{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00045329","sets":["1164:3925:3966:3970"]},"path":["3970"],"owner":"1","recid":"45329","title":["著作権保護のための電子透かしシステム オーディオ電子透かしにおけるマスクの最適配分と次元について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2000-03-21"},"_buckets":{"deposit":"724fa3f4-f101-443c-a950-89e15d47ad06"},"_deposit":{"id":"45329","pid":{"type":"depid","value":"45329","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"著作権保護のための電子透かしシステム オーディオ電子透かしにおけるマスクの最適配分と次元について","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"著作権保護のための電子透かしシステム オーディオ電子透かしにおけるマスクの最適配分と次元について"},{"subitem_title":"Watermark System for Copyright Protection","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2000-03-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"日本IBM東京基礎研究所"},{"subitem_text_value":"日本IBM東京基礎研究所"},{"subitem_text_value":"日本IBM東京基礎研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokyo Research Laboratory, IBM Japan, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Research Laboratory, IBM Japan, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Research Laboratory, IBM Japan, Ltd.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/45329/files/IPSJ-CSEC99008005.pdf"},"date":[{"dateType":"Available","dateValue":"2002-03-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC99008005.pdf","filesize":[{"value":"610.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"84566dde-3c28-47b3-9e1b-ff8780a810ff","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2000 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中村, 大賀"},{"creatorName":"立花, 隆輝"},{"creatorName":"小林, 誠士"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Taiga, Nakamura","creatorNameLang":"en"},{"creatorName":"Ryuki, Tachibana","creatorNameLang":"en"},{"creatorName":"Seiji, Kobayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"著作権保護のために電子透かしは重要な役割を担っているが、このような用途には高い信頼性が必要である。オーディオコンテンツへの電子透かしでは検出時に同期操作が必要であるという特徴がある。本論文ではオーディオへの電子透かしの埋め込み・検出手法をモデル化し、エラー率をコントロールするための閾値の設定方法について述べる。同期情報とビット情報へのマスクの最適な配分を求める。さらに正しくないマスクによる検出が統計的に不可能にするのに必要なマスクの次元を求める。","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Watermarking technology plays an important role for copyright protection of audio content. For such application like copyright protection, reliability is one of the most important factor. In this paper, we discuss the method for designing the threshold to fulfill the given error ratio based on the watermark detection model with synchronization, determining the optimum allocation of watermark strength, and for determining the necessary dimension of the masks to statiscally assure false-detection using wrong mask.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"30","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"25","bibliographicIssueDates":{"bibliographicIssueDate":"2000-03-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"30(1999-CSEC-008)","bibliographicVolumeNumber":"2000"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":45329,"updated":"2025-01-22T10:01:20.209725+00:00","links":{},"created":"2025-01-18T23:11:17.840209+00:00"}