P. Duhamel - Academia.edu (original) (raw)

Papers by P. Duhamel

Research paper thumbnail of Privacy-preserving quantization learning for distributed binary decision with applications to smart meters

2017 IEEE International Conference on Communications Workshops (ICC Workshops), 2017

Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdroppe... more Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdropper (Eve) is investigated. An encoder/quantizer (Alice) observes i.i.d. samples and communicates them via a public noiseless rate-limited channel to the detector (Bob) who has also access to a correlated analog source. Bob can take advantage of both informations to perform a binary decision on the joint probability law of these observations. Eve is further assumed to have access to another correlated analog source. This paper evaluates relevant trade-offs between the error probability of the two types and the amount of tolerated information leakage, for the particular case of testing against independence. An application to illustrate our results to real-data measured from the electric consumption at houses to perform anomaly detection is also provided.

Research paper thumbnail of Synthesis of digital filters with very low sensitivity of the frequency response to the change of the cofficients

ICASSP '78. IEEE International Conference on Acoustics, Speech, and Signal Processing

The following question provided motivation for this paper : - given some frequency specifications... more The following question provided motivation for this paper : - given some frequency specifications to be met by the implemented filter (taking into account the variations of the coefficients), is it better to implement the usual transfer functions with optimum magnitude in the Chebyshev sense, or to implement functions exhibiting a low sensitivity frequency response to the change of the

Research paper thumbnail of Variational Hierarchical Posterior Matching for mmWave Wireless Channels Online Learning

2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2020

Research paper thumbnail of Optimal detector for an additive watermarking scheme based on human auditory system

Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

ABSTRACT One requirement for audio watermarks is that the embedded watermark should be impercepti... more ABSTRACT One requirement for audio watermarks is that the embedded watermark should be imperceptible and does not alter the audio signal quality. To achieve this goal, existing audio watermarking methods use a power constraint or more sophisticated Human Auditory System (HAS) models. At the embedding side the watermark signal is shaped by a masking curve computed on the original signal. At the detector, signal processing like Wiener filtering or inverse filtering whitens the watermark and tries to avoid host signal effect. Then, the correlation detector, which is the Maximum Likelihood (ML) optimal detector, is applied considering Gaussian assumption for the signals. The method described in this paper uses a different approach in the DFT domain. A new ML detector is derived assuming a Weibull distribution for the modulus of the Discrete Fourier Transform of the host signal. Performances of the new proposed detector are given and compared to the correlation detector that assumes a Gaussian distribution of the signal.

Research paper thumbnail of Challenging issues in multimedia transmission over wireless networks based on network coding

2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2012

Research paper thumbnail of On the Outage Capacity of a Practical Decoder Accounting for Channel Estimation Inaccuracies

IEEE Transactions on Communications, 2009

Research paper thumbnail of Tatouage semi–fragile et théorie des jeux: Etude d’un systeme basé sur le scs

Research paper thumbnail of Broadcast- and MAC-Aware Coding Strategies for Multiple User Information Embedding

IEEE Transactions on Signal Processing, 2007

Research paper thumbnail of A scaled signal plus noise model for digital watermarking, application to time jitter

Digital watermarking is often modelled as the transmission of a message over a noisy channel deno... more Digital watermarking is often modelled as the transmission of a message over a noisy channel denoted as "watermark channel". Distortions introduced by the watermark channel result mainly from attacks but, depending on the attack, may include interference from the original signal. One of the main-differences with classical transmission situations comes from the fact that only perceptual distortions have to be taken into account. However, measuring the perceptual impact an attack has on a watermarked signal is currently an unsolved problem. Possible means of circumventing this problem would be (i) to define the distortion in a so-called "perceptual domain" and defining an "ad hoc" equivalence between objective and perceptual distortion, or (ii) to define an "equivalent distortion", by removing from the attack noise the part that is correlated to the host signal. We concentrate on the second approach, and first show that the resulting "equiv...

Research paper thumbnail of Trade-off's in the computation of mono- and multi-dimensional DCT's

International Conference on Acoustics, Speech, and Signal Processing

Research paper thumbnail of Improved Time and Frequency Synchronization Algorithm for 802.11a Wireless Standard based on the SIGNAL Field

REV Journal on Electronics and Communications, 2013

Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multip... more Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system is addressed in this paper. Usually synchronization algorithms rely only on training sequences specified by the standard. To enhance the synchronization between stations, we propose to extract known information by both the transmitter and the receiver at the IEEE 802.11a physical layer to be then exploited by the receiver in addition to the training sequences. Indeed the parts of the identified SIGNAL field are either known or predictable from the RtS (Request to Send) control frame when the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism is triggered jointly to bit-rate adaptation algorithms to the channel. Moreover the received RtS control frame allows the receiver to estimate the channel before time synchronization stage improving then the performance of the proposed synchronization algorithm. Simulation results show tha...

Research paper thumbnail of DSP implementation of fast FIR filtering algorithms using short FFT's

Proceedings of ISCAS'95 - International Symposium on Circuits and Systems, 2000

ABSTRACT

Research paper thumbnail of Polynomial transform computation of the 2-D DCT

International Conference on Acoustics, Speech, and Signal Processing, 2000

Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is... more Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is presented. The resulting algorithm reduces the number of both multiplications and additions compared to previous algorithms. It is shown that, although being ...

Research paper thumbnail of A posteriori control of complex Reed Solomon decoding with application to impulse noise cancellation in HIPERLAN/2

2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333), 2002

... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack ... more ... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack Keil Wolf,“Redundancy, the Discrete Fourier Transform, and Im-pulse Noise Cancellation,“lEEE ... Ja-Ling WU and Jiun Shiu, “Discrete cosine transform in error control coding,” IEEE ...

Research paper thumbnail of From maximum likelihood to iterative decoding

2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011

Research paper thumbnail of Real BCH codes as joint source channel codes for satellite images coding

Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137), 2000

Research paper thumbnail of Achievable Outage Rates with Improved Decoding of BICM Multiband OFDM under Channel Estimation Errors

2006 Fortieth Asilomar Conference on Signals, Systems and Computers, 2006

Research paper thumbnail of MIMO-OFDM optimal decoding and achievable information rates under imperfect channel estimation

2007 IEEE 8th Workshop on Signal Processing Advances in Wireless Communications, 2007

Research paper thumbnail of The multibridge charge routing filter

IEEE Transactions on Circuits and Systems, 1985

Research paper thumbnail of Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS

IEEE International Conference on Image Processing 2005, 2005

Research paper thumbnail of Privacy-preserving quantization learning for distributed binary decision with applications to smart meters

2017 IEEE International Conference on Communications Workshops (ICC Workshops), 2017

Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdroppe... more Vector Quantization (VQ) design for distributed binary decision in the presence of an eavesdropper (Eve) is investigated. An encoder/quantizer (Alice) observes i.i.d. samples and communicates them via a public noiseless rate-limited channel to the detector (Bob) who has also access to a correlated analog source. Bob can take advantage of both informations to perform a binary decision on the joint probability law of these observations. Eve is further assumed to have access to another correlated analog source. This paper evaluates relevant trade-offs between the error probability of the two types and the amount of tolerated information leakage, for the particular case of testing against independence. An application to illustrate our results to real-data measured from the electric consumption at houses to perform anomaly detection is also provided.

Research paper thumbnail of Synthesis of digital filters with very low sensitivity of the frequency response to the change of the cofficients

ICASSP '78. IEEE International Conference on Acoustics, Speech, and Signal Processing

The following question provided motivation for this paper : - given some frequency specifications... more The following question provided motivation for this paper : - given some frequency specifications to be met by the implemented filter (taking into account the variations of the coefficients), is it better to implement the usual transfer functions with optimum magnitude in the Chebyshev sense, or to implement functions exhibiting a low sensitivity frequency response to the change of the

Research paper thumbnail of Variational Hierarchical Posterior Matching for mmWave Wireless Channels Online Learning

2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2020

Research paper thumbnail of Optimal detector for an additive watermarking scheme based on human auditory system

Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

ABSTRACT One requirement for audio watermarks is that the embedded watermark should be impercepti... more ABSTRACT One requirement for audio watermarks is that the embedded watermark should be imperceptible and does not alter the audio signal quality. To achieve this goal, existing audio watermarking methods use a power constraint or more sophisticated Human Auditory System (HAS) models. At the embedding side the watermark signal is shaped by a masking curve computed on the original signal. At the detector, signal processing like Wiener filtering or inverse filtering whitens the watermark and tries to avoid host signal effect. Then, the correlation detector, which is the Maximum Likelihood (ML) optimal detector, is applied considering Gaussian assumption for the signals. The method described in this paper uses a different approach in the DFT domain. A new ML detector is derived assuming a Weibull distribution for the modulus of the Discrete Fourier Transform of the host signal. Performances of the new proposed detector are given and compared to the correlation detector that assumes a Gaussian distribution of the signal.

Research paper thumbnail of Challenging issues in multimedia transmission over wireless networks based on network coding

2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2012

Research paper thumbnail of On the Outage Capacity of a Practical Decoder Accounting for Channel Estimation Inaccuracies

IEEE Transactions on Communications, 2009

Research paper thumbnail of Tatouage semi–fragile et théorie des jeux: Etude d’un systeme basé sur le scs

Research paper thumbnail of Broadcast- and MAC-Aware Coding Strategies for Multiple User Information Embedding

IEEE Transactions on Signal Processing, 2007

Research paper thumbnail of A scaled signal plus noise model for digital watermarking, application to time jitter

Digital watermarking is often modelled as the transmission of a message over a noisy channel deno... more Digital watermarking is often modelled as the transmission of a message over a noisy channel denoted as "watermark channel". Distortions introduced by the watermark channel result mainly from attacks but, depending on the attack, may include interference from the original signal. One of the main-differences with classical transmission situations comes from the fact that only perceptual distortions have to be taken into account. However, measuring the perceptual impact an attack has on a watermarked signal is currently an unsolved problem. Possible means of circumventing this problem would be (i) to define the distortion in a so-called "perceptual domain" and defining an "ad hoc" equivalence between objective and perceptual distortion, or (ii) to define an "equivalent distortion", by removing from the attack noise the part that is correlated to the host signal. We concentrate on the second approach, and first show that the resulting "equiv...

Research paper thumbnail of Trade-off's in the computation of mono- and multi-dimensional DCT's

International Conference on Acoustics, Speech, and Signal Processing

Research paper thumbnail of Improved Time and Frequency Synchronization Algorithm for 802.11a Wireless Standard based on the SIGNAL Field

REV Journal on Electronics and Communications, 2013

Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multip... more Time and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system is addressed in this paper. Usually synchronization algorithms rely only on training sequences specified by the standard. To enhance the synchronization between stations, we propose to extract known information by both the transmitter and the receiver at the IEEE 802.11a physical layer to be then exploited by the receiver in addition to the training sequences. Indeed the parts of the identified SIGNAL field are either known or predictable from the RtS (Request to Send) control frame when the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism is triggered jointly to bit-rate adaptation algorithms to the channel. Moreover the received RtS control frame allows the receiver to estimate the channel before time synchronization stage improving then the performance of the proposed synchronization algorithm. Simulation results show tha...

Research paper thumbnail of DSP implementation of fast FIR filtering algorithms using short FFT's

Proceedings of ISCAS'95 - International Symposium on Circuits and Systems, 2000

ABSTRACT

Research paper thumbnail of Polynomial transform computation of the 2-D DCT

International Conference on Acoustics, Speech, and Signal Processing, 2000

Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is... more Abstract A 2-D DCT (discrete cosine transform) algorithm based on a direct polynomial approach is presented. The resulting algorithm reduces the number of both multiplications and additions compared to previous algorithms. It is shown that, although being ...

Research paper thumbnail of A posteriori control of complex Reed Solomon decoding with application to impulse noise cancellation in HIPERLAN/2

2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333), 2002

... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack ... more ... Low-level Gaussian noise sample with variance a$ are added to each position indepen ... Jack Keil Wolf,“Redundancy, the Discrete Fourier Transform, and Im-pulse Noise Cancellation,“lEEE ... Ja-Ling WU and Jiun Shiu, “Discrete cosine transform in error control coding,” IEEE ...

Research paper thumbnail of From maximum likelihood to iterative decoding

2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011

Research paper thumbnail of Real BCH codes as joint source channel codes for satellite images coding

Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137), 2000

Research paper thumbnail of Achievable Outage Rates with Improved Decoding of BICM Multiband OFDM under Channel Estimation Errors

2006 Fortieth Asilomar Conference on Signals, Systems and Computers, 2006

Research paper thumbnail of MIMO-OFDM optimal decoding and achievable information rates under imperfect channel estimation

2007 IEEE 8th Workshop on Signal Processing Advances in Wireless Communications, 2007

Research paper thumbnail of The multibridge charge routing filter

IEEE Transactions on Circuits and Systems, 1985

Research paper thumbnail of Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS

IEEE International Conference on Image Processing 2005, 2005