IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 54 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT 2015-09-04
11:15
Ishikawa Hakusan Shobutei Performance Evaluations of a Digital Watermarking Scheme for Recovery of Erasures in JPEG Images
Mami Takei, Hiroki Koga (Tsukuba Univ.) IT2015-39
In this paper, we propose a digital watermarking scheme for recovery of erased regions in JPEG images using the LT code,... [more] IT2015-39
pp.31-36
IT 2015-07-13
13:00
Tokyo Tokyo Institute of Technology Proposal of a Visual Secret Sharing Scheme Based on a Access Structure with Multiple Thresholds and Its Extensions
Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2015-21
The visual secret sharing scheme is a nonconventional secret sharing scheme for digital images in which a secret image i... [more] IT2015-21
pp.23-28
EMM, IT 2015-05-21
10:15
Kyoto Kyoto International Community House On a Lower Bound on the Capacity of Digital Fingerprinting Codes with Codewords Generated by Using a Continuous Distribution
Hiroki Koga, Kaoru Itabashi (U. Tsukuba) IT2015-1 EMM2015-1
 [more] IT2015-1 EMM2015-1
pp.1-6
IT 2014-09-19
10:15
Chiba   A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] IT2014-44
pp.19-24
ISEC, IT, WBS 2014-03-10
14:50
Aichi Nagoya Univ., Higashiyama Campus [Invited Talk] Four Limits in Probability and Their Operational Meanings in Information Theory
Hiroki Koga (Univ. of Tsukuba) IT2013-73 ISEC2013-102 WBS2013-62
 [more] IT2013-73 ISEC2013-102 WBS2013-62
pp.119-126
ISEC, IT, WBS 2014-03-11
13:20
Aichi Nagoya Univ., Higashiyama Campus A Construction of an Efficient Linear Ramp Threshold Secret Sharing Scheme Using an LT code
Mitsuteru Sakashita, Hiroki Koga, Shuntaro Honjo (Univ.of Tsukuba) IT2013-85 ISEC2013-114 WBS2013-74
 [more] IT2013-85 ISEC2013-114 WBS2013-74
pp.193-200
ISEC, IT, WBS 2014-03-11
13:45
Aichi Nagoya Univ., Higashiyama Campus Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security
Shuntaro Honjo, Hiroki Koga, Mitsuteru Sakashita (Univ. of Tsukuba) IT2013-86 ISEC2013-115 WBS2013-75
 [more] IT2013-86 ISEC2013-115 WBS2013-75
pp.201-207
ISEC, IT, WBS 2014-03-11
15:40
Aichi Nagoya Univ., Higashiyama Campus On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more]
IT2013-94 ISEC2013-123 WBS2013-83
pp.255-260
ISEC, IT, WBS 2014-03-11
16:05
Aichi Nagoya Univ., Higashiyama Campus Coding Theorems for Shannon's Cipher System under Two New Secrecy Criteria
Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba) IT2013-95 ISEC2013-124 WBS2013-84
In this paper we consider the situation where $n$ plaintexts generated from a stationary memoryless source are encoded t... [more] IT2013-95 ISEC2013-124 WBS2013-84
pp.261-268
IT 2013-05-24
11:15
Fukui Hotel Matuya Sensen at Awara-onsen, Fukui Pref. Coding Theorems on a Probabilistic Digital Fingerprinting Code under the Symmetry of malicious Users
Hiroki Koga, Kazuya Koyano (Univ. of Tsukuba) IT2013-4
 [more] IT2013-4
pp.13-18
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more]
IT2012-91 ISEC2012-109 WBS2012-77
pp.181-188
IT 2013-01-21
17:30
Tokyo Univ. of Electro-Communications On the FF Code with the Optimality on both the Redundancy and the Coding Rate
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroki Koga (Tsukuba Univ.), Ken-ichi Iwata (Fukui Univ.) IT2012-61
 [more] IT2012-61
pp.71-76
IT 2012-07-19
14:15
Aichi Toyota Technological Institute A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model
Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] IT2012-10
pp.7-12
IT 2012-07-20
15:10
Aichi Toyota Technological Institute On coding of a binary source based on Source Polarization
Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba) IT2012-26
Recently, a source coding scheme based on source polarization was proposed.
In the scheme binary data $X^N=(X_0,X_1,\do... [more]
IT2012-26
pp.103-108
IT 2012-05-25
14:25
Fukuoka   On the relationship between the redundancy and the coding rate of FF codes
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroki Koga (Tsukuba Univ.), Ken-ichi Iwata (Fukui Univ.) IT2012-2
Two kinds of optimality of the fixed-to-fixed length (FF) codes for a general source are studied. Han showed that the op... [more] IT2012-2
pp.7-12
IT 2012-05-25
16:50
Fukuoka   A Secret Sharing Sche me Based on a Two-Dementional Code with Decodability by Mobile Phones
Shuntaro Honjo, Hiroki Koga (Univ. Tsukuba) IT2012-7
 [more] IT2012-7
pp.35-40
IT 2011-11-29
16:50
Iwate HOTEL MORI NO KAZE [Panel Discussion] For Further Developments of Information Theory
Hiroshi Kamabe (Gifu Univ.), Hiroki Koga (Univ. Tsukuba) IT2011-38
 [more] IT2011-38
pp.25-28
IT 2011-09-30
13:40
Tokyo Tokyo Institute of Technology On the Achievable Rate Region in the Optimistic Sense for Independent Coding of Two Correlated General Sources
Hiroki Koga (Univ. of Tsukuba) IT2011-32
 [more] IT2011-32
pp.49-54
IT 2011-05-20
14:45
Osaka Osaka City University Performance of a Fragile Watermarking Scheme with Detectability of Tampered Locations in JPEG Images
Mitsuteru Sakashita, Hiroki Koga (Univ Tsukuba) IT2011-6
In this paper we propose a fragile watermaking scheme with detectability
of tampered locations in JPEG images. Given a ... [more]
IT2011-6
pp.31-36
ISEC, IT, WBS 2011-03-03
16:35
Osaka Osaka University The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui) IT2010-83 ISEC2010-87 WBS2010-62
 [more] IT2010-83 ISEC2010-87 WBS2010-62
pp.93-98
 Results 21 - 40 of 54 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan