the identification of source cameras from videos, though it is a highly relevant forensic analysis topic, has been studied much less than its counterpart that uses images. In this work we propose a method to identify ...
详细信息
ISBN:
(纸本)9789897584862
the identification of source cameras from videos, though it is a highly relevant forensic analysis topic, has been studied much less than its counterpart that uses images. In this work we propose a method to identify the source camera of a video based on camera specific noise patterns that we extract from video frames. For the extraction of noise pattern features, we propose an extended version of a constrained convolutional layer capable of processing color inputs. Our system is designed to classify individual video frames which are in turn combined by a majority vote to identify the source camera. We evaluated this approach on the benchmark VISION data set consisting of 1539 videos from 28 different cameras. To the best of our knowledge, this is the first work that addresses the challenge of video camera identification on a device level. the experiments show that our approach is very promising, achieving up to 93:1% accuracy while being robust to the WhatsApp and YouTube compression techniques. this work is part of the EU-funded project 4NSEEK focused on forensics against child sexual abuse.
In this paper, we present a novel approach to Machine Translation (MT) using syntactic patternrecognition (PR) methods. Our aim is to evaluate the possibility of using syntactic PR techniques in this mature field, an...
详细信息
ISBN:
(纸本)9783319591629
In this paper, we present a novel approach to Machine Translation (MT) using syntactic patternrecognition (PR) methods. Our aim is to evaluate the possibility of using syntactic PR techniques in this mature field, and to identify any potential benefits that can be gleaned by such an approach. To make use of syntactic PR techniques, we propose a system that performs string-matching to pair English sentence structures to Japanese (the specific languages, namely English and Japanese, were chosen because their sentence structures are completely dissimilar. this, however, proves the point that such syntactic methods will be applicable for other pairs of languages too.) structures -as opposed to matching strings in and of themselves, and to thus facilitate translation between the languages. In order to process the sentence structures of either language as a string, we have created a representation that replaces the tokens of a sentence withtheir respective Part-of-Speech tags. Further, to perform the actual string-matching operation, we make use of the OptPR algorithm, a syntactic award-winning PR scheme that has been proven to achieve optimal accuracy, and that also attains the information theoretic bound. through our experiments, we show that our implementation obtains superior results to that of a standard statistical MT system on our data set. Our results provide the additional guarantee of generating a known sentence structure in the target language. With further research, this system could be expanded to have a more complete coverage of the languages worked with. the incorporation of such PR techniques in MT, in general, and the OptPR algorithm, in particular, are both pioneering.
Performance evaluation of document recognition systems is a difficult and practically important problem. Issues arise in defining requirements, in characterizing the system's range of inputs and outputs, in interp...
Location Fingerprinting methods are an alternative to accurate localization of mobile sensors and actuators in indoor environments, which learn a radio map for a given scenario and use this information for recognizing...
详细信息
Supplier selection and evaluation are one of the most critical activities of a company in today's competitive business world. Partnering withthe suppliers has become a key factor to the success of an organization...
详细信息
ISBN:
(纸本)9780769536422
Supplier selection and evaluation are one of the most critical activities of a company in today's competitive business world. Partnering withthe suppliers has become a key factor to the success of an organization. the selection of supplier satisfying different evaluation criteria, is therefore of main importance and builds the topic of this paper this selection process is a difficult decision and optimization problem, such as data mining technology. this paper utilizes an integrated approach to find the interesting pattern Of supplier. this research has employed a numerical example for the explanation of the proposed approach, and the results show that the method is effective and applicable for supplier selection. In short, the approach provides a new route to guide the further research concerning supplier research.
Enterprise systems are frequently built by combining a number of discrete Web set-vices together, a process termed composition. there are a number of architectural configurations or distribution patterns, which expres...
详细信息
ISBN:
(纸本)076952558X
Enterprise systems are frequently built by combining a number of discrete Web set-vices together, a process termed composition. there are a number of architectural configurations or distribution patterns, which express how a composed system is to be deployed. Previously, we presented a Model Driven Architecture using UML 2.0, which took existing service interfaces as its input and generated an executable Web service composition, guided by a distribution pattern model. In this paper, we propose using Web service semantic descriptions in addition to Web service interfaces, to assist in the semi-automatic generation of the distribution pattern model. Web services described using semantic languages, such as OWL-S, can be automatically assessed for compatibility and their input and output messages can be mapped to each other.
In this paper, we present an analysis of two image characteristics which give rise to local and global redundancy in image representation. Based on this study, we propose a lossless image compression scheme which expl...
详细信息
According to its significance, facial expression recognition (FER) has reached an incredibly prominent position in the field of image processing, beginning in the 1990s and continuing to the present day. Face recognit...
详细信息
Quantum computing introduces an efficient way for unfolding complex problems on computing systems. It uses concept of superposition and entanglement, & hence supports intrinsic parallelism for obtaining the speedu...
详细信息
ISBN:
(纸本)9781538659069
Quantum computing introduces an efficient way for unfolding complex problems on computing systems. It uses concept of superposition and entanglement, & hence supports intrinsic parallelism for obtaining the speedup in context of time over classical computing. Quantum algorithms can be efficiently implemented over quantum computing system. Most popular quantum algorithms like Grover's and Shor's provide a great foundation to specifically design the algorithms. these algorithms work on improving the lower runtime bounds of classical algorithms. Grover's algorithm exhibits a quadratic polynomial speedup while searching an element among 'N' elements unstructured database. the algorithmic strategy can be applied over various computer science related applications and some important are being considered in this article i.e. pattern matching, data mining and machine learning. this article explores quantum fundamentals;history based evolution followed by Grover's search algorithm in detail with cascading advantages, limitations & applications and also finally concludes withthe significance of quantum computing & quantum algorithmic domains.
暂无评论