Exponential strong converse for content identification with lossy recovery
We revisit the high-dimensional content identification with lossy recovery problem (Tuncel
and Gündüz, 2014) and establish an exponential strong converse theorem. As a corollary of …
and Gündüz, 2014) and establish an exponential strong converse theorem. As a corollary of …
Strong Converse Exponent for Remote Lossy Source Coding
H Wu, H Joudeh - arxiv preprint arxiv:2501.14620, 2025 - arxiv.org
Past works on remote lossy source coding studied the rate under average distortion and the
error exponent of excess distortion probability. In this work, we look into how fast the excess …
error exponent of excess distortion probability. In this work, we look into how fast the excess …
Side information in robust principal component analysis: Algorithms and applications
Abstract Robust Principal Component Analysis (RPCA) aims at recovering a low-rank
subspace from grossly corrupted high-dimensional (often visual) data and is a cornerstone …
subspace from grossly corrupted high-dimensional (often visual) data and is a cornerstone …
FPGA implementation of fast & secure fingerprint authentication using trsg (true random and timestamp generator)
In the digital authentication system, the emerging technology is fingerprint authentication,
which have been concentrated more attraction towards security and control. Existing …
which have been concentrated more attraction towards security and control. Existing …
Compressing encrypted data: Achieving optimality and strong secrecy via permutations
In a system that performs both encryption and lossy compression, the conventional way is to
compress first and then encrypt the compressed data. This separation approach has been …
compress first and then encrypt the compressed data. This separation approach has been …
Speech Based Deception Detection Using Bispectral Analysis
Speech is considered as one of the most efficient and effective way to communicate with
each other. However, a deception is a very common phenomenon in speech …
each other. However, a deception is a very common phenomenon in speech …
Multimodal Biometric Fusion Using Image Encryption Algorithm
India being digitized through digital India, the most basic unique identity for each individual
is biometrics. Since India is the second most populous nation, the database that has to be …
is biometrics. Since India is the second most populous nation, the database that has to be …
[PDF][PDF] An Investigation towards Effectiveness of Present State of Biometric-Based Authentication System
DM Gavisiddappa, CM Patil - academia.edu
The adoption of biometric-based authentication mechanism has been already initiated a
decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all …
decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all …
[CITAS][C] Literature review for Deception detection
G An - The City University of New York, Report, 2015