Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2015-09-04 11:15 |
Ishikawa |
Hakusan Shobutei |
Performance Evaluations of a Digital Watermarking Scheme for Recovery of Erasures in JPEG Images Mami Takei, Hiroki Koga (Tsukuba Univ.) IT2015-39 |
In this paper, we propose a digital watermarking scheme for recovery of erased regions in JPEG images using the LT code,... [more] |
IT2015-39 pp.31-36 |
IT |
2015-07-13 13:00 |
Tokyo |
Tokyo Institute of Technology |
Proposal of a Visual Secret Sharing Scheme Based on a Access Structure with Multiple Thresholds and Its Extensions Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2015-21 |
The visual secret sharing scheme is a nonconventional secret sharing scheme for digital images in which a secret image i... [more] |
IT2015-21 pp.23-28 |
EMM, IT |
2015-05-21 10:15 |
Kyoto |
Kyoto International Community House |
On a Lower Bound on the Capacity of Digital Fingerprinting Codes with Codewords Generated by Using a Continuous Distribution Hiroki Koga, Kaoru Itabashi (U. Tsukuba) IT2015-1 EMM2015-1 |
[more] |
IT2015-1 EMM2015-1 pp.1-6 |
IT |
2014-09-19 10:15 |
Chiba |
|
A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44 |
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] |
IT2014-44 pp.19-24 |
ISEC, IT, WBS |
2014-03-10 14:50 |
Aichi |
Nagoya Univ., Higashiyama Campus |
[Invited Talk]
Four Limits in Probability and Their Operational Meanings in Information Theory Hiroki Koga (Univ. of Tsukuba) IT2013-73 ISEC2013-102 WBS2013-62 |
[more] |
IT2013-73 ISEC2013-102 WBS2013-62 pp.119-126 |
ISEC, IT, WBS |
2014-03-11 13:20 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Construction of an Efficient Linear Ramp Threshold Secret Sharing Scheme Using an LT code Mitsuteru Sakashita, Hiroki Koga, Shuntaro Honjo (Univ.of Tsukuba) IT2013-85 ISEC2013-114 WBS2013-74 |
[more] |
IT2013-85 ISEC2013-114 WBS2013-74 pp.193-200 |
ISEC, IT, WBS |
2014-03-11 13:45 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security Shuntaro Honjo, Hiroki Koga, Mitsuteru Sakashita (Univ. of Tsukuba) IT2013-86 ISEC2013-115 WBS2013-75 |
[more] |
IT2013-86 ISEC2013-115 WBS2013-75 pp.201-207 |
ISEC, IT, WBS |
2014-03-11 15:40 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83 |
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more] |
IT2013-94 ISEC2013-123 WBS2013-83 pp.255-260 |
ISEC, IT, WBS |
2014-03-11 16:05 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Coding Theorems for Shannon's Cipher System under Two New Secrecy Criteria Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba) IT2013-95 ISEC2013-124 WBS2013-84 |
In this paper we consider the situation where $n$ plaintexts generated from a stationary memoryless source are encoded t... [more] |
IT2013-95 ISEC2013-124 WBS2013-84 pp.261-268 |
IT |
2013-05-24 11:15 |
Fukui |
Hotel Matuya Sensen at Awara-onsen, Fukui Pref. |
Coding Theorems on a Probabilistic Digital Fingerprinting Code under the Symmetry of malicious Users Hiroki Koga, Kazuya Koyano (Univ. of Tsukuba) IT2013-4 |
[more] |
IT2013-4 pp.13-18 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77 |
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more] |
IT2012-91 ISEC2012-109 WBS2012-77 pp.181-188 |
IT |
2013-01-21 17:30 |
Tokyo |
Univ. of Electro-Communications |
On the FF Code with the Optimality on both the Redundancy and the Coding Rate Mitsuharu Arimura (Shonan Inst. Tech.), Hiroki Koga (Tsukuba Univ.), Ken-ichi Iwata (Fukui Univ.) IT2012-61 |
[more] |
IT2012-61 pp.71-76 |
IT |
2012-07-19 14:15 |
Aichi |
Toyota Technological Institute |
A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10 |
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] |
IT2012-10 pp.7-12 |
IT |
2012-07-20 15:10 |
Aichi |
Toyota Technological Institute |
On coding of a binary source based on Source Polarization Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba) IT2012-26 |
Recently, a source coding scheme based on source polarization was proposed.
In the scheme binary data $X^N=(X_0,X_1,\do... [more] |
IT2012-26 pp.103-108 |
IT |
2012-05-25 14:25 |
Fukuoka |
|
On the relationship between the redundancy and the coding rate of FF codes Mitsuharu Arimura (Shonan Inst. Tech.), Hiroki Koga (Tsukuba Univ.), Ken-ichi Iwata (Fukui Univ.) IT2012-2 |
Two kinds of optimality of the fixed-to-fixed length (FF) codes for a general source are studied. Han showed that the op... [more] |
IT2012-2 pp.7-12 |
IT |
2012-05-25 16:50 |
Fukuoka |
|
A Secret Sharing Sche me Based on a Two-Dementional Code with Decodability by Mobile Phones Shuntaro Honjo, Hiroki Koga (Univ. Tsukuba) IT2012-7 |
[more] |
IT2012-7 pp.35-40 |
IT |
2011-11-29 16:50 |
Iwate |
HOTEL MORI NO KAZE |
[Panel Discussion]
For Further Developments of Information Theory Hiroshi Kamabe (Gifu Univ.), Hiroki Koga (Univ. Tsukuba) IT2011-38 |
[more] |
IT2011-38 pp.25-28 |
IT |
2011-09-30 13:40 |
Tokyo |
Tokyo Institute of Technology |
On the Achievable Rate Region in the Optimistic Sense for Independent Coding of Two Correlated General Sources Hiroki Koga (Univ. of Tsukuba) IT2011-32 |
[more] |
IT2011-32 pp.49-54 |
IT |
2011-05-20 14:45 |
Osaka |
Osaka City University |
Performance of a Fragile Watermarking Scheme with Detectability of Tampered Locations in JPEG Images Mitsuteru Sakashita, Hiroki Koga (Univ Tsukuba) IT2011-6 |
In this paper we propose a fragile watermaking scheme with detectability
of tampered locations in JPEG images. Given a ... [more] |
IT2011-6 pp.31-36 |
ISEC, IT, WBS |
2011-03-03 16:35 |
Osaka |
Osaka University |
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui) IT2010-83 ISEC2010-87 WBS2010-62 |
[more] |
IT2010-83 ISEC2010-87 WBS2010-62 pp.93-98 |