Conference Date |
Thu, May 23, 2019 14:00 - 17:25
Fri, May 24, 2019 09:30 - 14:45 |
Topics |
Information Security, Information Theory, Information Hiding, etc. |
Conference Place |
Asahikawa International Conference Hall |
Address |
7 Chome Kagura 3 Jo, Asahikawa, Hokkaido, 070-8003, Japan |
Transportation Guide |
About 10 mins walk from Asahiikawa Station http://www.city.asahikawa.hokkaido.jp/kurashi/329/348/357/d054744.html |
Contact Person |
Prof. Tetsyya Kojima (NIT,Tokyo College)
+81-166-69-2000 (Community Center) |
Sponsors |
This conference is co-sponsored by IEEE IT Society Japan Chapter.
|
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on EMM, IT. |
Thu, May 23 PM EMM (1) Chair: Kazuhiro Kono (Kansai Univ.) 14:00 - 14:50 |
(1) |
14:00-14:25 |
Generation of privacy-preserving images holding positional information for HOG feature extraction |
Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) |
(2) |
14:25-14:50 |
A study on printer dependency on feature points for barcode forensics |
Kohei Shirai, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science) |
|
14:50-15:05 |
Break ( 15 min. ) |
Thu, May 23 PM IT (1) Chair: Nozomi Miya (Aoyama Gakuin Univ.) 15:05 - 16:20 |
(3) |
15:05-15:30 |
Gradient Coding based on LDGM Codes and Stochastic Gradient Descent |
Shunsuke Horii (Waseda Univ.), Takahiro Yoshida (Yokohama Col. of Commerce), Manabu Kobayashi, Toshiyasu Matsushima (Waseda Univ.) |
(4) |
15:30-15:55 |
The Error Performance Analysis of tail-biting conovolutional codes |
Hideki Yoshikawa (Tohoku Gakuin Univ.) |
(5) |
15:55-16:20 |
The Weight Distributions of the (256,k) Extended Binary Primitive BCH Codes with k=71, 187, 191, and 199 |
Toru Fujiwara (Osaka Univ.), Takuya Kusaka (Okayama Univ.) |
|
16:20-16:35 |
Break ( 15 min. ) |
Thu, May 23 PM Invited talk Chair: Minoru Kuribayashi (Okayama Univ.) 16:35 - 17:25 |
(6) |
16:35-17:25 |
[Invited Talk]
Security of Machine Learning |
Satsuya Ohata (AIST), Yuya Senzaki (Idein) |
Fri, May 24 AM IT (2) Chair: Hideki Yoshikawa (Tohoku Gakuin Univ.) 09:30 - 10:20 |
(7) |
09:30-09:55 |
A Consideration on Extended Ternary Memoryless Sources with a Simple Construction of Binary Compact Codes |
Nozomi Miya (Aoyama Gakuin Univ.), Takahiro Yoshida (Yokohama College of Commerce), Hajime Jinushi (Aoyama Gakuin Univ.) |
(8) |
09:55-10:20 |
On Multiterminal Zero Rate Hypothesis Testing Problem |
Yasutada Oohama (UEC) |
|
10:20-10:35 |
Break ( 15 min. ) |
Fri, May 24 AM EMM (2) Chair: Kitahiro Kaneda (NAGASE & CO., LTD.) 10:35 - 11:50 |
(9) |
10:35-11:00 |
Searchable Image Encryption using Secret Sharing Scheme |
Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) |
(10) |
11:00-11:25 |
Improved DM-QIM Watermarking for PDF Document |
Minoru Kuribayashi (Okayama Univ.), KokSheik Wong (Monash Univ.) |
(11) |
11:25-11:50 |
On an Audio Data Hiding Scheme in Music Based on the Characteristics of Percussion Instruments |
Naoto Yamahashi (Mimaki Engineering), Yui Ichioka (FIXER), Tetsuya Kojima (NIT, Tokyo College) |
|
11:50-13:30 |
Break ( 100 min. ) |
Fri, May 24 PM IT (3) Chair: Shunsuke Horii (Waseda Univ.) 13:30 - 14:45 |
(12) |
13:30-13:55 |
Higher Order Differential Property of BIG Block Cipher |
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
(13) |
13:55-14:20 |
Improving Sparse Superposition Codes with Deep Learning |
Masazumi Iida, Yuya Oshikawa (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Junichi Takeuchi (Kyushu Univ.) |
(14) |
14:20-14:45 |
Reduced-Complexity Successive Cancellation List Decoding of Polar Codes Using Parity Check and List-Pruning |
Yusuke Oki, Ryo Shibata, Gou Hosoya, Hiroyuki Yashima (TUS) |