Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2019-05-23 14:00 |
Hokkaido |
Asahikawa International Conference Hall |
Generation of privacy-preserving images holding positional information for HOG feature extraction Masaki Kitayama, Hitoshi Kiya (Tokyo Metro. Univ.) IT2019-1 EMM2019-1 |
In this paper, we propose a generation method of images which have no visual information but hold the gradient direction... [more] |
IT2019-1 EMM2019-1 pp.1-6 |
EMM, IT |
2019-05-23 14:25 |
Hokkaido |
Asahikawa International Conference Hall |
A study on printer dependency on feature points for barcode forensics Kohei Shirai, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science) IT2019-2 EMM2019-2 |
(To be available after the conference date) [more] |
IT2019-2 EMM2019-2 pp.7-12 |
EMM, IT |
2019-05-23 15:05 |
Hokkaido |
Asahikawa International Conference Hall |
Gradient Coding based on LDGM Codes and Stochastic Gradient Descent Shunsuke Horii (Waseda Univ.), Takahiro Yoshida (Yokohama Col. of Commerce), Manabu Kobayashi, Toshiyasu Matsushima (Waseda Univ.) IT2019-3 EMM2019-3 |
[more] |
IT2019-3 EMM2019-3 pp.13-18 |
EMM, IT |
2019-05-23 15:30 |
Hokkaido |
Asahikawa International Conference Hall |
The Error Performance Analysis of tail-biting conovolutional codes Hideki Yoshikawa (Tohoku Gakuin Univ.) IT2019-4 EMM2019-4 |
[more] |
IT2019-4 EMM2019-4 pp.19-22 |
EMM, IT |
2019-05-23 15:55 |
Hokkaido |
Asahikawa International Conference Hall |
The Weight Distributions of the (256,k) Extended Binary Primitive BCH Codes with k=71, 187, 191, and 199 Toru Fujiwara (Osaka Univ.), Takuya Kusaka (Okayama Univ.) IT2019-5 EMM2019-5 |
Computing the weight distribution of a code when the formula for the distribution is unknown is a challenging problem in... [more] |
IT2019-5 EMM2019-5 pp.23-28 |
EMM, IT |
2019-05-23 16:35 |
Hokkaido |
Asahikawa International Conference Hall |
[Invited Talk]
Security of Machine Learning Satsuya Ohata (AIST), Yuya Senzaki (Idein) IT2019-6 EMM2019-6 |
In this talk, we introduce several research results on machine learning security. Especially, we will explain about adve... [more] |
IT2019-6 EMM2019-6 p.29 |
EMM, IT |
2019-05-24 09:30 |
Hokkaido |
Asahikawa International Conference Hall |
A Consideration on Extended Ternary Memoryless Sources with a Simple Construction of Binary Compact Codes Nozomi Miya (Aoyama Gakuin Univ.), Takahiro Yoshida (Yokohama College of Commerce), Hajime Jinushi (Aoyama Gakuin Univ.) IT2019-7 EMM2019-7 |
The complexity of Huffman procedure grows with exponential order of $n$ for the $n$-th degree extended memoryless source... [more] |
IT2019-7 EMM2019-7 pp.31-36 |
EMM, IT |
2019-05-24 09:55 |
Hokkaido |
Asahikawa International Conference Hall |
On Multiterminal Zero Rate Hypothesis Testing Problem Yasutada Oohama (UEC) IT2019-8 EMM2019-8 |
[more] |
IT2019-8 EMM2019-8 pp.37-42 |
EMM, IT |
2019-05-24 10:35 |
Hokkaido |
Asahikawa International Conference Hall |
Searchable Image Encryption using Secret Sharing Scheme Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9 |
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] |
IT2019-9 EMM2019-9 pp.43-48 |
EMM, IT |
2019-05-24 11:00 |
Hokkaido |
Asahikawa International Conference Hall |
Improved DM-QIM Watermarking for PDF Document Minoru Kuribayashi (Okayama Univ.), KokSheik Wong (Monash Univ.) IT2019-10 EMM2019-10 |
In some watermarking schemes for PDF document, the spaces between words and characters are slightly modified to embed wa... [more] |
IT2019-10 EMM2019-10 pp.49-53 |
EMM, IT |
2019-05-24 11:25 |
Hokkaido |
Asahikawa International Conference Hall |
On an Audio Data Hiding Scheme in Music Based on the Characteristics of Percussion Instruments Naoto Yamahashi (Mimaki Engineering), Yui Ichioka (FIXER), Tetsuya Kojima (NIT, Tokyo College) IT2019-11 EMM2019-11 |
Information hiding is usually utilized as digital watermarks or digital fingerprints for the purpose of protecting the i... [more] |
IT2019-11 EMM2019-11 pp.55-59 |
EMM, IT |
2019-05-24 13:30 |
Hokkaido |
Asahikawa International Conference Hall |
Higher Order Differential Property of BIG Block Cipher Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12 |
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri et.al in 2019. The number of r... [more] |
IT2019-12 EMM2019-12 pp.61-66 |
EMM, IT |
2019-05-24 13:55 |
Hokkaido |
Asahikawa International Conference Hall |
Improving Sparse Superposition Codes with Deep Learning Masazumi Iida, Yuya Oshikawa (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Junichi Takeuchi (Kyushu Univ.) IT2019-13 EMM2019-13 |
[more] |
IT2019-13 EMM2019-13 pp.67-72 |
EMM, IT |
2019-05-24 14:20 |
Hokkaido |
Asahikawa International Conference Hall |
Reduced-Complexity Successive Cancellation List Decoding of Polar Codes Using Parity Check and List-Pruning Yusuke Oki, Ryo Shibata, Gou Hosoya, Hiroyuki Yashima (TUS) IT2019-14 EMM2019-14 |
In this paper, we propose encoding and decoding algorithms which add pruning bits into the transmitted information in or... [more] |
IT2019-14 EMM2019-14 pp.73-78 |