Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, IE, IPSJ-AVM, ITE-BCT [detail] |
2022-11-24 14:05 |
Aichi |
Nagoya Institute of Technology (Primary: On-site, Secondary: Online) |
Video watermarking method of embedding multiplexed watermark information and tampering detection patterns Eri Odaira (TUS), Naoto Kawamura (Kawamura Techno Lab.), Hyunho Kang (NIT, Tokyo College), Keiichi Iwamura (TUS) CS2022-52 IE2022-40 |
We investigate a watermarking method that rapidly embeds primary and secondly information into each frame of videos at t... [more] |
CS2022-52 IE2022-40 pp.21-26 |
EMM, EA, ASJ-H |
2021-11-15 13:30 |
Online |
Online |
[Poster Presentation]
Improving a tracking accuracy using Artificial Fiber Patterns by introducing Wrinkle on clothes and body shape determination Hiroki Urakawa, Kitahiro Kaneda, Keiichi Iwamura (TUS) EA2021-38 EMM2021-65 |
Due to the low cost of equipment, the number of surveillance cameras installed has increased significantly in recent yea... [more] |
EA2021-38 EMM2021-65 pp.63-68 |
EMM, IT |
2021-05-20 15:00 |
Online |
Online |
Improving a tracking accuracy using Artificial Fiber Patterns by applying a new image processing method Hiroki Urakawa, Kitahiro Kaneda, Keiichi Iwamura (TUS) IT2021-4 EMM2021-4 |
Due to the low cost of equipment, the number of surveillance cameras installed has increased significantly in recent yea... [more] |
IT2021-4 EMM2021-4 pp.19-24 |
EMM, IT |
2019-05-23 14:25 |
Hokkaido |
Asahikawa International Conference Hall |
A study on printer dependency on feature points for barcode forensics Kohei Shirai, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science) IT2019-2 EMM2019-2 |
(To be available after the conference date) [more] |
IT2019-2 EMM2019-2 pp.7-12 |
EMM, IT |
2019-05-24 10:35 |
Hokkaido |
Asahikawa International Conference Hall |
Searchable Image Encryption using Secret Sharing Scheme Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9 |
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] |
IT2019-9 EMM2019-9 pp.43-48 |
EMM |
2019-03-13 14:05 |
Okinawa |
TBD |
[Poster Presentation]
Content protection scheme that can control editing by accounting Kobayashi Tomohiro, Iwamura Keiichi (TUS), Inamura Masaki (TDU) EMM2018-99 |
[more] |
EMM2018-99 pp.39-44 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:50 |
Yamaguchi |
|
Study of an information extraction method using artificial fiber pattern with a clear ink Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 |
Our laboratory has developed “single dot method”, which is one of a nearly invisible pattern as new information embeddin... [more] |
ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 pp.13-18 |
IT, EMM |
2016-05-19 14:45 |
Hokkaido |
Otaru Economic Center |
Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method Kitahiro Kaneda (Osaka Prefecture Univ.), Yasuyuki Anezaki, Keiichi Iwamura (TUS), Isao Echizen (NII) IT2016-7 EMM2016-7 |
We have proposed a single dot information hiding method for printed matter. In this paper, we try to apply LDPC error co... [more] |
IT2016-7 EMM2016-7 pp.37-42 |
ICSS |
2014-11-28 09:40 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
security evaluation of content editing system that previous control allow about editing operation Katsuma Koga (Tokyo Univ of Science), Keiichi Iwamura (Tokyo Denki Unive), Masaki Inamura (Tokyo Univ of Science) ICSS2014-58 |
[more] |
ICSS2014-58 pp.43-48 |
EMM |
2014-05-16 14:45 |
Tokyo |
|
Improvement of embedding capacity and quality of reversible watermarking Toshuki Ito, Ryo Sugimura, Keiichi Iwamura (Tokyo Univ. of Science) EMM2014-8 |
Recently, a digital watermarking application has been proposed that could prevent medical accidents by embedding informa... [more] |
EMM2014-8 pp.41-46 |
EMM |
2014-05-16 15:15 |
Tokyo |
|
Performance evaluation for the synchronization error of Synchronization error correction using a slide decoding method Sadahiko Kadowaki, Toru Shigehiro, Keiichi Iwamura (Tokyo Univ. of Science) EMM2014-9 |
In the present information society, ensure the reliability is essential to good communication. However, it is present th... [more] |
EMM2014-9 pp.47-52 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Surveillance camera system to achieve both crime prevention and privacy protection Kento Kobayashi, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-103 |
Recently, cases to be taken up for privacy and personal information has increased, but there is no rule for privacy on s... [more] |
EMM2013-103 pp.21-26 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Feasible and content protection system at the same time edit control with signature inheritance Katsuma Koga, Keiichi Iwamura, Masaki Inamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-111 |
In the draft, it is insufficient in the market of Ntentsu circulation technology for copyright protection of current, we... [more] |
EMM2013-111 pp.69-74 |
EMM |
2012-10-04 14:00 |
Chiba |
Makuhari Messe |
Secret Sharing Suitable for Cloud Computing Satoshi Takahashi, Keiichi Iwamura (TUS) EMM2012-57 |
Recently, secret sharing has been attracting attention of applying to loud computing. For this reason is secret sharing ... [more] |
EMM2012-57 pp.11-16 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.) |
Digital watermarks provide the capability to add extra information to various media, such as still images, movies and au... [more] |
ISEC2008-44 pp.69-74 |