Skip to main content

Showing 1–3 of 3 results for author: Newton, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.18204  [pdf, other

    cs.SD eess.AS

    ConvDTW-ACS: Audio Segmentation for Track Type Detection During Car Manufacturing

    Authors: Álvaro López-Chilet, Zhaoyi Liu, Jon Ander Gómez, Carlos Alvarez, Marivi Alonso Ortiz, Andres Orejuela Mesa, David Newton, Friedrich Wolf-Monheim, Sam Michiels, Danny Hughes

    Abstract: This paper proposes a method for Acoustic Constrained Segmentation (ACS) in audio recordings of vehicles driven through a production test track, delimiting the boundaries of surface types in the track. ACS is a variant of classical acoustic segmentation where the sequence of labels is known, contiguous and invariable, which is especially useful in this work as the test track has a standard configu… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: 12 pages, 2 figures

  2. arXiv:1610.02443  [pdf, other

    cs.MM

    mPDF: Framework for Watermarking PDF Files using Image Watermarking Algorithms

    Authors: Sachin Mehta, Balakrishnan Prabhakaran, Rajarathnam Nallusamy, Derrick Newton

    Abstract: The advancement in digital technologies have made it possible to produce perfect copies of digital content. In this environment, malicious users reproduce the digital content and share it without compensation to the content owner. Content owners are concerned about the potential loss of revenue and reputation from piracy, especially when the content is available over the Internet. Digital watermar… ▽ More

    Submitted 7 October, 2016; originally announced October 2016.

    Comments: 20 pages

  3. arXiv:1509.03843  [pdf, ps, other

    cs.CR

    Attack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol

    Authors: Derrick Newton

    Abstract: A quantum digital signature (QDS) protocol is investigated in respect of an attacker who can impersonate other communicating principals in the style of Lowe's attack on the Needham-Schroeder public-key authentication protocol. A man-in-the-middle attack is identified in respect of a classical variant of the protocol and it is suggested that a similar attack would be effective against the QDS proto… ▽ More

    Submitted 13 September, 2015; originally announced September 2015.