Akio Ogihara
Osaka Prefecture University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Akio Ogihara.
international symposium on intelligent signal processing and communication systems | 2006
Akio Ogihara; Hiroyuki Matsumura; Akira Shiozaki
We propose a biometric verification method using biometric feature in keystroke operation for ATM (automatic teller machine) user authentication. In the proposed method, ATM user authentication is performed by using the 10 types of biometric feature of hand-shape which are extracted from keystroke motion in ATM operation. Moreover, we calculate the similarity between current ATM operator and genuine user in consideration of key-press timing. The proposed method can improve the safety of the present situation without special additional operation, physical load and psychological burden
International Journal of Electronics | 1989
Shojiro Yoneda; Isao Nakanishi; Itsuo Sasaki; Akio Ogihara
The switched-capacitor realization of the discrete Fourier transform (DFT) is treated in this paper as well as the inverse discrete Fourier transform (1DFT). The output of the DFT has a sinusoidal waveform including the amplitude and phase information of the required spectra. These spectra are given simultaneously and almost in real time. The output of the 1DFT is given merely by adding DFT outputs. Furthermore, the circuit configuration of this system-from input to DFT, from DFT to 1DFT, and from 1DFT to output-is a very simple configuration constructed by a non-recursive filter circuit.
international symposium on intelligent signal processing and communication systems | 2006
Akio Ogihara; Hiroshi Matsumoto; Akira Shiozaki
In order to realize high-precision hand gesture recognition, it is necessary that hand region is extracted correctly from moving image. In this paper, we propose a new hand region extraction method by using background subtraction algorithm. In the proposed method, we introduce the renewal of background image according to the situation of input image. In comparison with the conventional method, our method is able to extract hand region more accurately and more efficiently. Moreover, the proposed method has been applied to hand region extraction for Japanese sign language, and its validity has been confirmed
international symposium on information theory and its applications | 2010
Motoi Iwata; Tomoki Hori; Akira Shiozaki; Akio Ogihara
Digital watermarking is a technique that embeds additional data into digital contents so that the distortion by embedding them is imperceptible, where the additional data are called watermark. One of the applications of digital watermarking is tamper detection and recovery. The digital watermarking methods for tamper detection and recovery can detect the tampered region in a tampered image and recover it. In this application, the digital watermarking methods solve the problem that digital contents can be tampered so that the falsification is not detected. In this manuscript, we propose a new method for tamper detection and recovery of JPEG images by using a RS code. The proposed method embeds the check symbols corresponding to an information-reduced original image into the LSBs of the quantized DCT coefficients in a JPEG image directly. Therefore the method completely extracts the embedded data from watermarked JPEG images. We investigated the performance of the proposed method in view of the image quality and the ability of tamper detection and recovery. The experiments of the image quality confirmed the imperceptibility of watermarked images and images used for recovery. The experiments of the ability of tamper detection and recovery confirmed the maximum size of recoverable tampered region and the difficulty of undetectable falsification.
IEICE Transactions on Information and Systems | 2008
Akira Shiozaki; Motoi Iwata; Akio Ogihara
In this letter, we propose a simple reversible watermarking method for JPEG images using the characteristics of JPEG compression. The method embeds a watermark into a JPEG image, and it extracts the watermark from the watermarked JPEG image and at the same time can recover the watermarked JPEG image to an original unwatermarked JPEG image. Moreover we investigate the number of embeddable blocks, the quality of watermarked images, and the increase of file-size by embedding a watermark.
international symposium on information theory and its applications | 2008
Harumi Murata; Akio Ogihara; Motoi Iwata; Akira Shiozaki
The objective of this work is to increase the capacity of watermark information in the audio watermarking method based on amplitude modification. We increase the capacity of watermark information by embedding multiple watermarks in the different levels of audio data independently. Moreover, we aim to improve the sound quality by modifying the scaling curve of the conventional method.
intelligent information hiding and multimedia signal processing | 2015
Harumi Murata; Akio Ogihara
For audio signals, the sound quality of the stego signal should not deteriorate as much as host signal. With current methods, high sound quality means that the difference between the host and stego signals is small. We proposed a method with which high sound quality means that the sound quality of the stego signal is maintained as music even if another sound, except for host signal, is perceived. Accordingly, we focused on the counterpoint of music theory. A watermark signal is added in consonance to the tones of the host signal based on counterpoint. For this study, we used a diatonic chord as consonance. We also used a sound with an instrumental timbre as the watermark signal. The sound quality of the stego signal does not produce an unpleasant feeling to the listener even if the watermark signal is perceived.
intelligent information hiding and multimedia signal processing | 2009
Akio Ogihara; Harumi Murata; Motoi Iwata; Akira Shiozaki
In the conventional method proposed by W.N.Lie et al., it is difficult to satisfy both the capacity of watermark information and the robustness to MP3 compression. The objective of this work is to increase the capacity of watermark information in the audio watermarking based on low-frequency amplitude modification. We increase the capacity of watermark information by embedding multiple watermarks in individual layers. In the proposed method, it has plural data channels, so it is possible to embed watermark information by selecting the proper data channel according to the capacity of data or extraction accuracy.
international symposium on information theory and its applications | 2010
Harumi Murata; Akio Ogihara; Motoi Iwata; Akira Shiozaki
The objective of this work is to embed watermark information into digital audio data as the deterioration of sound quality is not perceivable to human ears. Hence, we consider that watermark information is embedded in the consonance to melody line or bass line. Generally, unison, octave, perfect fifth and perfect fourth are called consonance and human ears can hardly feel annoyed for consonance. Hence, we focus on perfect fifth and perfect fourth in the consonance. For decision of embedding positions, we need to estimate tone pitches, and we use spectrogram analysis as a technique of automatic music transcription. We embed watermark information with perfect fifth or perfect fourth of consonance from the pitch which is estimated by spectrogram analysis, and we aim at good sound quality of watermarked audio signal without sense of discomfort. Therefore, we propose an audio watermarking method by using automatic music transcription information.
EURASIP Journal on Advances in Signal Processing | 2010
Motoi Iwata; Tomoo Kanaya; Akira Shiozaki; Akio Ogihara
We propose a digital watermarking method warranting the lower limit of the image quality of watermarked images. The proposed method controls the degradation of a watermarked image by using a lower limit image. The lower limit image means the image of the worst quality that users can permit. The proposed method accepts any lower limit image and does not require it at extraction. Therefore lower limit images can be decided flexibly. In this paper, we introduce 2-dimensional human visual MTF model as an example of obtaining lower limit images. Also we use JPEG-compressed images of quality 75% and 50% as lower limit images. We investigate the performance of the proposed method by experiments. Moreover we compare the proposed method using three types of lower limit images with the existing method in view of the tradeoff between PSNR and the robustness against JPEG compression.