6,100 research outputs found

    A constructive and unifying framework for zero-bit watermarking

    Get PDF
    In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this problem from a classical detection theory point of view, but with side information enabled at the embedding side. This means that the watermark signal is a function of the host content. Our study is twofold. The first step is to design the best embedding function for a given detection function, and the best detection function for a given embedding function. This yields two conditions, which are mixed into one `fundamental' partial differential equation. It appears that many famous watermarking schemes are indeed solution to this `fundamental' equation. This study thus gives birth to a constructive framework unifying solutions, so far perceived as very different.Comment: submitted to IEEE Trans. on Information Forensics and Securit

    THE EFFECTS OF COMPUTER SKILL IN STUDENT`S ACHIEVEMENT THROUGH THE USE OF LEARNING MANAGEMENT SYSTEM FOR INFORMATION TECHNOLOGY SUBJECT AMONG GRADE 10 STUDENTS

    Get PDF
    THE EFFECTS OF COMPUTER SKILL IN STUDENT`S ACHIEVEMENT THROUGH THE USE OF LEARNING MANAGEMENT SYSTEM FOR INFORMATION TECHNOLOGY SUBJECT AMONG GRADE 10 STUDENTS - computer skill, student achievement, e-learning, learning management system, MOODL

    HUBUNGAN MANAJEMEN DIRI DENGAN STRES KERJA PADA KARYAWAN TETAP

    Get PDF
    Setiap perusahaan memiliki deskripsi pekerjaan yang berbeda, hal ini dapat mempengaruhi beban kerja yang diterima pada karyawan. Tingkat beban kerja yang berlebih dapat menciptakan stres kerja pada karyawan di dalam perusahaan. Manajemen diri sangat dibutuhkan untuk mengendalikan tingkat stres kerja yang dialami oleh karyawan. Penelitian ini bertujuan untuk mengetauhi hubungan antara manajemen diri dengan stres kerja pada karyawan tetap. Penelitian ini menggunakan pendekatan kuantitatif dengan metode korelasional, teknik pengambilan sampel pada penelitian ini mengguanakan purpopsive sampling. Subjek pada penelitian ini berjumlah 201 yang merupakan karyawan tetap yang telah melewati masa percobaan bekerja selama maksimal 3 bulan, mendapatkan gaji minimal UMR daerah dan telah bekerja selama 1 tahun lebih. Alat ukur yang digunakan Self-Control and Self�Management Scale (SCMS) dan the new job stress scale. Uji analisis menggunakan uji korelasi spearman rho dengan bantuan software IBM SPSS Statistics 27.0.1. Hasil penelitian menunjukan bahwa ada hubungan negatif yang signifikan antara manajemen diri dengan stres kerj

    Towards joint decoding of binary Tardos fingerprinting codes

    Get PDF
    The class of joint decoder of probabilistic fingerprinting codes is of utmost importance in theoretical papers to establish the concept of fingerprint capacity. However, no implementation supporting a large user base is known to date. This article presents an iterative decoder which is, as far as we are aware of, the first practical attempt towards joint decoding. The discriminative feature of the scores benefits on one hand from the side-information of previously accused users, and on the other hand, from recently introduced universal linear decoders for compound channels. Neither the code construction nor the decoder make precise assumptions about the collusion (size or strategy). The extension to incorporate soft outputs from the watermarking layer is straightforward. An extensive experimental work benchmarks the very good performance and offers a clear comparison with previous state-of-the-art decoders.Comment: submitted to IEEE Trans. on Information Forensics and Security. - typos corrected, one new plot, references added about ECC based fingerprinting code

    Worst case attacks against binary probabilistic traitor tracing codes

    Get PDF
    An insightful view into the design of traitor tracing codes should necessarily consider the worst case attacks that the colluders can lead. This paper takes an information-theoretic point of view where the worst case attack is defined as the collusion strategy minimizing the achievable rate of the traitor tracing code. Two different decoders are envisaged, the joint decoder and the simple decoder, as recently defined by P. Moulin \cite{Moulin08universal}. Several classes of colluders are defined with increasing power. The worst case attack is derived for each class and each decoder when applied to Tardos' codes and a probabilistic version of the Boneh-Shaw construction. This contextual study gives the real rates achievable by the binary probabilistic traitor tracing codes. Attacks usually considered in literature, such as majority or minority votes, are indeed largely suboptimal. This article also shows the utmost importance of the time-sharing concept in a probabilistic codes.Comment: submitted to IEEE Trans. on Information Forensics and Securit

    Barriers to and supports for success for Maori students in the Psychology Department at the University of Waikato

    Get PDF
    The overall objective for this evaluation was to investigate the barriers to participating in tertiary education for Maori, and supports for academic success for Maori students in the Psychology Department. With this objective in mind, we set out to: Investigate the barriers that impede success for Maori students in the Psychology Department. Identify variables of success and how they can be more effectively managed within the Psychology Department. Identify factors that contribute to Maori students continuing their studies through to graduate level. Provide recommendations for future development of a supportive environment for Maori students in the Psychology Department

    Orientation covariant aggregation of local descriptors with embeddings

    Get PDF
    Image search systems based on local descriptors typically achieve orientation invariance by aligning the patches on their dominant orientations. Albeit successful, this choice introduces too much invariance because it does not guarantee that the patches are rotated consistently. This paper introduces an aggregation strategy of local descriptors that achieves this covariance property by jointly encoding the angle in the aggregation stage in a continuous manner. It is combined with an efficient monomial embedding to provide a codebook-free method to aggregate local descriptors into a single vector representation. Our strategy is also compatible and employed with several popular encoding methods, in particular bag-of-words, VLAD and the Fisher vector. Our geometric-aware aggregation strategy is effective for image search, as shown by experiments performed on standard benchmarks for image and particular object retrieval, namely Holidays and Oxford buildings.Comment: European Conference on Computer Vision (2014

    Place attachment of Ngāi Te Ahi to Hairini Marae

    Get PDF
    Twelve members of Ngāi Te Ahi, a hapū from Tauranga, were interviewed to explore how they talk about their place attachment to Hairini Marae. This was organized around five key dimensions of place attachment taken from the literature—continuity, distinctiveness, symbolism, attachment and familiarity. We found that in discussing all dimensions, place attachment was equally about social and cultural relationships, history, and socialization. Place attachment for groups such as Māori is complex because it encompasses all social relationships past and present. The implication for those working with Māori is to take seriously the wider connotations of place when talking to Māori about marae, traditional homelands, and their land
    corecore