16,654 research outputs found

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication

    Study to identify how 'literacy' levels have developed over time : final report

    Get PDF

    Contribution to spectrum management in cognitive radio networks: a cognitive management framework

    Get PDF
    To overcome the current under-utilization of spectrum resources, the CR (Cognitive Radio) paradigm has gained an increasing interest to perform the so-called Dynamic Spectrum Access (DSA). In this respect, Cognitive Radio networks (CRNs) have been strengthened with cognitive management support to push forward their deployment and commercialization. This dissertation has assessed the relevance of exploiting several cognitive management functionalities in various scenarios and case studies. Specifically, this dissertation has constructed a generic cognitive management framework, based on the fittingness factor concept, to support spectrum management in CRNs. Under this framework, the dissertation has addressed two of the most promising CR applications, namely an Opportunistic Spectrum Access (OSA) to licensed bands and open sharing of license-exempt bands. In the former application, several strategies that exploit temporal statistical dependence between primary activity/inactivity durations to perform a proactive spectrum selection have been discussed. A set of guidelines to select the most relevant strategy for a given environment have been provided. In the latter application, a fittingness factor-based spectrum selection strategy has been proposed to efficiency exploit the different bands. Several formulations of the fittingness factor have been compared, and their relevance have been assessed under different settings. Drawing inspiration from these applications, a more general proactive strategy exploiting a characterization of spectrum resources at both the time and frequency domains has been developed to jointly assist spectrum selection (SS) and spectrum mobility (SM) functionalities. Several variants of the proposed strategy, each combining different choices and options of implementation, have been compared to identify which of its components have the most significant impact on performance depending on the working conditions of the CRN. To assess rationality of the proposed strategy with respect to other strategies, a cost-benefit analysis has been conducted to confront the introduced gain in terms of user satisfaction level to the incurred cost in terms of signaling amount. Finally, the dissertation has conducted an analysis of practicality aspects in terms of robustness to environment uncertainty and applicability to realistic environments. With respect to the former aspect, robustness has been assessed in front of two sources of uncertainty, namely imperfection of the acquisition process and non-stationarity of the environment, and additional functionalities have been developed, when needed, to improve robustness. With respect to the latter, the proposed framework has been applied to a Digital Home (DH) environment to validate the obtained key findings under realistic conditions.Postprint (published version

    Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

    Full text link
    We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different users populate distinct subspaces of this feature space. In a systematic experiment designed to test how this behavioral pattern exhibits consistency over time, we collected touch data from users interacting with a smart phone using basic navigation maneuvers, i.e., up-down and left-right scrolling. We propose a classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen. The classifier achieves a median equal error rate of 0% for intra-session authentication, 2%-3% for inter-session authentication and below 4% when the authentication test was carried out one week after the enrollment phase. While our experimental findings disqualify this method as a standalone authentication mechanism for long-term authentication, it could be implemented as a means to extend screen-lock time or as a part of a multi-modal biometric authentication system.Comment: to appear at IEEE Transactions on Information Forensics & Security; Download data from http://www.mariofrank.net/touchalytics

    Software reliability and dependability: a roadmap

    Get PDF
    Shifting the focus from software reliability to user-centred measures of dependability in complete software-based systems. Influencing design practice to facilitate dependability assessment. Propagating awareness of dependability issues and the use of existing, useful methods. Injecting some rigour in the use of process-related evidence for dependability assessment. Better understanding issues of diversity and variation as drivers of dependability. Bev Littlewood is founder-Director of the Centre for Software Reliability, and Professor of Software Engineering at City University, London. Prof Littlewood has worked for many years on problems associated with the modelling and evaluation of the dependability of software-based systems; he has published many papers in international journals and conference proceedings and has edited several books. Much of this work has been carried out in collaborative projects, including the successful EC-funded projects SHIP, PDCS, PDCS2, DeVa. He has been employed as a consultant t

    The pecuniary and non-pecuniary costs of job displacement. An evaluation of the post-displacement injury rate

    Get PDF
    This paper investigates the pecuniary and non-pecuniary costs of involuntary job loss by focusing on both post-displacement earnings losses and injury rates. To this end we employ a unique dataset. Administrative data from Italy describing individual work histories have been merged with individual data on workplace injuries. Propensity score matching techniques are employed to measure the causal effect of displacement on workplace injury rates. We find that in a period marked by tight labour market, re-employed displaced workers experience only moderate and short-lived earnings losses but are about 70 percent more likely to be injured at their subsequent jobs compared to the control group of non-displaced workers. These results suggest that re-employed displaced workers may trade pecuniary job attributes for non-pecuniary ones.Job displacement, post-displacement injury rates, propensity score matching

    21-cm signatures of residual HI inside cosmic HII regions during reionization

    Full text link
    We investigate the impact of sinks of ionizing radiation on the reionization-era 21-cm signal, focusing on 1-point statistics. We consider sinks in both the intergalactic medium and inside galaxies. At a fixed filling factor of HII regions, sinks will have two main effects on the 21-cm morphology: (i) as inhomogeneous absorbers of ionizing photons they result in smaller and more widespread cosmic HII patches; and (ii) as reservoirs of neutral gas they contribute a non-zero 21-cm signal in otherwise ionized regions. Both effects damp the contrast between neutral and ionized patches during reionization, making detection of the epoch of reionization with 21-cm interferometry more challenging. Here we systematically investigate these effects using the latest semi-numerical simulations. We find that sinks dramatically suppress the peak in the redshift evolution of the variance, corresponding to the midpoint of reionization. As previously predicted, skewness changes sign at midpoint, but the fluctuations in the residual HI suppress a late-time rise. Furthermore, large levels of residual HI dramatically alter the evolution of the variance, skewness and power spectrum from that seen at lower levels. In general, the evolution of the large-scale modes provides a better, cleaner, higher signal-to-noise probe of reionization.Comment: Minor edits to agree with MNRAS published versio
    corecore