Tue, Mar 14 AM WBS1(D21) 09:00 - 10:15 |
(1) |
09:00-09:25 |
Improvement of the meteor burst channel model and comparison with results of the experiment in Indonesia IT2022-68 ISEC2022-47 WBS2022-65 RCC2022-65 |
Hiroto Iwasaki, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.) |
(2) |
09:25-09:50 |
A Study on Application of Multi-Receiver System in Meteor Burst Communication IT2022-69 ISEC2022-48 WBS2022-66 RCC2022-66 |
Takumi Kayama, Kaiji Mukumoto, Tadahiro Wada (Shizuoka Univ.) |
(3) |
09:50-10:15 |
A Proposal of Visible Light Communication System using Image Classifier based on Imaginary Images IT2022-70 ISEC2022-49 WBS2022-67 RCC2022-67 |
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) |
|
10:15-10:30 |
Break ( 15 min. ) |
Tue, Mar 14 AM IT2(D21) Chair: Tetsuya Kojima (National Institute of Technology, Tokyo College) 10:30 - 11:20 |
(4) |
10:30-11:20 |
[Invited Talk]
Information-Theoretic Analyses for Two Problems Taking Security into Consideration
-- Parameter Estimation Problem under Local Differential Privacy, and Privacy-Utility Tradeoff Problem -- IT2022-71 ISEC2022-50 WBS2022-68 RCC2022-68 |
Shota Saito (Gunma Univ.) |
|
11:20-13:00 |
Break ( 100 min. ) |
Tue, Mar 14 AM ISEC1(D22) Chair: Kazuki Yoneyama (Ibaraki University) 09:00 - 10:15 |
(5) |
09:00-09:25 |
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication
-- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication -- IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69 |
Masaaki Shirase (FUN) |
(6) |
09:25-09:50 |
Security Anslysis of binary elliptic curve GLS254 IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 |
Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) |
(7) |
09:50-10:15 |
Full key recovery of RSA secret key from noisy binary GCD operation sequences IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71 |
Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba) |
|
10:15-10:30 |
Break ( 15 min. ) |
Tue, Mar 14 AM ISEC2(D22) Chair: Yoshikazu Hanatani (Toshiba) 10:30 - 12:10 |
(8) |
10:30-10:55 |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 |
Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) |
(9) |
10:55-11:20 |
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73 |
Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU) |
(10) |
11:20-11:45 |
An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography IT2022-77 ISEC2022-56 WBS2022-74 RCC2022-74 |
Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech) |
(11) |
11:45-12:10 |
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 |
Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) |
|
12:10-13:00 |
Break ( 50 min. ) |
Tue, Mar 14 AM IT1 (D12) Chair: Jun Suzuki (UEC) 09:25 - 10:15 |
(12) |
09:25-09:50 |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 |
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) |
(13) |
09:50-10:15 |
An information-spectrum approach to entanglement purification and distillation IT2022-80 ISEC2022-59 WBS2022-77 RCC2022-77 |
Motoki Achiwa, Tomohiro Ogawa (UEC) |
Tue, Mar 14 PM RCC1(D21) Chair: Kunihisa Okano (Ritsumeikan University) 13:00 - 14:15 |
(14) |
13:00-13:25 |
On Reward Distribution in Reinforcement Learning of Multi-Agent Surveillance Systems with Temporal Logic Specifications IT2022-81 ISEC2022-60 WBS2022-78 RCC2022-78 |
Keita Terashima, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) |
(15) |
13:25-13:50 |
Generation of GPS and QZSS Spoofing Signals IT2022-82 ISEC2022-61 WBS2022-79 RCC2022-79 |
Yuta Kawasaki, ishii koji (Kagawa Univ.) |
(16) |
13:50-14:15 |
Secure communication based on high precision space-time synchronization IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) |
|
14:15-14:55 |
Break ( 40 min. ) |
Tue, Mar 14 PM WBS2(D21) 14:55 - 16:35 |
(17) |
14:55-15:20 |
A Study on Security Gap-Based Design of Polar Codes IT2022-84 ISEC2022-63 WBS2022-81 RCC2022-81 |
Hidetake Matsui, Toshiki Matsumine, Hideki Ochiai (Yokohama National Univ.) |
(18) |
15:20-15:45 |
High Speed Optical Wireless Uplink using MU-MIMO with Angle Diversity IT2022-85 ISEC2022-64 WBS2022-82 RCC2022-82 |
Xuejuan Zhu, Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya Univ) |
(19) |
15:45-16:10 |
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83 |
Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) |
(20) |
16:10-16:35 |
Performance Evaluation of Image Sensor Communication Using Propeller-Type Rotary LED Transmitter With Varying LED Installation Positions IT2022-87 ISEC2022-66 WBS2022-84 RCC2022-84 |
Kazuki Syakuda (Okayama Univ. of Sci.), Zhengqiang Tang (Nagoya Univ.), Shintaro Arai (Okayama Univ. of Sci.) |
|
16:35-16:50 |
Break ( 15 min. ) |
Tue, Mar 14 PM RCC2(D21) Chair: Ryosuke Adachi (Yamaguchi University) 16:50 - 17:40 |
(21) |
16:50-17:40 |
[Invited Talk]
Novel Wireless Communication System Realized by Mobile Terminal Collaboration using Higher-Frequency Bands IT2022-88 ISEC2022-67 WBS2022-85 RCC2022-85 |
Hidekazu Murata (Yamaguchi Univ.) |
Tue, Mar 14 PM ISEC3(D22) Chair: Atsushi Takayasu (The University of Tokyo) 13:00 - 14:40 |
(22) |
13:00-13:25 |
Multi-Authority Attribute Based Signatures from Lattice IT2022-89 ISEC2022-68 WBS2022-86 RCC2022-86 |
Yuto Kaneko, Toi Tomita, Junji Shikata (Yokohama National Univ.) |
(23) |
13:25-13:50 |
Signature scheme based on OSIDH IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 |
Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT) |
(24) |
13:50-14:15 |
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 |
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
(25) |
14:15-14:40 |
FPGA implementation of PQC Signature Algorithm QR-UOV using High Level Synthesis IT2022-92 ISEC2022-71 WBS2022-89 RCC2022-89 |
Kimihiro Yamakoshi, Tsunekaze Saito (NTT) |
|
14:40-14:55 |
Break ( 15 min. ) |
Tue, Mar 14 PM ISEC4(D22) Chair: Koichi Sakurai (Kyushu University) 14:55 - 16:35 |
(26) |
14:55-15:20 |
Forward-Secure for Claimable/Repudiable Ring Signature Scheme IT2022-93 ISEC2022-72 WBS2022-90 RCC2022-90 |
Masato Uehara, Atsuko Miyaji (Osaka Univ), Tian yangguang (Surrey Univ) |
(27) |
15:20-15:45 |
Attribute-based encryption with keyword search IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 |
Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) |
(28) |
15:45-16:10 |
Claimable Designated Verifier Signature IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) |
(29) |
16:10-16:35 |
Identity-based Matchmaking Encryption Secure against the KGC IT2022-96 ISEC2022-75 WBS2022-93 RCC2022-93 |
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
|
16:35-16:50 |
Break ( 15 min. ) |
Tue, Mar 14 PM ISEC5(D22) Chair: Takahiro Matsuda (AIST) 16:50 - 18:05 |
(30) |
16:50-17:15 |
Proposal for a privacy-preserving frequency estimation method IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 |
Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) |
(31) |
17:15-17:40 |
Local Differential Privacy mechanism for non-linear machine learning IT2022-98 ISEC2022-77 WBS2022-95 RCC2022-95 |
Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST), Tomoaki Mimoto (ATR) |
(32) |
17:40-18:05 |
Diversification of Personal Records using GAN IT2022-99 ISEC2022-78 WBS2022-96 RCC2022-96 |
Chengxi Jiang, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) |
Tue, Mar 14 PM IT3 (D12) Chair: Shigeaki Kuzuoka (Wakayama Univ.) 13:00 - 14:40 |
(33) |
13:00-13:25 |
Exponential Strong Converse for Source Coding with Encoded Side Information
-- Comparison with Source Coding with Non-encoded Side Information -- IT2022-100 ISEC2022-79 WBS2022-97 RCC2022-97 |
Daisuke Takeuchi, Shun Watanabe (TUAT) |
(34) |
13:25-13:50 |
A Greedy Algorithm for the Minimum-Entropy Coupling Problem IT2022-101 ISEC2022-80 WBS2022-98 RCC2022-98 |
Taisei Shibata, Ken-ichi Iwata, Kengo Hashimoto (Univ. Fukui) |
(35) |
13:50-14:15 |
A Construction Method of Alphabetic Codes Allowing N-bit Decoding Delays IT2022-102 ISEC2022-81 WBS2022-99 RCC2022-99 |
Daichi Ueda, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(36) |
14:15-14:40 |
Construction of Grammar-Based Codes Using the LZ78 Code and Its Variants IT2022-103 ISEC2022-82 WBS2022-100 RCC2022-100 |
Mitsuharu Arimura (Shonan Inst. Tech.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Tue, Mar 14 PM IT4 (D12) Chair: Tomohiro Ogawa (UEC) 14:55 - 16:10 |
(37) |
14:55-15:20 |
IT2022-104 ISEC2022-83 WBS2022-101 RCC2022-101 |
Kaito Ootsu, Shan Lu, Hiroshi Kamabe (Gifu Univ) |
(38) |
15:20-15:45 |
Estimation Performance of Sparse Bayesian Linear Regression model with t-distribution IT2022-105 ISEC2022-84 WBS2022-102 RCC2022-102 |
Kazuaki Murayama (UEC) |
(39) |
15:45-16:10 |
Improvement of the Performance for Quantum Neural Network Classifiers based on Optimal Quantum Measurement Decoding IT2022-106 ISEC2022-85 WBS2022-103 RCC2022-103 |
Yusaku Yamada, Jun Suzuki (UEC) |
Wed, Mar 15 AM RCC3(D21) Chair: Koichi Kobayashi (Hokkaido University) 09:30 - 10:45 |
(40) |
09:30-09:55 |
Design Using Sparse Optimization of Consensus Dynamics in High-Order Multi-Agent Systems IT2022-107 ISEC2022-86 WBS2022-104 RCC2022-104 |
Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.) |
(41) |
09:55-10:20 |
Control of Multi-robot Systems Using A Future Map IT2022-108 ISEC2022-87 WBS2022-105 RCC2022-105 |
Aki Matsutaka (Nagoya Univ.), Shun-ichi Azuma (Kyoto Univ.), Ryo Ariizumi, Toru Asai (Nagoya Univ.) |
(42) |
10:20-10:45 |
Improvement of the Operability of Industrial Robot using Interpolation method under Imperfect Communication Constraints IT2022-109 ISEC2022-88 WBS2022-106 RCC2022-106 |
Yosuke Takagi, Ben Naila Chedlia, Hiraku Okada, Masaaki Katayama (Nagoya Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
Wed, Mar 15 AM WBS3(D21) 11:00 - 11:50 |
(43) |
11:00-11:50 |
[Invited Talk]
Virtualized terminal utilizing the terahertz band for high-capacity communications toward Beyond 5G/6G IT2022-110 ISEC2022-89 WBS2022-107 RCC2022-107 |
Takahiro Hayashi, Yoshio Kunisawa, Tatsuya Nagao, Kazuki Takezawa, Satoshi Ito, Hiromi Matsuno, Yoji Kishi (KDDI Research, Inc) |
|
11:50-13:00 |
Lunch ( 70 min. ) |
Wed, Mar 15 AM ISEC6(D22) Chair: Goichiro Hanaoka (AIST) 09:30 - 10:45 |
(44) |
09:30-09:55 |
Networks anomaly detection by VAE based on features extracted by CNN IT2022-111 ISEC2022-90 WBS2022-108 RCC2022-108 |
Higashihata Kazuki (Osaka Prefecture Univ.), Aoki Shigeki, Miyamoto Takao (Osaka Metropolitan Univ.) |
(45) |
09:55-10:20 |
A Consideration of Logfile Automatic Detection for Digital Forensics using Machine Learning IT2022-112 ISEC2022-91 WBS2022-109 RCC2022-109 |
Koudai Iwasaki (TUIS), Akira Orita, Shingo Sekiya, Shinta Nakano (HISYS), Masaki Hanada, Eiji Nunohiro, Yorinori Kishimoto (TUIS) |
(46) |
10:20-10:45 |
Designing for Supply Chain Network Model with Disruption Risks by Hybrid GA and Jaya Algorithm with Fuzzy Logic Controller IT2022-113 ISEC2022-92 WBS2022-110 RCC2022-110 |
Mitsuo Gen (FLSI), YoungSu Yun, Tserendulam Erdenebaatar (Chosun Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
Wed, Mar 15 AM ISEC7(D22) Chair: Masaaki Shirase (Future University Hakodate) 11:00 - 12:15 |
(47) |
11:00-11:25 |
Garbled Circuit Construction Method Using Linked List of Hash Functions IT2022-114 ISEC2022-93 WBS2022-111 RCC2022-111 |
Guangjian Liu, Tiancheng Wang, Hikaru Morita (Kanagawa Univ.) |
(48) |
11:25-11:50 |
Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112 |
Yuji Suga (IIJ) |
(49) |
11:50-12:15 |
Steganography for Graphs using Graph Spectrum IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 |
Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) |
|
12:15-13:00 |
Lunch ( 45 min. ) |
Wed, Mar 15 AM IT5 (D12) Chair: Gou Hosoya (Waseda Univ.) 09:30 - 10:45 |
(50) |
09:30-09:55 |
A Study on Systematic Design of Geometric Shaping for BICM Systems IT2022-117 ISEC2022-96 WBS2022-114 RCC2022-114 |
Eito Kurihara, Hideki Ochiai (YNU) |
(51) |
09:55-10:20 |
IT2022-118 ISEC2022-97 WBS2022-115 RCC2022-115 |
Hibiki Ogawa, Hiroshi Kamabe, Shan Lu (Gifu Univ) |
(52) |
10:20-10:45 |
Efficient composition of encoding polynomial in distributed coded computing scheme IT2022-119 ISEC2022-98 WBS2022-116 RCC2022-116 |
Daisuke Hibino, Tomoharu Shibuya (Sophia Univ.) |
Wed, Mar 15 PM WBS4(D21) 13:00 - 14:40 |
(53) |
13:00-13:25 |
Data Sharing Illumination Light Communications System using (k,n) Visual Secret Sharing Scheme IT2022-120 ISEC2022-99 WBS2022-117 RCC2022-117 |
Ryohei Hazu, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(54) |
13:25-13:50 |
A Study of Individual FOV Optimization according to the placement of PDs for Underwater VLC using Angular Diversity Receiver IT2022-121 ISEC2022-100 WBS2022-118 RCC2022-118 |
Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ) |
(55) |
13:50-14:15 |
A Study on Average Bit Error Rate Analysis of Underwater Optical Camera Communication Using RGB-LED Array IT2022-122 ISEC2022-101 WBS2022-119 RCC2022-119 |
Kazune Yokoo, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.), Takao Sawa (JAMSTEC) |
(56) |
14:15-14:40 |
Frame Synchronization of Modified MPPM in RGB-LED based Parallel Transmission Scheme IT2022-123 ISEC2022-102 WBS2022-120 RCC2022-120 |
Hiromasa Habuchi, Jo Matsushima (Ibaraki Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Wed, Mar 15 PM WBS5(D21) 14:55 - 16:35 |
(57) |
14:55-15:45 |
[Invited Talk]
Terahertz Surface-Wave Resonators for Functional Devices IT2022-124 ISEC2022-103 WBS2022-121 RCC2022-121 |
Jun-ichi Shikata, Yuya Iwakawa (Nihon Univ.), Seigo Ohno (Tohoku Univ.) |
(58) |
15:45-16:10 |
Characterization of Effective Traffic Offloading with Predictive Drone Placement IT2022-125 ISEC2022-104 WBS2022-122 RCC2022-122 |
Sotaro Ichikawa, Osamu Takyu (Shinshu Univ) |
(59) |
16:10-16:35 |
Performance Improvements of Positioning Accuracy Based on Multiple Observations of Doppler shift for User Position Detection System Using Unmanned Aerial Vehicles IT2022-126 ISEC2022-105 WBS2022-123 RCC2022-123 |
Taiga Deguchi, Hiroyasu Ishikawa (Nihon Univ.) |
Wed, Mar 15 PM ISEC8(D22) Chair: Yuji Suga (IIJ) 13:00 - 14:40 |
(60) |
13:00-13:25 |
A proposal of an attribute protection scheme in self-sovereign identity systems with shared terminals IT2022-127 ISEC2022-106 WBS2022-124 RCC2022-124 |
Wataru Nakamura, Kenta Takahashi (Hitachi) |
(61) |
13:25-13:50 |
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 |
Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) |
(62) |
13:50-14:15 |
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 |
Sakae Chikara, Tsunekazu Saito (NTT) |
(63) |
14:15-14:40 |
Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127 |
Kouichi Sakurai (Kyushu Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Wed, Mar 15 PM ISEC9(D22) Chair: Noboru Kunihiro (University of Tsukuba) 14:55 - 16:35 |
(64) |
14:55-15:20 |
Experiments on pre-image computation time in Keccak[r = 40, c = 160, nr = 2] IT2022-131 ISEC2022-110 WBS2022-128 RCC2022-128 |
Xinyu Qi, Atsushi Fujioka (Kanagawa Univ), Kazumaro Aoki (BUNKYO Univ) |
(65) |
15:20-15:45 |
Evaluation and Improvement of Related Key Differential Attack for the Block Cipher Midori IT2022-132 ISEC2022-111 WBS2022-129 RCC2022-129 |
Shion Hirao, Keigo Horibe, Kosei Sakamoto, Takanori Isobe (UOH) |
(66) |
15:45-16:10 |
New Differential Pair of Linear Differential Attack for Salsa IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 |
Kunjo Ri, Atsuko Miyaji (Handai) |
(67) |
16:10-16:35 |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 |
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) |
Wed, Mar 15 PM IT6 (D12) Chair: Mitsuharu Arimura (Shonan Institute of Technology ) 13:00 - 14:40 |
(68) |
13:00-13:25 |
An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132 |
Tetsunao Matsuta (Saitama Univ.) |
(69) |
13:25-13:50 |
On the Optimal Construction of a Ramp Secret Sharing Scheme Realizing a General Access Structure IT2022-136 ISEC2022-115 WBS2022-133 RCC2022-133 |
Shugo Kurokawa, Hiroki Koga (Univ Tsukuba) |
(70) |
13:50-14:15 |
Evaluation of the Optimal Relative Difference of Superimposed All the Shares for a (t,n)-Threshold Visual Cryptography Scheme IT2022-137 ISEC2022-116 WBS2022-134 RCC2022-134 |
Hiroki Koga (Univ. Tsuikuba) |
(71) |
14:15-14:40 |
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 |
Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) |