Sciweavers

TIFS
2008
149views more  TIFS 2008»
13 years 11 months ago
Using One-Class SVMs and Wavelets for Audio Surveillance
This paper presents a procedure aimed at recognizing environmental sounds for surveillance and security applications. We propose to apply One-Class Support Vector Machines (1-SVMs...
Asma Rabaoui, Manuel Davy, Stéphane Rossign...
TIFS
2008
157views more  TIFS 2008»
13 years 11 months ago
Subspace Approximation of Face Recognition Algorithms: An Empirical Study
We present a theory for constructing linear subspace approximations to face-recognition algorithms and empirically demonstrate that a surprisingly diverse set of face-recognition a...
Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi, ...
TIFS
2008
159views more  TIFS 2008»
13 years 11 months ago
Chaotic-Type Features for Speech Steganalysis
We investigate the use of chaotic-type features for recorded speech steganalysis. Considering that data hiding within a speech signal distorts the chaotic properties of the origina...
Osman Hilmi Kocal, Emrah Yürüklü, I...
TIFS
2008
102views more  TIFS 2008»
13 years 11 months ago
Use of Identification Trial Statistics for the Combination of Biometric Matchers
Combination functions typically used in biometric identification systems consider as input parameters only those matching scores which are related to a single person in order to de...
Sergey Tulyakov, Venu Govindaraju
TIFS
2008
137views more  TIFS 2008»
13 years 11 months ago
Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform
This paper presents a hierarchical watermarking framework for semiregular meshes. Three blind watermarks are inserted in a semiregular mesh with different purposes: a geometrically...
Kai Wang, Guillaume Lavoué, Florence Denis,...
TIFS
2008
152views more  TIFS 2008»
13 years 11 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
TIFS
2008
121views more  TIFS 2008»
13 years 11 months ago
Effect of Severe Image Compression on Iris Recognition Performance
We investigate three schemes for severe compression of iris images in order to assess what their impact would be on recognition performance of the algorithms deployed today for ide...
John Daugman, Cathryn Downing
TIFS
2008
154views more  TIFS 2008»
13 years 11 months ago
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network...
Juan M. Estévez-Tapiador, Julio Césa...
TIFS
2008
120views more  TIFS 2008»
13 years 11 months ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...