Exponential strong converse for content identification with lossy recovery

L Zhou, VYF Tan, L Yu, M Motani - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We revisit the high-dimensional content identification with lossy recovery problem (Tuncel
and Gündüz, 2014) and establish an exponential strong converse theorem. As a corollary of …

Strong Converse Exponent for Remote Lossy Source Coding

H Wu, H Joudeh - arxiv preprint arxiv:2501.14620, 2025 - arxiv.org
Past works on remote lossy source coding studied the rate under average distortion and the
error exponent of excess distortion probability. In this work, we look into how fast the excess …

Side information in robust principal component analysis: Algorithms and applications

N Xue, Y Panagakis, S Zafeiriou - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
Abstract Robust Principal Component Analysis (RPCA) aims at recovering a low-rank
subspace from grossly corrupted high-dimensional (often visual) data and is a cornerstone …

FPGA implementation of fast & secure fingerprint authentication using trsg (true random and timestamp generator)

D Harikrishnan, NS Kumar, RS Joseph, K Nair… - Microprocessors and …, 2021 - Elsevier
In the digital authentication system, the emerging technology is fingerprint authentication,
which have been concentrated more attraction towards security and control. Existing …

Compressing encrypted data: Achieving optimality and strong secrecy via permutations

W Kang, N Liu - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
In a system that performs both encryption and lossy compression, the conventional way is to
compress first and then encrypt the compressed data. This separation approach has been …

Speech Based Deception Detection Using Bispectral Analysis

MS Islam, N Mamun, MS Ullah - … of the 2nd International Conference on …, 2018 - dl.acm.org
Speech is considered as one of the most efficient and effective way to communicate with
each other. However, a deception is a very common phenomenon in speech …

Multimodal Biometric Fusion Using Image Encryption Algorithm

D Jagadiswary, D Saraswady - Proceedings of the International …, 2016 - dl.acm.org
India being digitized through digital India, the most basic unique identity for each individual
is biometrics. Since India is the second most populous nation, the database that has to be …

[PDF][PDF] An Investigation towards Effectiveness of Present State of Biometric-Based Authentication System

DM Gavisiddappa, CM Patil - academia.edu
The adoption of biometric-based authentication mechanism has been already initiated a
decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all …

[CITAS][C] Literature review for Deception detection

G An - The City University of New York, Report, 2015