The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the problem of fine-grained physical object recognition and introduce a dataset PharmaPack containing 1000 unique pharma packages enrolled in a controlled environment using consumer mobile phones as well as several recognition sets representing various scenarios. For performance evaluation, we extract two types of recently proposed local feature descriptors and aggregate them using popular...
Many state-of-the-art methods in image retrieval, classification and copy detection are based on the Bag-of-Features (BOF) framework. However, the performance of these systems is mostly experimentally evaluated and little results are reported on theoretical performance. In this paper, we present a statistical framework that makes it possible to analyse the performance of a simple BOF-system and to...
In many problems such as biometrics, multimedia search, retrieval, recommendation systems requiring privacy-preserving similarity computations and identification, some binary features are stored in the public domain or outsourced to third parties that might raise certain privacy concerns about the original data. To avoid this privacy leak, privacy amplification is used. In the most cases, the privacy...
In light of the recent development of multimedia and networking technologies, an exponentially increasing amount of content is available via various public services. That is why content identification attracts a lot of attention. One possible technology for content identification is based on digital fingerprinting. When trying to establish information-theoretic limits in this application, usually...
In recent years, content identification based on digital fingerprinting attracts a lot of attention in different emerging applications. At the same time, the theoretical analysis of digital fingerprinting systems for finite length case remains an open issue. Additionally, privacy leaks caused by fingerprint storage, distribution and sharing in a public domain via third party outsourced services cause...
In this paper, we consider security-privacy issues in authentication techniques based on the extraction of common randomness. We demonstrate that the key rate-privacy leak pairs can be enhanced using reliable components extraction from specially designed random projections. The decrease of bit error probability is estimated and its impact on the key rate and privacy leak is evaluated. Several authentication...
In this work a novel fast search algorithm is proposed that is designed to offer improved performance in terms of identification accuracy whilst maintaining acceptable speed for forensic applications involving biometrics and Physically Unclonable Functions. A framework for forensic applications is presented, followed by a review of optimal and existing fast algorithms. We show why the new algorithm...
Using multiple binary classifiers is a popular way to construct multi-class classifiers. There exist several strategies to construct multi-class classifiers from binary classifiers. An important question is which strategy offers the highest probability of successful classification given the number of N binary classifiers used. The first result presented in this work is a method to approximate how...
In this paper, we consider the multiclass classification problem based on independent set of binary classifiers. Each binary classifier represents the output of quantized projection of training data onto a randomly generated orthonormal basis vector thus producing a binary label. The ensemble of all binary labels forms an analogue of a coding matrix. The properties of such kind of matrices and their...
In this paper, we consider robust hashing based on a bit reliability function that allows to enhance the performance in terms of both average probability of error and identification complexity. The obtained results demonstrate the high efficiency of the prosed approach.
This paper is concerned with the particularities of the new class of complex (multiphase) signals created based on the maximum length sequences (m-sequences) and investigation of their properties by means of the spectral and correlation analyses. Ambiguity function apparatus will also be used for these signals investigation.
For the feasible solution space reduction different limitation on solution is applied. Limitations are selected according to the signal or image properties. From all class of feasible solutions only few are selected, which qualify to the positivity requirement. In This work the influence of solution limitation on the signal restoration method properties was shown and computer simulation was performed...
In the paper the results of spatio-temporal imaging simulation based on radar, synthetic aperture radar (SAR) and radiometry systems are presented. The analytical relationship between object scattering/emitting and the formed image is given and the general approach for the description of imaging system by means of Frendholm equation solution is developed. The potential limit of image resolution based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.