Searched for: faculty%3A%22Electrical%255C%252BEngineering%252C%255C%252BMathematics%255C%252Band%255C%252BComputer%255C%252BScience%22
(1 - 17 of 17)
document
Erkin, Z. (author), Veugen, T. (author), Toft, T. (author), Lagendijk, R.L. (author)
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is...
journal article 2013
document
Doets, P.J.O. (author), Lagendijk, R.L. (author)
An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identification, even when the audio is severely distorted. Audio compression changes the fingerprint slightly. We show that these small fingerprint differences due to compression can be...
journal article 2008
document
Prins, J.P. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so that the merchant can retrieve the buyer's identity when he encounters a redistributed copy. To prevent the merchant from dishonestly...
journal article 2007
document
Erkin, Z. (author), Piva, A. (author), Katzenbeisser, S. (author), Lagendijk, R.L. (author), Shokrollahi, J. (author), Neven, G. (author), Barni, M. (author)
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and...
journal article 2007
document
Doets, P.J.O. (author), Menot Gisbert, M. (author), Lagendijk, R.L. (author)
Audio fingerprints can be seen as hashes of the perceptual content of an audio excerpt. Applications include linking metadata to unlabeled audio, watermark support, and broadcast monitoring. Existing systems identify a song by comparing its fingerprint to pre-computed fingerprints in a database. Small changes of the audio induce small...
conference paper 2006
document
Pérez-Gonzalez, F. (author), Mosquera, C. (author), Alzarez, M. (author), Lagendijk, R. (author)
conference paper 2006
document
Wang, J. (author), Shterev, I.D. (author), Lagendijk, R.L. (author)
This paper presents a scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context. Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks1. Unfortunately, Quantization-based watermarking schemes are not...
conference paper 2006
document
Haratcherev, L. (author), Taal, J. (author), Langendoen, K. (author), Lagendijk, R. (author), Sips, H. (author)
journal article 2006
document
Meyer, P.F.A. (author), Westerlaken, R.P. (author), Klein Gunnewiek, R. (author), Lagendijk, R.L. (author)
In distributed video coding, the complexity of the video encoder is reduced at the cost of a more complex video decoder. Using the principles of Slepian andWolf, video compression is then carried out using channel coding principles, under the assumption that the video decoder can temporally predict side-information that is correlated with the...
conference paper 2005
document
Taal, R.J. (author), Lagendijk, R.L. (author)
Peer-to-peer networks (P2P) form a distributed communication infrastructure that is particularly well matched to video streaming using multiple description coding. We form M descriptions using MDC-FEC building on a scalable version of the “Dirac” video coder. The M descriptions are streamed via M different application layer multicast (ALM) trees...
conference paper 2005
document
Wang, J. (author), Reinders, M.J.T. (author), Pouwelse, J. (author), Lagendijk, R.L. (author)
The Wi-Fi walkman is a mobile multimedia application that we developed to investigate the technological and usability aspects of human-computer interaction with personalized, intelligent and context-aware wearable devices in peer-to-peer wireless environments such as the future home, office, or university campuses. It is a small handheld device...
conference paper 2005
document
Shterev, I.D. (author), Lagendijk, R.L. (author)
Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks.1 The existence of good high dimensional lattices that can be efficiently implemented2–4 and incorporated into watermarking structures, made quantization-based watermarking schemes of practical...
conference paper 2005
document
Shterev, I.D. (author), Lagendijk, I.L. (author), Heusdens, R. (author)
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior to watermark decoding. In this paper we derive the marginal probability density model for the watermarked and attacked data, when the attack channel consists of...
conference paper 2004
document
Setyawan, I. (author), Lagendijk, L. (author)
We present in this paper the results of our study on the human perception of geometric distortions in images. The ultimate goal of this study is to devise an objective measurement scheme for geometric distortions in images, which should have a good correspondence to human perception of the distortions. The study is divided into two parts. The...
conference paper 2004
document
Taal, J.R. (author), Chen, Z. (author), He, Y. (author), Lagendijk, R.I.L. (author)
Wireless and Internet video applications are inherently subjected to bit errors and packet errors, respectively. This is especially so if constraints on the end-to-end compression and transmission latencies are imposed. Therefore, it is necessary to develop methods to optimize the video compression parameters and the rate allocation of these...
journal article 2004
document
Lagendijk, R.L. (author), Biemond, J. (author)
Uitgegeven in opdracht van Delftse Uitgevers Maatschappij VSSD
book 1994
document
Lagendijk, R.L. (author)
doctoral thesis 1990
Searched for: faculty%3A%22Electrical%255C%252BEngineering%252C%255C%252BMathematics%255C%252Band%255C%252BComputer%255C%252BScience%22
(1 - 17 of 17)