All Stories

  1. Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation
  2. Disinformation detection and source tracking using semi-fragile watermarking and blockchain
  3. An Extension of Job-Worker Assignment Algorithm for Dynamic Job Migration for User-PC Computing System
  4. StealthPDF: Data hiding method for PDF file with no visual degradation
  5. DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning
  6. An Implementation of Job Migration Function Using CRIU and Podman in Docker-based User-PC Computing System
  7. White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model
  8. A Throughput Drop Estimation Model for Concurrent Communications under Partially Overlapping Channels without Channel Bonding and Its Application to Channel Assignment in IEEE 802.11n WLAN
  9. A Code Completion Problem in C Programming Learning Assistant System
  10. An Implementation of Offline Answering Function for Code Completion Problem in PLAS
  11. A Generalization of Transmission Power Optimization Method for Concurrently Communicating Multiple Access-Points in Wireless Local-Area Network
  12. A Proposal of Air-Conditioning Guidance System Using Discomfort Index
  13. Transmission Power Optimization of Concurrently Communicating Two Access Points in Wireless Local Area Network
  14. A Proposal of Transmission Power Optimization Method for Concurrently Communicating Two Access-Points in Wireless Local-Area Network
  15. Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing
  16. A Generalized TCP Fairness Control Method for Multiple-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access Point
  17. An Extension of Code Correction Problem for Java Programming Learning Assistant System
  18. An Implementation and Evaluation of Advanced Widgets Topic for Interactive Application Stage in Android Programming Learning Assistance System
  19. Improved DM-QIM Watermarking Scheme for PDF Document
  20. A Calligraphy Learning Assistant System with Letter Portion Practice Function Using Projection Mapping
  21. Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy
  22. Efficient Decentralized Tracing Protocol for Fingerprinting System with Index Table
  23. Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates
  24. A proposal of calligraphy learning assistant system with letter portion practice function using projection mapping
  25. A proposal of Android Programming Learning Assistant System with implementation of basic application learning
  26. Efficiently Decodable Non-Adaptive Threshold Group Testing
  27. A Proposal of Recommendation Function for Solving Element Fill-in-Blank Problem in Java Programming Learning Assistant System
  28. Web-Server Implementation of Code Completion Problem for Java Programming Learning Assistant System
  29. A TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point
  30. A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher
  31. A Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point
  32. An Extension of Throughput Drop Estimation Model for Three-Link Concurrent Communications under Partially Overlapping Channels and Channel Bonding in IEEE 802.11n WLAN
  33. Decentralized tracing protocol for fingerprinting system
  34. Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing
  35. Robust and Secure Data Hiding for PDF Text Document
  36. Sublinear Decoding Schemes for Non-adaptive Group Testing with Inhibitors
  37. Throughput Measurement and Estimation Model for Concurrent Communications of Multiple Raspberry Pi Access-Points in Wireless Local-Area Network
  38. Efficient Decoding Algorithm for Cyclically Permutable Code
  39. Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code
  40. Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
  41. Bias-Based Binary Fingerprinting Code Under Erasure Channel
  42. Fingerprinting for multimedia content broadcasting system
  43. Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes
  44. Secure data management system with traceability against internal leakage
  45. Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System
  46. Reversible data hiding based compressible privacy preserving system for color image
  47. Data Hiding for Text Document in PDF File
  48. A Proposal of Software Architecture for Java Programming Learning Assistant System
  49. Aesthetic QR Code Based on Modified Systematic Encoding Function
  50. DCT-OFDM Watermarking Scheme Based on Communication System Model
  51. Information Hiding and Its Criteria for Evaluation
  52. Watermarking with Fixed Decoder for Aesthetic 2D Barcode
  53. A proposal of three extensions in blank element selection algorithm for Java programming learning assistant system
  54. Enabling public auditability for operation behaviors in cloud storage
  55. A Proposal of Coding Rule Learning Function in Java Programming Learning Assistant System
  56. Throughput measurements for access-point installation optimization in IEEE802.11n wireless networks
  57. Worker PC performance measurements using benchmarks for user-PC computing system
  58. Benchmarking of scoring functions for bias-based fingerprinting code
  59. DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks
  60. Enrichment of Visual Appearance of Aesthetic QR Code
  61. Fingerprinting for Broadcast Content Distribution System
  62. Digital Watermark
  63. Simple Countermeasure to Non-Linear Collusion Attacks Targeted for Spread-Spectrum Fingerprinting Scheme
  64. Image fingerprinting system based on collusion secure code and watermarking method
  65. Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme
  66. DCT-OFDM based watermarking scheme robust against clipping attack
  67. A simple tracing algorithm for binary fingerprinting code under averaging attack
  68. Bias Equalizer for Binary Probabilistic Fingerprinting Codes
  69. Coded Spread Spectrum Watermarking Scheme
  70. Interference Removal Operation for Spread Spectrum Fingerprinting Scheme
  71. Adaptive iterative detection method for spread spectrum fingerprinting scheme
  72. A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes
  73. Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique
  74. Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme
  75. Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random Permutation
  76. Recent Fingerprinting Techniques with Cryptographic Protocol
  77. Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel
  78. On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
  79. Systematic Generation of Tardos's Fingerprint Codes
  80. Tardos’s Fingerprinting Code over AWGN Channel
  81. A Study of Rounding Error on CDMA-Based Fingerprinting Scheme
  82. A study of traceability of CDMA-based fingerprinting scheme
  83. Adaptive reversible data hiding for JPEG images
  84. Effective assignment of fingerprints on CDMA-based fingerprinting scheme
  85. Hierarchical construction of Tardos code
  86. On the systematic generation of Tardos’s fingerprinting codes
  87. Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
  88. Effective detection method for CDMA-based fingerprinting scheme
  89. Iterative Detection Method for CDMA-Based Fingerprinting Scheme
  90. Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer
  91. How to Generate Cyclically Permutable Codes From Cyclic Codes
  92. Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant
  93. Improvement of watermark detection ability based on blockwise image compensation for geometrical distortions
  94. Fingerprinting protocol for images based on additive homomorphic property
  95. Reversible Watermark with Large Capacity Using the Predictive Coding
  96. A Watermarking Scheme Applicable for Fingerprinting Protocol
  97. Watermarking schemes using the addition property among DCT coefficients
  98. A New Anonymous Fingerprinting Scheme with High Enciphering Rate
  99. A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients
  100. Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique