P. Duhamel - Academia.edu (original) (raw)
Papers by P. Duhamel
2017 IEEE International Conference on Communications Workshops (ICC Workshops), 2017
Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdroppe... more Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdropper (Eve) is investigated. An encoder/quantizer (Alice) observes i.i.d. samples and communicates them via a public noiseless rate-limited channel to the detector (Bob) who has also access to a correlated analog source. Bob can take advantage of both informations to perform a binary decision on the joint probability law of these observations. Eve is further assumed to have access to another correlated analog source. This paper evaluates relevant trade-offs between the error probability of the two types and the amount of tolerated information leakage, for the particular case of testing against independence. An application to illustrate our results to real-data measured from the electric consumption at houses to perform anomaly detection is also provided.
ICASSP '78. IEEE International Conference on Acoustics, Speech, and Signal Processing
The following question provided motivation for this paper : - given some frequency specifications... more The following question provided motivation for this paper : - given some frequency specifications to be met by the implemented filter (taking into account the variations of the coefficients), is it better to implement the usual transfer functions with optimum magnitude in the Chebyshev sense, or to implement functions exhibiting a low sensitivity frequency response to the change of the
2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2020
Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
ABSTRACT One requirement for audio watermarks is that the embedded watermark should be impercepti... more ABSTRACT One requirement for audio watermarks is that the embedded watermark should be imperceptible and does not alter the audio signal quality. To achieve this goal, existing audio watermarking methods use a power constraint or more sophisticated Human Auditory System (HAS) models. At the embedding side the watermark signal is shaped by a masking curve computed on the original signal. At the detector, signal processing like Wiener filtering or inverse filtering whitens the watermark and tries to avoid host signal effect. Then, the correlation detector, which is the Maximum Likelihood (ML) optimal detector, is applied considering Gaussian assumption for the signals. The method described in this paper uses a different approach in the DFT domain. A new ML detector is derived assuming a Weibull distribution for the modulus of the Discrete Fourier Transform of the host signal. Performances of the new proposed detector are given and compared to the correlation detector that assumes a Gaussian distribution of the signal.
2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2012
IEEE Transactions on Communications, 2009
IEEE Transactions on Signal Processing, 2007
Digital watermarking is often modelled as the transmission of a message over a noisy channel deno... more Digital watermarking is often modelled as the transmission of a message over a noisy channel denoted as "watermark channel". Distortions introduced by the watermark channel result mainly from attacks but, depending on the attack, may include interference from the original signal. One of the main-differences with classical transmission situations comes from the fact that only perceptual distortions have to be taken into account. However, measuring the perceptual impact an attack has on a watermarked signal is currently an unsolved problem. Possible means of circumventing this problem would be (i) to define the distortion in a so-called "perceptual domain" and defining an "ad hoc" equivalence between objective and perceptual distortion, or (ii) to define an "equivalent distortion", by removing from the attack noise the part that is correlated to the host signal. We concentrate on the second approach, and first show that the resulting "equiv...
International Conference on Acoustics, Speech, and Signal Processing
REV Journal on Electronics and Communications, 2013
Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multip... more Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system is addressed in this paper. Usually synchronization algorithms rely only on training sequences specified by the standard. To enhance the synchronization between stations, we propose to extract known information by both the transmitter and the receiver at the IEEE 802.11a physical layer to be then exploited by the receiver in addition to the training sequences. Indeed the parts of the identified SIGNAL field are either known or predictable from the RtS (Request to Send) control frame when the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism is triggered jointly to bit-rate adaptation algorithms to the channel. Moreover the received RtS control frame allows the receiver to estimate the channel before time synchronization stage improving then the performance of the proposed synchronization algorithm. Simulation results show tha...
Proceedings of ISCAS'95 - International Symposium on Circuits and Systems, 2000
ABSTRACT
International Conference on Acoustics, Speech, and Signal Processing, 2000
Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is... more Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is presented. The resulting algorithm reduces the number of both multiplications and additions compared to previous algorithms. It is shown that, although being ...
2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333), 2002
... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack ... more ... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack Keil Wolf,Redundancy, the Discrete Fourier Transform, and Im-pulse Noise Cancellation,lEEE ... Ja-Ling WU and Jiun Shiu, Discrete cosine transform in error control coding, IEEE ...
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011
Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137), 2000
2006 Fortieth Asilomar Conference on Signals, Systems and Computers, 2006
2007 IEEE 8th Workshop on Signal Processing Advances in Wireless Communications, 2007
IEEE Transactions on Circuits and Systems, 1985
IEEE International Conference on Image Processing 2005, 2005
2017 IEEE International Conference on Communications Workshops (ICC Workshops), 2017
Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdroppe... more Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdropper (Eve) is investigated. An encoder/quantizer (Alice) observes i.i.d. samples and communicates them via a public noiseless rate-limited channel to the detector (Bob) who has also access to a correlated analog source. Bob can take advantage of both informations to perform a binary decision on the joint probability law of these observations. Eve is further assumed to have access to another correlated analog source. This paper evaluates relevant trade-offs between the error probability of the two types and the amount of tolerated information leakage, for the particular case of testing against independence. An application to illustrate our results to real-data measured from the electric consumption at houses to perform anomaly detection is also provided.
ICASSP '78. IEEE International Conference on Acoustics, Speech, and Signal Processing
The following question provided motivation for this paper : - given some frequency specifications... more The following question provided motivation for this paper : - given some frequency specifications to be met by the implemented filter (taking into account the variations of the coefficients), is it better to implement the usual transfer functions with optimum magnitude in the Chebyshev sense, or to implement functions exhibiting a low sensitivity frequency response to the change of the
2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2020
Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
ABSTRACT One requirement for audio watermarks is that the embedded watermark should be impercepti... more ABSTRACT One requirement for audio watermarks is that the embedded watermark should be imperceptible and does not alter the audio signal quality. To achieve this goal, existing audio watermarking methods use a power constraint or more sophisticated Human Auditory System (HAS) models. At the embedding side the watermark signal is shaped by a masking curve computed on the original signal. At the detector, signal processing like Wiener filtering or inverse filtering whitens the watermark and tries to avoid host signal effect. Then, the correlation detector, which is the Maximum Likelihood (ML) optimal detector, is applied considering Gaussian assumption for the signals. The method described in this paper uses a different approach in the DFT domain. A new ML detector is derived assuming a Weibull distribution for the modulus of the Discrete Fourier Transform of the host signal. Performances of the new proposed detector are given and compared to the correlation detector that assumes a Gaussian distribution of the signal.
2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2012
IEEE Transactions on Communications, 2009
IEEE Transactions on Signal Processing, 2007
Digital watermarking is often modelled as the transmission of a message over a noisy channel deno... more Digital watermarking is often modelled as the transmission of a message over a noisy channel denoted as "watermark channel". Distortions introduced by the watermark channel result mainly from attacks but, depending on the attack, may include interference from the original signal. One of the main-differences with classical transmission situations comes from the fact that only perceptual distortions have to be taken into account. However, measuring the perceptual impact an attack has on a watermarked signal is currently an unsolved problem. Possible means of circumventing this problem would be (i) to define the distortion in a so-called "perceptual domain" and defining an "ad hoc" equivalence between objective and perceptual distortion, or (ii) to define an "equivalent distortion", by removing from the attack noise the part that is correlated to the host signal. We concentrate on the second approach, and first show that the resulting "equiv...
International Conference on Acoustics, Speech, and Signal Processing
REV Journal on Electronics and Communications, 2013
Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multip... more Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system is addressed in this paper. Usually synchronization algorithms rely only on training sequences specified by the standard. To enhance the synchronization between stations, we propose to extract known information by both the transmitter and the receiver at the IEEE 802.11a physical layer to be then exploited by the receiver in addition to the training sequences. Indeed the parts of the identified SIGNAL field are either known or predictable from the RtS (Request to Send) control frame when the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism is triggered jointly to bit-rate adaptation algorithms to the channel. Moreover the received RtS control frame allows the receiver to estimate the channel before time synchronization stage improving then the performance of the proposed synchronization algorithm. Simulation results show tha...
Proceedings of ISCAS'95 - International Symposium on Circuits and Systems, 2000
ABSTRACT
International Conference on Acoustics, Speech, and Signal Processing, 2000
Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is... more Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is presented. The resulting algorithm reduces the number of both multiplications and additions compared to previous algorithms. It is shown that, although being ...
2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333), 2002
... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack ... more ... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack Keil Wolf,Redundancy, the Discrete Fourier Transform, and Im-pulse Noise Cancellation,lEEE ... Ja-Ling WU and Jiun Shiu, Discrete cosine transform in error control coding, IEEE ...
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011
Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137), 2000
2006 Fortieth Asilomar Conference on Signals, Systems and Computers, 2006
2007 IEEE 8th Workshop on Signal Processing Advances in Wireless Communications, 2007
IEEE Transactions on Circuits and Systems, 1985
IEEE International Conference on Image Processing 2005, 2005