Sorry, you need to enable JavaScript to visit this website.

Signal Processing and Cryptography

Filter Design for Delay-Based Anonymous Communications

Paper Details

Authors:
Fernando Pérez-González, Carmela Troncoso
Submitted On:
6 March 2017 - 11:59am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

PosterICASSP2017.pdf

(271)

Subscribe

[1] Fernando Pérez-González, Carmela Troncoso, "Filter Design for Delay-Based Anonymous Communications", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1653. Accessed: Apr. 25, 2019.
@article{1653-17,
url = {http://sigport.org/1653},
author = {Fernando Pérez-González; Carmela Troncoso },
publisher = {IEEE SigPort},
title = {Filter Design for Delay-Based Anonymous Communications},
year = {2017} }
TY - EJOUR
T1 - Filter Design for Delay-Based Anonymous Communications
AU - Fernando Pérez-González; Carmela Troncoso
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1653
ER -
Fernando Pérez-González, Carmela Troncoso. (2017). Filter Design for Delay-Based Anonymous Communications. IEEE SigPort. http://sigport.org/1653
Fernando Pérez-González, Carmela Troncoso, 2017. Filter Design for Delay-Based Anonymous Communications. Available at: http://sigport.org/1653.
Fernando Pérez-González, Carmela Troncoso. (2017). "Filter Design for Delay-Based Anonymous Communications." Web.
1. Fernando Pérez-González, Carmela Troncoso. Filter Design for Delay-Based Anonymous Communications [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1653

USTC2016

Paper Details

Authors:
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li
Submitted On:
17 June 2016 - 11:41pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

bare_jrnl_compsoc2.pdf

(484)

Subscribe

[1] Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li, "USTC2016", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1126. Accessed: Apr. 25, 2019.
@article{1126-16,
url = {http://sigport.org/1126},
author = {Huancheng Zhou; Hongyi Duanmu; Jiacheng Li; Yike Ma; Jun Shi; Zhihao Tan; Xiaohan Wang; Liuyu Xiang; Heqin Yin; Weihai Li },
publisher = {IEEE SigPort},
title = {USTC2016},
year = {2016} }
TY - EJOUR
T1 - USTC2016
AU - Huancheng Zhou; Hongyi Duanmu; Jiacheng Li; Yike Ma; Jun Shi; Zhihao Tan; Xiaohan Wang; Liuyu Xiang; Heqin Yin; Weihai Li
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1126
ER -
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li. (2016). USTC2016. IEEE SigPort. http://sigport.org/1126
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li, 2016. USTC2016. Available at: http://sigport.org/1126.
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li. (2016). "USTC2016." Web.
1. Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li. USTC2016 [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1126

USTC2016

Paper Details

Authors:
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li
Submitted On:
17 June 2016 - 11:41pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

bare_jrnl_compsoc2.pdf

(422)

Subscribe

[1] Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li, "USTC2016", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1114. Accessed: Apr. 25, 2019.
@article{1114-16,
url = {http://sigport.org/1114},
author = {Huancheng Zhou; Hongyi Duanmu; Jiacheng Li; Yike Ma; Jun Shi; Zhihao Tan; Xiaohan Wang; Liuyu Xiang; Heqin Yin; Weihai Li },
publisher = {IEEE SigPort},
title = {USTC2016},
year = {2016} }
TY - EJOUR
T1 - USTC2016
AU - Huancheng Zhou; Hongyi Duanmu; Jiacheng Li; Yike Ma; Jun Shi; Zhihao Tan; Xiaohan Wang; Liuyu Xiang; Heqin Yin; Weihai Li
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1114
ER -
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li. (2016). USTC2016. IEEE SigPort. http://sigport.org/1114
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li, 2016. USTC2016. Available at: http://sigport.org/1114.
Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li. (2016). "USTC2016." Web.
1. Huancheng Zhou, Hongyi Duanmu, Jiacheng Li, Yike Ma, Jun Shi, Zhihao Tan, Xiaohan Wang, Liuyu Xiang, Heqin Yin, Weihai Li. USTC2016 [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1114

Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

20151202-globalSIP-PPT.pdf

(518)

Subscribe

[1] , "Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/371. Accessed: Apr. 25, 2019.
@article{371-15,
url = {http://sigport.org/371},
author = { },
publisher = {IEEE SigPort},
title = {Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique},
year = {2015} }
TY - EJOUR
T1 - Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/371
ER -
. (2015). Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique. IEEE SigPort. http://sigport.org/371
, 2015. Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique. Available at: http://sigport.org/371.
. (2015). "Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique." Web.
1. . Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/371

A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption

Paper Details

Authors:
Edmar S. da Silva, Ricardo M. Campello de Souza
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

presentation.pdf

(780)

Subscribe

[1] Edmar S. da Silva, Ricardo M. Campello de Souza, "A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/337. Accessed: Apr. 25, 2019.
@article{337-15,
url = {http://sigport.org/337},
author = {Edmar S. da Silva; Ricardo M. Campello de Souza },
publisher = {IEEE SigPort},
title = {A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption},
year = {2015} }
TY - EJOUR
T1 - A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption
AU - Edmar S. da Silva; Ricardo M. Campello de Souza
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/337
ER -
Edmar S. da Silva, Ricardo M. Campello de Souza. (2015). A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption. IEEE SigPort. http://sigport.org/337
Edmar S. da Silva, Ricardo M. Campello de Souza, 2015. A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption. Available at: http://sigport.org/337.
Edmar S. da Silva, Ricardo M. Campello de Souza. (2015). "A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption." Web.
1. Edmar S. da Silva, Ricardo M. Campello de Souza. A Finite Field Cosine Transform-Based Image Processing Scheme for Color Image Encryption [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/337

Content Fingerprinting and Security


Over the last decade, baseline indexing techniques have been refurbished under the code name "content fingerprinting" when deployed in the context of security applications. In the first part of the talk, the speaker will detail the collection of security-related applications where content fingerprints have been exploited, including IP theft detection, audience measurement, traffic monitoring, forgery detection, etc. In the second part, he will discuss the unique technical challenges raised by the presence of a possibly hostile adversary in the ecosystem.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

MMSP_overviewTalk.pdf

(483)

Subscribe

[1] , "Content Fingerprinting and Security", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/231. Accessed: Apr. 25, 2019.
@article{231-15,
url = {http://sigport.org/231},
author = { },
publisher = {IEEE SigPort},
title = {Content Fingerprinting and Security},
year = {2015} }
TY - EJOUR
T1 - Content Fingerprinting and Security
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/231
ER -
. (2015). Content Fingerprinting and Security. IEEE SigPort. http://sigport.org/231
, 2015. Content Fingerprinting and Security. Available at: http://sigport.org/231.
. (2015). "Content Fingerprinting and Security." Web.
1. . Content Fingerprinting and Security [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/231

Checking Up the Health of Multimedia Security


The terminology "multimedia security" gained a new popularity in the mid-90s with the rapid rise of digital watermarking in an attempt to combat piracy of copyrighted content. This milestone incarnates the mutation of content protection techniques from conventional cryptography to signal processing techniques. Today, multimedia security encompasses a much wider range of techniques such as multimedia encryption, content fingerprinting, anti-camcording, passive forensic analysis.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:38pm
Short Link:
Type:

Document Files

multimediaSecurity_INRIA2014.pdf

(512)

Subscribe

[1] , "Checking Up the Health of Multimedia Security", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/230. Accessed: Apr. 25, 2019.
@article{230-15,
url = {http://sigport.org/230},
author = { },
publisher = {IEEE SigPort},
title = {Checking Up the Health of Multimedia Security},
year = {2015} }
TY - EJOUR
T1 - Checking Up the Health of Multimedia Security
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/230
ER -
. (2015). Checking Up the Health of Multimedia Security. IEEE SigPort. http://sigport.org/230
, 2015. Checking Up the Health of Multimedia Security. Available at: http://sigport.org/230.
. (2015). "Checking Up the Health of Multimedia Security." Web.
1. . Checking Up the Health of Multimedia Security [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/230

Pages