42,574 research outputs found

    A constructive and unifying framework for zero-bit watermarking

    Get PDF
    In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this problem from a classical detection theory point of view, but with side information enabled at the embedding side. This means that the watermark signal is a function of the host content. Our study is twofold. The first step is to design the best embedding function for a given detection function, and the best detection function for a given embedding function. This yields two conditions, which are mixed into one `fundamental' partial differential equation. It appears that many famous watermarking schemes are indeed solution to this `fundamental' equation. This study thus gives birth to a constructive framework unifying solutions, so far perceived as very different.Comment: submitted to IEEE Trans. on Information Forensics and Securit

    A semi-coherent analysis method to search for continuous gravitational waves emitted by ultra-light boson clouds around spinning black holes

    Full text link
    As a consequence of superradiant instability induced in Kerr black holes, ultra-light boson clouds can be a source of persistent gravitational waves, potentially detectable by current and future gravitational-wave detectors. These signals have been predicted to be nearly monochromatic, with a small steady frequency increase (spin-up), but given the several assumptions and simplifications done at theoretical level, it is wise to consider, from the data analysis point of view, a broader class of gravitational signals in which the phase (or the frequency) slightly wander in time. Also other types of sources, e.g. neutron stars in which a torque balance equilibrium exists between matter accretion and emission of persistent gravitational waves, would fit in this category. In this paper we present a robust and computationally cheap analysis pipeline devoted to the search of such kind of signals. We provide a full characterization of the method, through both a theoretical sensitivity estimation and through the analysis of syntethic data in which simulated signals have been injected. The search setup for both all-sky searches and higher sensitivity directed searches is discussed.Comment: 13 pages, 13 figure

    Limits on Sparse Data Acquisition: RIC Analysis of Finite Gaussian Matrices

    Full text link
    One of the key issues in the acquisition of sparse data by means of compressed sensing (CS) is the design of the measurement matrix. Gaussian matrices have been proven to be information-theoretically optimal in terms of minimizing the required number of measurements for sparse recovery. In this paper we provide a new approach for the analysis of the restricted isometry constant (RIC) of finite dimensional Gaussian measurement matrices. The proposed method relies on the exact distributions of the extreme eigenvalues for Wishart matrices. First, we derive the probability that the restricted isometry property is satisfied for a given sufficient recovery condition on the RIC, and propose a probabilistic framework to study both the symmetric and asymmetric RICs. Then, we analyze the recovery of compressible signals in noise through the statistical characterization of stability and robustness. The presented framework determines limits on various sparse recovery algorithms for finite size problems. In particular, it provides a tight lower bound on the maximum sparsity order of the acquired data allowing signal recovery with a given target probability. Also, we derive simple approximations for the RICs based on the Tracy-Widom distribution.Comment: 11 pages, 6 figures, accepted for publication in IEEE transactions on information theor

    Roadmap on optical security

    Get PDF
    Postprint (author's final draft
    • …
    corecore