|
Chair |
|
Yasutada Oohama (Univ. of Electro-Comm.) |
Vice Chair |
|
Tadashi Wadayama (Nagoya Inst. of Tech.) |
Secretary |
|
Takuya Kusaka (Okayama Univ.), Mitsugu Iwamoto (Univ. of Electro-Comm.) |
Assistant |
|
Ryo Nomura (Senshu Univ.) |
|
|
Chair |
|
Akinori Ito (Tohoku Univ.) |
Vice Chair |
|
Masashi Unoki (JAIST), Masaki Kawamura (Yamaguchi Univ.) |
Secretary |
|
Masatsugu Ichino (Univ. of Electro-Comm.), Kotaro Sonoda (Nagasaki Univ.) |
Assistant |
|
Motoi Iwata (Osaka Pref. Univ.), Kazuhiro Kono (Kansai Univ.) |
|
Conference Date |
Thu, May 21, 2015 10:15 - 16:10
Fri, May 22, 2015 10:00 - 15:35 |
Topics |
Information Security, Information Theory, Information Hiding, etc. |
Conference Place |
Kyoto International Community House |
Address |
2-1 Torii-cho,Awataguchi, Sakyo-ku Kyoto,606-8536 JAPAN. |
Transportation Guide |
http://www.kcif.or.jp/HP/access/en/index.html |
Sponsors |
This conference is co-sponsored by the IEEE IT Society Japan Chapter.
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, May 21 AM 10:15 - 11:30 |
(1) |
10:15-10:40 |
On a Lower Bound on the Capacity of Digital Fingerprinting Codes with Codewords Generated by Using a Continuous Distribution IT2015-1 EMM2015-1 |
Hiroki Koga, Kaoru Itabashi (U. Tsukuba) |
(2) |
10:40-11:05 |
Feasible regions of symmetric capacity and Gallager's $E_{0}$ functions for discrete memoryless channels under a uniform input distribution IT2015-2 EMM2015-2 |
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) |
(3) |
11:05-11:30 |
Analysis on Reliability Function and Strong Converse of Discrete Memoryless Biometrical Identification Systems IT2015-3 EMM2015-3 |
Yachongka Vamoua, Hideki Yagi (Univ. of Electro-Comm.) |
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Thu, May 21 PM 13:00 - 14:15 |
(4) |
13:00-13:25 |
New Classes of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XV)SE(1)PKC and K(XVI)SE(1)PKC IT2015-4 EMM2015-4 |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(5) |
13:25-13:50 |
Design and Evaluation of LDPC Code Decoder Using Generalized BP Algorithm IT2015-5 EMM2015-5 |
Akiyoshi Hashimoto, Harumi Morino (Hitachi) |
(6) |
13:50-14:15 |
A Note on Correlation Properties of Periodic Sequences over Extension Fields from a Cyclic Difference Set IT2015-6 EMM2015-6 |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.), Keiichi Takahashi (Kinki Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
Thu, May 21 PM 14:30 - 16:10 |
(7) |
14:30-14:55 |
Generating Protected Eigenface Templates Using an Unitary Transformaion IT2015-7 EMM2015-7 |
Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(8) |
14:55-15:20 |
Readout of copyright information hidden in objects fabricated with 3-D printers IT2015-8 EMM2015-8 |
Piyarat Silapasuphakornwong, Masahiro Suzuki, Kazutake Uehira (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hiroshi Unno (Kanagawa Inst. Tech.) |
(9) |
15:20-15:45 |
A study on speaker conversion using speech and expression features for video chatting IT2015-9 EMM2015-9 |
Yuuki Saito, Takashi Nose (Tohoku Univ.), Takahiro Shinozaki (Tokyo Institute of Technology), Akinori Ito (Tohoku Univ.) |
(10) |
15:45-16:10 |
Data Anonymization for Information Recommendation Based on TF-IDF Method IT2015-10 EMM2015-10 |
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) |
Fri, May 22 AM 10:00 - 10:50 |
(11) |
10:00-10:25 |
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint IT2015-11 EMM2015-11 |
Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) |
(12) |
10:25-10:50 |
Evaluation of Symmetric Mutual Information of Simplified TDMR Channel Model IT2015-12 EMM2015-12 |
Tadashi Wadayama (Nitech) |
|
10:50-11:05 |
Break ( 15 min. ) |
Fri, May 22 AM 11:05 - 11:55 |
(13) |
11:05-11:55 |
[Invited Talk]
Trade-off between resiliency and efficiency of cryptographic protocols
-- The case of information theoretical security -- IT2015-13 EMM2015-13 |
Maki Yoshida (NICT) |
|
11:55-13:40 |
Lunch Break ( 105 min. ) |
Fri, May 22 PM 13:40 - 14:30 |
(14) |
13:40-14:05 |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically IT2015-14 EMM2015-14 |
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) |
(15) |
14:05-14:30 |
Robust Audio Watermarking Based on Dynamic Phase Coding and Error Control Coding IT2015-15 EMM2015-15 |
Ngo Nhut Minh, Brian M. Kurkoski, Masashi Unoki (JAIST) |
|
14:30-14:45 |
Break ( 15 min. ) |
Fri, May 22 PM 14:45 - 15:35 |
(16) |
14:45-15:35 |
[Invited Talk]
Complete Complementary Codes and Its Applications IT2015-16 EMM2015-16 |
Tetsuya Kojima (NIT, Tokyo College) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
IT |
Technical Committee on Information Theory (IT) [Latest Schedule]
|
Contact Address |
E-:it-c(to IT Secretaries)
.
Takuya Kusaka (Okayama University)
Mitsugu Iwamoto (University of Electro-Communications)
Ryo Nomura (Senshu University) |
EMM |
Technical Committee on Enriched MultiMedia (EMM) [Latest Schedule]
|
Contact Address |
EMM
Masatsugu Ichino(University of Electro-Communications) |
Last modified: 2015-05-18 10:59:08
|