By Topic

IEEE Transactions on Signal Processing

Issue 10  Part 2 • Date Oct. 2004

 This issue contains several parts.Go to:  Part 1 

Filter Results

Displaying Results 1 - 19 of 19
  • Table of contents

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • IEEE Transactions on Signal Processing publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • A Message from the Editor-in-Chief: First Supplement on Secure Media

    Publication Year: 2004, Page(s): 2953
    Request permission for commercial reuse | PDF file iconPDF (20 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editorial: Supplement on Secure Media—I

    Publication Year: 2004, Page(s): 2954
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security pitfalls of frame-by-frame approaches to video watermarking

    Publication Year: 2004, Page(s):2955 - 2964
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Watermarking digital video material is usually considered as watermarking a sequence of still images. However, such a frame-by-frame approach is very risky since straightforward embedding strategies can result in poor performance in terms of security i.e., against hostile attacks. As examples, two very common video-watermarking systems will be presented as well as the associated intra-video collus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of ST-DM watermarking in presence of nonadditive attacks

    Publication Year: 2004, Page(s):2965 - 2974
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    The performance of spread-transform dither modulation (ST-DM) watermarking in the presence of two important classes of non additive attacks, such as the gain attack plus noise addition, and the quantization attack are evaluated. The analysis is developed under the assumption that the host features are independent and identically distributed Gaussian random variables, and that a minimum distance cr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A block cipher cryptosystem using wavelet transforms over finite fields

    Publication Year: 2004, Page(s):2975 - 2991
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    We present a new private key cryptosystem based on the finite-field wavelet. The encryption and decryption are performed by the synthesis and analysis banks of the nonlinear finite-field wavelet transform, whose filter coefficients are determined by the keys of the users. We exploit the polyphase representation of the wavelets to introduce a shared key mechanism for the wavelet cryptosystem. We pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On compressing encrypted data

    Publication Year: 2004, Page(s):2992 - 3006
    Cited by:  Papers (96)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the data and then encrypt it. In this paper, we investigate the novelty of reversing the order of these steps, i.e., first encrypting and then compressing, without compromising either the compression efficiency or the information-theoretic security. Although counter-i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal synchronization in video watermarking

    Publication Year: 2004, Page(s):3007 - 3022
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    One of the challenges for blind watermark detection is synchronization. Synchronization is the process of identifying the coordinates of an embedded watermark and is crucial in successful watermark detection. If the detector's input is watermarked but synchronization fails, then the embedded watermark will not be detected. In this paper, temporal synchronization for blind video watermark detection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modulation-scale analysis for content identification

    Publication Year: 2004, Page(s):3023 - 3035
    Cited by:  Papers (33)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB) | HTML iconHTML

    For nonstationary signal classification, e.g., speech or music, features are traditionally extracted from a time-shifted, yet short data window. For many applications, these short-term features do not efficiently capture or represent longer term signal variation. Partially motivated by human audition, we overcome the deficiencies of short-term features by employing modulation-scale analysis for lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance prediction methodology for biometric systems using a large deviations approach

    Publication Year: 2004, Page(s):3036 - 3045
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    In the selection of biometrics for use in a recognition system and in the subsequent design of the system, the predicted performance is a key consideration. The realizations of the biometric signatures or vectors of features extracted from the signatures can be modeled as realizations of random processes. These random processes and the resulting distributions on the measurements determine bounds o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of hiding in the least significant bit

    Publication Year: 2004, Page(s):3046 - 3058
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    In this paper, we apply the theory of hypothesis testing to the steganalysis, or detection of hidden data, in the least significant bit (LSB) of a host image. The hiding rate (if data is hidden) and host probability mass function (PMF) are unknown. Our main results are as follows. a) Two types of tests are derived: a universal (over choices of host PMF) method that has certain asymptotic optimalit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting global and local decisions for multimodal biometrics verification

    Publication Year: 2004, Page(s):3059 - 3072
    Cited by:  Papers (50)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1216 KB) | HTML iconHTML

    In this paper, we address the multimodal biometric decision fusion problem. By exploring into the user-specific approach for learning and threshold setting, four possible paradigms for learning and decision making are investigated. Since each user requires a decision hyperplane specific to him in order to achieve good verification accuracy, those tedious iterative training methods like the neural ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of traitors in algebraic-geometric traceability codes

    Publication Year: 2004, Page(s):3073 - 3077
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In a fingerprinting scheme, a distributor places marks in each copy of a digital object. Placing different marks in different copies uniquely identifies the recipient of each copy and therefore allows the tracing of the source of an unauthorized redistribution. A widely used approach to the fingerprinting problem is the use of error-correcting codes with a suitable minimum distance. With this appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE International Workshop on Genomic Signal Processing and Statistics

    Publication Year: 2004, Page(s): 3078
    Request permission for commercial reuse | PDF file iconPDF (643 KB)
    Freely Available from IEEE
  • IEEE 2005 International Conference on Image Processing

    Publication Year: 2004, Page(s): 3079
    Request permission for commercial reuse | PDF file iconPDF (484 KB)
    Freely Available from IEEE
  • 2005 IEEE Signal Processing Society membership application

    Publication Year: 2004, Page(s): 3080
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Blank page [back cover]

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (3 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Signal Processing covers novel theory, algorithms, performance analyses and applications of techniques for the processing, understanding, learning, retrieval, mining, and extraction of information from signals

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sergios Theodoridis
University of Athens