The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an artificial Boolean network exhibiting the behaviour similar to that of the cell cycle: three phases and checkpoints between them. The phases follow the increase of the cell mass, while checkpoints ensure that internal errors are corrected before moving to the next phase. The network can tolerate up to one gene mutation and one transient error in gene expressions. It has only 6 genes...
Nowadays, multimedia data protection widely uses data hiding technology like Digital Watermarking or steganography. Among the large offer of watermarking techniques several ones are now based on the side information scheme proposed by Costa. These techniques mainly use scalar quantization for embedding a given information. Such solutions have good properties in terms of robustness and capacity but...
The design of the MAP decoder for signals in impulsive noise modeled using the symmetric α-stable (SαS) distribution is considered. The conventional MAP decoder, which optimizes the a posteriori probability for Gaussian noise, performs poorly in SαS noise. On the other hand, the optimal MAP decoder possesses impractical complexity due to the lack of a closed form expression of the probability density...
In this paper, the improved spread spectrum (ISS) modulation is modified and extended to cancel the host interference in the context of watermark decoding with unmatched filtering, where the reference sequence at the watermark decoder does not match with the embedded sequence. Then a robust and transparent audio watermarking scheme based on this extended ISS and a psychoacoustic model is proposed...
Flow watermarking 1 is an efficient technique for linking packet flows that helps thwart various attacks in networks such as over the Internet. Current state-of-the-art water-marking schemes withstand packet losses at the expense of compromising invisibility. We present an invisible flow watermarking scheme that can endure large numbers of packet losses. To maintain invisibility, our scheme embeds...
Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction algorithm to be a good classifier. But, an even effective feature extractor can give a very low-quality biometric...
The paper proposes a new approach for evaluating the security levels of digital watermarking schemes, which is more in line with the formulation proposed in cryptography. We first exhibit the class of equivalent decoding keys. These are the keys allowing a reliable decoding of contents watermarked with the secret key. Then, we evaluate the probability that the adversary picks an equivalent key. The...
This paper describes an informed unipolar spread spectrum (SS) modulation to improve the performance of SS-based watermark extraction with self-synchronization. Compared with bipolar SS, unipolar SS, realized by employing a pair of orthogonal codes to represent the watermark bits, is more robust against the distorted correlation between the received watermarked signal and the reference. The informed...
The BP decoding terminates frequently during the early stage for LT codes with the robust Soliton distribution. Generally, more than 90% of undecoded input symbols result from decoding termination within the range 0 ≤ n ≤ k/2, where n and k are the decoded and total number of input symbols, respectively. This study focuses on reducing the symbol loss probability by preventing early decoding termination...
A challenging problem related to the design of polar codes is “robustness against channel parameter variations”, as stated in Arıkan's original work. In this paper, we show that mismatched polar codes with a decoder implementation based on an approximation of the polarization transformations proposed in [3] are robust for the class of binary symmetric channels. We carry numerical simulations for the...
In this paper we unveil basic properties of a (k, n)-threshold scheme secure against an extended impersonation attack by an opponent. We consider a scenario in which an opponent tries to impersonate one of the participants under knowledge of other shares. We first establish lower bounds on not only the sizes of the n shares and the uniform random number needed for generation of the shares but also...
There are many studies on the performance of binary fingerprinting codes under a well-known marking assumption. Among many fingerprinting codes, we focus on Tardos codes and Nuida's variants. From the signal processing point of view, the relaxation of the assumption is required for the analysis. In this paper, we consider the averaging attack which has been studied in the spread-spectrum-based fingerprinting...
In this paper, we propose a robust speaker-independent acoustic model training method using generative training to generate many pseudo-speakers from a small number of real speakers. We focus on the difference between each speaker's vocal tract length, and manipulate it in order to create many different pseudo-speakers with a range of vocal tract lengths. This method employs frequency warping based...
The goal of the project is a telemedicine network of smart in-home monitoring systems for outpatient pregnancy surveillance to ensure early detection of pregnancy complications and fetal pathologies, as well as ubiquitous information support of pregnancy care both antenatal and intrapartum.
In this paper, we investigate the impact of circuit misbehavior due to parametric variations and voltage scaling on the performance of wireless communication systems. Our study reveals the inherent error resilience of such systems and argues that sufficiently reliable operation can be maintained even in the presence of unreliable circuits and manufacturing defects. We further show how selective application...
Forward error correction (FEC) is an effective means of reliable communications in wireless networks. Among all error-correcting codes, the recently developed fountain codes are known for their low complexity and rateless features. In the literature, fountain codes are mostly adopted in point-to-point communications. In this paper, we will investigate decomposed fountain codes for distributed dual-hop...
This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in...
With the rapid development and the richer content of the Internet, the copyright protection of the works should be further developed. The watermarking has become a possible solution. In this paper, firstly, a novel hybrid multiplicative rule is presented and utilized to embed the watermark into DWT coefficients controlled by the secret key. Secondly, the optimum and locally optimum hybrid multiplicative...
A method of reversible video image regions of interest anonymization for applications in video surveillance systems is described. A short introduction to the anonymization procedures is presented together with the explanation of its relation to visual surveillance. A short review of state of the art of sensitive data protection in media is included. An approach to reversible Region of Interest (ROI)...
One problem in the current High Efficiency Video Coding design is that the entropy decoding, or the parsing process of one frame may depend on syntax elements on other frames. Thus, a small error may lead to immediate failure of decoding of the current frame and all the following inter frames. This paper analyzes the cause of this vulnerability of HEVC bitstreams. Based on the analysis, we further...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.