153 research outputs found

    Initialization of the BIMBO self-test method using binary inputs and outputs

    Get PDF
    International audienceThis paper deals with the initialization of the BIMBO method, a deterministic identification method based on binary observation, for the (self-) test of integrated electronic and electromechanical systems, such as MEMS. Finding an adequate starting point for the parameter estimation algorithm may be crucial, depending on the chosen model parameterization. We show how this starting point may be obtained using only binary inputs and outputs and a few straightforward calculations. The practical implementation of this method only requires a one-bit digital-to-analog converter (DAC) and a one-bit analog-to-digital converter (ADC). This makes the proposed approach very amenable to integration and leads to no additional cost compared to the BIMBO method. We describe the method from a theoretical point of view, discuss its implementation and illustrate it in some idealized cases

    A Recursive System Identification Method Based on Binary Measurements

    Get PDF
    An online approach to parameter estimation problems based on binary observations is presented in this paper. This recursive identification method relies on a least-mean squares approach which makes it possible to estimate the coefficients of a finite-impulse response system knowing only the system input and the sign of the system output. The impulse response is identified up to a positive multiplicative constant. The role of the regulative coefficient is investigated thanks to simulated data. The proposed method is compared with another online approach: it is shown that the proposed method is competitive with the other one in terms of estimation quality and of calculation complexity

    Self-testing of sigma-delta MEMS sensors using BIMBO

    Get PDF
    International audienceSELF-TESTING OF SIGMA-DELTA MEMS SENSORS USING BIMB

    Deepfake detection by exploiting surface anomalies: the SurFake approach

    Full text link
    The ever-increasing use of synthetically generated content in different sectors of our everyday life, one for all media information, poses a strong need for deepfake detection tools in order to avoid the proliferation of altered messages. The process to identify manipulated content, in particular images and videos, is basically performed by looking for the presence of some inconsistencies and/or anomalies specifically due to the fake generation process. Different techniques exist in the scientific literature that exploit diverse ad-hoc features in order to highlight possible modifications. In this paper, we propose to investigate how deepfake creation can impact on the characteristics that the whole scene had at the time of the acquisition. In particular, when an image (video) is captured the overall geometry of the scene (e.g. surfaces) and the acquisition process (e.g. illumination) determine a univocal environment that is directly represented by the image pixel values; all these intrinsic relations are possibly changed by the deepfake generation process. By resorting to the analysis of the characteristics of the surfaces depicted in the image it is possible to obtain a descriptor usable to train a CNN for deepfake detection: we refer to such an approach as SurFake. Experimental results carried out on the FF++ dataset for different kinds of deepfake forgeries and diverse deep learning models confirm that such a feature can be adopted to discriminate between pristine and altered images; furthermore, experiments witness that it can also be combined with visual data to provide a certain improvement in terms of detection accuracy

    Convergence Analysis of an Online Approach to Parameter Estimation Problems Based on Binary Noisy Observations

    No full text
    International audienceThe convergence analysis of an online system identification method based on binary-quantized observations is presented in this paper. This recursive algorithm can be applied in the case of finite impulse response (FIR) systems and exhibits low computational complexity as well as low storage requirement. This method, whose practical requirement is a simple 1-bit quantizer, implies low power consumption and minimal silicon area, and is consequently well-adapted to the test of microfabricated devices. The convergence in the mean of the method is studied in the presence of measurement noise at the input of the quantizer. In particular, a lower bound of the correlation coe cient between the nominal and the estimated system parameters is found. Some simulation results are then given in order to illustrate this result and the assumptions necessary for its derivation are discusse

    Datasets, Clues and State-of-the-Arts for Multimedia Forensics: An Extensive Review

    Full text link
    With the large chunks of social media data being created daily and the parallel rise of realistic multimedia tampering methods, detecting and localising tampering in images and videos has become essential. This survey focusses on approaches for tampering detection in multimedia data using deep learning models. Specifically, it presents a detailed analysis of benchmark datasets for malicious manipulation detection that are publicly available. It also offers a comprehensive list of tampering clues and commonly used deep learning architectures. Next, it discusses the current state-of-the-art tampering detection methods, categorizing them into meaningful types such as deepfake detection methods, splice tampering detection methods, copy-move tampering detection methods, etc. and discussing their strengths and weaknesses. Top results achieved on benchmark datasets, comparison of deep learning approaches against traditional methods and critical insights from the recent tampering detection methods are also discussed. Lastly, the research gaps, future direction and conclusion are discussed to provide an in-depth understanding of the tampering detection research arena
    corecore