IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Enriched MultiMedia (EMM)  (Searched in: 2011)

Search Results: Keywords 'from:2012-03-16 to:2012-03-16'

[Go to Official EMM Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2012-03-16
09:00
Osaka   Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration
Fumiya Nakano, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi (Kyushu Inst. Tech.) EMM2011-64
An application of information hiding to image compression is investigated to improve compression efficiency for JPEG col... [more] EMM2011-64
pp.1-5
EMM 2012-03-16
09:30
Osaka   Providing Hiding Functions of Sub-track Acoustic Signals for Audio Watermark Technique -- G-encoder Mark for COPY PROTECT --
Toshio Modegi (DNP) EMM2011-65
We propose hiding another acoustic signal such as vocal sounds of warning messages or copy disturbance noises within an ... [more] EMM2011-65
pp.7-12
EMM 2012-03-16
10:00
Osaka   Secure Speech Coding Method Using Speech Synthesis
Minoru Kohata (Chiba Insutitute of Tech.) EMM2011-66
Several analog speech encryption methods were proposed so far. Nowadays, most of speech encryptionsystems employs digita... [more] EMM2011-66
pp.13-18
EMM 2012-03-16
10:45
Osaka   An Image Segmentation Method for Privacy and Copyright-aware Image Trading System
Yu Sengoku, Hirohisa Hioki (Kyoto Univ.) EMM2011-67
In a digital image trading system, for protecting the copyright of images and users' privacy, an image to be purchased i... [more] EMM2011-67
pp.19-24
EMM 2012-03-16
11:15
Osaka   Collusion-Secure Delivery of Privacy Protected Video Depending on Viewers Authority
Naoya Fukuoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.) EMM2011-68
This report presents a collusion-secure delivery method for viewer-dependent privacy protected video, where “viewer-depe... [more] EMM2011-68
pp.25-30
EMM 2012-03-16
11:45
Osaka   Protection of privacy in JPEG images using reversible information hiding
Fuyuki Masutani, Michiharu Niimi, Hideki Noda (KIT) EMM2011-69
The privacy of unknown person may be included in the digital images unintentionally taken as a sight. The action of the ... [more] EMM2011-69
pp.31-36
EMM 2012-03-16
13:30
Osaka   [Invited Talk] Music Valuation by Kandoh Grading Scale
Satoshi Oode, Akio Ando (NHK STRL), Takashi Taniguchi (Osaka Gakuin Univ.) EMM2011-70
The word “Kandoh” was used in the daily incident when feeling were dramatically changed, and when affirmative evaluation... [more] EMM2011-70
pp.37-42
EMM 2012-03-16
14:45
Osaka   Image watermarking resistant to geometric attacks based on SIFT feature
Wei Na, Kazuhiko Yamaguchi (UEC) EMM2011-71
In image watermarking issue,geometric attacks are known as important and difficult problem to resist,which can desynchro... [more] EMM2011-71
pp.43-48
EMM 2012-03-16
15:15
Osaka   Performance evaluation for decoder with simulated annealing for spread spectrum digital watermarking
Nao Teranishi, Masaki Kawamura (Yamaguchi Univ.) EMM2011-72
We discuss decoding algorithms using simulated annealing (SA) in spread
spectrum watermarking. We consider two types o... [more]
EMM2011-72
pp.49-54
EMM 2012-03-16
16:00
Osaka   Smooth time-saving techniques focused on the amount of movement of objects in video
Hiroshi Usami, Rei Hamakawa (Chukyo Univ) EMM2011-73
 [more] EMM2011-73
pp.55-60
EMM 2012-03-16
16:30
Osaka   Possibility of Audio Trick Art by Converting Sampling Frequency
Naofumi Aoki (Hokkaido Univ.) EMM2011-74
Besides some industrial applications such as steganography and digital watermarking, the concept of information hiding i... [more] EMM2011-74
pp.61-64
EMM 2012-03-16
17:00
Osaka   Ambient Code Using Time Modulation of Color
Toru Inoue, Shigeru Kuriyama (TUT) EMM2011-75
Visual tag technologies are widely utilized for instantly obtaining URLs of relevant information, by photographing print... [more] EMM2011-75
pp.65-70
EMM 2012-03-16
17:30
Osaka   A study of effective information hiding method for embedded systems
Kei Nakao, Shuhei Itaya, Masahiro Osawa, Takeshi Kumaki, Takeshi Fujino (Ritsumeikan Univ.) EMM2011-76
 [more] EMM2011-76
pp.71-76
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan