Compromising anonymous communication systems using blind source separation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Watermarking using Blind Source Separation

In this paper, we present a robust and secure algorithm for watermarking, the watermark is first transformed into the frequency domain using the discrete wavelet transform (DWT). Then the entire DWT coefficient except the LL (Band) discarded, these coefficients are permuted and encrypted by specific mixing. The encrypted coefficients are inserted into the most significant spectral components of...

متن کامل

Nonlinear Blind Source Separation Using Ensemble Learning

Blind source separation (BSS) and the closely related Independent Component Analysis (ICA) have recently drawn a lot of attention in unsupervised neural learning and statistical signal processing 1, 2, 3]. In the basic linear case, ICA and BSS use the same data model x(t) = As(t) = m X i=1 s i (t)a i : (1) Here x(t) is the n-dimensional t:th data vector, s 1 (t); : : : ; s m (t) are the respect...

متن کامل

Anechoic Blind Source Separation Using Wigner Marginals

Blind source separation problems emerge in many applications, where signals can be modeled as superpositions of multiple sources. Many popular applications of blind source separation are based on linear instantaneous mixture models. If specific invariance properties are known about the sources, for example, translation or rotation invariance, the simple linear model can be extended by inclusion...

متن کامل

Blind source separation using order statistics

This paper shows the possibility to blindly separate instantaneous mixtures of sources by means of a criteria exploiting order statistics. Properties of higher order statistics and second order methods are first underlined. Then a brief description of the order statistics shows that they gather all these properties and a new criteria is proposed. Next an iterative algorithm able to simultaneous...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Information and System Security

سال: 2009

ISSN: 1094-9224,1557-7406

DOI: 10.1145/1609956.1609964