Kooperativer Bibliotheksverbund

Berlin Brandenburg

and
and

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • IEEE Xplore  (72)
Type of Medium
Language
Year
  • 1
    Language: English
    Description: Research in the area of automatic speaker verification (ASV) has been advanced enough for the industry to start using ASV systems in practical applications. However, these systems are highly vulnerable to spoofing or presentation attacks, limiting their wide deployment. Therefore, it is important to develop mechanisms that can detect such attacks, and it is equally important for these mechanisms to be seamlessly integrated into existing ASV systems for practical and attack-resistant solutions. To be practical, however, an attack detection should (i) have high accuracy, (ii) be well-generalized for different attacks, and (iii) be simple and efficient. Several audio-based presentation attack detection (PAD) methods have been proposed recently but their evaluation was usually done on a single, often obscure, database with limited number of attacks. Therefore, in this paper, we conduct an extensive study of eight state-of-the-art PAD methods and evaluate their ability to detect known and unknown attacks (e.g., in a cross-database scenario) using two major publicly available speaker databases with spoofing attacks: AVspoof and ASVspoof. We investigate whether combining several PAD systems via score fusion can improve attack detection accuracy. We also study the impact of fusing PAD systems (via parallel and cascading schemes) with two i-vector and inter-session variability based ASV systems on the overall performance in both bona fide (no attacks) and spoof scenarios. The evaluation results question the efficiency and practicality of the existing PAD systems, especially when comparing results for individual databases and cross-database data. Fusing several PAD systems can lead to a slightly improved performance; however, how to select which systems to fuse remains an open question. Joint ASV-PAD systems show a significantly increased resistance to the attacks at the expense of slightly degraded performance for bona fide scenarios.
    Keywords: Presentation Attack Detection ; Score Fusion ; Speaker Database ; Speaker Recognition ; Voice Biometrics
    ISSN: 19324553
    E-ISSN: 19410484
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    In: 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), March 2012, pp.925-931
    Description: The paper describes a method for keyterm extraction from messages of microblogs. The described approach utilizes the information obtained by the analysis of structure and content of Wikipedia. The algorithm is based on computation of "keyphraseness" measure for each term, i.e. an estimation of probability that it can be selected as a key in the text. The experimental study of the proposed technique demonstrated satisfactory results which significantly outpaces analogues. As a demonstration of possible application of the algorithm, the prototype of context-sensitive advertising system has been implemented. This system is able to obtain the descriptions of the goods relevant to the found keyterms from Amazon online store. Several suggestions are also made on how to utilize the information obtained by the analysis of Twitter messages in different auxiliary services.
    Keywords: Twitter ; Internet ; Blogs ; Encyclopedias ; Electronic Publishing ; Databases ; Keyterm Extraction ; Microblogging ; Twitter ; Wikipedia ; Context-Sensitive Advertising
    ISBN: 9781467316576
    ISBN: 1467316571
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Source: IEEE eBooks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    In: IEEE/ACM Transactions on Audio, Speech, and Language Processing, November 2017, Vol.25(11), pp.2098-2111
    Description: Automatic speaker verification systems can be spoofed through recorded, synthetic, or voice converted speech of target speakers. To make these systems practically viable, the detection of such attacks, referred to as presentation attacks, is of paramount interest. In that direction, this paper investigates two aspects: 1) a novel approach to detect presentation attacks where, unlike conventional approaches, no speech signal modeling related assumptions are made, rather the attacks are detected by computing first-order and second-order spectral statistics and feeding them to a classifier, and 2) generalization of the presentation attack detection systems across databases. Our investigations on ASVspoof 2015 challenge database and AVspoof database show that, when compared to the approaches based on conventional short-term spectral features, the proposed approach with a linear discriminative classifier yields a better system, irrespective of whether the spoofed signal is replayed to the microphone or is directly injected into the system software process. Cross-database investigations show that neither the short-term spectral processing-based approaches nor the proposed approach yield systems which are able to generalize across databases or methods of attack. Thus, revealing the difficulty of the problem and the need for further resources and research.
    Keywords: Speech ; Feature Extraction ; Speech Processing ; Databases ; Mel Frequency Cepstral Coefficient ; Computational Modeling ; Anti-Spoofing ; Cross-Database ; Presentation Attack Detection ; Spectral Statistics ; Engineering
    ISSN: 2329-9290
    E-ISSN: 2329-9304
    Source: IEEE Conference Publications
    Source: IEEE Journals & Magazines 
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    In: IEEE Transactions on Information Forensics and Security, June 2013, Vol.8(6), pp.911-923
    Description: Many images uploaded to social networks are related to travel, since people consider traveling to be an important event in their life. However, a significant amount of travel images on the Internet lack proper geographical annotations or tags. In many cases, the images are tagged manually. One way to make this time-consuming manual tagging process more efficient is to propagate tags from a small set of tagged images to the larger set of untagged images automatically. In this paper, we present a system for automatic geotag propagation in images based on the similarity between image content (famous landmarks) and its context (associated geotags). In such a scenario, however, an incorrect or a spam tag can damage the integrity and reliability of the automated propagation system. Therefore, for reliable geotags propagation, we suggest adopting a user trust model based on social feedback from the users of the photo-sharing system. We compare this socially-driven approach with other user trust models via experiments and subjective testing on an image database of various famous landmarks. Results demonstrate that relying on user feedback is more efficient, since the number of propagated tags more than doubles without loss of accuracy compared to using other models or propagating without trust modeling.
    Keywords: Tagging ; Visualization ; Social Network Services ; Global Positioning System ; Context ; Manuals ; Reliability ; Geotags ; Object Duplicate Detection ; Social Networks ; Social Tagging ; Spam Combatting ; Tag Propagation ; Trust Modeling ; Engineering ; Computer Science
    ISSN: 1556-6013
    E-ISSN: 1556-6021
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    In: SMPTE Motion Imaging Journal, May 2015, Vol.124(4), pp.1-6
    Description: The main objective of this paper is to verify test methodologies for the assessment of high dynamic range (HDR) video. To achieve this, a next generation HDR monitor by Dolby Laboratories was used to display professionally produced HDR content. Two complementary approaches for subjective assessment of HDR video were then designed and carried out at the European Broadcast Union and Ecole Polytechnique Fédérale de Lausanne premises. Results obtained from both evaluations were highly correlated, which shows that they offer a good degree of reliability and reproducibility in different situations. Analysis of the scores in both cases also shows good confidence intervals for each point under test. Finally, they could demonstrate that an increase in terms of quality of experience can be expected from the conventional level of 100 nits to HDR/high brightness at 4000 nits, with intermediate improvements at 400 and 1000 nits.
    Keywords: Computer Displays ; Video Signal Processing ; High-Definition Television ; Optical ; Image and Video Signal Processing ; Display Technology ; Visual Arts
    ISSN: 1545-0279
    E-ISSN: 2160-2492
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Source: IEEE Journals & Magazines
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    In: 2017 IEEE East-West Design & Test Symposium (EWDTS), September 2017, pp.1-4
    Description: The area of SRAM on the chip has increased significantly in recent years (up to 90% in projects of 2014-2015). Thus, the development of the new techniques for accurate estimation of memory block characteristics due to technology variation is required. One of the main problems is the accurate estimation of the minimal voltage difference (MVD), that will reduce the pessimism in the evaluation of performance and yield analysis. In this work we have completed the comparative analysis of existing techniques (based on the worst case method) and the developed method of the accurate estimation of MVD. In the proposed method we use the technique of conditional probabilities, which allows improving the accuracy of estimation. The obtained experimental data shows the possibility of reducing MVD up to 17-22% with the SA number from 256 to 4096.
    Keywords: Yield Estimation ; Computational Modeling ; Standards ; Sram Cells ; Monte Carlo Methods ; Engineering
    E-ISSN: 2472-761X
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    In: 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX), September 2014, pp.232-237
    Description: Ultra High Definition (UHD) is one of the emerging immersive video technologies already available to public, as even some of the smartphones are capable of capturing UHD video. The increasingly widespread availability of UHD capable recording devices has important implications on privacy. This paper addresses the problem by proposing a publicly available UHD video dataset designed for evaluation of privacy issues. The dataset depicts typical surveillance scenarios of people fighting, exchanging bags, walking, and stealing, in an indoor and outdoor environment. The dataset also includes the data from the subjective assessment, which evaluated the impact of UHD on privacy compared to a currently common High Definition (HD) video and declining Standard Definition (SD) video. The results of the assessment not only demonstrate that UHD is a significantly more privacy intrusive technology when compared to HD and SD used today, but they also quantify the impact of intrusivness.
    Keywords: Data Privacy ; High Definition Video ; Privacy ; Video Sequences ; Visualization ; Surveillance ; Streaming Media ; Dataset ; Uhd Video ; Video Surveillance ; Privacy Evaluations ; Subjective Study
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Language: English
    In: 2018 International Conference on Actual Problems of Electron Devices Engineering (APEDE), September 2018, pp.175-179
    Description: The paper is focused on the technique of reducing CMOS leakage power consumption with using of sleep transistors. The discussed technique uses three-modal sleep unit with additional «drowsy» mode. Such "drowsy" mode reduces the transition time between active and sleep modes, providing an acceptable reduction of leakage power. The efficiency of the considered technique was evaluated for ISCAS'85 benchmark circuits designed on transistors with a channel length equal to 30 nm. Simulation results of test circuits with footer three-modal sleep transistors show, that technique allows to reduce transition time between modes by ~40% and reduces leakage by ~70-75%.
    Keywords: Switching Circuits ; Transistors ; Microelectronics ; Energy Efficiency ; Integrated Circuits ; Cmos Technology ; Power Demand
    ISBN: 9781538643327
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Conference Proceeding
    Conference Proceeding
    Language: English
    In: 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, August 2013, pp.208-213
    Description: The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important properties such as security of protected visual data, reversibility (ability to undo privacy protection), simplicity, and independence from the video encoding used. To overcome these shortcomings, in this paper, we propose a morphing-based privacy protection method and focus on its robustness, reversibility, and security properties. We morph faces from a standard FERET dataset and run face detection and recognition algorithms on the resulted images to demonstrate that morphed faces retain the likeness of a face, while making them unrecognizable, which ensures the protection of privacy. Our experiments also demonstrate the influence of morphing strength on robustness and security. We also show how to determine the right parameters of the method.
    Keywords: Face ; Interpolation ; Accuracy ; Face Recognition ; Privacy ; Security ; Robustness
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Language: English
    In: 2014 IEEE International Conference on Image Processing (ICIP), October 2014, pp.3423-3425
    Description: JPEG scrambling tool is a flexible web-based tool with an intuitive and simple to use GUI and interface to secure visual information in a region of interest (ROI) of JPEG images. The tool demonstrates an efficient integration and use of security tools in JPEG image format by an example of scrambling privacy filter, which enables a variety of security services such as confidentiality, integrity verification, source authentication, and conditional access.
    Keywords: Transform Coding ; Image Coding ; Graphical User Interfaces ; Decoding ; Privacy ; Discrete Cosine Transforms ; Security ; Secure Jpeg ; Demonstration ; Scrambling ; Web Interface ; Applied Sciences
    ISSN: 1522-4880
    E-ISSN: 2381-8549
    Source: IEEE Conference Publications
    Source: IEEE Xplore
    Source: IEEE Journals & Magazines 
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages