Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Image splicing detection has been considered as one of the most challenging problems in passive image authentication. In this paper, we propose an automatic detection framework to ...
This paper is concerned with the estimation of steganographic capacity in digital images, using information theoretic bounds and very large-scale experiments to approximate the dis...
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Geographical information retrieval (GIR) can benefit from context information to adapt the results to a user’s current situation and personal preferences. In this respect, seman...
Abstract. During the development of context aware applications a context management component must traditionally be created. This task requires specialist context lifecycle managem...
Several navigation situations can be imagined where visual cueing is not practical or unfeasible, and where the hands are required exclusively for a certain task. The utilization o...
A major challenge in using multi-modal, distributed sensor systems for activity recognition is to maintain a temporal synchronization between individually recorded data streams. A ...
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...