The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper highlights a novel transformation based differently coded separate image bit watermarking concept with various series of secret bit sequencing for the multiple hidden images achieving stronger robustness and authentication scenarios. First three pixel bytes of the 2×2 non-overlapping sub blocks of the cover image is mutually transformed followed by the distinct encoding of the resultant...
Steganography is the art of science dealing with hiding secret data inside image, audio, video or text files. In audio steganography; secret message is embedded in the digital sound by slightly altering the binary sequence of the sound file. Existing audio steganography software deal with WAV, AU, and even MP3 sound files. Embedding secret messages in the digital sound is usually a more difficult...
Forensics examiners frequently try to identify duplicate files during an investigation. They might do so to identify known files of interest, or to allow more rapid review of documents that appear to be similar. Current forensic tools for detecting duplicate files operate over the low-level bits of the file, typically using hashing. While this can be a fast and effective method in many cases, it can...
The improved compression efficiency achieved by the High Efficiency Video Coding (HEVC) standard has the counter-effect of decreasing error resilience in transmission over error-prone channels. To increase the error resilience of HEVC streams, this paper proposes a checkerboard reference picture selection method in order to reduce the prediction mismatch at the decoder in case of frame losses. The...
Dictionary learning method based on sparse coding has been widely used in visual tracking, since it has good performance in terms of encoding target appearance. Currently, most of the visual tracking algorithms based on dictionary learning update the dictionary with tracking results in tracking process. Consequently, the total error accumulated over time, and even cause the failure of tracking. In...
We present a controller synthesis algorithm for reach-avoid problems for piecewise linear discrete-time systems. Our algorithm relies on SMT solvers and in this paper we focus on piecewise constant control strategies. Our algorithm generates feedback control laws together with inductive proofs of unbounded time safety and progress properties with respect to the reach-avoid sets. Under a reasonable...
Apparent age estimation from face image has attracted more and more attentions as it is favorable in some real-world applications. In this work, we propose an end-to-end learning approach for robust apparent age estimation, named by us AgeNet. Specifically, we address the apparent age estimation problem by fusing two kinds of models, i.e., real-value based regression models and Gaussian label distribution...
Person re-identification plays a key role in video monitoring. Aiming for current person re-identifications for numerical complexity and extraction difficulty, we propose a simple and fast multi-feature. On the basis of analysis of difference excitation and orientation of Weber Local Descriptors, showing graphic texture features by difference excitation of circular field, showing graphic edge orientation...
Echo hiding methods have good perceptual quality and they are robust to intentional and unintentional modifications. Unfortunately these methods are not quite transparent and are not suitable for steganography applications. Specifically, this point became more obvious after a recent steganalysis investigation where both parameters and the hidden message were extracted accurately. This work tries to...
The Gabor filters are considered one of the best image representation approaches for face recognition (FR). Researchers have exploited various configurations of Gabor magnitude as well as Gabor phase responses and their modeling with other descriptors. In this paper, we propose a novel face representation approach; Local Gabor Rank Pattern (LGRP), which exploits ordinal ranking of Gabor response images...
Recently sparse and collaborative representation based classification has been developed for face recognition with single sample per person (SSPP). By using variations extracted from a generic training set as an additional common dictionary, promising performance has been reported in face recognition with SSPP. However, existing representation based classifiers for face recognition with SSPP ignored...
Deep learning and unsupervised feature learning systems are known to achieve good performance in benchmarks by using extremely large architectures with many features at each layer. However, we found that the number of features' contribution to performance is very small when it is more than the threshold. Meanwhile, the size of pooling layer has an important influence on performance. In this paper,...
In classifying images, scenes or objects, the most popular approach is based on the features extraction-coding-pooling framework allowing to generate discriminative and robust image representations from densely extracted local patches, mainly some SIFT/HOG ones. The majority of the latest research is focused on how to improve successfully these coding and pooling parts. In this work, we show that...
This exploratory study investigates design expertise through the lens of Robust Design. Robust Design is typically applied to manufacturing processes. Robust Design has the objective of minimizing the effects of uncontrollable noise factors on the output of the process or product. Designers achieve robustness through the control of design variables. A coding scheme was developed from the conceptual...
This paper addresses the combination of a low delay subband ADPCM-based audio codec with adaptive pre- and post-filtering for psychoacoustic noise shaping. We present how our basic scheme for error robust subband coding can be combined with two cascades of band shelving filters. The gain parameters of these filters are adapted by an algorithm that is based on power estimates which are obtained from...
A practical rateless coding framework for the half-duplex decode-and-forward (DF) relay channel is proposed in this paper. Rateless spinal codes are employed as the basic coding strategy in our coding framework and a cooperative decoder for the destination is proposed. Moreover, by introducing the concepts of equivalent code and equivalent channel, we prove that the proposed coding framework is capable...
We investigate the impact of laser frequency drift, which can cause inter-channel interference (ICI) in superchannel communications. We show that Han-Kobayashi coding significantly improves robustness against the drift, achieving 2-times higher achievable rate than conventional coding.
In a model-based Covert Timing Channel (CTC), the (covert) sender modulates the inter-packet delays (IPDs) of the packet stream generated by the overt application (source) by following a well-known statistical model of the application traffic. Implementing a CTC system that operates on real application traffic such as Skype requires addressing several challenges. First, packets generated by Skype...
Robust plan execution in uncertain and dynamic environments is a critical issue for plan-based autonomous systems, especially when uncertain events coexist with temporal flexibility. In this regard, many Planning and Scheduling systems model temporal uncertainty by means of flexible timelines, each of which describes the behavior of one of the system components, and consists of a sequence of events...
Consider a set of clients in a broadcast network, each of which holds a subset of packets in the ground set X. In the (coded) cooperative data exchange problem, the clients need to recover all packets in X by exchanging coded packets over a lossless broadcast channel. Several previous works analyzed this problem under the assumption that each client initially holds a random subset of packets in X...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.