Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
EMM |
2022-03-08 09:15 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Ultimate Link for multiple letters with robust for print and scan Takahiro Muta, Michiharu Niimi (KIT), Yukiharu Yamauchi (National Inst. of Tech., Kitakyushu Col.) EMM2021-108 |
In out laboratory, we are proposing an Ultimate Link technology that maps semantic coherence in the real world to inform... [more] |
EMM2021-108 pp.86-90 |
EMM |
2019-03-13 14:05 |
Okinawa |
TBD |
[Poster Presentation]
A Visible Video Data Hiding Based on Spacial and Temporal Synchronization and Its Application to Information Communications Yuya Hirata, Tetsuya Kojima (NIT, Tokyo College) EMM2018-98 |
Research on information transmission using digital contents has attracted much attention as an application of data hidin... [more] |
EMM2018-98 pp.33-38 |
SP |
2019-01-26 16:25 |
Ishikawa |
Kanazawa-Harmonie |
[Fellow Memorial Lecture]
Machine, human and sound communication Akinori Ito (Tohoku Univ.) SP2018-55 |
Speech is the most important modality for human-human communication. From invention of electrical speech communication, ... [more] |
SP2018-55 p.19 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 16:10 |
Ishikawa |
Hotel Koshuen |
[Invited Talk]
Audio Information-Hiding Techniques based on Human Auditory Characteristics Masashi Unoki (JAIST) EA2018-78 EMM2018-78 |
For the audio content security such like the audio content protection as well as speech tampering detection, audio infor... [more] |
EA2018-78 EMM2018-78 pp.153-156 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
Information Hiding for Networked Control Systems Using Steganography Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CQ2018-73 |
According to the growing of the Internet, secure communication methods have been actively reserached. The mainly used se... [more] |
CQ2018-73 pp.55-60 |
EMM, EA |
2013-11-14 14:45 |
Hiroshima |
Prefectural University of Hiroshima, Satellite Campus Hiroshima |
Novel proposal of information hiding technology and its robustness by utilizing an artificial fiber pattern for an augmented reality system Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EA2013-71 EMM2013-71 |
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] |
EA2013-71 EMM2013-71 pp.19-24 |
EMM, EA |
2013-11-14 15:45 |
Hiroshima |
Prefectural University of Hiroshima, Satellite Campus Hiroshima |
Information Embedment to Character Patterns Using Color Shohei Okugi, Yoshihiro Sugaya, Shinichiro Omachi (Tohoku Univ.) EA2013-73 EMM2013-73 |
With development of cyber physical systems, information hiding technology that goes through the real environment has bee... [more] |
EA2013-73 EMM2013-73 pp.31-36 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 14:10 |
Hokkaido |
|
Study of an artificial fiber pattern in Augmented Reality system Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 |
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] |
ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 pp.213-220 |
EMM |
2011-11-14 15:15 |
Miyagi |
|
Hybrid Screen-Decoded Images Combine Visual Cryptography and Carrier Screen Images Rui Shogenji (Shizuoka Univ.) EMM2011-43 |
There are screen-decoded images which used as a document security technique such as anti-counterfeiting technology for t... [more] |
EMM2011-43 pp.19-24 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 13:30 |
Shizuoka |
Shizuoka University |
Carrier Screen Images Decoding with an Ordinary Digital Camera Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.) ISEC2011-9 SITE2011-6 ICSS2011-14 EMM2011-8 |
There are carrier screen images which used as document security such as anti-counterfeiting technology for the bank note... [more] |
ISEC2011-9 SITE2011-6 ICSS2011-14 EMM2011-8 pp.1-6 |
ITS, IE, ITE-ME, ITE-AIT, ITE-HI |
2006-02-20 16:05 |
Hokkaido |
Hokkaido Univ. |
Information Hiding Technique Based on Morphing Technology Satoshi Kondo, Qiangfu Zhao (Aizu Univ.), Hideyuki Takagi (Kyushu Univ.) |
This paper proposes a new technique for information hiding based on morphing technology. In the proposed technique, the ... [more] |
ITS2005-72 IE2005-279 pp.145-150 |