Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2012-03-16 09:00 |
Osaka |
|
Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Fumiya Nakano, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi (Kyushu Inst. Tech.) EMM2011-64 |
An application of information hiding to image compression is investigated to improve compression efficiency for JPEG col... [more] |
EMM2011-64 pp.1-5 |
EMM |
2012-03-16 09:30 |
Osaka |
|
Providing Hiding Functions of Sub-track Acoustic Signals for Audio Watermark Technique
-- G-encoder Mark for COPY PROTECT -- Toshio Modegi (DNP) EMM2011-65 |
We propose hiding another acoustic signal such as vocal sounds of warning messages or copy disturbance noises within an ... [more] |
EMM2011-65 pp.7-12 |
EMM |
2012-03-16 10:00 |
Osaka |
|
Secure Speech Coding Method Using Speech Synthesis Minoru Kohata (Chiba Insutitute of Tech.) EMM2011-66 |
Several analog speech encryption methods were proposed so far. Nowadays, most of speech encryptionsystems employs digita... [more] |
EMM2011-66 pp.13-18 |
EMM |
2012-03-16 10:45 |
Osaka |
|
An Image Segmentation Method for Privacy and Copyright-aware Image Trading System Yu Sengoku, Hirohisa Hioki (Kyoto Univ.) EMM2011-67 |
In a digital image trading system, for protecting the copyright of images and users' privacy, an image to be purchased i... [more] |
EMM2011-67 pp.19-24 |
EMM |
2012-03-16 11:15 |
Osaka |
|
Collusion-Secure Delivery of Privacy Protected Video Depending on Viewers Authority Naoya Fukuoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.) EMM2011-68 |
This report presents a collusion-secure delivery method for viewer-dependent privacy protected video, where “viewer-depe... [more] |
EMM2011-68 pp.25-30 |
EMM |
2012-03-16 11:45 |
Osaka |
|
Protection of privacy in JPEG images using reversible information hiding Fuyuki Masutani, Michiharu Niimi, Hideki Noda (KIT) EMM2011-69 |
The privacy of unknown person may be included in the digital images unintentionally taken as a sight. The action of the ... [more] |
EMM2011-69 pp.31-36 |
EMM |
2012-03-16 13:30 |
Osaka |
|
[Invited Talk]
Music Valuation by Kandoh Grading Scale Satoshi Oode, Akio Ando (NHK STRL), Takashi Taniguchi (Osaka Gakuin Univ.) EMM2011-70 |
The word “Kandoh” was used in the daily incident when feeling were dramatically changed, and when affirmative evaluation... [more] |
EMM2011-70 pp.37-42 |
EMM |
2012-03-16 14:45 |
Osaka |
|
Image watermarking resistant to geometric attacks based on SIFT feature Wei Na, Kazuhiko Yamaguchi (UEC) EMM2011-71 |
In image watermarking issue,geometric attacks are known as important and difficult problem to resist,which can desynchro... [more] |
EMM2011-71 pp.43-48 |
EMM |
2012-03-16 15:15 |
Osaka |
|
Performance evaluation for decoder with simulated annealing for spread spectrum digital watermarking Nao Teranishi, Masaki Kawamura (Yamaguchi Univ.) EMM2011-72 |
We discuss decoding algorithms using simulated annealing (SA) in spread
spectrum watermarking. We consider two types o... [more] |
EMM2011-72 pp.49-54 |
EMM |
2012-03-16 16:00 |
Osaka |
|
Smooth time-saving techniques focused on the amount of movement of objects in video Hiroshi Usami, Rei Hamakawa (Chukyo Univ) EMM2011-73 |
[more] |
EMM2011-73 pp.55-60 |
EMM |
2012-03-16 16:30 |
Osaka |
|
Possibility of Audio Trick Art by Converting Sampling Frequency Naofumi Aoki (Hokkaido Univ.) EMM2011-74 |
Besides some industrial applications such as steganography and digital watermarking, the concept of information hiding i... [more] |
EMM2011-74 pp.61-64 |
EMM |
2012-03-16 17:00 |
Osaka |
|
Ambient Code Using Time Modulation of Color Toru Inoue, Shigeru Kuriyama (TUT) EMM2011-75 |
Visual tag technologies are widely utilized for instantly obtaining URLs of relevant information, by photographing print... [more] |
EMM2011-75 pp.65-70 |
EMM |
2012-03-16 17:30 |
Osaka |
|
A study of effective information hiding method for embedded systems Kei Nakao, Shuhei Itaya, Masahiro Osawa, Takeshi Kumaki, Takeshi Fujino (Ritsumeikan Univ.) EMM2011-76 |
[more] |
EMM2011-76 pp.71-76 |