Sorry, you need to enable JavaScript to visit this website.

Information Forensics and Security

Secure Identification for Gaussian Channels


New applications in modern communications are demanding robust and ultra-reliable low latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical transmission scheme proposed by Shannon. Previous studies concentrate mainly on identification over discrete channels. We focus on Gaussian channels for their known practical relevance. We deal with secure identification over Gaussian channels.

Paper Details

Authors:
Wafa Labidi, Christian Deppe, Holger Boche
Submitted On:
13 May 2020 - 5:43pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Vortrag_ICASSP202_SPS.pdf

(54)

Subscribe

[1] Wafa Labidi, Christian Deppe, Holger Boche, "Secure Identification for Gaussian Channels", IEEE SigPort, 2020. [Online]. Available: http://sigport.org/5156. Accessed: Oct. 24, 2020.
@article{5156-20,
url = {http://sigport.org/5156},
author = {Wafa Labidi; Christian Deppe; Holger Boche },
publisher = {IEEE SigPort},
title = {Secure Identification for Gaussian Channels},
year = {2020} }
TY - EJOUR
T1 - Secure Identification for Gaussian Channels
AU - Wafa Labidi; Christian Deppe; Holger Boche
PY - 2020
PB - IEEE SigPort
UR - http://sigport.org/5156
ER -
Wafa Labidi, Christian Deppe, Holger Boche. (2020). Secure Identification for Gaussian Channels. IEEE SigPort. http://sigport.org/5156
Wafa Labidi, Christian Deppe, Holger Boche, 2020. Secure Identification for Gaussian Channels. Available at: http://sigport.org/5156.
Wafa Labidi, Christian Deppe, Holger Boche. (2020). "Secure Identification for Gaussian Channels." Web.
1. Wafa Labidi, Christian Deppe, Holger Boche. Secure Identification for Gaussian Channels [Internet]. IEEE SigPort; 2020. Available from : http://sigport.org/5156

Secure Identification for Gaussian Channels


New applications in modern communications are demanding robust and ultra-reliable low latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical transmission scheme proposed by Shannon. Previous studies concentrate mainly on identification over discrete channels. We focus on Gaussian channels for their known practical relevance. We deal with secure identification over Gaussian channels.

Paper Details

Authors:
Wafa Labidi, Christian Deppe, Holger Boche
Submitted On:
13 May 2020 - 5:32pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

Vortrag_ICASSP202_SPS.pdf

(50)

Subscribe

[1] Wafa Labidi, Christian Deppe, Holger Boche, "Secure Identification for Gaussian Channels", IEEE SigPort, 2020. [Online]. Available: http://sigport.org/5154. Accessed: Oct. 24, 2020.
@article{5154-20,
url = {http://sigport.org/5154},
author = {Wafa Labidi; Christian Deppe; Holger Boche },
publisher = {IEEE SigPort},
title = {Secure Identification for Gaussian Channels},
year = {2020} }
TY - EJOUR
T1 - Secure Identification for Gaussian Channels
AU - Wafa Labidi; Christian Deppe; Holger Boche
PY - 2020
PB - IEEE SigPort
UR - http://sigport.org/5154
ER -
Wafa Labidi, Christian Deppe, Holger Boche. (2020). Secure Identification for Gaussian Channels. IEEE SigPort. http://sigport.org/5154
Wafa Labidi, Christian Deppe, Holger Boche, 2020. Secure Identification for Gaussian Channels. Available at: http://sigport.org/5154.
Wafa Labidi, Christian Deppe, Holger Boche. (2020). "Secure Identification for Gaussian Channels." Web.
1. Wafa Labidi, Christian Deppe, Holger Boche. Secure Identification for Gaussian Channels [Internet]. IEEE SigPort; 2020. Available from : http://sigport.org/5154

Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation


Electric Network Frequency (ENF) fluctuations constitute a powerful tool in multimedia forensics. An efficient approach for ENF estimation is introduced with temporal windowing based on the filter-bank Capon spectral estimator. A type of Gohberg-Semencul factorization of the model covariance matrix is used due to the Toeplitz structure of the covariance matrix. Moreover, this approach uses, for the first time in the field of ENF, a temporal window, not necessarily the rectangular one, at the stage preceding spectral estimation.

Paper Details

Authors:
George Karantaidis,Constantine Kotropoulos
Submitted On:
4 November 2019 - 4:04am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

poster2019.pdf

(95)

Subscribe

[1] George Karantaidis,Constantine Kotropoulos, "Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4905. Accessed: Oct. 24, 2020.
@article{4905-19,
url = {http://sigport.org/4905},
author = {George Karantaidis;Constantine Kotropoulos },
publisher = {IEEE SigPort},
title = {Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation},
year = {2019} }
TY - EJOUR
T1 - Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation
AU - George Karantaidis;Constantine Kotropoulos
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4905
ER -
George Karantaidis,Constantine Kotropoulos. (2019). Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation. IEEE SigPort. http://sigport.org/4905
George Karantaidis,Constantine Kotropoulos, 2019. Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation. Available at: http://sigport.org/4905.
George Karantaidis,Constantine Kotropoulos. (2019). "Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation." Web.
1. George Karantaidis,Constantine Kotropoulos. Efficient Capon-based approach exploiting temporal windowing for electric network frequency estimation [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4905

Securing physical documents with digital signatures

Paper Details

Authors:
Christian Winter, Waldemar Berchtold, Jan Niklas Hollenbeck
Submitted On:
24 September 2019 - 10:04am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Securing_physical_documents.pdf

(121)

Subscribe

[1] Christian Winter, Waldemar Berchtold, Jan Niklas Hollenbeck, "Securing physical documents with digital signatures", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4832. Accessed: Oct. 24, 2020.
@article{4832-19,
url = {http://sigport.org/4832},
author = {Christian Winter; Waldemar Berchtold; Jan Niklas Hollenbeck },
publisher = {IEEE SigPort},
title = {Securing physical documents with digital signatures},
year = {2019} }
TY - EJOUR
T1 - Securing physical documents with digital signatures
AU - Christian Winter; Waldemar Berchtold; Jan Niklas Hollenbeck
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4832
ER -
Christian Winter, Waldemar Berchtold, Jan Niklas Hollenbeck. (2019). Securing physical documents with digital signatures. IEEE SigPort. http://sigport.org/4832
Christian Winter, Waldemar Berchtold, Jan Niklas Hollenbeck, 2019. Securing physical documents with digital signatures. Available at: http://sigport.org/4832.
Christian Winter, Waldemar Berchtold, Jan Niklas Hollenbeck. (2019). "Securing physical documents with digital signatures." Web.
1. Christian Winter, Waldemar Berchtold, Jan Niklas Hollenbeck. Securing physical documents with digital signatures [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4832

FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals


With the growth of location based services, indoor localization is attracting great interests as it facilitates further ubiquitous environments. In this paper, we propose FuseLoc, the first information fusion based indoor localization using multiple features extracted from Channel State Information (CSI). In FuseLoc, the localization problem is modelled as a pattern matching problem, where the location of a subject is predicted based on the similarity measure of the CSI features of the unknown location with those of the training locations.

Paper Details

Authors:
Tahsina Farah Sanam, Hana Godrich
Submitted On:
10 May 2019 - 2:04pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICASSP_Poster.pdf

(184)

Subscribe

[1] Tahsina Farah Sanam, Hana Godrich, "FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4385. Accessed: Oct. 24, 2020.
@article{4385-19,
url = {http://sigport.org/4385},
author = {Tahsina Farah Sanam; Hana Godrich },
publisher = {IEEE SigPort},
title = {FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals},
year = {2019} }
TY - EJOUR
T1 - FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals
AU - Tahsina Farah Sanam; Hana Godrich
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4385
ER -
Tahsina Farah Sanam, Hana Godrich. (2019). FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals. IEEE SigPort. http://sigport.org/4385
Tahsina Farah Sanam, Hana Godrich, 2019. FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals. Available at: http://sigport.org/4385.
Tahsina Farah Sanam, Hana Godrich. (2019). "FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals." Web.
1. Tahsina Farah Sanam, Hana Godrich. FuseLoc: A CCA Based Information Fusion for Indoor Localization Using CSI Phase and Amplitude of WiFi Signals [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4385

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Paper Details

Authors:
Olga Taran, Slavi Bonev, Slava Voloshynovskiy
Submitted On:
10 May 2019 - 11:13am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Slides

(141)

Subscribe

[1] Olga Taran, Slavi Bonev, Slava Voloshynovskiy, "Clonability of anti-counterfeiting printable graphical codes: a machine learning approach", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4359. Accessed: Oct. 24, 2020.
@article{4359-19,
url = {http://sigport.org/4359},
author = {Olga Taran; Slavi Bonev; Slava Voloshynovskiy },
publisher = {IEEE SigPort},
title = {Clonability of anti-counterfeiting printable graphical codes: a machine learning approach},
year = {2019} }
TY - EJOUR
T1 - Clonability of anti-counterfeiting printable graphical codes: a machine learning approach
AU - Olga Taran; Slavi Bonev; Slava Voloshynovskiy
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4359
ER -
Olga Taran, Slavi Bonev, Slava Voloshynovskiy. (2019). Clonability of anti-counterfeiting printable graphical codes: a machine learning approach. IEEE SigPort. http://sigport.org/4359
Olga Taran, Slavi Bonev, Slava Voloshynovskiy, 2019. Clonability of anti-counterfeiting printable graphical codes: a machine learning approach. Available at: http://sigport.org/4359.
Olga Taran, Slavi Bonev, Slava Voloshynovskiy. (2019). "Clonability of anti-counterfeiting printable graphical codes: a machine learning approach." Web.
1. Olga Taran, Slavi Bonev, Slava Voloshynovskiy. Clonability of anti-counterfeiting printable graphical codes: a machine learning approach [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4359

Phylogenetic Analysis of Software Using Cache Miss Statistics


While the phylogenetic analysis of multimedia documents keeps being investigated, some recent studies have shown the possibility of re-using the same strategies to analyze the evolution of computer programs (Software Phylogeny), considering its several applications spanning from copyright enforcement to malware detection.

Paper Details

Authors:
Sebastiano Verde, Simone Milani, Giancarlo Calvagno
Submitted On:
8 May 2019 - 10:28am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

verde2019phylosoft

(143)

Subscribe

[1] Sebastiano Verde, Simone Milani, Giancarlo Calvagno, "Phylogenetic Analysis of Software Using Cache Miss Statistics", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4035. Accessed: Oct. 24, 2020.
@article{4035-19,
url = {http://sigport.org/4035},
author = {Sebastiano Verde; Simone Milani; Giancarlo Calvagno },
publisher = {IEEE SigPort},
title = {Phylogenetic Analysis of Software Using Cache Miss Statistics},
year = {2019} }
TY - EJOUR
T1 - Phylogenetic Analysis of Software Using Cache Miss Statistics
AU - Sebastiano Verde; Simone Milani; Giancarlo Calvagno
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4035
ER -
Sebastiano Verde, Simone Milani, Giancarlo Calvagno. (2019). Phylogenetic Analysis of Software Using Cache Miss Statistics. IEEE SigPort. http://sigport.org/4035
Sebastiano Verde, Simone Milani, Giancarlo Calvagno, 2019. Phylogenetic Analysis of Software Using Cache Miss Statistics. Available at: http://sigport.org/4035.
Sebastiano Verde, Simone Milani, Giancarlo Calvagno. (2019). "Phylogenetic Analysis of Software Using Cache Miss Statistics." Web.
1. Sebastiano Verde, Simone Milani, Giancarlo Calvagno. Phylogenetic Analysis of Software Using Cache Miss Statistics [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4035

Protect Your Deep Neural Networks from Piracy


Building an effective DNN model requires massive human-labeled training data, powerful computing hardware and researchers' skills and efforts. Successful DNN models are becoming important intellectual properties for the model owners and should be protected from unauthorized access and piracy. This paper proposes a novel framework to provide access control to the trained deep neural networks so that only authorized users can utilize them properly.

Paper Details

Authors:
Mingliang Chen, Min Wu
Submitted On:
5 February 2019 - 11:23am
Short Link:
Type:
Paper Code:
Document Year:
Cite

Document Files

wifs18_dnn_piracy.pdf

(181)

Subscribe

[1] Mingliang Chen, Min Wu, "Protect Your Deep Neural Networks from Piracy", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/3848. Accessed: Oct. 24, 2020.
@article{3848-19,
url = {http://sigport.org/3848},
author = {Mingliang Chen; Min Wu },
publisher = {IEEE SigPort},
title = {Protect Your Deep Neural Networks from Piracy},
year = {2019} }
TY - EJOUR
T1 - Protect Your Deep Neural Networks from Piracy
AU - Mingliang Chen; Min Wu
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/3848
ER -
Mingliang Chen, Min Wu. (2019). Protect Your Deep Neural Networks from Piracy. IEEE SigPort. http://sigport.org/3848
Mingliang Chen, Min Wu, 2019. Protect Your Deep Neural Networks from Piracy. Available at: http://sigport.org/3848.
Mingliang Chen, Min Wu. (2019). "Protect Your Deep Neural Networks from Piracy." Web.
1. Mingliang Chen, Min Wu. Protect Your Deep Neural Networks from Piracy [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/3848

Protect Your Deep Neural Networks from Piracy


Building an effective DNN model requires massive human-labeled training data, powerful computing hardware and researchers' skills and efforts. Successful DNN models are becoming important intellectual properties for the model owners and should be protected from unauthorized access and piracy. This paper proposes a novel framework to provide access control to the trained deep neural networks so that only authorized users can utilize them properly.

Paper Details

Authors:
Submitted On:
27 March 2019 - 9:03am
Short Link:
Type:
Paper Code:
Document Year:
Cite

Document Files

wifs18_dnn_piracy.pdf

(138)

Subscribe

[1] , "Protect Your Deep Neural Networks from Piracy", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/3846. Accessed: Oct. 24, 2020.
@article{3846-19,
url = {http://sigport.org/3846},
author = { },
publisher = {IEEE SigPort},
title = {Protect Your Deep Neural Networks from Piracy},
year = {2019} }
TY - EJOUR
T1 - Protect Your Deep Neural Networks from Piracy
AU -
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/3846
ER -
. (2019). Protect Your Deep Neural Networks from Piracy. IEEE SigPort. http://sigport.org/3846
, 2019. Protect Your Deep Neural Networks from Piracy. Available at: http://sigport.org/3846.
. (2019). "Protect Your Deep Neural Networks from Piracy." Web.
1. . Protect Your Deep Neural Networks from Piracy [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/3846

Factors Affecting ENF Capture in Audio


The electric network frequency (ENF) signal is an environmental signature that can be captured in audiovisual recordings made in locations where there is electrical activity. This signal is influenced by the power grid in which the recording is made, and recent work has shown that it can be useful toward a number of forensics and security applications. An under-studied area of ENF research is the factors that can affect the capture of ENF traces in media recordings.

Paper Details

Authors:
Steven Gambino, Miao Yu
Submitted On:
7 January 2019 - 5:06pm
Short Link:
Type:
Document Year:
Cite

Document Files

Poster for TIFS journal paper

(198)

Subscribe

[1] Steven Gambino, Miao Yu, "Factors Affecting ENF Capture in Audio", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/3844. Accessed: Oct. 24, 2020.
@article{3844-19,
url = {http://sigport.org/3844},
author = {Steven Gambino; Miao Yu },
publisher = {IEEE SigPort},
title = {Factors Affecting ENF Capture in Audio},
year = {2019} }
TY - EJOUR
T1 - Factors Affecting ENF Capture in Audio
AU - Steven Gambino; Miao Yu
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/3844
ER -
Steven Gambino, Miao Yu. (2019). Factors Affecting ENF Capture in Audio. IEEE SigPort. http://sigport.org/3844
Steven Gambino, Miao Yu, 2019. Factors Affecting ENF Capture in Audio. Available at: http://sigport.org/3844.
Steven Gambino, Miao Yu. (2019). "Factors Affecting ENF Capture in Audio." Web.
1. Steven Gambino, Miao Yu. Factors Affecting ENF Capture in Audio [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/3844

Pages