164 research outputs found

    Error analysis for filtered back projection reconstructions in Besov spaces

    Full text link
    Filtered back projection (FBP) methods are the most widely used reconstruction algorithms in computerized tomography (CT). The ill-posedness of this inverse problem allows only an approximate reconstruction for given noisy data. Studying the resulting reconstruction error has been a most active field of research in the 1990s and has recently been revived in terms of optimal filter design and estimating the FBP approximation errors in general Sobolev spaces. However, the choice of Sobolev spaces is suboptimal for characterizing typical CT reconstructions. A widely used model are sums of characteristic functions, which are better modelled in terms of Besov spaces Bqα,p(R2)\mathrm{B}^{\alpha,p}_q(\mathbb{R}^2). In particular B1α,1(R2)\mathrm{B}^{\alpha,1}_1(\mathbb{R}^2) with α≈1\alpha \approx 1 is a preferred model in image analysis for describing natural images. In case of noisy Radon data the total FBP reconstruction error ∄f−fLΎ∄≀∄f−fL∄+∄fL−fLΎ∄\|f-f_L^\delta\| \le \|f-f_L\|+ \|f_L - f_L^\delta\| splits into an approximation error and a data error, where LL serves as regularization parameter. In this paper, we study the approximation error of FBP reconstructions for target functions f∈L1(R2)∩Bqα,p(R2)f \in \mathrm{L}^1(\mathbb{R}^2) \cap \mathrm{B}^{\alpha,p}_q(\mathbb{R}^2) with positive α∈̞N\alpha \not\in \mathbb{N} and 1≀p,q≀∞1 \leq p,q \leq \infty. We prove that the Lp\mathrm{L}^p-norm of the inherent FBP approximation error f−fLf-f_L can be bounded above by \begin{equation*} \|f - f_L\|_{\mathrm{L}^p(\mathbb{R}^2)} \leq c_{\alpha,q,W} \, L^{-\alpha} \, |f|_{\mathrm{B}^{\alpha,p}_q(\mathbb{R}^2)} \end{equation*} under suitable assumptions on the utilized low-pass filter's window function WW. This then extends by classical methods to estimates for the total reconstruction error.Comment: 32 pages, 8 figure

    Best Practices for Notification Studies for Security and Privacy Issues on the Internet

    Get PDF
    Researchers help operators of vulnerable and non-compliant internet services by individually notifying them about security and privacy issues uncovered in their research. To improve efficiency and effectiveness of such efforts, dedicated notification studies are imperative. As of today, there is no comprehensive documentation of pitfalls and best practices for conducting such notification studies, which limits validity of results and impedes reproducibility. Drawing on our experience with such studies and guidance from related work, we present a set of guidelines and practical recommendations, including initial data collection, sending of notifications, interacting with the recipients, and publishing the results. We note that future studies can especially benefit from extensive planning and automation of crucial processes, i.e., activities that take place well before the first notifications are sent.Comment: Accepted to the 3rd International Workshop on Information Security Methodology and Replication Studies (IWSMR '21), colocated with ARES '2

    On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market

    Get PDF
    Today, online privacy is the domain of regulatory measures and privacy-enhancing technologies. Transparency in the form of external and public assessments has been proposed for improving privacy and security because it exposes otherwise hidden deficiencies. Previous work has studied privacy attitudes and behavior of consumers. However, little is known on how organizations react to measures that employ public “naming and shaming” as an incentive for improvement. We performed the first study on this aspect by conducting a qualitative survey with 152 German health insurers. We scanned their websites with PrivacyScore.org to generate a public ranking and confronted the insurers with the results. We obtained a response rate of 27%. Responses ranged from positive feedback to legal threats. Only 12% of the sites – mostly on-responders – improved during our study. Our results show that insurers struggle due to unawareness, reluctance, and incapability, and demonstrate the general difficulties of transparency-based approaches

    Integration of Standardized and Non-Standardized Product Data

    Get PDF
    Abstract: Smart products adapt to environments, process contexts, users and other products. Standardized product data such as BMECat, eCl@ss, and EPC global formats are designed to support the exploitation of product data and therefore contribute to more efficient supply chains. Non-standardized product data mainly target soft benefits which targets the exploration of product dat

    Chlamydia pneumoniae infection acts as an endothelial stressor with the potential to initiate the earliest heat shock protein 60-dependent inflammatory stage of atherosclerosis

    Get PDF
    We identified increased expression and redistribution of the intracellular protein 60-kDa human heat shock protein (hHSP60) (HSPD1) to the cell surface in human endothelial cells subjected to classical atherosclerosis risk factors and subsequent immunologic cross-reactivity against this highly conserved molecule, as key events occurring early in the process of atherosclerosis. The present study aimed at investigating the role of infectious pathogens as stress factors for vascular endothelial cells and, as such, contributors to early atherosclerotic lesion formation. Using primary donor-matched arterial and venous human endothelial cells, we show that infection with Chlamydia pneumoniae leads to marked upregulation and surface expression of hHSP60 and adhesion molecules. Moreover, we provide evidence for an increased susceptibility of arterial endothelial cells for redistribution of hHSP60 to the cellular membrane in response to C. pneumoniae infection as compared to autologous venous endothelial cells. We also show that oxidative stress has a central role to play in endothelial cell activation in response to chlamydial infection. These data provide evidence for a role of C. pneumoniae as a potent primary endothelial stressor for arterial endothelial cells leading to enrichment of hHSP60 on the cellular membrane and, as such, a potential initiator of atherosclerosi

    My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack

    Get PDF
    Wearables that constantly collect various sensor data of their users increase the chances for inferences of unintentional and sensitive information such as passwords typed on a physical keyboard. We take a thorough look at the potential of using electromyographic (EMG) data, a sensor modality which is new to the market but has lately gained attention in the context of wearables for augmented reality (AR), for a keylogging side-channel attack. Our approach is based on neural networks for a between-subject attack in a realistic scenario using the Myo Armband to collect the sensor data. In our approach, the EMG data has proven to be the most prominent source of information compared to the accelerometer and gyroscope, increasing the keystroke detection performance. For our end-to-end approach on raw data, we report a mean balanced accuracy of about 76 % for the keystroke detection and a mean top-3 key accuracy of about 32 % on 52 classes for the key identification on passwords of varying strengths. We have created an extensive dataset including more than 310 000 keystrokes recorded from 37 volunteers, which is available as open access along with the source code used to create the given results

    Zero-Interaction Security-Towards Sound Experimental Validation

    Get PDF
    Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the challenges encountered when reproducing the work of others, collecting realistic data in the wild, and ensuring that our own work is reproducible in turn. The presented findings are based on our study investigating the limits of zero-interaction security (ZIS)- a novel concept, leveraging sensor data collected by Internet of Things (IoT) devices to pair or authenticate devices. In particular, we share our experiences in reproducing five state-of-the-art ZIS schemes, collecting a comprehensive dataset of sensor data from the real world, evaluating these schemes on the collected data, and releasing the data, code, and documentation to facilitate reproducibility of our results
    • 

    corecore