Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle Jan 2010

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi Jan 2010

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …


Navigating The Corridors Of Power : Using Rfid And Compass Sensors For Robot Localisation And Navigation, Yan Lee, Brian Mac Namee, John D. Kelleher Jan 2010

Navigating The Corridors Of Power : Using Rfid And Compass Sensors For Robot Localisation And Navigation, Yan Lee, Brian Mac Namee, John D. Kelleher

Conference papers

Localisation and navigation are still of the most important issues in mobile robotics. In certain indoor application scenarios Radio frequency identification (RFID) based absolute localisation has been found to be especially successful in supporting navigation. In this paper we examine the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We present a proof of concept system and show how it can be used to localized within and navigate through an environment.


Evaluating Sensorineural Hearing Loss With An Auditory Nerve Model Using A Mean Structural Similarity Measure, Andrew Hines, Naomi Harte Jan 2010

Evaluating Sensorineural Hearing Loss With An Auditory Nerve Model Using A Mean Structural Similarity Measure, Andrew Hines, Naomi Harte

Conference papers

Hearing loss research has traditionally been based on perceptual criteria, speech intelligibility and threshold levels. The development of computational models of the auditory-periphery has allowed experimentation via simulation to provide quantitative, repeatable results at a more granular level than would be practical with clinical research on human subjects. This work seeks to create an objective measure to automate this inspection process and ranks hearing losses based on auditory-nerve discharge patterns. A systematic way of assessing phonemic degradation using the outputs of an auditory nerve model for a range of sensorineural hearing losses would aid in rapid prototyping development of speech-processing …


Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher Jan 2010

Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher

Conference papers

Localisation and navigation are still two of the most important issues in mobile robotics. In certain indoor application scenarios RFID (radio frequency identification)-based absolute localisation has been found to be especially successful in supporting navigation. In this paper we evaluate the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We describe our system and evaluate its performance in a small, but full-scale, test environment.