Thu, Mar 2 PM Poster session (Former half) 13:00 - 14:15 |
(1) |
13:00-14:15 |
[Poster Presentation]
An extension of reversible data hiding in encrypted images with high compression performance and flexible processing order |
Eichi Arai, Shoko Imaizumi (Chiba Univ.) |
(2) |
13:00-14:15 |
[Poster Presentation]
Influence of Data Hiding for Transformer Encoder of ViT Using DM-QIM |
Shuntaro Fukuoka, Shoko Imaizumi (Chiba Univ.) |
(3) |
13:00-14:15 |
[Poster Presentation]
Reversible data hiding in encrypted domain for HDR images |
Ryusuke Murase, Shoko Imaizumi (Chiba Univ.) |
(4) |
13:00-14:15 |
[Poster Presentation]
A study on micro-expression recognition in suspicious behaviour detection systems |
Sotaro Sekine, Hyunho Kang (NITTC) |
(5) |
13:00-14:15 |
[Poster Presentation]
A study on detection necessity of text-based generative AI |
Manamu Kitajima, Hyunho Kang (NITTC) |
(6) |
13:00-14:15 |
[Poster Presentation]
A Video Data Hiding Scheme Utilizing Characteristics of Consecutive Frames |
Hikaru Ando, Tetsuya Kojima, Raito Matsuzaki, Akira Tanaka (NIT, Tokyo College) |
(7) |
13:00-14:15 |
[Poster Presentation]
A Video Data Hiding Scheme Using Dynamic Programming on Feature Sequences |
Tamaki Yonemaru, Tetsuya Kojima, Raito Matsuzaki, Akira Tanaka (NIT, Tokyo College) |
(8) |
13:00-14:15 |
[Poster Presentation]
Improvement of human flow measurement using flor estimation on depth images |
Takuya Nagatoshi, Michiharu Niimi (KIT) |
(9) |
13:00-14:15 |
[Poster Presentation]
Clothes recommendation system based on user's latent interests extracted from vectors of clothes images |
Daishi Tanaka, Michiharu Niimi (KIT) |
|
14:15-14:30 |
Break ( 15 min. ) |
Thu, Mar 2 PM Poster session(latter half) 14:30 - 15:45 |
(10) |
14:30-15:45 |
[Poster Presentation]
A study on human face parts for Fake Face Detection using transfer learning |
Sasuke Kobayashi, Hyunho Kang (NITTC) |
(11) |
14:30-15:45 |
[Poster Presentation]
A Study on personal infomatino leakage from natural langage model |
Taku Ohara, Hyunho Kang (NITTC) |
(12) |
14:30-15:45 |
[Poster Presentation]
A study on recognition method for vehicle license plate using super resolution |
Yuki Fukatsu, Hyunho Kang (NITTC) |
(13) |
14:30-15:45 |
[Poster Presentation]
Study on Deep Fake detection using Vision Transformer |
Sotaro Kuwahara, Hyunho Kang (NITTC) |
(14) |
14:30-15:45 |
[Poster Presentation]
Watermark Extraction Method Using BSS
-- Improving Image Quality Using Inter-frame Difference -- |
Nao Harada, Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) |
(15) |
14:30-15:45 |
[Poster Presentation]
Development of a screenshot application that can redisplay web pages by building on the Swift standard library |
Ayaka Sakamoto, Masaki Kawamura (Yamaguchi Univ.) |
(16) |
14:30-15:45 |
[Poster Presentation]
Human Head Position Detection Using OpenPose for Privacy Protection |
Ryota Seo, Chinatsu Tanaka, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(17) |
14:30-15:45 |
[Poster Presentation]
Gait Analysis Focusing on Operating Characteristics at Feature Points Detected by OpenPose |
Chinatsu Tanaka, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(18) |
14:30-15:45 |
[Poster Presentation]
A Study on Eliminating Malicious Node in Federated Learning |
Reon Akai, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ) |
(19) |
14:30-15:45 |
[Poster Presentation]
A study on discrimination method between bonafide and replay sound focusing on the transfer function |
Daiki Matunaga, Kotaro Sonoda (Nagasaki Univ.) |
(20) |
14:30-15:45 |
[Poster Presentation]
A Study on Shared Information Aggregation in Steganographic Acoustical Secret Sharing |
Akihiro Matsumoto, Kotaro Sonoda (Nagasaki Univ.) |
|
15:45-16:00 |
Break ( 15 min. ) |
Thu, Mar 2 PM Invited talk 16:00 - 17:00 |
(21) |
16:00-17:00 |
[Invited Talk]
Image transformation with random numbers for reliable AI |
Hitoshi Kiya (TMU) |
Fri, Mar 3 AM Regular(1) 09:10 - 10:25 |
(22) |
09:10-09:35 |
Study on Analysis of Amplitude and Frequency Perturbation in the Voice for Fake Audio Detection |
Kai Li, Yao Wang, Minh Le Nguyen, Masato Akagi, Masashi Unoki (JAIST) |
(23) |
09:35-10:00 |
An Efficient Method of Model Inversion Attack on Face Recognition Systems Outputting Single-Class Information |
Shunsuke Yoshimura (Osaka Univ.), Kazuaki Nakamura (Tokyo Univ. of Science), Naoko Nitta (Mukogawa Women's Univ.), Noboru Babaguchi (Fukui Univ. of Tech.) |
(24) |
10:00-10:25 |
System to Prevent Distribution of Art Forgeries Using IOTA |
Yusuke Abe, Kitahiro Kaneda, Keiichi Iwamura (TUS) |
|
10:25-10:40 |
Break ( 15 min. ) |
Fri, Mar 3 AM Regular(2) 10:40 - 11:30 |
(25) |
10:40-11:05 |
Suppression of averaging attacks by image reconstruction using Seam Carving |
Makoto Fujimura (Nagasaki Univ.), Kousuke Imamura (Kanazawa Univ.), Hideo Kuroda (Nagasaki Univ.) |
(26) |
11:05-11:30 |
Investigation of Video Watermarking Method Based on 3D U-Net Robust Against Re-shooting |
Ryota Takahashi (Osaka Prefecture Univ.), Motoi Iwata, Koichi Kise (Osaka Metropolitan Univ.) |
|
11:30-11:45 |
Break ( 15 min. ) |
Fri, Mar 3 AM 11:45 - 12:00 |
(27) |
11:45-12:00 |
Award ceremony |