Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2024-01-16 14:00 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
EMM2023-80 |
Today, with the development of subscription services such as YouTube, Spotify, and Apple Music, it has become easier to ... [more] |
EMM2023-80 pp.1-6 |
EMM |
2024-01-16 14:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Comparison of multi-factor authentication and improved authentication methods for increased security Kazuki Takeda, Youichi Takashima (Kaishi Professional Univ) EMM2023-81 |
Password authentication is used as an authentication method for various services, and while ID+password authentication i... [more] |
EMM2023-81 pp.7-12 |
EMM |
2024-01-16 14:50 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Development of Smartphone App of an application of EmoEditor (Emotion-Expressive Editor) to mail communications Yuki Shimamura, Michiharu Niimi (KIT) EMM2023-82 |
We report the implementation of an emotion-expressive editor, EmoEditor, which enables emotion expression through font c... [more] |
EMM2023-82 pp.13-18 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
EMM |
2024-01-17 09:30 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
A Reversible Data Hiding Method in Compressible Encrypted Domain for OpenEXR Images Noa Kikuchi, Shoko Imaizumi (Chiba Univ.) EMM2023-84 |
In this paper, we propose a method to achieve high-capacity reversible data hiding (RDH) for OpenEXR images with compres... [more] |
EMM2023-84 pp.20-25 |
EMM |
2024-01-17 09:55 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
An encryption method of JPEG bitstreams for partially disclosing visual information Mare Hirose, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) EMM2023-85 |
In this paper, we propose an encryption method for JPEG codestreams in which the file size is invariant before and after... [more] |
EMM2023-85 pp.26-31 |
EMM |
2024-01-17 10:20 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
An Extension of Reversible Color-Tone Control Using Data Hiding Daichi Nakaya, Shoko Imaizumi (Chiba Univ.) EMM2023-86 |
[more] |
EMM2023-86 pp.32-37 |
EMM |
2024-01-17 10:55 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Detecting Adversarial Examples using Filtering Operation Based on JPEG-Compression-Derived Distortion Kenta Tsunomori (Okayama Univ.), Minoru Kuribayashi (Tohoku Univ.), Nobuo Funabiki (Okayama Univ.) EMM2023-87 |
Image classifiers based on convolutional neural networks are caused misclassification by adversarial perturbations. In t... [more] |
EMM2023-87 pp.38-43 |
EMM |
2024-01-17 11:20 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
A study on 3D model adaptation for generating patch-based adversarial perturbations Hiroto Takiwaki (Okayama Univ.), Minoru Kuribayashi (Touhoku Univ.), Nobuo Funabiki (Okayama Univ.) EMM2023-88 |
The development of facial recognition technology using machine learning has made it possible to recognize individuals fr... [more] |
EMM2023-88 pp.44-49 |