Sciweavers

TIFS
2016
67views more  TIFS 2016»
10 years 17 days ago
Information Theoretical Limit of Media Forensics: The Forensicability
—While more and more forensic techniques have been proposed to detect the processing history of multimedia content, one starts to wonder if there exists a fundamental limit on th...
Xiaoyu Chu, Yan Chen, Matthew C. Stamm, K. J. Ray ...
TIFS
2016
65views more  TIFS 2016»
10 years 17 days ago
Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization
—Although sensor pattern noise (SPN) has been proven to be an effective means to uniquely identify digital cameras, some non-unique artifacts, shared amongst cameras undergo the ...
Xufeng Lin, Chang-Tsun Li
TIFS
2016
63views more  TIFS 2016»
10 years 17 days ago
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
—We introduce Hand Movement, Orientation, and Grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle...
Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Pen...
TIFS
2016
79views more  TIFS 2016»
10 years 17 days ago
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption
We introduce a new encryption notion called Euclidean Distance based Encryption (EDE). In this notion, a ciphertext encrypted with a vector and a threshold value can be decrypted ...
Fuchun Guo, Willy Susilo, Yi Mu
TIFS
2016
57views more  TIFS 2016»
10 years 17 days ago
Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata
—Rule-based matching on network packet headers is a central problem in firewalls, and network intrusion, monitoring and access-control systems. To enhance performance, rules are...
Alok Tongaonkar, R. Sekar
TIE
2016
50views more  TIE 2016»
10 years 17 days ago
The Impact of Deadline Misses on the Control Performance of High-End Motion Control Systems
—In high-end motion control systems the real-time computational platform must execute tasks from multiple control loops operating at high sampling rates. In recent years traditio...
W. Geelen, Duarte Antunes, Jeroen Voeten, Ramon R....
TIE
2016
57views more  TIE 2016»
10 years 17 days ago
Gradient-Based Fingerprinting for Indoor Localization and Tracking
—Of the different branches of indoor localization research, WiFi fingerprinting has drawn significant attention over the past decade. These localization systems function by com...
Yuanchao Shu, Yinghua Huang, Jiaqi Zhang, Philippe...
TIE
2016
52views more  TIE 2016»
10 years 17 days ago
Analysis and Control of Modular Multilevel Converters under Asymmetric Arm Impedance Conditions
This paper presents a detailed analysis and improved control strategy for Modular Multilevel Converters (MMC) under asymmetric arm inductance conditions. Unlike symmetric condition...
Rong Zeng, Lie Xu, Liangzhong Yao, Stephen J. Finn...
TIE
2016
46views more  TIE 2016»
10 years 17 days ago
High-Efficiency NPC Multilevel Converter Using Super-Junction MOSFETs
—Super-junction MOSFETs exhibit low on-state resistances and low switching losses. However, the reverse recovery behavior of their intrinsic diodes and their output capacitance c...
Neville McNeill, Xibo Yuan, Philip Anthony
TIE
2016
52views more  TIE 2016»
10 years 17 days ago
Isolated Chargers for EVs Incorporating Six-Phase Machines
−The paper considers two isolated solutions for fast charging of electric vehicles (EVs). The isolation is located on the grid side (off-board), while the rest of the charging ap...
Ivan Subotic, Nandor Bodo, Emil Levi, Martin Jones...