Sciweavers

IH
2009
Springer
14 years 6 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
IH
2009
Springer
14 years 6 months ago
Detect Digital Image Splicing with Visual Cues
Image splicing detection has been considered as one of the most challenging problems in passive image authentication. In this paper, we propose an automatic detection framework to ...
Zhenhua Qu, Guoping Qiu, Jiwu Huang
IH
2009
Springer
14 years 6 months ago
Estimating Steganographic Fisher Information in Real Images
This paper is concerned with the estimation of steganographic capacity in digital images, using information theoretic bounds and very large-scale experiments to approximate the dis...
Andrew D. Ker
IH
2009
Springer
14 years 6 months ago
Microphone Classification Using Fourier Coefficients
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Robert Buchholz, Christian Krätzer, Jana Ditt...
IH
2009
Springer
14 years 6 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
EUROSSC
2009
Springer
14 years 6 months ago
Semantic Rules for Context-Aware Geographical Information Retrieval
Geographical information retrieval (GIR) can benefit from context information to adapt the results to a user’s current situation and personal preferences. In this respect, seman...
Carsten Keßler, Martin Raubal, Christoph Wos...
EUROSSC
2009
Springer
14 years 6 months ago
A Context Lifecycle for Web-Based Context Management Services
Abstract. During the development of context aware applications a context management component must traditionally be created. This task requires specialist context lifecycle managem...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth
EUROSSC
2009
Springer
14 years 6 months ago
Time-Lag as Limiting Factor for Indoor Walking Navigation
Several navigation situations can be imagined where visual cueing is not practical or unfeasible, and where the hands are required exclusively for a certain task. The utilization o...
Andreas Riener, Markus Straub, Alois Ferscha
EUROSSC
2009
Springer
14 years 6 months ago
Automatic Event-Based Synchronization of Multimodal Data Streams from Wearable and Ambient Sensors
A major challenge in using multi-modal, distributed sensor systems for activity recognition is to maintain a temporal synchronization between individually recorded data streams. A ...
David Bannach, Oliver Amft, Paul Lukowicz
EMISA
2009
Springer
14 years 6 months ago
Controlled Flexibility and Lifecycle Management of Business Processes through Extensibility
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Sören Balko, Arthur H. M. ter Hofstede, Alist...