Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2015-05-21 10:15 |
Kyoto |
Kyoto International Community House |
On a Lower Bound on the Capacity of Digital Fingerprinting Codes with Codewords Generated by Using a Continuous Distribution Hiroki Koga, Kaoru Itabashi (U. Tsukuba) IT2015-1 EMM2015-1 |
[more] |
IT2015-1 EMM2015-1 pp.1-6 |
EMM, IT |
2015-05-21 10:40 |
Kyoto |
Kyoto International Community House |
Feasible regions of symmetric capacity and Gallager's $E_{0}$ functions for discrete memoryless channels under a uniform input distribution Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) IT2015-2 EMM2015-2 |
This study aims to clarify the extremal channels in the sense of channel reliability functions for some class of channel... [more] |
IT2015-2 EMM2015-2 pp.7-12 |
EMM, IT |
2015-05-21 11:05 |
Kyoto |
Kyoto International Community House |
Analysis on Reliability Function and Strong Converse of Discrete Memoryless Biometrical Identification Systems Yachongka Vamoua, Hideki Yagi (Univ. of Electro-Comm.) IT2015-3 EMM2015-3 |
The biometrical identification system, introduced by Willems et al., is a system to identify individuals based on measur... [more] |
IT2015-3 EMM2015-3 pp.13-18 |
EMM, IT |
2015-05-21 13:00 |
Kyoto |
Kyoto International Community House |
New Classes of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XV)SE(1)PKC and K(XVI)SE(1)PKC Masao Kasahara (Waseda Univ./Chuo Univ.) IT2015-4 EMM2015-4 |
[more] |
IT2015-4 EMM2015-4 pp.19-24 |
EMM, IT |
2015-05-21 13:25 |
Kyoto |
Kyoto International Community House |
Design and Evaluation of LDPC Code Decoder Using Generalized BP Algorithm Akiyoshi Hashimoto, Harumi Morino (Hitachi) IT2015-5 EMM2015-5 |
We proposed generalized belief propagation algorithm which can be implemented in hardware decoder and architecture of de... [more] |
IT2015-5 EMM2015-5 pp.25-30 |
EMM, IT |
2015-05-21 13:50 |
Kyoto |
Kyoto International Community House |
A Note on Correlation Properties of Periodic Sequences over Extension Fields from a Cyclic Difference Set Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.), Keiichi Takahashi (Kinki Univ.) IT2015-6 EMM2015-6 |
The authors proposed constant-weight sequences over multi-value generalized
form binary constant-weight sequences by L... [more] |
IT2015-6 EMM2015-6 pp.31-34 |
EMM, IT |
2015-05-21 14:30 |
Kyoto |
Kyoto International Community House |
Generating Protected Eigenface Templates Using an Unitary Transformaion Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2015-7 EMM2015-7 |
This paper considers a template protection scheme based on an unitary transformation, where the template consists of the... [more] |
IT2015-7 EMM2015-7 pp.35-40 |
EMM, IT |
2015-05-21 14:55 |
Kyoto |
Kyoto International Community House |
Readout of copyright information hidden in objects fabricated with 3-D printers Piyarat Silapasuphakornwong, Masahiro Suzuki, Kazutake Uehira (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hiroshi Unno (Kanagawa Inst. Tech.) IT2015-8 EMM2015-8 |
We examined the technique for copyright protection of digital data for 3-D printers. Although many people expect that 3-... [more] |
IT2015-8 EMM2015-8 pp.41-44 |
EMM, IT |
2015-05-21 15:20 |
Kyoto |
Kyoto International Community House |
A study on speaker conversion using speech and expression features for video chatting Yuuki Saito, Takashi Nose (Tohoku Univ.), Takahiro Shinozaki (Tokyo Institute of Technology), Akinori Ito (Tohoku Univ.) IT2015-9 EMM2015-9 |
In this paper, we suggest two method that the individuality of the face of original speaker convert that of target speak... [more] |
IT2015-9 EMM2015-9 pp.45-50 |
EMM, IT |
2015-05-21 15:45 |
Kyoto |
Kyoto International Community House |
Data Anonymization for Information Recommendation Based on TF-IDF Method Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) IT2015-10 EMM2015-10 |
This paper proposes a data anonymization method considering information recommendation for users.
Attaching importance ... [more] |
IT2015-10 EMM2015-10 pp.51-56 |
EMM, IT |
2015-05-22 10:00 |
Kyoto |
Kyoto International Community House |
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) IT2015-11 EMM2015-11 |
An information flow problem discusses how to distribute information over a complicated network. It is known that the te... [more] |
IT2015-11 EMM2015-11 pp.57-62 |
EMM, IT |
2015-05-22 10:25 |
Kyoto |
Kyoto International Community House |
Evaluation of Symmetric Mutual Information of Simplified TDMR Channel Model Tadashi Wadayama (Nitech) IT2015-12 EMM2015-12 |
In the present paper, a simplified two-dimensional magnetic recording (TDMR) channel model is proposed in order to captu... [more] |
IT2015-12 EMM2015-12 pp.63-68 |
EMM, IT |
2015-05-22 11:05 |
Kyoto |
Kyoto International Community House |
[Invited Talk]
Trade-off between resiliency and efficiency of cryptographic protocols
-- The case of information theoretical security -- Maki Yoshida (NICT) IT2015-13 EMM2015-13 |
[more] |
IT2015-13 EMM2015-13 pp.69-74 |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |
EMM, IT |
2015-05-22 14:05 |
Kyoto |
Kyoto International Community House |
Robust Audio Watermarking Based on Dynamic Phase Coding and Error Control Coding Ngo Nhut Minh, Brian M. Kurkoski, Masashi Unoki (JAIST) IT2015-15 EMM2015-15 |
This paper proposes an audio watermarking method based on dynamic phase coding and error control coding. The technique o... [more] |
IT2015-15 EMM2015-15 pp.81-86 |
EMM, IT |
2015-05-22 14:45 |
Kyoto |
Kyoto International Community House |
[Invited Talk]
Complete Complementary Codes and Its Applications Tetsuya Kojima (NIT, Tokyo College) IT2015-16 EMM2015-16 |
It is important to find spread spectrum sequences that have auto correlation with a single sharp peak and no cross corre... [more] |
IT2015-16 EMM2015-16 pp.87-92 |