230 research outputs found

    On the Realization of Non-Linear Pseudo-Noise Generator for various Signal Processing and Communication Applications

    Get PDF
    In digital communication systems and digital signal processing, the design of pseudo-noise (PN) sequences having good correlation properties has been one of the most important development steps. Its well-known application areas include spread spectrum communications, Multiuser Communications, Digital Signal Processing for reduction of power spectral density, mitigation of Multiple Access Interference (MAI) and improvement of signal to noise ratio (SNR) respectively. In this paper a performance of non- linear PN code generator for interference rejection improvement of signal to noise ratio in signal processing applications have been studied.  The signal of interest can be considered to be a digitally controlled wide band digital chaotic signal, which has been implemented by conventional PN code generators.  The proposed technique can be used as an alternative code for improvement in signal to noise ratio, interference rejection, spreading code for various signal processing and communication applications.  The proposed scheme has been implemented using matlab as a simulation tool.  Power spectral density, auto-correlation and cross-correlation property have been thoroughly studied and has been compared with conventional scheme and are presented in the paper. Keywords: PN Code Generator, Spread Spectrum Modulation, Auto-correlation, Cross-correlation, Power Spectral Density

    Collusion-resistant fingerprinting for multimedia

    Full text link

    Blind quality assessment system for multimedia communications using tracing watermarking

    Full text link

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    Resilient Digital Video Transmission over Wireless Channels using Pixel-Level Artefact Detection Mechanisms

    Get PDF
    Recent advances in communications and video coding technology have brought multimedia communications into everyday life, where a variety of services and applications are being integrated within different devices such that multimedia content is provided everywhere and on any device. H.264/AVC provides a major advance on preceding video coding standards obtaining as much as twice the coding efficiency over these standards (Richardson I.E.G., 2003, Wiegand T. & Sullivan G.J., 2007). Furthermore, this new codec inserts video related information within network abstraction layer units (NALUs), which facilitates the transmission of H.264/AVC coded sequences over a variety of network environments (Stockhammer, T. & Hannuksela M.M., 2005) making it applicable for a broad range of applications such as TV broadcasting, mobile TV, video-on-demand, digital media storage, high definition TV, multimedia streaming and conversational applications. Real-time wireless conversational and broadcast applications are particularly challenging as, in general, reliable delivery cannot be guaranteed (Stockhammer, T. & Hannuksela M.M., 2005). The H.264/AVC standard specifies several error resilient strategies to minimise the effect of transmission errors on the perceptual quality of the reconstructed video sequences. However, these methods assume a packet-loss scenario where the receiver discards and conceals all the video information contained within a corrupted NALU packet. This implies that the error resilient methods adopted by the standard operate at a lower bound since not all the information contained within a corrupted NALU packet is un-utilizable (Stockhammer, T. et al., 2003).peer-reviewe

    Low Complexity Greedy Power Allocation Algorithm for Proportional Resource Allocation in Multi-User OFDM Systems, Journal of Telecommunications and Information Technology, 2012, nr 4

    Get PDF
    Multi-User Orthogonal Frequency Division Multiplexing (MU-OFDM) is an efficient technique for achieving high downlink capacity in high-speed communication systems. A key issue in MU-OFDM is the allocation of the OFDM subcarriers and power to users sharing the channel. In this paper a proportional rate-adaptive resource allocation algorithm for MU-OFDM is presented. Subcarrier and power allocation are carried out sequentially to reduce the complexity. The low complexity proportional subcarriers allocation is followed by Greedy Power Allocation (GPA) to solve the rate-adaptive resource allocation problem with proportional rate constraints for MU-OFDM systems. It improves the work of Wong et al. in this area by introducing an optimal GPA that achieves approximate rate proportionality, while maximizing the total sum-rate capacity of MU-OFDM. It is shown through simulation that the proposed GPA algorithm performs better than the algorithm of Wong et al., by achieving higher total capacities with the same computational complexity, especially, at larger number of users and roughly satisfying user rate proportionality

    Behavior modeling and forensics for multimedia social networks

    Full text link

    FedComm: Federated Learning as a Medium for Covert Communication

    Full text link
    Proposed as a solution to mitigate the privacy implications related to the adoption of deep learning, Federated Learning (FL) enables large numbers of participants to successfully train deep neural networks without having to reveal the actual private training data. To date, a substantial amount of research has investigated the security and privacy properties of FL, resulting in a plethora of innovative attack and defense strategies. This paper thoroughly investigates the communication capabilities of an FL scheme. In particular, we show that a party involved in the FL learning process can use FL as a covert communication medium to send an arbitrary message. We introduce FedComm, a novel multi-system covert-communication technique that enables robust sharing and transfer of targeted payloads within the FL framework. Our extensive theoretical and empirical evaluations show that FedComm provides a stealthy communication channel, with minimal disruptions to the training process. Our experiments show that FedComm successfully delivers 100% of a payload in the order of kilobits before the FL procedure converges. Our evaluation also shows that FedComm is independent of the application domain and the neural network architecture used by the underlying FL scheme.Comment: 18 page
    corecore