Wed, Mar 13 PM Poster Session (Oral abstract presentation) 13:15 - 13:55 |
(1) |
13:15-13:55 |
Oral presentation for poster session papers |
|
13:55-14:05 |
Break ( 10 min. ) |
Wed, Mar 13 PM Poster session (former half) 14:05 - 15:05 |
(1) |
14:05-15:05 |
[Poster Presentation]
A privacy preserving culculation method of eigenface using EtC images |
Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) |
(2) |
14:05-15:05 |
[Poster Presentation]
Digital watermarking method using CNN including a robust extractor neural network against rotation |
Ippei Hamamoto, Masaki Kawamura (Yamaguchi Univ.) |
(3) |
14:05-15:05 |
[Poster Presentation]
Identification of Analog Devices Based Machine Learning |
Kazuma Tomitsuka, Shohei Hujimaki, Hyunho Kang (NITTC) |
(4) |
14:05-15:05 |
[Poster Presentation]
Printer Identification Using Density Characteristics of Text Contour |
Yusuke Takateyama, Hyunho Kang (NITTC) |
(5) |
14:05-15:05 |
[Poster Presentation]
Watermark extraction using deep learning |
Tanaka Yota, Hyunho Kang (NITTC) |
(6) |
14:05-15:05 |
[Poster Presentation]
A study on detection of panning processing of sound |
Yasuhiro Kuroda, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) |
(7) |
14:05-15:05 |
[Poster Presentation]
An eye-contact feedback system using the estimation of the facial direction during oral presentation |
Yo Horiuchi, Tetsuya Kojima (NIT, Tokyo College), Tomoko Hori (Juntendo Univ.) |
(8) |
14:05-15:05 |
[Poster Presentation]
A Visible Video Data Hiding Based on Spacial and Temporal Synchronization and Its Application to Information Communications |
Yuya Hirata, Tetsuya Kojima (NIT, Tokyo College) |
(9) |
14:05-15:05 |
[Poster Presentation]
Content protection scheme that can control editing by accounting |
Kobayashi Tomohiro, Iwamura Keiichi (TUS), Inamura Masaki (TDU) |
(10) |
14:05-15:05 |
[Poster Presentation]
A study of patch size for distinguishing CGs from real photos using CNN |
Kento Kawata, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
|
15:05-15:15 |
Break ( 10 min. ) |
Wed, Mar 13 PM Poster session (latter half) 15:15 - 16:15 |
(11) |
15:15-16:15 |
[Poster Presentation]
Relationship between error correcting capability for error correction codes and basin of attraction in associative memory models |
Akinobu Oshikawa, Masaki Kawamura (Yamaguchi Univ.) |
(12) |
15:15-16:15 |
[Poster Presentation]
Face Anti-spoofing Using Optical Flow |
Fujimkai Shohei, Hyunho Kang (NITTC) |
(13) |
15:15-16:15 |
[Poster Presentation]
Breast Cancer Image Classification Using Machine Learning |
Kanta Sugawara, Hyunho Kang (NITTC) |
(14) |
15:15-16:15 |
[Poster Presentation]
A Consideration on Spatio-Temporal Feature Learning for Video Forgery Detection |
Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) |
(15) |
15:15-16:15 |
[Poster Presentation]
On a Visible Video Watermarking Using Visual Effects |
Kento Akimoto, Tetsuya Kojima (NIT, Tokyo College) |
(16) |
15:15-16:15 |
[Poster Presentation]
Human Touch Character Font System
-- Generation of hand written HIRAGANA using Neural Network -- |
Yuto Yamamoto, Michiharu Niimi (KIT) |
(17) |
15:15-16:15 |
[Poster Presentation]
Estimation of Collusion Strategy for Fingerprinting Codes under Noisy Environment |
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(18) |
15:15-16:15 |
[Poster Presentation]
Study on inaudible audio information hiding using linear-time variant IIR filter based on cochlear delay characteristics |
Candy Olivia Mawalim, Masashi Unoki (JAIST) |
|
16:15-16:25 |
Break ( 10 min. ) |
Wed, Mar 13 PM Regular (1) 16:25 - 17:15 |
(19) |
16:25-16:50 |
Improving the robusteness of neural networks to adversarial examples by reducing color depth of training inage data |
Shuntaro Miyazato, Toshihiko Yamasaki, Kiyoharu Aizawa (UTokyo) |
(20) |
16:50-17:15 |
An attempt of source position estimation based on multipoint observation of infrasound |
Zhenglie Cui, Ryosuke Sasahara (Tohoku Univ.), Ryouichi Nishimura (NICT), Yoiti Suzuki (Tohoku Univ.) |
Thu, Mar 14 AM Regular (2) 09:15 - 10:05 |
(21) |
09:15-10:05 |
[Invited Talk]
Copyright Protection Technology in a UGC Era without Depending on DRM |
Masaki Inamura (TDU) |
|
10:05-10:15 |
Break ( 10 min. ) |
Thu, Mar 14 AM Regular (3) 10:15 - 11:55 |
(22) |
10:15-10:40 |
Proposal of Malware Classification Method with N-gram Compression and Deep Learning |
Shoki Takiguchi, Ryuya Uda (Tokyo Univ. of Tech.) |
(23) |
10:40-11:05 |
Implementation of Digital Signature to QR Symbol with Compatible using Subcell Division and Double Encoding |
Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) |
(24) |
11:05-11:30 |
Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels |
Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) |
(25) |
11:30-11:55 |
Image Patch Modeling using Secure Computation of Sparse Dictionary Learning |
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) |