27 research outputs found

    Sampling streams of pulses with unknown shapes

    Get PDF
    This paper extends the class of continuous-time signals that can be perfectly reconstructed by developing a theory for the sampling and exact reconstruction of streams of short pulses with unknown shapes. The single pulse is modelled as the delayed version of a wavelet-sparse signal, which is normally not band limited. As the delay can be an arbitrary real number, it is hard to develop an exact sampling result for this type of signals. We achieve the exact reconstruction of the pulses by using only the knowledge of the Fourier transform of the signal at specific frequencies. We further introduce a multi-channel acquisition system which uses a new family of compact-support sampling kernels for extracting the Fourier information from the samples. The shape of the kernel is independent of the wavelet basis in which the pulse is sparse and hence the same acquisition system can be used with pulses which are sparse on different wavelet bases. By exploiting the fact that pulses have short duration and that the sampling kernels have compact support, we finally propose a local and sequential algorithm to reconstruct streaming pulses from the samples

    An image recapture detection algorithm based on learning dictionaries of edge profiles

    Get PDF
    With today's digital camera technology, high-quality images can be recaptured from an liquid crystal display (LCD) monitor screen with relative ease. An attacker may choose to recapture a forged image in order to conceal imperfections and to increase its authenticity. In this paper, we address the problem of detecting images recaptured from LCD monitors. We provide a comprehensive overview of the traces found in recaptured images, and we argue that aliasing and blurriness are the least scene dependent features. We then show how aliasing can be eliminated by setting the capture parameters to predetermined values. Driven by this finding, we propose a recapture detection algorithm based on learned edge blurriness. Two sets of dictionaries are trained using the K-singular value decomposition approach from the line spread profiles of selected edges from single captured and recaptured images. An support vector machine classifier is then built using dictionary approximation errors and the mean edge spread width from the training images. The algorithm, which requires no user intervention, was tested on a database that included more than 2500 high-quality recaptured images. Our results show that our method achieves a performance rate that exceeds 99% for recaptured images and 94% for single captured images

    Sparse sampling of signal innovations

    Get PDF
    Sparse sampling of continuous-time sparse signals is addressed. In particular, it is shown that sampling at the rate of innovation is possible, in some sense applying Occam's razor to the sampling of sparse signals. The noisy case is analyzed and solved, proposing methods reaching the optimal performance given by the Cramer-Rao bounds. Finally, a number of applications have been discussed where sparsity can be taken advantage of. The comprehensive coverage given in this article should lead to further research in sparse sampling, as well as new applications. One main application to use the theory presented in this article is ultra-wide band (UWB) communications

    Moment inversion problem for piecewise D-finite functions

    Full text link
    We consider the problem of exact reconstruction of univariate functions with jump discontinuities at unknown positions from their moments. These functions are assumed to satisfy an a priori unknown linear homogeneous differential equation with polynomial coefficients on each continuity interval. Therefore, they may be specified by a finite amount of information. This reconstruction problem has practical importance in Signal Processing and other applications. It is somewhat of a ``folklore'' that the sequence of the moments of such ``piecewise D-finite''functions satisfies a linear recurrence relation of bounded order and degree. We derive this recurrence relation explicitly. It turns out that the coefficients of the differential operator which annihilates every piece of the function, as well as the locations of the discontinuities, appear in this recurrence in a precisely controlled manner. This leads to the formulation of a generic algorithm for reconstructing a piecewise D-finite function from its moments. We investigate the conditions for solvability of the resulting linear systems in the general case, as well as analyze a few particular examples. We provide results of numerical simulations for several types of signals, which test the sensitivity of the proposed algorithm to noise

    Enhancement by postfiltering for speech and audio coding in ad-hoc sensor networks

    Full text link
    Enhancement algorithms for wireless acoustics sensor networks~(WASNs) are indispensable with the increasing availability and usage of connected devices with microphones. Conventional spatial filtering approaches for enhancement in WASNs approximate quantization noise with an additive Gaussian distribution, which limits performance due to the non-linear nature of quantization noise at lower bitrates. In this work, we propose a postfilter for enhancement based on Bayesian statistics to obtain a multidevice signal estimate, which explicitly models the quantization noise. Our experiments using PSNR, PESQ and MUSHRA scores demonstrate that the proposed postfilter can be used to enhance signal quality in ad-hoc sensor networks

    Smart meter privacy

    No full text
    The newgeneration electricity supply network, called the smart grid (SG), provides consumers with an active management and control of the power. By utilizing digital communications and sensing technologies which make the grid smart, SGs yield more efficient electricity transmission, reduced peak demand, improved security and increased integration of renewable energy systems compared to the traditional grid. Smart meters (SMs) are one of the core enablers of SG systems; they measure and record the high resolution electricity consumption information of a household almost in a real time basis, and report it to the utility provider (UP) at regular time intervals. SM measurements can be used for time-of-use pricing, trading user-generated energy, and mitigating load variations. However, real-time SM readings can also reveal sensitive information about the consumer’s activities which the user may not want to share with the UP, resulting in serious privacy concerns. SM privacy enabling techniques proposed in the literature can be categorized as SM data manipulation and demand shaping. While the SMdata is modified before being reported to the UP in the former method, the latter requires direct manipulation of the real energy consumption by exploiting physical resources, such as a renewable energy source (RES) or a rechargeable battery (RB). In this chapter, a datamanipulation privacy-enabling technique and three different demand shaping privacy-enabling techniques are presented, considering SM with a RES and an RB, SM with only an RB andSMwith only a RES. Information theoretic measures are used to quantify SM privacy. Optimal energy management strategies and bounds which are obtained using control theory, specifically Markov decision processes (MDPs), and rate distortion theory are analyzed

    Privacy-cost Trade-off in a Smart Meter System with a Renewable Energy Source and a Rechargeable Battery

    No full text
    We study the privacy-cost trade-off in a smart meter (SM) system with a renewable energy source (RES) and a finite-capacity rechargeable battery (RB). Privacy is measured by the mutual information rate between the energy demand and the energy received from the grid, where the latter also determines the cost, and hence, reported by the SM to the utility provider (UP). We consider a renewable energy generation process that fully charges the RB at random time instants, and its realization is assumed to be known also by the UP. We reformulate the problem as a Markov decision process (MDP), and solve it by dynamic programming (DP) to design battery charging and discharging policies that minimize a linear combination of the privacy leakage and energy cost. We also propose a lower bound and two alternative low-complexity energy management policies, one of which is shown numerically to perform close to the MDP solution
    corecore