We aim to implement functions that can identify and find people and objects by picking out sounds and voices from the vast amount of audio and video information that is obtained via microphones and cameras and made available by ubiquitous networks.
Robust media search
- For media information such as video, audio and images, we are developing a technique for searching and identifying media content at high speed that is unaffected by signal distortion or noise. With this robust media search (RMS) technique, we can support the storage and distribution of information and so well handle the media information explosion.
Media information extraction
- We are developing a technique for automatically extracting information related to objects and events included in media information such as video, audio and images. This technique connects media information with symbolic information such as text and attributes, thereby bringing new value to vast quantities of media information.
- With the world’s most advanced speech enhancement and speech recognition technology at its core, we are implementing technology that uses audio information to help us understand the surrounding environment as a communication scene. With this technology, we will support new services that help people to communicate.
Dynamical information processing
- By making active use of disordered phenomena such as laser chaos, we are implementing a high-speed random number generator and an information-theoretic secure encryption system. With these technologies, we will contribute to the implementation of safe and secure communications.
Quantum information science
- By applying the principles of quantum mechanics, it will become possible to perform diverse types of information processing that are currently regarded as impossible. Through our research into quantum information science centered on quantum computing and quantum cryptography, we aim to implement quantum telecommunication techniques in the near future.
Information security based on formal methods
- We are exploring the possibilities of formal methods, which are techniques for providing rigorous mathematical assurances of the security of systems. We aim to provide a high level of safety and security in telecommunication systems that provide essential services such as e-commerce, e-government and e-health.