Abstract / truncated to 115 words (read the full abstract)

Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these elds has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a general theory that takes into account the impact that the presence of an adversary has on the design of effective signal processing tools. By focusing on the application ... toggle 16 keywords

signal processing in adversarial domain adversarial signal processing game theory detection theory adversary attacker attacks byzantines decision fusion data fusion zero-sum games dynamic programming consensus algorithms decentralized networks factor graph sum product algorithm.

Information

Author
Kallas, Kassem
Institution
University of Siena
Supervisor
Publication Year
2017
Upload Date
Sept. 25, 2017

First few pages / click to enlarge

The current layout is optimized for mobile phones. Page previews, thumbnails, and full abstracts will remain hidden until the browser window grows in width.

The current layout is optimized for tablet devices. Page previews and some thumbnails will remain hidden until the browser window grows in width.