|
Chair |
|
Masayoshi Ohashi (Fukuoka Univ.) |
Vice Chair |
|
Jun Muramatsu (NTT) |
Secretary |
|
Nariaki Kuzuoka (Wakayama Univ.), Takahiro Yoshida (Yokohama College of Commerce) |
Assistant |
|
Mitsugu Iwamoto (Univ. of Electro-Comm.) |
|
|
Chair |
|
Akinori Ito (Tohoku Univ.) |
Vice Chair |
|
Masaki Kawamura (Yamaguchi Univ.), Hirohisa Hioki (Kyoto Univ.) |
Secretary |
|
Kotaro Sonoda (Nagasaki Univ.), Motoi Iwata (Osaka Pref. Univ.) |
Assistant |
|
Rui Shogenji (Shizuoka Univ.), Masaaki Fujiyoshi (Tokyo Metropolitan Univ.) |
|
Conference Date |
Mon, May 22, 2017 13:00 - 17:40
Tue, May 23, 2017 10:00 - 15:15 |
Topics |
Information Security, Information Theory, Information Hiding, etc. |
Conference Place |
Seminar room in Hyakushunen Kinenkan, Yonezawa Campus, Yamagata University |
Address |
3-16, Jounan 4 Choume, Yonezawa city, Yamagata, 992-8510 Japan |
Transportation Guide |
about 5 minutes walk from Minami Yonezawa station in JR Yonesaka line http://www.yamagata-u.ac.jp/en/about-yu/transportation/ |
Contact Person |
Prof. Kazuhiro KONDO
+81-238-26-3312 |
Sponsors |
This conference is co-sponsored by IEEE IT Society Japan Chapter.
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Mon, May 22 PM EMM (1) 13:00 - 13:50 |
(1) |
13:00-13:25 |
A Data Embedding Method based on the JavaScript Encoder jjencode IT2017-1 EMM2017-1 |
Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) |
(2) |
13:25-13:50 |
Digital watermark detection method based on feature point matching using RANSAC algorithm IT2017-2 EMM2017-2 |
Yo Kitaoka, Kazuhiko Yamaguchi (UEC) |
|
13:50-14:05 |
Break ( 15 min. ) |
Mon, May 22 PM EMM (2) 14:05 - 14:55 |
(3) |
14:05-14:30 |
Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File IT2017-3 EMM2017-3 |
Takuya Fukushima, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(4) |
14:30-14:55 |
A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage IT2017-4 EMM2017-4 |
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
|
14:55-15:10 |
Break ( 15 min. ) |
Mon, May 22 PM IT (1) 15:10 - 16:25 |
(5) |
15:10-15:35 |
An Application of Universal FV Codes to Source Coding Allowing Errors IT2017-5 EMM2017-5 |
Shigeaki Kuzuoka (Wakayama Univ.) |
(6) |
15:35-16:00 |
Introduction to Anharmonic Fourier Series IT2017-6 EMM2017-6 |
Tetsuo Sakai (DRL) |
(7) |
16:00-16:25 |
Higher Order Differential Property of Few IT2017-7 EMM2017-7 |
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
|
16:25-16:40 |
Break ( 15 min. ) |
Mon, May 22 PM Invited talk Chair: Akinori Ito (Tohoku Univ.) 16:40 - 17:40 |
(8) |
16:40-17:40 |
[Invited Talk]
Frontier of intelligent information processing
-- - Sparse modeling vs Deep learning - -- |
Masayuki Ohzeki (Tohoku Univ.) |
Tue, May 23 AM EMM (3) 10:00 - 11:15 |
(9) |
10:00-10:25 |
Detection of anti-forensics by elimination and disguise of electrical network frequency in audio recordings IT2017-8 EMM2017-8 |
Akira Nishimura (Tokyo Univ. Info. Sci.) |
(10) |
10:25-10:50 |
On a wind noise countermeasure for bicycle Augmented Reality Audio systems IT2017-9 EMM2017-9 |
Toya Kitagawa, Kazuhiro Kondo (Yamagata Univ) |
(11) |
10:50-11:15 |
A speech Manipulation Detection Method using Speech Fingerprinting and Watermark IT2017-10 EMM2017-10 |
Shinnya Takahashi, Kazuhiro Kondo (Yamagata Univ.) |
|
11:15-11:30 |
Break ( 15 min. ) |
Tue, May 23 AM EMM (4) 11:30 - 12:20 |
(12) |
11:30-11:55 |
Digital signature type QR code with personal identification function IT2017-11 EMM2017-11 |
Ken-ichi Sakina (QR Tech.) |
(13) |
11:55-12:20 |
Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code IT2017-12 EMM2017-12 |
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) |
|
12:20-14:00 |
Lunch ( 100 min. ) |
Tue, May 23 PM IT (2) 14:00 - 15:15 |
(14) |
14:00-14:25 |
Construction of Parallel RIO Codes using Coset Coding with Hamming Codes IT2017-13 EMM2017-13 |
Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) |
(15) |
14:25-14:50 |
A Dynamic Programming Algorithm to Construct Optimal Code Trees of Binary AIFV-m Codes IT2017-14 EMM2017-14 |
Takaya Kawai, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(16) |
14:50-15:15 |
A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality IT2017-15 EMM2017-15 |
Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
IT |
Technical Committee on Information Theory (IT) [Latest Schedule]
|
Contact Address |
E-:it-c(to IT Secretaries)
.
Shigeaki Kuzuoka (Wakayama University)
Takahiro Yoshida (Yokohama College of Commerce)
Mitsugu Iwamoto (University of Electro-Communications) |
EMM |
Technical Committee on Enriched MultiMedia (EMM) [Latest Schedule]
|
Contact Address |
|
Last modified: 2017-05-16 22:58:49
|