IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 50  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2024-03-13
13:40
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
A Steganalysis of Image Steganography using Real Image Denoising
Shinnosuke Toguchi, Takamichi Miyata (CIT) SITE2023-100 IA2023-106
Image steganography is a technique for embedding secret messages in images. SteganoGAN, one of the previous methods, use... [more] SITE2023-100 IA2023-106
pp.195-202
RCC, ISEC, IT, WBS 2023-03-15
11:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Steganography for Graphs using Graph Spectrum
Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113
Steganography aims to hide the fact that a message is being communicated by embedding it in another information medium.T... [more] IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113
pp.305-312
AI 2022-02-28
15:00
Miyazaki Youth Hostel Sunflower MIYAZAKI
(Primary: On-site, Secondary: Online)
Basic Study for Backdoor Attack based on Invisible Trigger
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] AI2021-21
pp.53-58
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] 2022-02-22
11:55
Online Online Bit-plane oriented Detection method of Malicious Code Hidden in the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] ITS2021-50 IE2021-59
pp.151-156
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] IT2020-128 ISEC2020-58 WBS2020-47
pp.104-109
CS, IN, NS, NV
(Joint)
2020-09-11
15:10
Online Online A study of steganography based on error correction code and secret sharing scheme
Kaito Onuma, Sumiko Miyata (SIT) CS2020-44
In recent years, the opportunity to handle information on the Internet has increased and interest in security has increa... [more] CS2020-44
pp.47-52
SIS 2020-03-05
13:10
Saitama Saitama Hall
(Cancelled but technical report was issued)
An Improvement on Data Hiding in the Copyright- and Privacy-Protected Image Trading System
Kazuaki Takahashi, Masaaki Fujiyoshi (Tokyo Metro. Univ.), Wannida Sae-tang (KMUTNB), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-39
This paper improves the data hiding performance in the copyright- and privacy-protected image trading system. In the sys... [more] SIS2019-39
pp.13-18
EA, SIP, SP 2019-03-14
13:30
Nagasaki i+Land nagasaki (Nagasaki-shi) [Poster Presentation] Steganographic Audio Secret Sharing
Shu Noguchi, Kotaro Sonoda, Senya Kiyasu (Nagasaki Univ.) EA2018-108 SIP2018-114 SP2018-70
In the usual secret sharing scheme, one secret information is managed by distributing it amongst a group of shares of se... [more] EA2018-108 SIP2018-114 SP2018-70
pp.55-60
IT, ISEC, WBS 2019-03-08
14:20
Tokyo University of Electro-Communications On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more]
IT2018-124 ISEC2018-130 WBS2018-125
pp.297-302
CQ, ICM, NS, NV
(Joint)
2018-11-16
13:45
Ishikawa   Information Hiding for Networked Control Systems Using Steganography
Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CQ2018-73
According to the growing of the Internet, secure communication methods have been actively reserached. The mainly used se... [more] CQ2018-73
pp.55-60
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-15
13:50
Tokyo   Study of template matching application of steganography ANGO
Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36
We propose a method ANGO(=Asymmetric Nondestractive steGanOgraphy) to extract different third information by two(o... [more] ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36
pp.247-252
NS 2017-05-19
10:50
Tokyo Kikai Shinko Kaikan Per-Packet Throughput of Information-Leakage Through Content Names in NDN Interest Packets
Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2017-20
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN)... [more] NS2017-20
pp.35-40
EA, EMM 2016-11-17
16:15
Oita Compal Hall (Oita) An introduction of watermark as an alternative of QR code
Naoki Terunuma, Kei Hiraki (UTokyo) EA2016-54 EMM2016-60
A QR code on a poster provides easy access to web sites. Using QR code increases the quantity of information, though it ... [more] EA2016-54 EMM2016-60
pp.37-42
PRMU 2016-10-21
16:20
Miyazaki   Study of template matching application of a steganography (ANGO) -- Interdisciplinary cryptography and image processing --
Hirokazu Ishizuka (Kyudai), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyudai) PRMU2016-108
We propose a steganographic method called ANGO using Ango Sakaguchi's
novel ``ANGOU'' as a hint. Go through the study ... [more]
PRMU2016-108
pp.97-102
SIS 2016-06-10
11:45
Hokkaido Kushiro Tourism and Convention cent. Multibit Data Embedding Algorithm for Palette-based Images
Yoshiaki Ueda, Jyohei Matsuoka (Yamaguchi Univ.), Takanori Koga (NIT, Tokuyama College), Noriaki Suetake, Eiji Uchino (Yamaguchi Univ.) SIS2016-16
In this report, the steganographic methods especially for the palette-based images, such as graphic interchange format (... [more] SIS2016-16
pp.81-86
EMM 2016-01-18
13:00
Miyagi Katahira Campus, Tohoku University Eldercare Remote Support IoT System using Steganography
Masahiro Wakiyama, Akira Miyamoto (NITKIT) EMM2015-61
There is an increasing need for eldercare due to the declining birthrate and aging population in Japan. In concern for a... [more] EMM2015-61
pp.1-6
RCS, IT, SIP 2016-01-19
14:45
Osaka Kwansei Gakuin Univ. Osaka Umeda Campus Wireless Steganography using Nonlinear Amplifier in OFDM system
Keisuke Hokai, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) IT2015-96 SIP2015-110 RCS2015-328
As a countermeasure against eavesdropping in wireless communications the wireless steganography technique has been propo... [more] IT2015-96 SIP2015-110 RCS2015-328
pp.261-266
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] Improvement of Multibit Information Embedding Scheme for Palette-Based Images
Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-79
We propose a new approach of embedding multibit information for palette-based images in this paper. The secret informati... [more] EMM2014-79
pp.13-17
RCS 2014-06-18
10:37
Okinawa Okinawa-ken Seinenkaikan (Naha) Wireless Steganography in MIMO System
Keisuke Hokai, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2014-68
As a countermeasure against eavesdropping in wireless communications the wireless steganography technique has been propo... [more] RCS2014-68
pp.207-212
EMM 2014-01-28
09:30
Miyagi Research Institute of Electrical Communication Evaluation of Threshold Levels using Complexity Distributions in BPCS Steganography Technique
Syouhei Harada, Shingo Shimaura, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) EMM2013-94
It is necessary to reduce two variance values of the degradation level of stego images and the embedding rate in stegano... [more] EMM2013-94
pp.33-38
 Results 1 - 20 of 50  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan