The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We discuss the threat that hardware Trojans (HTs) impose on wireless networks, along with possible remedies for mitigating the risk. We first present an HT attack on an 802.11a/g transmitter (TX), which exploits Forward Error Correction (FEC) encoding. While FEC seeks to protect the transmitted signal against channel noise, it often offers more protection than needed by the actual channel. This margin...
With the advent of QR readers and mobile phones the use of graphical codes like QR codes and data matrix code has become very popular. Despite the noise like appearance, it has the advantage of high data capacity, damage resistance and fast decoding robustness. The proposed system embeds the image chosen by the user to develop visually appealing QR codes with improved decoding robustness using BCH...
This paper investigates the framework of encoder-decoder with attention for sequence labelling based spoken language understanding. We introduce Bidirectional Long Short Term Memory - Long Short Term Memory networks (BLSTM-LSTM) as the encoder-decoder model to fully utilize the power of deep learning. In the sequence labelling task, the input and output sequences are aligned word by word, while the...
This paper considers communication over the point-to-point Gaussian channel with stationary and ergodic channel gain and full channel state information. The capacity of this channel can be achieved in a straightforward manner via any capacity-achieving codebook for the non-fading Gaussian channel, in conjunction with separable coding, i.e., coding independently over each fading state. Despite its...
The article describes the authors' experience in results processing of quality characteristics measurements of signal of Digital Radio Mondiale standard (robustness mode E) during field trials in the experimental broadcasting area, organized in Saint-Petersburg.
In contrast to many image watermarking schemes, the suggested method is implemented in the JPEG compressed domain with no transcoding or decompression. Therefore, this scheme is highly efficient in real-time applications and suitable for multimedia information, which is rarely available in an uncompressed form. The proposed watermarking scheme is very flexible, and can be tailored to meet the requirements...
Most of the turbo decoding stopping criteria assume perfect channel reliability available at the receiver since they require a threshold based on signal-to-noise ratio (SNR) information. However, operational environments can vary according to frame sizes, code structures and channel reliability requirements, further aggravating the difficulty in threshold determination and convergence or non-convergence...
Copyright protection for multimedia data owners is of crucial importance as the duplication of multimedia data has become easily with the advent of Internet and digital multimedia technology. Current digital watermarking techniques for preserving the product ownership are rule-based and not directly deal with the data synchronization, therefore their decoding performance reduces significantly when...
This paper presents a new embedding strategy to extend the performance bound of spread spectrum (SS) based watermarking by introducing more imperceptible distortions measured in the mean square errors (MSE). The potential of the host is sufficiently exploited and utilized to maximize the watermark robustness. This strategy is then realized in audio watermarking by adaptively inverting the host according...
Near-Infrared spectroscopy (NIRS) is an emerging non-invasive brain computer interface (BCI) modality that measures changes in haemoglobin concentrations in the cortical tissue. To date most NIRS studies have used standard multiple subject/session dependent classifiers for neural signal decoding. Such approach is preferable to avoid large degree of variabilities in the acquired data that affects classifier...
AprilTags and other passive fiducial markers require specialized algorithms to detect markers among other features in a natural scene. The vision processing steps generally dominate the computation time of a tag detection pipeline, so even small improvements in marker detection can translate to a faster tag detection system. We incorporated lessons learned from implementing and supporting the AprilTag...
This paper investigates the robustness of two state-of-theart action recognition algorithms: a pixel domain approach based on 3D convolutional neural networks (C3D) and a compressed domain approach requiring only partial decoding of the video, based on feature description using motion vectors and Fisher vector encoding (MV-FV). We study the robustness of the two algorithms against: (i) quality variations,...
In this paper, we investigate the limitation of existing STT-LUT designs and propose two new circuit styles of designing STT-LUTs that offer higher performance and robustness compared to the conventional STT-LUT design. The proposed styles include a Dynamic Single Rail (DSR) and a Dynamic Dual Rail (DDR) STT-LUT. The simulation results in a 16nm bulk CMOS technology shows that the proposed designs...
Although High Dynamic Range (HDR) content can provide an enhanced immersive experience for end-users, the impact of channel errors on its perception is unclear due to the lack of a standardized HDR video distribution framework. This paper presents an assessment of the robustness of the two main HDR video distribution architectures, the single-layer 10-bit scheme and the two-layer 8-bit backward-compatible...
In this paper authors proposed a secured Digital Biometric based watermarking algorithm and its hardware realization by means of Field Programmable Gate Array (FPGA). The scheme focuses on the Graph Based Visual Saliency (GBVS) technique. Biometric watermarking has been introduced for validity and ultimate security of a digital media. Biometric information which is basically fingerprint is being hidden...
Computing under uncertainty has become increasingly important in modern information processing systems. In this work, we first review exciting recent results on the multi-faceted role coding approaches can play in this important discipline, including fundamental performance limits of noisy iterative algorithms and decoders, implications on system design, and coding-theoretic methods for approximate...
We study the problem of estimating an unknown vector from noisy underdetermined observations, with recovery guarantees. In such context, a regularity model on the unknown is needed to obtain recovery guarantees. We show that we can guarantee the recovery of generic models (cones) with the minimization of an arbitrary regularizer subject to a data-fit constraint (generalized robust basis pursuit) under...
Digital domain is today's most preferred area for data processing and transmission. In case of data augmentation or authorized replication, copyright protection has become an exigent challenge. Digital watermarking is a conventional procedure to serve this purpose. Here a spatial domain image watermarking scheme is developed through a pixel based saliency map where the inadequate nature of human visual...
Document is unavailable: This DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of IEEE's "Publication Services and Products Board Operations Manual," IEEE has chosen to exclude this article from distribution. We regret any inconvenience.
Color brings extra data capacity for QR codes, but it also brings tremendous challenges to the decoding because of color interference and illumination variation, especially for high-density QR codes. In this paper, we put forth a framework for high-capacity QR codes, HiQ, which optimizes the decoding algorithm for high-density QR codes to achieve robust and fast decoding on mobile devices, and adopts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.