27 research outputs found
Sampling streams of pulses with unknown shapes
This paper extends the class of continuous-time signals that can be perfectly reconstructed by developing a theory for the sampling and exact reconstruction of streams of short pulses with unknown shapes. The single pulse is modelled as the delayed version of a wavelet-sparse signal, which is normally not band limited. As the delay can be an arbitrary real number, it is hard to develop an exact sampling result for this type of signals. We achieve the exact reconstruction of the pulses by using only the knowledge of the Fourier transform of the signal at specific frequencies. We further introduce a multi-channel acquisition system which uses a new family of compact-support sampling kernels for extracting the Fourier information from the samples. The shape of the kernel is independent of the wavelet basis in which the pulse is sparse and hence the same acquisition system can be used with pulses which are sparse on different wavelet bases. By exploiting the fact that pulses have short duration and that the sampling kernels have compact support, we finally propose a local and sequential algorithm to reconstruct streaming pulses from the samples
An image recapture detection algorithm based on learning dictionaries of edge profiles
With today's digital camera technology, high-quality images can be recaptured from an liquid crystal display (LCD) monitor screen with relative ease. An attacker may choose to recapture a forged image in order to conceal imperfections and to increase its authenticity. In this paper, we address the problem of detecting images recaptured from LCD monitors. We provide a comprehensive overview of the traces found in recaptured images, and we argue that aliasing and blurriness are the least scene dependent features. We then show how aliasing can be eliminated by setting the capture parameters to predetermined values. Driven by this finding, we propose a recapture detection algorithm based on learned edge blurriness. Two sets of dictionaries are trained using the K-singular value decomposition approach from the line spread profiles of selected edges from single captured and recaptured images. An support vector machine classifier is then built using dictionary approximation errors and the mean edge spread width from the training images. The algorithm, which requires no user intervention, was tested on a database that included more than 2500 high-quality recaptured images. Our results show that our method achieves a performance rate that exceeds 99% for recaptured images and 94% for single captured images
Sparse sampling of signal innovations
Sparse sampling of continuous-time sparse signals is addressed. In particular, it is shown that sampling at the rate of innovation is possible, in some sense applying Occam's razor to the sampling of sparse signals. The noisy case is analyzed and solved, proposing methods reaching the optimal performance given by the Cramer-Rao bounds. Finally, a number of applications have been discussed where sparsity can be taken advantage of. The comprehensive coverage given in this article should lead to further research in sparse sampling, as well as new applications. One main application to use the theory presented in this article is ultra-wide band (UWB) communications
Moment inversion problem for piecewise D-finite functions
We consider the problem of exact reconstruction of univariate functions with
jump discontinuities at unknown positions from their moments. These functions
are assumed to satisfy an a priori unknown linear homogeneous differential
equation with polynomial coefficients on each continuity interval. Therefore,
they may be specified by a finite amount of information. This reconstruction
problem has practical importance in Signal Processing and other applications.
It is somewhat of a ``folklore'' that the sequence of the moments of such
``piecewise D-finite''functions satisfies a linear recurrence relation of
bounded order and degree. We derive this recurrence relation explicitly. It
turns out that the coefficients of the differential operator which annihilates
every piece of the function, as well as the locations of the discontinuities,
appear in this recurrence in a precisely controlled manner. This leads to the
formulation of a generic algorithm for reconstructing a piecewise D-finite
function from its moments. We investigate the conditions for solvability of the
resulting linear systems in the general case, as well as analyze a few
particular examples. We provide results of numerical simulations for several
types of signals, which test the sensitivity of the proposed algorithm to
noise
Recommended from our members
Deep De-Aliasing for Fast Compressive Sensing MRI
Fast Magnetic Resonance Imaging (MRI) is highly in demand for many clinical applications in order to reduce the scanning cost and improve the patient experience. This can also potentially increase the image quality by reducing the motion artefacts and contrast washout. However, once an image field of view and the desired resolution are chosen, the minimum scanning time is normally determined by the requirement of acquiring sufficient raw data to meet the Nyquist-Shannon sampling criteria. Compressive Sensing (CS) theory has been perfectly matched to the MRI scanning sequence design with much less required raw data for the image reconstruction. Inspired by recent advances in deep learning for solving various inverse problems, we propose a conditional Generative Adversarial Networks-based deep learning framework for de-aliasing and reconstructing MRI images from highly undersampled data with great promise to accelerate the data acquisition process. By coupling an innovative content loss with the adversarial loss our de-aliasing results are more realistic. Furthermore, we propose a refinement learning procedure for training the generator network, which can stabilise the training with fast convergence and less parameter tuning. We demonstrate that the proposed framework outperforms state-of-the-art CS-MRI methods, in terms of reconstruction error and perceptual image quality. In addition, our method can reconstruct each image in 0.22ms--0.37ms, which is promising for real-time applications
Enhancement by postfiltering for speech and audio coding in ad-hoc sensor networks
Enhancement algorithms for wireless acoustics sensor networks~(WASNs) are
indispensable with the increasing availability and usage of connected devices
with microphones. Conventional spatial filtering approaches for enhancement in
WASNs approximate quantization noise with an additive Gaussian distribution,
which limits performance due to the non-linear nature of quantization noise at
lower bitrates. In this work, we propose a postfilter for enhancement based on
Bayesian statistics to obtain a multidevice signal estimate, which explicitly
models the quantization noise. Our experiments using PSNR, PESQ and MUSHRA
scores demonstrate that the proposed postfilter can be used to enhance signal
quality in ad-hoc sensor networks
Smart meter privacy
The newgeneration electricity supply network, called the smart grid (SG), provides consumers with an active management and control of the power. By utilizing digital communications and sensing technologies which make the grid smart, SGs yield more efficient electricity transmission, reduced peak demand, improved security and increased integration of renewable energy systems compared to the traditional grid. Smart meters (SMs) are one of the core enablers of SG systems; they measure and record the high resolution electricity consumption information of a household almost in a real time basis, and report it to the utility provider (UP) at regular time intervals. SM measurements can be used for time-of-use pricing, trading user-generated energy, and mitigating load variations. However, real-time SM readings can also reveal sensitive information about the consumer’s activities which the user may not want to share with the UP, resulting in serious privacy concerns. SM privacy enabling techniques proposed in the literature can be categorized as SM data manipulation and demand shaping. While the SMdata is modified before being reported to the UP in the former method, the latter requires direct manipulation of the real energy consumption by exploiting physical resources, such as a renewable energy source (RES) or a rechargeable battery (RB). In this chapter, a datamanipulation privacy-enabling technique and three different demand shaping privacy-enabling techniques are presented, considering SM with a RES and an RB, SM with only an RB andSMwith only a RES. Information theoretic measures are used to quantify SM privacy. Optimal energy management strategies and bounds which are obtained using control theory, specifically Markov decision processes (MDPs), and rate distortion theory are analyzed
Privacy-cost Trade-off in a Smart Meter System with a Renewable Energy Source and a Rechargeable Battery
We study the privacy-cost trade-off in a smart meter (SM) system with a renewable energy source (RES) and a finite-capacity rechargeable battery (RB). Privacy is measured by the mutual information rate between the energy demand and the energy received from the grid, where the latter also determines the cost, and hence, reported by the SM to the utility provider (UP). We consider a renewable energy generation process that fully charges the RB at random time instants, and its realization is assumed to be known also by the UP. We reformulate the problem as a Markov decision process (MDP), and solve it by dynamic programming (DP) to design battery charging and discharging policies that minimize a linear combination of the privacy leakage and energy cost. We also propose a lower bound and two alternative low-complexity energy management policies, one of which is shown numerically to perform close to the MDP solution