首页 > 最新文献

21st European Signal Processing Conference (EUSIPCO 2013)最新文献

英文 中文
Adaptive sinusoidal modeling of percussive musical instrument sounds 打击乐器声音的自适应正弦建模
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43434
Marcelo F. Caetano, George P. Kafentzis, A. Mouchtaris, Y. Stylianou
Percussive musical instrument sounds figure among the most challenging to model using sinusoids particularly due to the characteristic attack that features a sharp onset and transients. Attack transients present a highly nonstationary inharmonic behaviour that is very difficult to model with traditional sinusoidal models which use slowly varying sinusoids, commonly introducing an artifact known as pre-echo. In this work we use an adaptive sinusoidal model dubbed eaQHM to model percussive sounds from musical instruments such as plucked strings or percussion and investigate how eaQHM handles the sharp onsets and the nonstationary inharmonic nature of the attack transients. We show that adaptation renders a virtually perceptually identical sinusoidal representation of percussive sounds from different musical instruments, improving the Signal to Reconstruction Error Ratio (SRER) obtained with a traditional sinusoidal model. The result of a listening test revealed that the percussive sounds modeled with eaQHM were considered perceptually closer to the original sounds than their traditional-sinusoidal-modeled counterparts. Most listeners reported that they used the attack as cue.
打击乐乐器的声音是使用正弦波建模最具挑战性的,特别是由于其特征攻击具有尖锐的开始和瞬态。攻击瞬态表现出高度非平稳的非谐波行为,很难用使用缓慢变化的正弦波的传统正弦模型来建模,通常会引入称为预回波的伪像。在这项工作中,我们使用一种称为eaQHM的自适应正弦模型来模拟乐器(如拨弦或打击乐器)的打击声音,并研究eaQHM如何处理攻击瞬态的尖锐发作和非平稳非谐波性质。我们表明,自适应呈现了来自不同乐器的冲击声音的几乎感知相同的正弦表示,提高了传统正弦模型获得的信号重建误差率(SRER)。一项听力测试的结果显示,与传统的正弦模型相比,用eaQHM模型模拟的打击乐声音在感知上更接近原始声音。大多数听众报告说,他们把这次攻击作为线索。
{"title":"Adaptive sinusoidal modeling of percussive musical instrument sounds","authors":"Marcelo F. Caetano, George P. Kafentzis, A. Mouchtaris, Y. Stylianou","doi":"10.5281/ZENODO.43434","DOIUrl":"https://doi.org/10.5281/ZENODO.43434","url":null,"abstract":"Percussive musical instrument sounds figure among the most challenging to model using sinusoids particularly due to the characteristic attack that features a sharp onset and transients. Attack transients present a highly nonstationary inharmonic behaviour that is very difficult to model with traditional sinusoidal models which use slowly varying sinusoids, commonly introducing an artifact known as pre-echo. In this work we use an adaptive sinusoidal model dubbed eaQHM to model percussive sounds from musical instruments such as plucked strings or percussion and investigate how eaQHM handles the sharp onsets and the nonstationary inharmonic nature of the attack transients. We show that adaptation renders a virtually perceptually identical sinusoidal representation of percussive sounds from different musical instruments, improving the Signal to Reconstruction Error Ratio (SRER) obtained with a traditional sinusoidal model. The result of a listening test revealed that the percussive sounds modeled with eaQHM were considered perceptually closer to the original sounds than their traditional-sinusoidal-modeled counterparts. Most listeners reported that they used the attack as cue.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116741517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy efficiency in MIMO large scale two-tier networks with beamforming and adaptive modulation 具有波束形成和自适应调制的MIMO大规模两层网络的能量效率
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43731
Raul Hernandez-Aquino, D. McLernon, M. Ghogho, Syed Ali Raza Zaidi
In this paper, the energy efficiency in the downlink of a two-tier network consisting of macro- and femtocells using beamforming is analyzed. Orthogonal subchannel allocation is used in order to eliminate inter-tier interference. The random locations of the interferers in both tiers are modeled via a Poisson Point Process. Improvements in the energy efficiency of the system (in b/J/Hz), when several femtocells are deployed in a network, are observed under different scenarios. Finally, using realistic implementation parameters, we examine how the energy efficiency is affected by different antenna configurations, and we also obtain the optimal configurations.
本文分析了采用波束形成技术的由宏基站和飞基站组成的二层网络下行链路的能量效率。为了消除层间干扰,采用正交子信道分配。两层干扰的随机位置通过泊松点过程建模。在不同的场景下,当在网络中部署多个飞基站时,可以观察到系统能效(以b/J/Hz为单位)的改进。最后,利用实际的实现参数,研究了不同天线配置对能量效率的影响,并得到了最优配置。
{"title":"Energy efficiency in MIMO large scale two-tier networks with beamforming and adaptive modulation","authors":"Raul Hernandez-Aquino, D. McLernon, M. Ghogho, Syed Ali Raza Zaidi","doi":"10.5281/ZENODO.43731","DOIUrl":"https://doi.org/10.5281/ZENODO.43731","url":null,"abstract":"In this paper, the energy efficiency in the downlink of a two-tier network consisting of macro- and femtocells using beamforming is analyzed. Orthogonal subchannel allocation is used in order to eliminate inter-tier interference. The random locations of the interferers in both tiers are modeled via a Poisson Point Process. Improvements in the energy efficiency of the system (in b/J/Hz), when several femtocells are deployed in a network, are observed under different scenarios. Finally, using realistic implementation parameters, we examine how the energy efficiency is affected by different antenna configurations, and we also obtain the optimal configurations.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Facial image clustering in 3D video using constrained Ncut 基于约束Ncut的三维视频人脸图像聚类
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43742
G. Orfanidis, N. Nikolaidis, I. Pitas
In this paper a novel variant of the Normalized Nut (N-Cut) clustering algorithm that incorporates imposed constraints is implemented and evaluated on facial image clustering for 3D video analysis. The clustering problem is seen as a graph cut problem through a similarity matrix representing the relation among the vertices, i.e. facial images in this work. Mutual Information is used as similarity metric, applied on the HSV color space of the original images. This work considers the incorporation of constraints either regarding similarity or dissimilarity derived from a priori available information in the clustering procedure and evaluates the performance increase by their use. Experiments are conducted on 3D videos where a priori information about the facial images exists.
本文实现了一种新的归一化坚果(N-Cut)聚类算法,该算法结合了强加的约束,并对用于3D视频分析的面部图像聚类进行了评估。聚类问题被视为一个图切问题,通过一个相似矩阵表示顶点之间的关系,即在本工作中面部图像。采用互信息作为相似度度量,应用于原始图像的HSV色彩空间。这项工作考虑了在聚类过程中从先验可用信息中获得的关于相似性或不相似性的约束的合并,并评估了它们的使用对性能的提高。实验是在三维视频中进行的,其中存在面部图像的先验信息。
{"title":"Facial image clustering in 3D video using constrained Ncut","authors":"G. Orfanidis, N. Nikolaidis, I. Pitas","doi":"10.5281/ZENODO.43742","DOIUrl":"https://doi.org/10.5281/ZENODO.43742","url":null,"abstract":"In this paper a novel variant of the Normalized Nut (N-Cut) clustering algorithm that incorporates imposed constraints is implemented and evaluated on facial image clustering for 3D video analysis. The clustering problem is seen as a graph cut problem through a similarity matrix representing the relation among the vertices, i.e. facial images in this work. Mutual Information is used as similarity metric, applied on the HSV color space of the original images. This work considers the incorporation of constraints either regarding similarity or dissimilarity derived from a priori available information in the clustering procedure and evaluates the performance increase by their use. Experiments are conducted on 3D videos where a priori information about the facial images exists.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115152969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Event detection in short duration audio using Gaussian Mixture Model and Random Forest Classifier 基于高斯混合模型和随机森林分类器的短时间音频事件检测
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43595
Anurag Kumar, R. Hegde, Rita Singh, B. Raj
The amount of online multimedia files is increasing day by day with the ever increasing popularity of video sharing websites. This has led to a huge interest in content analysis of multimedia files. Audio being a major component of multimedia has the potential to help analyze different events occurring in a multimedia recording. In this paper we present an audio event detection mechanism based on Gaussian Mixture Model (GMM) and Random Forest Classifier. Experiments show that our proposed mechanism shows significant improvement in detection of specifically finer audio events in short duration recordings.
随着视频分享网站的日益普及,网络多媒体文件的数量日益增加。这导致了对多媒体文件内容分析的巨大兴趣。音频作为多媒体的主要组成部分,有可能帮助分析多媒体记录中发生的不同事件。本文提出了一种基于高斯混合模型和随机森林分类器的音频事件检测机制。实验表明,我们提出的机制在检测短时间录音中特别精细的音频事件方面有显着改善。
{"title":"Event detection in short duration audio using Gaussian Mixture Model and Random Forest Classifier","authors":"Anurag Kumar, R. Hegde, Rita Singh, B. Raj","doi":"10.5281/ZENODO.43595","DOIUrl":"https://doi.org/10.5281/ZENODO.43595","url":null,"abstract":"The amount of online multimedia files is increasing day by day with the ever increasing popularity of video sharing websites. This has led to a huge interest in content analysis of multimedia files. Audio being a major component of multimedia has the potential to help analyze different events occurring in a multimedia recording. In this paper we present an audio event detection mechanism based on Gaussian Mixture Model (GMM) and Random Forest Classifier. Experiments show that our proposed mechanism shows significant improvement in detection of specifically finer audio events in short duration recordings.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114883485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Leaf segmentation and parallel phenotyping for the analysis of gene networks in plants 植物基因网络的叶片分割与平行表型分析
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43589
Olivier Janssens, Jonas De Vylder, J. Aelterman, S. Verstockt, W. Philips, D. Straeten, S. Hoecke, R. Walle
Over the last 4 years phenotyping is becoming more and more automated, decreasing a lot of manual labour. Features, which uniquely define the plant, can be extracted automatically from images. As a lot of plant data has to be processed in order to extract the features, fast processing of these features is a challenge. Therefore in this paper, a new method for automatic segmentation of individual leaves from plants with a circular arrangement of leaves (rosettes) is proposed, together with an algorithm to extract the line of symmetry of the leaf. Furthermore, in order to achieve fast processing for phenotyping plants, four feature extraction methods are parallelised in order to run on the CPU and GPU. Our evaluation results show that by parallelizing the feature extraction methods, it is possible to calculate the image moments, area, histogram and sum of intensities 5 to 45 times faster than single threaded implementations.
在过去的4年里,表型分析变得越来越自动化,减少了大量的体力劳动。可以从图像中自动提取唯一定义植物的特征。由于需要处理大量的植物数据来提取特征,因此快速处理这些特征是一个挑战。为此,本文提出了一种叶片呈圆形排列的植物单叶自动分割的新方法,并提出了一种提取叶片对称线的算法。此外,为了实现植物表型的快速处理,为了在CPU和GPU上运行,并行化了四种特征提取方法。我们的评估结果表明,通过并行化特征提取方法,可以比单线程实现更快地计算图像矩、面积、直方图和强度之和5到45倍。
{"title":"Leaf segmentation and parallel phenotyping for the analysis of gene networks in plants","authors":"Olivier Janssens, Jonas De Vylder, J. Aelterman, S. Verstockt, W. Philips, D. Straeten, S. Hoecke, R. Walle","doi":"10.5281/ZENODO.43589","DOIUrl":"https://doi.org/10.5281/ZENODO.43589","url":null,"abstract":"Over the last 4 years phenotyping is becoming more and more automated, decreasing a lot of manual labour. Features, which uniquely define the plant, can be extracted automatically from images. As a lot of plant data has to be processed in order to extract the features, fast processing of these features is a challenge. Therefore in this paper, a new method for automatic segmentation of individual leaves from plants with a circular arrangement of leaves (rosettes) is proposed, together with an algorithm to extract the line of symmetry of the leaf. Furthermore, in order to achieve fast processing for phenotyping plants, four feature extraction methods are parallelised in order to run on the CPU and GPU. Our evaluation results show that by parallelizing the feature extraction methods, it is possible to calculate the image moments, area, histogram and sum of intensities 5 to 45 times faster than single threaded implementations.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"776 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Bandwidth efficient localization for sustainable and safe building environments 带宽高效定位可持续和安全的建筑环境
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43585
A. Kalis, M. Milis, A. Kounoudes, A. Constantinides
The objective of this work is to propose the use of innovative low-cost wireless sensor network nodes equipped with smart antennas, so as to meet the goal of creating a sustainable and safe building environment. The proposed wireless sensor network system can provide information on people density within building areas, information that can be used in a number of applications such as energy footprint optimization, predictive maintenance and building safe evacuation. The unique design of the proposed sensor nodes can be supportive to the aforementioned applications by providing people location information and building area usage in a bandwidth efficient way, in order to enable such systems to be integrated into existing low-bandwidth in-building communication systems, such as fire alert and automation networks. Node architecture is based on the use of low-cost and low-complexity switched beam antennas and the use of a localization estimation algorithm based on angle of arrival measurements which, as opposed to popular received signal strength based algorithms, are not affected by the severe multipath environment of indoor communications systems.
本工作的目标是提出使用配备智能天线的创新型低成本无线传感器网络节点,以实现创造可持续和安全的建筑环境的目标。所提出的无线传感器网络系统可以提供建筑区域内人员密度的信息,这些信息可用于能源足迹优化、预测性维护和建筑安全疏散等许多应用。所提出的传感器节点的独特设计可以通过以带宽有效的方式提供人员位置信息和建筑面积使用情况来支持上述应用,以便使此类系统能够集成到现有的低带宽建筑通信系统中,例如火灾警报和自动化网络。节点架构基于使用低成本和低复杂度的交换波束天线,并使用基于到达角测量的定位估计算法,与流行的基于接收信号强度的算法相反,该算法不受室内通信系统严重多径环境的影响。
{"title":"Bandwidth efficient localization for sustainable and safe building environments","authors":"A. Kalis, M. Milis, A. Kounoudes, A. Constantinides","doi":"10.5281/ZENODO.43585","DOIUrl":"https://doi.org/10.5281/ZENODO.43585","url":null,"abstract":"The objective of this work is to propose the use of innovative low-cost wireless sensor network nodes equipped with smart antennas, so as to meet the goal of creating a sustainable and safe building environment. The proposed wireless sensor network system can provide information on people density within building areas, information that can be used in a number of applications such as energy footprint optimization, predictive maintenance and building safe evacuation. The unique design of the proposed sensor nodes can be supportive to the aforementioned applications by providing people location information and building area usage in a bandwidth efficient way, in order to enable such systems to be integrated into existing low-bandwidth in-building communication systems, such as fire alert and automation networks. Node architecture is based on the use of low-cost and low-complexity switched beam antennas and the use of a localization estimation algorithm based on angle of arrival measurements which, as opposed to popular received signal strength based algorithms, are not affected by the severe multipath environment of indoor communications systems.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127239210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generalized Non-linear Sparse Classifier 广义非线性稀疏分类器
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43381
A. Majumdar, R. Ward, T. Aboulnasr
In a recent study a novel classification algorithm called the Sparse Classifier (SC) assumes that if a test sample belongs to class k then it can be approximately represented by a linear combination of the training samples belonging to k. Good face recognition results were obtained by the SC method. This paper proposes two generalizations of the aforesaid assumption. The first generalization assumes that the test sample raised to a power can be approximated by a linear combination of the training samples of that class raised to the same powers. The second generalization assumes that the test samples raised to a power can be approximately represented by a non-linear combination of the training samples raised to the same power. The first generalization requires solving a group-sparse optimization problem with linear constraints while the second assumption requires solving a group-sparse optimization problem with non-linear constraints. We propose two greedy sub-optimal algorithms to solve the said problems. The classifiers developed in this work are used for single-image-per-person face recognition. We find that our first generalization leads to an improvement of 2-3% in recognition accuracy over SC, while the second generalization improves the recognition accuracy even further; about 6-7% better than the first generalization.
在最近的一项研究中,一种新的分类算法被称为稀疏分类器(SC),它假设如果一个测试样本属于k类,那么它可以由属于k的训练样本的线性组合近似表示。通过SC方法获得了良好的人脸识别结果。本文对上述假设提出了两种概括。第一个泛化假设被提升到一个幂的测试样本可以通过被提升到相同幂的类别的训练样本的线性组合来近似。第二个泛化假设提高到一个幂的测试样本可以近似地用提高到相同幂的训练样本的非线性组合来表示。第一个泛化假设要求求解线性约束下的群稀疏优化问题,第二个泛化假设要求求解非线性约束下的群稀疏优化问题。我们提出了两个贪心次优算法来解决上述问题。在这项工作中开发的分类器用于单个图像的人脸识别。我们发现我们的第一次泛化导致识别精度比SC提高了2-3%,而第二次泛化则进一步提高了识别精度;比第一个结论好6-7%。
{"title":"Generalized Non-linear Sparse Classifier","authors":"A. Majumdar, R. Ward, T. Aboulnasr","doi":"10.5281/ZENODO.43381","DOIUrl":"https://doi.org/10.5281/ZENODO.43381","url":null,"abstract":"In a recent study a novel classification algorithm called the Sparse Classifier (SC) assumes that if a test sample belongs to class k then it can be approximately represented by a linear combination of the training samples belonging to k. Good face recognition results were obtained by the SC method. This paper proposes two generalizations of the aforesaid assumption. The first generalization assumes that the test sample raised to a power can be approximated by a linear combination of the training samples of that class raised to the same powers. The second generalization assumes that the test samples raised to a power can be approximately represented by a non-linear combination of the training samples raised to the same power. The first generalization requires solving a group-sparse optimization problem with linear constraints while the second assumption requires solving a group-sparse optimization problem with non-linear constraints. We propose two greedy sub-optimal algorithms to solve the said problems. The classifiers developed in this work are used for single-image-per-person face recognition. We find that our first generalization leads to an improvement of 2-3% in recognition accuracy over SC, while the second generalization improves the recognition accuracy even further; about 6-7% better than the first generalization.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128878090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A game-theoretic analysis of content-adaptive steganography with independent embedding 独立嵌入的内容自适应隐写博弈论分析
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43653
Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme
We provide a game-theoretic analysis of a scenario from the field of content-adaptive steganography. Alice, a steganographer, wants to embed a secret message into a random binary sequence with a known distribution in which the value of each position is independently but non-identically distributed. Eve, a steganalyst, observes the sequence and wants to determine whether it contains a hidden message. Alice is allowed to flip binary values independently at random, with the constraint that the expected number of changes is a fixed constant. Eve may choose to classify each sequence as either unmodified (cover) or modified (stego). The payoff for Eve in the game is the probability that her classification is correct; and the payoff for Alice is the probability that Eve's classification is incorrect, so that the game is constant-sum. We show that Eve's best response strategy in this game can be expressed as a linear aggregation threshold formula similar to those used in practical steganalysis. We give a general formula for Alice's best response strategy; and we compute explicit pure strategy equilibria for the special case of changing one bit in a length-two sequence.
我们从内容自适应隐写术领域提供了一个场景的博弈论分析。爱丽丝是一名隐写术专家,她想把一条秘密信息嵌入到一个随机的二进制序列中,该序列具有已知的分布,其中每个位置的值是独立但非相同的分布。Eve是一名隐写分析者,她观察这个序列,想要确定它是否包含隐藏的信息。Alice被允许独立地、随机地翻转二进制值,约束条件是期望的改变次数是一个固定的常数。夏娃可以选择将每个序列分类为未修改(覆盖)或修改(隐藏)。Eve在游戏中的收益便是她的分类是正确的概率;爱丽丝的收益是伊芙分类错误的概率,所以这个游戏是常数和的。我们证明,在这个博弈中,伊芙的最佳对策策略可以表示为一个类似于实际隐写分析中使用的线性聚合阈值公式。我们给出爱丽丝最佳对策策略的一般公式;我们计算了在长度为2的序列中改变1位的特殊情况下的显式纯策略均衡。
{"title":"A game-theoretic analysis of content-adaptive steganography with independent embedding","authors":"Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme","doi":"10.5281/ZENODO.43653","DOIUrl":"https://doi.org/10.5281/ZENODO.43653","url":null,"abstract":"We provide a game-theoretic analysis of a scenario from the field of content-adaptive steganography. Alice, a steganographer, wants to embed a secret message into a random binary sequence with a known distribution in which the value of each position is independently but non-identically distributed. Eve, a steganalyst, observes the sequence and wants to determine whether it contains a hidden message. Alice is allowed to flip binary values independently at random, with the constraint that the expected number of changes is a fixed constant. Eve may choose to classify each sequence as either unmodified (cover) or modified (stego). The payoff for Eve in the game is the probability that her classification is correct; and the payoff for Alice is the probability that Eve's classification is incorrect, so that the game is constant-sum. We show that Eve's best response strategy in this game can be expressed as a linear aggregation threshold formula similar to those used in practical steganalysis. We give a general formula for Alice's best response strategy; and we compute explicit pure strategy equilibria for the special case of changing one bit in a length-two sequence.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132660060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis of textural features for face biometric anti-spoofing 人脸生物识别抗欺骗的纹理特征分析
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43537
Muhammad-Adeel Waris, Honglei Zhang, I. Ahmad, S. Kiranyaz, M. Gabbouj
True authentication predicted on biometrics has received upsurge attention during the last few years, as it provides facile way to access the system through basic physical and behavioral characteristics. Face recognition being a non-intrusive recognition requires less participation from the user compared to iris, speech and fingerprint based biometric. Resistance to false authentication from photographs and video playbacks is a vigorous issue for successful biometric system. This paper analyzes different textural features and proposes a novel approach for anti-spoofing solution. Experiments were conducted on a publicly available face spoofing database REPLAY-ATTACK to validate textural analysis over a database containing printed photographs, photos and videos displayed on electronic screens. Results show that the approach is superior to the other existing state of art approaches tested on same database.
在过去的几年里,基于生物识别技术预测的真实身份验证受到了极大的关注,因为它提供了一种通过基本的物理和行为特征访问系统的简便方法。与基于虹膜、语音和指纹的生物识别技术相比,面部识别是非侵入式识别,需要用户较少的参与。抵抗来自照片和视频回放的虚假认证是成功的生物识别系统的一个重要问题。分析了不同的纹理特征,提出了一种新的抗欺骗方案。实验是在一个公开的人脸欺骗数据库REPLAY-ATTACK上进行的,以验证对包含打印照片、照片和电子屏幕上显示的视频的数据库的纹理分析。结果表明,该方法优于现有的在同一数据库上进行测试的方法。
{"title":"Analysis of textural features for face biometric anti-spoofing","authors":"Muhammad-Adeel Waris, Honglei Zhang, I. Ahmad, S. Kiranyaz, M. Gabbouj","doi":"10.5281/ZENODO.43537","DOIUrl":"https://doi.org/10.5281/ZENODO.43537","url":null,"abstract":"True authentication predicted on biometrics has received upsurge attention during the last few years, as it provides facile way to access the system through basic physical and behavioral characteristics. Face recognition being a non-intrusive recognition requires less participation from the user compared to iris, speech and fingerprint based biometric. Resistance to false authentication from photographs and video playbacks is a vigorous issue for successful biometric system. This paper analyzes different textural features and proposes a novel approach for anti-spoofing solution. Experiments were conducted on a publicly available face spoofing database REPLAY-ATTACK to validate textural analysis over a database containing printed photographs, photos and videos displayed on electronic screens. Results show that the approach is superior to the other existing state of art approaches tested on same database.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improved amr wideband error concealment for mobile communications 改进了移动通信的amr宽带错误隐藏
Pub Date : 2013-09-09 DOI: 10.5281/ZENODO.43321
Sai Han, Florian Pflug, T. Fingscheidt
Mobile wideband speech communication (HD Voice) is more and more available in the past years, primarily in 3G networks. The specifics of mobile communication - even if it is packet-switched - is that received frames with residual bit errors after channel decoding must not necessarily be marked as lost, instead they may be marked as bad (bad frame indicator, BFI). In this work we present how to exploit the information of a soft input (i. e., a log-likelihood ratio input) within the Adaptive Multirate Wideband (AMR-WB) speech decoder, allowing a more robust error concealment as compared to the 3GPP Recommendation. Log-likelihood ratios may be taken from a soft-output channel decoder, or, as in our generic simulation, directly from the demodulator, without the need of a BFI. Since error concealment is non-mandatory, chipset manufacturers are free to implement this alternative speech decoding scheme still in a standard-compliant fashion.
移动宽带语音通信(HD Voice)在过去几年中越来越普及,主要是在3G网络中。移动通信的特点——即使是分组交换——是在信道解码后带有残余误码的接收帧不一定被标记为丢失,相反,它们可能被标记为坏帧(坏帧指示器,BFI)。在这项工作中,我们介绍了如何在自适应多速率宽带(AMR-WB)语音解码器中利用软输入(即对数似然比输入)的信息,与3GPP推荐相比,允许更强大的错误隐藏。对数似然比可以从软输出信道解码器中获取,或者像我们的一般模拟一样,直接从解调器中获取,而不需要BFI。由于错误隐藏不是强制性的,芯片组制造商可以自由地以符合标准的方式实现这种替代语音解码方案。
{"title":"Improved amr wideband error concealment for mobile communications","authors":"Sai Han, Florian Pflug, T. Fingscheidt","doi":"10.5281/ZENODO.43321","DOIUrl":"https://doi.org/10.5281/ZENODO.43321","url":null,"abstract":"Mobile wideband speech communication (HD Voice) is more and more available in the past years, primarily in 3G networks. The specifics of mobile communication - even if it is packet-switched - is that received frames with residual bit errors after channel decoding must not necessarily be marked as lost, instead they may be marked as bad (bad frame indicator, BFI). In this work we present how to exploit the information of a soft input (i. e., a log-likelihood ratio input) within the Adaptive Multirate Wideband (AMR-WB) speech decoder, allowing a more robust error concealment as compared to the 3GPP Recommendation. Log-likelihood ratios may be taken from a soft-output channel decoder, or, as in our generic simulation, directly from the demodulator, without the need of a BFI. Since error concealment is non-mandatory, chipset manufacturers are free to implement this alternative speech decoding scheme still in a standard-compliant fashion.","PeriodicalId":400766,"journal":{"name":"21st European Signal Processing Conference (EUSIPCO 2013)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
21st European Signal Processing Conference (EUSIPCO 2013)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1