Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 13:40 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
A Steganalysis of Image Steganography using Real Image Denoising Shinnosuke Toguchi, Takamichi Miyata (CIT) SITE2023-100 IA2023-106 |
Image steganography is a technique for embedding secret messages in images. SteganoGAN, one of the previous methods, use... [more] |
SITE2023-100 IA2023-106 pp.195-202 |
RCC, ISEC, IT, WBS |
2023-03-15 11:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Steganography for Graphs using Graph Spectrum Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 |
Steganography aims to hide the fact that a message is being communicated by embedding it in another information medium.T... [more] |
IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 pp.305-312 |
AI |
2022-02-28 15:00 |
Miyazaki |
Youth Hostel Sunflower MIYAZAKI (Primary: On-site, Secondary: Online) |
Basic Study for Backdoor Attack based on Invisible Trigger Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21 |
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] |
AI2021-21 pp.53-58 |
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] |
2022-02-22 11:55 |
Online |
Online |
Bit-plane oriented Detection method of Malicious Code Hidden in the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59 |
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] |
ITS2021-50 IE2021-59 pp.151-156 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47 |
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] |
IT2020-128 ISEC2020-58 WBS2020-47 pp.104-109 |
CS, IN, NS, NV (Joint) |
2020-09-11 15:10 |
Online |
Online |
A study of steganography based on error correction code and secret sharing scheme Kaito Onuma, Sumiko Miyata (SIT) CS2020-44 |
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] |
CS2020-44 pp.47-52 |
SIS |
2020-03-05 13:10 |
Saitama |
Saitama Hall (Cancelled but technical report was issued) |
An Improvement on Data Hiding in the Copyright- and Privacy-Protected Image Trading System Kazuaki Takahashi, Masaaki Fujiyoshi (Tokyo Metro. Univ.), Wannida Sae-tang (KMUTNB), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-39 |
This paper improves the data hiding performance in the copyright- and privacy-protected image trading system. In the sys... [more] |
SIS2019-39 pp.13-18 |
EA, SIP, SP |
2019-03-14 13:30 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
[Poster Presentation]
Steganographic Audio Secret Sharing Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70 |
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] |
EA2018-108 SIP2018-114 SP2018-70 pp.55-60 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
Information Hiding for Networked Control Systems Using Steganography Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CQ2018-73 |
According to the growing of the Internet, secure communication methods have been actively reserached. The mainly used se... [more] |
CQ2018-73 pp.55-60 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Study of template matching application of steganography ANGO Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 |
We propose a method ANGO(=Asymmetric Nondestractive steGanOgraphy) to extract different third information by two(o... [more] |
ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 pp.247-252 |
NS |
2017-05-19 10:50 |
Tokyo |
Kikai Shinko Kaikan |
Per-Packet Throughput of Information-Leakage Through Content Names in NDN Interest Packets Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2017-20 |
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN)... [more] |
NS2017-20 pp.35-40 |
EA, EMM |
2016-11-17 16:15 |
Oita |
Compal Hall (Oita) |
An introduction of watermark as an alternative of QR code Naoki Terunuma, Kei Hiraki (UTokyo) EA2016-54 EMM2016-60 |
A QR code on a poster provides easy access to web sites. Using QR code increases the quantity of information, though it ... [more] |
EA2016-54 EMM2016-60 pp.37-42 |
PRMU |
2016-10-21 16:20 |
Miyazaki |
|
Study of template matching application of a steganography (ANGO)
-- Interdisciplinary cryptography and image processing -- Hirokazu Ishizuka (Kyudai), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyudai) PRMU2016-108 |
We propose a steganographic method called ANGO using Ango Sakaguchi's
novel ``ANGOU'' as a hint. Go through the study ... [more] |
PRMU2016-108 pp.97-102 |
SIS |
2016-06-10 11:45 |
Hokkaido |
Kushiro Tourism and Convention cent. |
Multibit Data Embedding Algorithm for Palette-based Images Yoshiaki Ueda, Jyohei Matsuoka (Yamaguchi Univ.), Takanori Koga (NIT, Tokuyama College), Noriaki Suetake, Eiji Uchino (Yamaguchi Univ.) SIS2016-16 |
In this report, the steganographic methods especially for the palette-based images, such as graphic interchange format (... [more] |
SIS2016-16 pp.81-86 |
EMM |
2016-01-18 13:00 |
Miyagi |
Katahira Campus, Tohoku University |
Eldercare Remote Support IoT System using Steganography Masahiro Wakiyama, Akira Miyamoto (NITKIT) EMM2015-61 |
There is an increasing need for eldercare due to the declining birthrate and aging population in Japan. In concern for a... [more] |
EMM2015-61 pp.1-6 |
RCS, IT, SIP |
2016-01-19 14:45 |
Osaka |
Kwansei Gakuin Univ. Osaka Umeda Campus |
Wireless Steganography using Nonlinear Amplifier in OFDM system Keisuke Hokai, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) IT2015-96 SIP2015-110 RCS2015-328 |
As a countermeasure against eavesdropping in wireless communications the wireless steganography technique has been propo... [more] |
IT2015-96 SIP2015-110 RCS2015-328 pp.261-266 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
Improvement of Multibit Information Embedding Scheme for Palette-Based Images Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-79 |
We propose a new approach of embedding multibit information for palette-based images in this paper. The secret informati... [more] |
EMM2014-79 pp.13-17 |
RCS |
2014-06-18 10:37 |
Okinawa |
Okinawa-ken Seinenkaikan (Naha) |
Wireless Steganography in MIMO System Keisuke Hokai, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2014-68 |
As a countermeasure against eavesdropping in wireless communications the wireless steganography technique has been propo... [more] |
RCS2014-68 pp.207-212 |
EMM |
2014-01-28 09:30 |
Miyagi |
Research Institute of Electrical Communication |
Evaluation of Threshold Levels using Complexity Distributions in BPCS Steganography Technique Syouhei Harada, Shingo Shimaura, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) EMM2013-94 |
It is necessary to reduce two variance values of the degradation level of stego images and the embedding rate in stegano... [more] |
EMM2013-94 pp.33-38 |