IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
EMM 2022-03-08
09:15
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
[Poster Presentation] Ultimate Link for multiple letters with robust for print and scan
Takahiro Muta, Michiharu Niimi (KIT), Yukiharu Yamauchi (National Inst. of Tech., Kitakyushu Col.) EMM2021-108
In out laboratory, we are proposing an Ultimate Link technology that maps semantic coherence in the real world to inform... [more] EMM2021-108
pp.86-90
EMM 2019-03-13
14:05
Okinawa TBD [Poster Presentation] A Visible Video Data Hiding Based on Spacial and Temporal Synchronization and Its Application to Information Communications
Yuya Hirata, Tetsuya Kojima (NIT, Tokyo College) EMM2018-98
Research on information transmission using digital contents has attracted much attention as an application of data hidin... [more] EMM2018-98
pp.33-38
SP 2019-01-26
16:25
Ishikawa Kanazawa-Harmonie [Fellow Memorial Lecture] Machine, human and sound communication
Akinori Ito (Tohoku Univ.) SP2018-55
Speech is the most important modality for human-human communication. From invention of electrical speech communication, ... [more] SP2018-55
p.19
EA, ASJ-H, EMM, IPSJ-MUS [detail] 2018-11-21
16:10
Ishikawa Hotel Koshuen [Invited Talk] Audio Information-Hiding Techniques based on Human Auditory Characteristics
Masashi Unoki (JAIST) EA2018-78 EMM2018-78
For the audio content security such like the audio content protection as well as speech tampering detection, audio infor... [more] EA2018-78 EMM2018-78
pp.153-156
CQ, ICM, NS, NV
(Joint)
2018-11-16
13:45
Ishikawa   Information Hiding for Networked Control Systems Using Steganography
Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CQ2018-73
According to the growing of the Internet, secure communication methods have been actively reserached. The mainly used se... [more] CQ2018-73
pp.55-60
EMM, EA 2013-11-14
14:45
Hiroshima Prefectural University of Hiroshima, Satellite Campus Hiroshima Novel proposal of information hiding technology and its robustness by utilizing an artificial fiber pattern for an augmented reality system
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EA2013-71 EMM2013-71
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] EA2013-71 EMM2013-71
pp.19-24
EMM, EA 2013-11-14
15:45
Hiroshima Prefectural University of Hiroshima, Satellite Campus Hiroshima Information Embedment to Character Patterns Using Color
Shohei Okugi, Yoshihiro Sugaya, Shinichiro Omachi (Tohoku Univ.) EA2013-73 EMM2013-73
With development of cyber physical systems, information hiding technology that goes through the real environment has bee... [more] EA2013-73 EMM2013-73
pp.31-36
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
14:10
Hokkaido   Study of an artificial fiber pattern in Augmented Reality system
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31
pp.213-220
EMM 2011-11-14
15:15
Miyagi   Hybrid Screen-Decoded Images Combine Visual Cryptography and Carrier Screen Images
Rui Shogenji (Shizuoka Univ.) EMM2011-43
There are screen-decoded images which used as a document security technique such as anti-counterfeiting technology for t... [more] EMM2011-43
pp.19-24
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-12
13:30
Shizuoka Shizuoka University Carrier Screen Images Decoding with an Ordinary Digital Camera
Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.) ISEC2011-9 SITE2011-6 ICSS2011-14 EMM2011-8
There are carrier screen images which used as document security such as anti-counterfeiting technology for the bank note... [more] ISEC2011-9 SITE2011-6 ICSS2011-14 EMM2011-8
pp.1-6
ITS, IE, ITE-ME, ITE-AIT, ITE-HI 2006-02-20
16:05
Hokkaido Hokkaido Univ. Information Hiding Technique Based on Morphing Technology
Satoshi Kondo, Qiangfu Zhao (Aizu Univ.), Hideyuki Takagi (Kyushu Univ.)
This paper proposes a new technique for information hiding based on morphing technology. In the proposed technique, the ... [more] ITS2005-72 IE2005-279
pp.145-150
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan