Information-Theoretical Analysis of Private Content Identification
|
|
- Lesley Taylor
- 5 years ago
- Views:
Transcription
1 Information-Theoretical Analysis of Private Content Identification S. Voloshynovskiy, O. Koval, F. Beekhof, F. Farhadzadeh, T. Holotyak Stochastic Information Processing Group, University of Geneva, Switzerland ITW200 Dublin, Ireland
2 2 Outline Introduction 2 Identification setup 3 Error events 4 Identification capacity and privacy leak 5 Complexity of fingerprint-based identification 6 Conclusions
3 Introduction Physical Objects Humans Digital Content Images Videos Audios Text docs 3 watches Online sharing services packaging Physical objects Biometrics Main concerns Identification: identity, authenticity, origin, ownership, Tracking and tracing Automatic tagging
4 Introduction Physical Objects Humans Digital Content Images Videos Audios Text docs 4 watches Online sharing services packaging Physical objects Biometrics A solution Digital fingerprinting (a.k.a. robust perceptual hashing) is a technique for computing a compact robust, secure and private binary representation of physical or digital content.
5 Introduction Physical Objects Humans Digital Content Images Videos Audios Text docs 5 watches Online sharing services packaging Physical objects Biometrics Objectives Performance analysis (probability of error, achievable rate); Privacy leak evaluation; Complexity for large-scale applications. Related works: F. Willems, T. Kalker, J. Goseling, and J.-P. Linnartz, ISIT2003 Westover and O Sullivan, ISIT2004, IEEE IT2008 and Tuncel IEEE IT2009
6 Identification Setup () 6 Enrollment Digital Fingerprint Extraction Codebook/Database 2 M Key Identification Decoder Digital Fingerprint Extraction Codebook cardinality: with being the rate. - dim. reduction (sensing matrix) - binarization - privacy amplification
7 Identification Setup (2) 7 Identification Proposition 2as composite hypothesis testing 0 Enrollment 0 0 Identification 0 Equivalent 0 Equivalent Channel 0 Binary fingerprinting - enrollment bit error probability - identification bit error probability
8 Identification Setup (3) 8 Forney s Proposition erasure/list 2 decoder [Forney 68] - binary entropy. Binary fingerprinting Bounded Distance Decoder (BDD) List decoding Unique decoding with Erasure decoding
9 Identification Setup (4) 9 Properties Correct acceptance Correct rejection Hypothesis testing Binomial distribution Binomial distribution
10 Identification Setup (5) 0
11 Error events () Proposition The optimal threshold rule should satisfy error. Proof: for unique content identification under Forney s erasure to guarantee a minimum of overall identification - probability of false acceptance - probability of incorrect decoding - divergence
12 Error events (2) 2 that is minimized by: Forney s threshold vs For large, for the identification rates. Remark For the identification rate satisfying, the above optimal threshold yields. PL b b y
13 Identification capacity and privacy leak () 3 Proposition 2 For and if there exist codes with rate and error probability such that: As soon as is arbitrarily close to, the rate is achievable, and it is referred to as: private identification capacity: privacy leak: Remark 2 /result coincides with F. Willems et al ISIT2003/ If privacy amplification is not applied, i.e., and, one is interested in the maximization of the identification capacity that yields:
14 Identification capacity and privacy leak (2) 4 Remark P b =0.0 P b =0. P b =0.2 P b =0.3 P b =
15 Complexity of fingerprint based identification () 5 Decoding Proposition algorithms 2 Exhaustive implementation of BDD Hamming sphere decoding Reliability-based decoding
16 Complexity of fingerprint based identification (2) 6 Exhaustive implementation of BDD Given: codewords, with Compute: Complexity: exponential Identification = exhaustive computation Codebook/Database Fingerprint 2 M Remark 3 Complexity does not depend on data quality (both privacy amplification and acquisition).
17 Complexity of fingerprint based identification (3) 7 Hamming sphere decoding Observation: the most likely codewords radius around. are within a Hamming sphere with Identification = codeword presence verification Data user Fingerprint Hamming sphere PL b b y query Server Y/N Codebook/Database 2 M
18 Complexity of fingerprint based identification (4) 8 Hamming sphere decoding Proposition 3 The cardinality of the list of candidates contained in the sphere of radius, is:, where Asymptotically: For unique decoding : Remark 4 Complexity depends on data quality. Remark 5 Analogy: binary fingerprint = computer memory address with flag.
19 Complexity of fingerprint based identification (5) 9 Reliability based decoding Observation: the reliability of bits of within Hamming sphere can be estimated based on the fingerprint magnitude. Random projections: impact of distortions Concept of random projection bit reliability (sign-magnitude decomp.) Sort
20 Complexity of fingerprint based identification (6) 20 Identification = soft decoding or soft verification Data user Hamming sphere Server Codebook/Database Fingerprint PL b b y query Y/N 2 M b u ( m) m M Two-channel splitting: Good channel with Bad channel with 2 3 Multi-channel splitting, randomization and decoding [Voloshynovskiy et al, IEEE WIFS200]
21 Complexity Introduction Identification setup Error events Capacity-Privacy Complexity Conclusions Complexity of fingerprint based identification (7) 2 Comparison of decoding strategies Exhaustive search Hamming sphere decoding Reliability based decoding Fixed 0 2 ES Hamming Reliability ES 0 8 Hamming Reliability Database size Remark 6 Reference performance: [F. Willems, ISIT2009]
22 22 Conclusions Remark 5 Content identification = coding problem with random codes. We have analyzed the performance-privacy trade-off of content identification framework. We have investigated the complexity of three decoding strategies based on the BDD. The obtained results can be of interest for security and content-based retrieval system analysis as well as low-complexity approximate search implementations. Extensions Compression (memory storage) Identification Rate Privacy Complexity List decoding vs unique decoding Performance under soft decoding.
How to Generate Keys from Facial Images and Keep your Privacy at the Same Time
How to Generate Keys from Facial Images and Keep your Privacy at the Same Time Orr Dunkelman, University of Haifa Joint work with Mahmood Sharif and Margarita Osadchy Overview Motivation Background: The
More informationPattern Recognition. Kjell Elenius. Speech, Music and Hearing KTH. March 29, 2007 Speech recognition
Pattern Recognition Kjell Elenius Speech, Music and Hearing KTH March 29, 2007 Speech recognition 2007 1 Ch 4. Pattern Recognition 1(3) Bayes Decision Theory Minimum-Error-Rate Decision Rules Discriminant
More informationLarge-scale visual recognition Efficient matching
Large-scale visual recognition Efficient matching Florent Perronnin, XRCE Hervé Jégou, INRIA CVPR tutorial June 16, 2012 Outline!! Preliminary!! Locality Sensitive Hashing: the two modes!! Hashing!! Embedding!!
More informationA Robust Visual Identifier Using the Trace Transform
A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image
More informationTamper-proofing proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding
Tamper-proofing proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding R Villán, S Voloshynovskiy, O Koval, F Deguillaume, and T Pun Stochastic Image Processing Group Computer
More informationMultimedia Security: So What s the Big Deal?
Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:
More informationTemplate Protection and its Implementation in 3D Face Recognition Systems
Template Protection and its Implementation in 3D Face Recognition Systems Xuebing Zhou Fraunhofer IGD, Fraunhoferstr. 5, 64283 Darmstadt, Germany E-mail: xuebing.zhou@igd.fhg.de ABSTRACT As biometric recognition
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationPrivacy Preserving Identification Using Sparse Approximation with Ambiguization
Privacy Preserving Identification Using Sparse Approximation with Ambiguization Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov and Olga Taran Stochastic Information Processing Group, Department
More informationMotivation. CS389L: Automated Logical Reasoning. Lecture 5: Binary Decision Diagrams. Historical Context. Binary Decision Trees
Motivation CS389L: Automated Logical Reasoning Lecture 5: Binary Decision Diagrams Işıl Dillig Previous lectures: How to determine satisfiability of propositional formulas Sometimes need to efficiently
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationIN THE LAST decade, the amount of video contents digitally
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 18, NO. 7, JULY 2008 983 Robust Video Fingerprinting for Content-Based Video Identification Sunil Lee, Member, IEEE, and Chang D. Yoo,
More informationRepeating Segment Detection in Songs using Audio Fingerprint Matching
Repeating Segment Detection in Songs using Audio Fingerprint Matching Regunathan Radhakrishnan and Wenyu Jiang Dolby Laboratories Inc, San Francisco, USA E-mail: regu.r@dolby.com Institute for Infocomm
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationAkarsh Pokkunuru EECS Department Contractive Auto-Encoders: Explicit Invariance During Feature Extraction
Akarsh Pokkunuru EECS Department 03-16-2017 Contractive Auto-Encoders: Explicit Invariance During Feature Extraction 1 AGENDA Introduction to Auto-encoders Types of Auto-encoders Analysis of different
More informationInformation technology Identification cards On-card biometric comparison
INTERNATIONAL STANDARD ISO/IEC 24787:2010 TECHNICAL CORRIGENDUM 1 Published 2013-06-15 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ ORGANISATION INTERNATIONALE
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationCSE / 60537: Biometrics
CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?
More informationIMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION
IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION C. Örencik, T. B. Pedersen, E. Savaş and M. Keskinoz Faculty of Engineering & Natural Sciences, Sabanci University, Istanbul, 34956, Turkey {cengizo@su.,
More informationThe AWGN Red Alert Problem
The AWGN Red Alert Problem Bobak Nazer, Yanina Shkel, and Stark C. Draper ECE Department Boston University ECE Department University of Wisconsin, Madison ITA 2011 February 10, 2011 Nazer, Shkel, Draper
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationFASTER UPPER BOUNDING OF INTERSECTION SIZES
FASTER UPPER BOUNDING OF INTERSECTION SIZES IBM Research Tokyo - Japan Daisuke Takuma Hiroki Yanagisawa 213 IBM Outline Motivation of upper bounding Contributions Data structure Proposal Evaluation (introduce
More informationMotivation. Mechanisms of Physical-Layer Security. Securenets 2011 May 20th, Secrecy metrics and examples. Information-Theoretic Secrecy Metrics
Mechanisms of Physical-Layer Security Securenets 2011 May 20th, 2011 Motivation Matthieu Bloch Georgia Institute of Technology School of Electrical and Computer Engineering Secrecy metrics and examples
More informationMRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)
5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1
More informationInformation Theory and Communication
Information Theory and Communication Shannon-Fano-Elias Code and Arithmetic Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/12 Roadmap Examples
More informationStudying Leakages on an Embedded Biometric System Using Side Channel Analysis
Studying Leakages on an Embedded Biometric System Using Side Channel Analysis M. Berthier, Y. Bocktaels, J. Bringer, H. Chabanne, T. Chouta, J-L. Danger, M. Favre, T. Graba Institut Mines-Télécom Outline
More informationTowards e-passport Duplicate Enrolment Check in the European Union
2013 European Intelligence and Security Informatics Conference Towards e-passport Duplicate Enrolment Check in the European Union Moazzam Butt, Sandra Marti, Alexander Nouak,Jörg Köplin, R. Raghavendra
More informationDuality for Simple Multiple Access Networks
Duality for Simple Multiple Access Networks Iwan Duursma Department of Mathematics and Coordinated Science Laboratory U of Illinois at Urbana-Champaign DIMACS Workshop on Network Coding December 15-17,
More informationIntersection Acceleration
Advanced Computer Graphics Intersection Acceleration Matthias Teschner Computer Science Department University of Freiburg Outline introduction bounding volume hierarchies uniform grids kd-trees octrees
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationLecture 8. (Part 2.) Digital watermarks. Models of WM and classification :
Lecture 8. (Part 2.) Digital watermarks Definition. Digital watermarking (WM) is invisible practically changing of cover object (CO) for the purpose of embedding an additional message about this CO. Usually,
More informationRank Minimization over Finite Fields
Rank Minimization over Finite Fields Vincent Y. F. Tan Laura Balzano, Stark C. Draper Department of Electrical and Computer Engineering, University of Wisconsin-Madison ISIT 2011 Vincent Tan (UW-Madison)
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationContents. 3 Vector Quantization The VQ Advantage Formulation Optimality Conditions... 48
Contents Part I Prelude 1 Introduction... 3 1.1 Audio Coding... 4 1.2 Basic Idea... 6 1.3 Perceptual Irrelevance... 8 1.4 Statistical Redundancy... 9 1.5 Data Modeling... 9 1.6 Resolution Challenge...
More informationIndexing and Searching
Indexing and Searching Berlin Chen Department of Computer Science & Information Engineering National Taiwan Normal University References: 1. Modern Information Retrieval, chapter 9 2. Information Retrieval:
More informationCompressing Data. Konstantin Tretyakov
Compressing Data Konstantin Tretyakov (kt@ut.ee) MTAT.03.238 Advanced April 26, 2012 Claude Elwood Shannon (1916-2001) C. E. Shannon. A mathematical theory of communication. 1948 C. E. Shannon. The mathematical
More informationMultibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions
Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour
More informationRegion-based Segmentation
Region-based Segmentation Image Segmentation Group similar components (such as, pixels in an image, image frames in a video) to obtain a compact representation. Applications: Finding tumors, veins, etc.
More informationForensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique
Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford
More informationCS 664 Segmentation. Daniel Huttenlocher
CS 664 Segmentation Daniel Huttenlocher Grouping Perceptual Organization Structural relationships between tokens Parallelism, symmetry, alignment Similarity of token properties Often strong psychophysical
More informationAuthenticating Pervasive Devices with Human Protocols
Authenticating Pervasive Devices with Human Protocols Presented by Xiaokun Mu Paper Authors: Ari Juels RSA Laboratories Stephen A. Weis Massachusetts Institute of Technology Authentication Problems It
More informationWe have used both of the last two claims in previous algorithms and therefore their proof is omitted.
Homework 3 Question 1 The algorithm will be based on the following logic: If an edge ( ) is deleted from the spanning tree, let and be the trees that were created, rooted at and respectively Adding any
More informationEC500. Design of Secure and Reliable Hardware. Lecture 9. Mark Karpovsky
EC500 Design of Secure and Reliable Hardware Lecture 9 Mark Karpovsky 1 1 Arithmetical Codes 1.1 Detection and Correction of errors in arithmetical channels (adders, multipliers, etc) Let = 0,1,,2 1 and
More informationText Categorization. Foundations of Statistic Natural Language Processing The MIT Press1999
Text Categorization Foundations of Statistic Natural Language Processing The MIT Press1999 Outline Introduction Decision Trees Maximum Entropy Modeling (optional) Perceptrons K Nearest Neighbor Classification
More informationChapter 3: User Authentication
Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationTutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication
Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem
More informationA Short Introduction to Audio Fingerprinting with a Focus on Shazam
A Short Introduction to Audio Fingerprinting with a Focus on Shazam MUS-17 Simon Froitzheim July 5, 2017 Introduction Audio fingerprinting is the process of encoding a (potentially) unlabeled piece of
More informationError Correcting Codes
Error Correcting Codes 2. The Hamming Codes Priti Shankar Priti Shankar is with the Department of Computer Science and Automation at the Indian Institute of Science, Bangalore. Her interests are in Theoretical
More informationEC500. Design of Secure and Reliable Hardware. Lecture 1 & 2
EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.
More informationAchieving k-anonmity* Privacy Protection Using Generalization and Suppression
UT DALLAS Erik Jonsson School of Engineering & Computer Science Achieving k-anonmity* Privacy Protection Using Generalization and Suppression Murat Kantarcioglu Based on Sweeney 2002 paper Releasing Private
More informationPeg-Free Hand Geometry Verification System
Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu
More informationDifferentially-Private Network Trace Analysis. Frank McSherry and Ratul Mahajan Microsoft Research
Differentially-Private Network Trace Analysis Frank McSherry and Ratul Mahajan Microsoft Research Overview. 1 Overview Question: Is it possible to conduct network trace analyses in a way that provides
More informationComputational complexity
Computational complexity Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Definitions: problems and instances A problem is a general question expressed in
More informationIndexing and Searching
Indexing and Searching Berlin Chen Department of Computer Science & Information Engineering National Taiwan Normal University References: 1. Modern Information Retrieval, chapter 8 2. Information Retrieval:
More informationUntraceable Nym Creation on the Freedom 2.0 Network
Russell Samuels Ed Hawco November 1, 2000 Untraceable Nym Creation on the Freedom 2.0 Network Version 2.0 This whitepaper, targeted at users with a basic understanding of Freedom, describes the Freedom
More informationAppendix A Sourcecode
Appendix A Sourcecode A.1 Sourcecode Microcontroller PUF #include keygeneration.h #. include iap.h unsigned char puf mem[5120]; int temp buffer [FLASH BLOCK SIZE ] ; unsigned char key temp [KEY SIZE ]
More informationBehavioral Data Mining. Lecture 18 Clustering
Behavioral Data Mining Lecture 18 Clustering Outline Why? Cluster quality K-means Spectral clustering Generative Models Rationale Given a set {X i } for i = 1,,n, a clustering is a partition of the X i
More informationAn Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics
An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics Ye Wang Boston University Boston, MA. yw@bu.edu Shantanu Rane Mitsubishi Electric Research Laboratories Cambridge,
More informationSample images can be independently regenerated from face recognition templates
Sample images can be independently regenerated from face recognition templates Andy Adler School of Information Technology and Engineering University of Ottawa Introduction Biometrics Biometric authentication
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationPRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE
PRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE Iu. Tkachenko 1,2, W. Puech 1, O. Strauss 1 1 Laboratory LIRMM, UMR CNRS 5506 University of Montpellier 860 rue de St Priest, 34090 Montpellier Cedex
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3413 Relay Networks With Delays Abbas El Gamal, Fellow, IEEE, Navid Hassanpour, and James Mammen, Student Member, IEEE Abstract The
More informationBELOW, we consider decoding algorithms for Reed Muller
4880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 11, NOVEMBER 2006 Error Exponents for Recursive Decoding of Reed Muller Codes on a Binary-Symmetric Channel Marat Burnashev and Ilya Dumer, Senior
More informationICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification
ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another
More informationBio-FactsFigures.docx Page 1
Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a
More informationLarge scale object/scene recognition
Large scale object/scene recognition Image dataset: > 1 million images query Image search system ranked image list Each image described by approximately 2000 descriptors 2 10 9 descriptors to index! Database
More informationProgram verification. Generalities about software Verification Model Checking. September 20, 2016
Program verification Generalities about software Verification Model Checking Laure Gonnord David Monniaux September 20, 2016 1 / 43 The teaching staff Laure Gonnord, associate professor, LIP laboratory,
More informationI. INTRODUCTION. Fig. 1. BE system for key binding and key release.
118 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #12 Forwarding Security 2015 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5-8 minutes Written SoW
More informationTemplate Protection for PCA-LDA-based 3D Face Recognition Systems
Template Protection for PCA-LDA-based 3D Face Recognition Systems Daniel Hartung Email: hartung.dani@gmail.com Abstract: Authentication based on biometrics became significantly important over the last
More informationReading group on Ontologies and NLP:
Reading group on Ontologies and NLP: Machine Learning27th infebruary Automated 2014 1 / 25 Te Reading group on Ontologies and NLP: Machine Learning in Automated Text Categorization, by Fabrizio Sebastianini.
More informationFlat Clustering. Slides are mostly from Hinrich Schütze. March 27, 2017
Flat Clustering Slides are mostly from Hinrich Schütze March 7, 07 / 79 Overview Recap Clustering: Introduction 3 Clustering in IR 4 K-means 5 Evaluation 6 How many clusters? / 79 Outline Recap Clustering:
More informationRandomized Algorithms for Network Security and Peer-to-Peer Systems
Randomized Algorithms for Network Security and Peer-to-Peer Systems Micah Adler University of Massachusetts, Amherst Talk Outline Probabilistic Packet Marking for IP Traceback Network Security Appeared
More informationMobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint
Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint Sviatoslav Voloshynovskiy, Maurits Diephuis and Taras Holotyak Computer Science Department, University of Geneva 7, Route de Drize,
More informationHuffman Coding. Version of October 13, Version of October 13, 2014 Huffman Coding 1 / 27
Huffman Coding Version of October 13, 2014 Version of October 13, 2014 Huffman Coding 1 / 27 Outline Outline Coding and Decoding The optimal source coding problem Huffman coding: A greedy algorithm Correctness
More information4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009
4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009 Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks Nianjun Zhou, Member, IEEE, Alhussein
More informationDistributed Signal Processing for Binaural Hearing Aids
Distributed Signal Processing for Binaural Hearing Aids Olivier Roy LCAV - I&C - EPFL Joint work with Martin Vetterli July 24, 2008 Outline 1 Motivations 2 Information-theoretic Analysis 3 Example: Distributed
More informationBiometric Template Protection Using Universal Background Models: An Application to Online Signature
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 269 Biometric Template Protection Using Universal Background Models: An Application to Online Signature Enrique Argones
More informationDistributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski
Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution
More informationNotes for Lecture 24
U.C. Berkeley CS276: Cryptography Handout N24 Luca Trevisan April 21, 2009 Notes for Lecture 24 Scribed by Milosh Drezgich, posted May 11, 2009 Summary Today we introduce the notion of zero knowledge proof
More informationContents. Preface to the Second Edition
Preface to the Second Edition v 1 Introduction 1 1.1 What Is Data Mining?....................... 4 1.2 Motivating Challenges....................... 5 1.3 The Origins of Data Mining....................
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationTest 2 Review. (b) Give one significant advantage of a nonce over a timestamp.
Test 2 Review Name Student ID number Notation: {X} Bob Apply Bob s public key to X [Y ] Bob Apply Bob s private key to Y E(P, K) Encrypt P with symmetric key K D(C, K) Decrypt C with symmetric key K h(x)
More informationIntroduction to Information Retrieval
Introduction to Information Retrieval http://informationretrieval.org IIR 6: Flat Clustering Wiltrud Kessler & Hinrich Schütze Institute for Natural Language Processing, University of Stuttgart 0-- / 83
More informationProbabilistic PPM. Claude Knaus Matthias Zwicker University of Bern. State of the Art in Photon Density Estimation
Probabilistic PPM Claude Knaus Matthias Zwicker University of Bern State of the Art in Photon Density Estimation Modified slides and presentation by Toshiya Hachisuka Probabilistic PPM Alternative derivation
More informationCYBER SECURITY MADE SIMPLE
CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published
More informationDistortion-Resistant Hashing for rapid search of similar DNA subsequence
1 Distortion-Resistant Hashing for rapid search of similar DNA subsequence Jarek Duda Jagiellonian University, Golebia 24, 31-007 Krakow, Poland, Email: dudajar@gmail.com arxiv:1602.05889v1 [cs.ds] 18
More informationA Theory of Network Equivalence Part I: Point-to-Point Channels
972 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 2, FEBRUARY 2011 A Theory of Network Equivalence Part I: Point-to-Point Channels Ralf Koetter, Fellow, IEEE, Michelle Effros, Fellow, IEEE, and
More informationDUPLICATE DETECTION AND AUDIO THUMBNAILS WITH AUDIO FINGERPRINTING
DUPLICATE DETECTION AND AUDIO THUMBNAILS WITH AUDIO FINGERPRINTING Christopher Burges, Daniel Plastina, John Platt, Erin Renshaw, and Henrique Malvar March 24 Technical Report MSR-TR-24-19 Audio fingerprinting
More informationHashing with Graphs. Sanjiv Kumar (Google), and Shih Fu Chang (Columbia) June, 2011
Hashing with Graphs Wei Liu (Columbia Columbia), Jun Wang (IBM IBM), Sanjiv Kumar (Google), and Shih Fu Chang (Columbia) June, 2011 Overview Graph Hashing Outline Anchor Graph Hashing Experiments Conclusions
More informationA Geometric Transformation to Protect Minutiae-Based Fingerprint Templates
A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates Yagiz Sutcu a, Husrev T. Sencar b and Nasir Memon b a Polytechnic University, Electrical & Computer Engineering Dept., Brooklyn,
More informationENSC Multimedia Communications Engineering Huffman Coding (1)
ENSC 424 - Multimedia Communications Engineering Huffman Coding () Jie Liang Engineering Science Simon Fraser University JieL@sfu.ca J. Liang: SFU ENSC 424 Outline Entropy Coding Prefix code Kraft-McMillan
More informationCS573 Data Privacy and Security. Differential Privacy. Li Xiong
CS573 Data Privacy and Security Differential Privacy Li Xiong Outline Differential Privacy Definition Basic techniques Composition theorems Statistical Data Privacy Non-interactive vs interactive Privacy
More informationHYDRAstor: a Scalable Secondary Storage
HYDRAstor: a Scalable Secondary Storage 7th USENIX Conference on File and Storage Technologies (FAST '09) February 26 th 2009 C. Dubnicki, L. Gryz, L. Heldt, M. Kaczmarczyk, W. Kilian, P. Strzelczak, J.
More informationTest 2 Review. 1. (10 points) Timestamps and nonces are both used in security protocols to prevent replay attacks.
Test 2 Review Name Student ID number Notation: {X} Bob Apply Bob s public key to X [Y ] Bob Apply Bob s private key to Y E(P, K) Encrypt P with symmetric key K D(C, K) Decrypt C with symmetric key K h(x)
More informationIndexing. CS6200: Information Retrieval. Index Construction. Slides by: Jesse Anderton
Indexing Index Construction CS6200: Information Retrieval Slides by: Jesse Anderton Motivation: Scale Corpus Terms Docs Entries A term incidence matrix with V terms and D documents has O(V x D) entries.
More information