Conference Date |
Mon, May 22, 2017 13:00 - 17:40
Tue, May 23, 2017 10:00 - 15:15 |
Topics |
Information Security, Information Theory, Information Hiding, etc. |
Conference Place |
Seminar room in Hyakushunen Kinenkan, Yonezawa Campus, Yamagata University |
Address |
3-16, Jounan 4 Choume, Yonezawa city, Yamagata, 992-8510 Japan |
Transportation Guide |
about 5 minutes walk from Minami Yonezawa station in JR Yonesaka line http://www.yamagata-u.ac.jp/en/about-yu/transportation/ |
Contact Person |
Prof. Kazuhiro KONDO
+81-238-26-3312 |
Sponsors |
This conference is co-sponsored by IEEE IT Society Japan Chapter.
|
Mon, May 22 PM EMM (1) 13:00 - 13:50 |
(1) |
13:00-13:25 |
A Data Embedding Method based on the JavaScript Encoder jjencode |
Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) |
(2) |
13:25-13:50 |
Digital watermark detection method based on feature point matching using RANSAC algorithm |
Yo Kitaoka, Kazuhiko Yamaguchi (UEC) |
|
13:50-14:05 |
Break ( 15 min. ) |
Mon, May 22 PM EMM (2) 14:05 - 14:55 |
(3) |
14:05-14:30 |
Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File |
Takuya Fukushima, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(4) |
14:30-14:55 |
A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage |
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
|
14:55-15:10 |
Break ( 15 min. ) |
Mon, May 22 PM IT (1) 15:10 - 16:25 |
(5) |
15:10-15:35 |
An Application of Universal FV Codes to Source Coding Allowing Errors |
Shigeaki Kuzuoka (Wakayama Univ.) |
(6) |
15:35-16:00 |
Introduction to Anharmonic Fourier Series |
Tetsuo Sakai (DRL) |
(7) |
16:00-16:25 |
Higher Order Differential Property of Few |
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
|
16:25-16:40 |
Break ( 15 min. ) |
Mon, May 22 PM Invited talk Chair: Akinori Ito (Tohoku Univ.) 16:40 - 17:40 |
(8) |
16:40-17:40 |
[Invited Talk]
Frontier of intelligent information processing
-- - Sparse modeling vs Deep learning - -- |
Masayuki Ohzeki (Tohoku Univ.) |
Tue, May 23 AM EMM (3) 10:00 - 11:15 |
(9) |
10:00-10:25 |
Detection of anti-forensics by elimination and disguise of electrical network frequency in audio recordings |
Akira Nishimura (Tokyo Univ. Info. Sci.) |
(10) |
10:25-10:50 |
On a wind noise countermeasure for bicycle Augmented Reality Audio systems |
Toya Kitagawa, Kazuhiro Kondo (Yamagata Univ) |
(11) |
10:50-11:15 |
A speech Manipulation Detection Method using Speech Fingerprinting and Watermark |
Shinnya Takahashi, Kazuhiro Kondo (Yamagata Univ.) |
|
11:15-11:30 |
Break ( 15 min. ) |
Tue, May 23 AM EMM (4) 11:30 - 12:20 |
(12) |
11:30-11:55 |
Digital signature type QR code with personal identification function |
Ken-ichi Sakina (QR Tech.) |
(13) |
11:55-12:20 |
Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code |
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) |
|
12:20-14:00 |
Lunch ( 100 min. ) |
Tue, May 23 PM IT (2) 14:00 - 15:15 |
(14) |
14:00-14:25 |
Construction of Parallel RIO Codes using Coset Coding with Hamming Codes |
Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) |
(15) |
14:25-14:50 |
A Dynamic Programming Algorithm to Construct Optimal Code Trees of Binary AIFV-m Codes |
Takaya Kawai, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(16) |
14:50-15:15 |
A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality |
Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) |