Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle Sep 2009

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle

Conference papers

This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …


A Mobile Ecg Monitoring System With Context Collection, Jin Peng Li, Damon Berry, Richard Hayes Jan 2009

A Mobile Ecg Monitoring System With Context Collection, Jin Peng Li, Damon Berry, Richard Hayes

Conference Papers

Preventative health management represents a shift from the traditional approach of reactive treatment-based healthcare towards a proactive wellness-management approach where patients are encouraged to stay healthy with expert support when they need it, at any location and any time. This work represents a step along the road towards proactive, preventative healthcare for cardiac patients. It seeks to develop a smart mobile ECG monitoring system that requests and records context information about what is happening around the subject when an arrhythmia event occurs. Context information about the subject’s activities of daily living will, it is hoped, provide an enriched data set …


Archetype Alignment: A Two-Level Driven Semantic Matching Approach To Interoperability In The Clinical Domain, Damon Berry, Jesus Bisbal Jan 2009

Archetype Alignment: A Two-Level Driven Semantic Matching Approach To Interoperability In The Clinical Domain, Damon Berry, Jesus Bisbal

Conference Papers

Semantic interoperability between electronic health record systems and other information systems in the health domain implies agreement about the structure and the meaning of the information that is communicated. There are still a number of similar but different EHR system approaches. Some of the newer approaches adopt the two-layer model approach where a generic reference model is constrained by archetypes into valid clinical concepts which can be exchanged. The meaning of the concepts that are represented by an archetype can be conveyed by embedding codes from a commonly recognised terminology at appropriate points in the archetype. However, as the number …


A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2009

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.

In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …