[1]
|
Miriam K. Wolff, Hans Georg Schaathun, Anders Lyngvi Fougner, Martin Steinert,
and Rune Volden.
Mobile software development kit for real time multivariate blood
glucose prediction.
IEEE Access, 12:5910--5919, 2024.
[ bib |
DOI |
URL ]
Keywords: Wearable computers;Sensors;Real-time systems;Glucose;Insulin;Prediction algorithms;Protocols;Blood;Machine learning;Blood glucose prediction;health information systems;machine learning;wearable sensors
|
[2]
|
Miriam K. Wolff, Sam Royston, Anders Lyngvi Fougner, Hans Georg Schaathun,
Martin Steinert, and Rune Volden.
Glupredkit: Development and user evaluation of a standardization
software for blood glucose prediction, 2024.
[ bib |
arXiv |
URL ]
|
[3]
|
Bismi Rasheed, Øystein Bjelland, Andreas F. Dalen, Ute Schaarschmidt,
Hans Georg Schaathun, Morten D. Pedersen, Martin Steinert, and Robin T. Bye.
Intraoperative identification of patient-specific elastic modulus of
the meniscus during arthroscopy.
Computer Methods and Programs in Biomedicine, 254:108269, 2024.
[ bib |
DOI |
URL ]
Background and Objective:
Degenerative meniscus tissue has been associated with a lower elastic modulus and can lead to the development of arthrosis. Safe intraoperative measurement of in vivo elastic modulus of the human meniscus could contribute to a better understanding of meniscus health, and for developing surgical simulators where novice surgeons can learn to distinguish healthy from degenerative meniscus tissue. Such measurement can also support intraoperative decision-making by providing a quantitative measure of the meniscus health condition. The objective of this study is to demonstrate a method for intraoperative identification of meniscus elastic modulus during arthroscopic probing using an adaptive observer method.
Methods:
Ex vivo arthroscopic examinations were performed on five cadaveric knees to estimate the elastic modulus of the anterior, mid-body, and posterior regions of lateral and medial menisci. Real-time intraoperative force–displacement data was obtained and utilized for modulus estimation through an adaptive observer method. For the validation of arthroscopic elastic moduli, an inverse parameter identification approach using optimization, based on biomechanical indentation tests and finite element analyses, was employed. Experimental force–displacement data in various anatomical locations were measured through indentation. An iterative optimization algorithm was employed to optimize elastic moduli and Poisson’s ratios by comparing experimental force values at maximum displacement with the corresponding force values from linear elastic region-specific finite element models. Finally, the estimated elastic modulus values obtained from ex vivo arthroscopy were compared against optimized values using a paired t-test.
Results:
The elastic moduli obtained from ex vivo arthroscopy and optimization showcased subject specificity in material properties. Additionally, the results emphasized anatomical and regional specificity within the menisci. The anterior region of the medial menisci exhibited the highest elastic modulus among the anatomical locations studied (9.97±3.20MPa from arthroscopy and 5.05±1.97MPa from finite element-based inverse parameter identification). The paired t-test results indicated no statistically significant difference between the elastic moduli obtained from arthroscopy and inverse parameter identification, suggesting the feasibility of stiffness estimation using arthroscopic examination.
Conclusions:
This study has demonstrated the feasibility of intraoperative identification of patient-specific elastic modulus for meniscus tissue during arthroscopy.
Keywords: Arthroscopic meniscus examination, Adaptive observer, Indentation testing, Finite element analysis, Inverse parameter identification, Elastic modulus
|
[4]
|
Ben David Normann, Kenny Solevåg-Hoti, and Hans Georg Schaathun.
A short review on joint weak and strong cluster lens-mass
reconstruction.
arXiv preprint arXiv:2405.18930, 2024.
[ bib |
URL ]
|
[5]
|
Hans Georg Schaathun.
On the common core of science and design.
Preprint, under peer review, 2024.
[ bib ]
|
[6]
|
Bismi Rasheed, Morten Dinhoff Pedersen, and Hans Georg Schaathun.
Co-rotational reduced order kalman filter finite element method for
the real-time implementation of large-scale structural models.
IFAC-PapersOnLine, 56(2):10198--10203, 2023.
22nd IFAC World Congress.
[ bib |
DOI ]
The real-time implementation of large-scale structural models without sacrificing their physical realism is challenging. This paper introduces a conceptual framework named the Co-rotational Reduced Order Kalman Filter Finite Element Method (CROKF-FEM) for the realistic linear elastic analysis of large-scale structures in real-time. The standard linear finite element method (FEM) is employed for high-precision deformation modeling, and element matrices are pre-computed in the space domain. To avoid the inflated elements of standard linear FEM due to large rotation, a co-rotational formulation is devised. Then, the system is discretized in the time domain using the Wilson- θ implicit integration scheme and a further state-space model is developed. Subsequently, a reduced-order model is constructed using the balanced truncation method. Finally, a Kalman filter algorithm is created on the reduced model for online estimation. This approach preserves all the benefits of traditional linear FEM with a similar deformation accuracy while achieving significant real-time performance.
Keywords: Kalman Filtering, Model Order Reduction, Corotational Formulation, Finite Element Method, Real-time Modeling, Soft Tissue Deformation
|
[7]
|
Bismi Rasheed, Venkat Ayyalasomayajula, Ute Schaarschmidt, Terje Vagstad, and
Hans Georg Schaathun.
Region- and layer-specific investigations of the human menisci using
shg imaging and biaxial testing.
Frontiers in Bioengineering and Biotechnology, 11, 2023.
[ bib |
DOI |
URL ]
In this paper, we examine the region- and layer-specific collagen fiber morphology via second harmonic generation (SHG) in combination with planar biaxial tension testing to suggest a structure-based constitutive model for the human meniscal tissue. Five lateral and four medial menisci were utilized, with samples excised across the thickness from the anterior, mid-body, and posterior regions of each meniscus. An optical clearing protocol enhanced the scan depth. SHG imaging revealed that the top samples consisted of randomly oriented fibers with a mean fiber orientation of 43.3<sup>o</sup>. The bottom samples were dominated by circumferentially organized fibers, with a mean orientation of 9.5<sup>o</sup>. Biaxial testing revealed a clear anisotropic response, with the circumferential direction being stiffer than the radial direction. The bottom samples from the anterior region of the medial menisci exhibited higher circumferential elastic modulus with a mean value of 21 MPa. The data from the two testing protocols were combined to characterize the tissue with an anisotropic hyperelastic material model based on the generalized structure tensor approach. The model showed good agreement in representing the material anisotropy with a mean r<sup>2</sup> = 0.92.
|
[8]
|
Hans Georg Schaathun, Ben David Normann, Einar Leite Austnes, Simon
Ingebrigtsen, Sondre Westbø Remøy, and Simon Nedreberg Runde.
On the simulation of gravitational lensing.
In Enrico Vicario, Romeo Bandinelli, Virginia Fani, and Michele
Mastroianni, editors, Proceedings of the 30th European Conference on
Modelling and Simulation. ECMS - European Council for Modelling and
Simulation, 2023.
Florence, Italy, 21-23 June 2023.
[ bib |
URL ]
|
[9]
|
Hans Georg Schaathun, Ben David Normann, and Kenny Solevåg-Hoti.
Om å kartleggja mørk materie med maskinlæring.
Norsk IKT-konferanse for forskning og utdanning, 2023(1), 2023.
[ bib |
URL ]
|
[10]
|
Hans Georg Schaathun.
Maskinlæring og studentlæring.
Norsk Informatikkonferanse, November 2022.
Undervising og Didaktikk i IT-faga, Kristiansand, November
2022.
[ bib |
URL ]
|
[11]
|
Bismi Rasheed, Venkat Siva Radha Krishna Ayyalasomayajula, Ute Alexandra
Schaarschmidt, Terje Vagstad, and Hans Georg Schaathun.
Biaxial mechanical characterization and constitutive modeling of
human meniscus.
In 7th International Conference on Computational and
Mathematical Biomedical Engineering (CMBE2022), June 2022.
[ bib |
.pdf ]
|
[12]
|
Hans Georg Schaathun.
Where Schön and Simon agree: The rationality of design.
Design Studies, 79:101090, 2022.
[ bib |
DOI ]
Simon and Schön are commonly seen to represent two conflicting views on design method, but this interpretation has been challenged in recent years. In this paper we discuss their differences and agreements in more depth. Both of them agree on a rationality which is distinct from science and its reliance on universal truth. They depend on a practical reason, and what Aristotle calls the calculative part of the soul, which deals with the contingencies of real world problems, and still let us know, and share, truth. One discrepancy remains between Simon and Schön. Simon does not tell us how we identify the changing goals of man. Schön addresses this by invoking the distinctly human power to see-as.
Keywords: design methodology, reflective practice, engineering design, philosophy of design, logic of design
|
[13]
|
Hans Georg Schaathun.
On Understanding in Mathematics.
Teaching Mathematics and its Applications: An International
Journal of the IMA, 41(4):318--328, 09 2022.
[ bib |
DOI |
arXiv ]
It is often difficult to teach mathematics for understanding. Many students seem to prefer to learn computational skills by rote, and seem to remember very little of the course contents the following semester. The reasons for this are surely manifold. This paper reviews the concept of understanding, looking particularly towards the meaning it has in hermeneutic philosophy. The known distinction between hermeneutical and epistemological understanding is resituated in mathematics, and we argue that it is the hermeneutic understanding which is most relevant when mathematics is taught as a support subject for engineering and other professions.
|
[14]
|
Øystein Bjelland, Bismi Rasheed, Hans Georg Schaathun, Morten D Pedersen,
Martin Steinert, Alf Inge Hellevik, and Robin T Bye.
Towards a digital twin for arthroscopic knee surgery: A systematic
review.
IEEE Access, 10:45029--45052, 2022.
[ bib |
URL ]
|
[15]
|
Hans Georg Schaathun.
Smidig epistemologi.
Norsk Informatikkonferanse, November 2021.
Undervising og Didaktikk i IT-faga, Trondheim, November 2021.
[ bib |
URL ]
|
[16]
|
Hans Georg Schaathun and Jan Gunnar Moe.
Kva er eigentleg målet i matematikken?
Nordic Journal of STEM Education, 4(2), 2021.
[ bib |
DOI ]
|
[17]
|
Hans Georg Schaathun.
Ingeniørdannelse. kva har danning i teknologifag å gjera?
Norsk Informatikkonferanse, November 2020.
Undervising og Didaktikk i IT-faga, online in November 2020.
[ bib |
URL |
.pdf ]
|
[18]
|
Hans Georg Schaathun.
Den tause kunnskapen i it-studia.
Norsk Informatikkonferanse, November 2019.
Presentert på Undervising og Didaktikk i IT-faga, Narvik 26.
nov. 2019.
[ bib |
URL |
.pdf ]
|
[19]
|
Kjetil Nordby, Hans Georg Schaathun, Etienne Gernez, and Sigrun Lurås.
A conceptual framework for reporting field research for design in the
maritime industries.
The International Journal of Marine Design, 2019.
Accepted for publication, but journal discountinued before
publication.
[ bib |
URL ]
|
[20]
|
Hans Georg Schaathun and Sebastian Søviknes Gundersen.
Quiz for diskusjon og samarbeid i store klasser.
Norsk Informatikkonferanse, September 2018.
Presentert på Undervising og Didaktikk i IT-faga, Svalbard
18.-20. sept. 2018.
[ bib |
URL |
.pdf ]
|
[21]
|
Hans Georg Schaathun and Adrian Rutle.
Model-driven software engineering in the resource description
framework: a way to version control.
In Norsk Informatikkonferanse, September 2017.
[ bib |
URL |
.pdf ]
|
[22]
|
Hans Georg Schaathun and Minoru Kuribayashi.
Obfuscation in digital fingerprinting.
International Journal of Information and Coding Theory,
4(2-3):185--200, 2017.
[ bib |
DOI ]
|
[23]
|
Hans Georg Schaathun, Que Tran, Mikael Tollefsen, and Etienne Gernez.
Data and knowledge manangement in field studies. a case for semantic
technologies.
In Norsk Informatikkonferanse, 2017.
Open access at http://ojs.bibsys.no/index.php/NIK/index. ISSN
1892-0721.
[ bib |
URL |
.pdf ]
|
[24]
|
Ibrahim Hameed, Robin Bye, Ottar Osen, Birger Pedersen, and Hans Georg
Schaathun.
Intelligent computer-automated crane design using an online crane
prototyping tool.
In Thorsten Claus, Frank Herrmann, Michael Manitz, and Oliver Rose,
editors, Proceedings of the 30th European Conference on Modelling and
Simulation, 2016.
Regensburg, Germany.
[ bib |
URL ]
|
[25]
|
Robin Bye, Ottar Osen, Birger Pedersen, Ibrahim Hameed, and Hans Georg
Schaathun.
A software framework for intelligent computer-automated product
design.
In Thorsten Claus, Frank Herrmann, Michael Manitz, and Oliver Rose,
editors, Proceedings of the 30th European Conference on Modelling and
Simulation, 2016.
Regensburg, Germany.
[ bib |
URL ]
|
[26]
|
Welie Annett Schaathun and Hans Georg Schaathun.
Mellom klassisk betinging og støttende stillas: Et
utviklingspsykologisk perspektiv på ingeniørstudenters læring.
In Innovasjon i velferdssamfunnet, volume 2015 of
Fjordantologien. Universitetsforlaget, 2016.
[ bib |
URL |
.pdf ]
|
[27]
|
Welie Annett Schaathun and Hans Georg Schaathun.
Dypevaluering av studentenes læring - Er fokusgrupper svaret?
Norsk Informatikkonferanse, November 2015.
Presentert på Undervising og Didaktikk i IT-faga, Ålesund
23.-25, november 2015.
[ bib |
URL |
.pdf ]
|
[28]
|
Hans Georg Schaathun.
Matematikk er eit pratefag og andre røynsler frå eit omvendt
klasserom.
Norsk Informatikkonferanse, November 2015.
Presentert på Undervising og Didaktikk i IT-faga, Ålesund
23.-25, november 2015.
[ bib |
URL |
.pdf ]
|
[29]
|
Minoru Kuribayashi and Hans Georg Schaathun.
Image fingerprinting system based on collusion secure code and
watermarking method.
In 2015 IEEE International Conference on Image Processing
(ICIP), pages 2120--2124. IEEE, September 2015.
[ bib |
DOI ]
|
[30]
|
Hans Georg Schaathun.
Evaluation of splittable pseudo-random generators.
Journal of Functional Programming, 25:e6, May 2015.
[ bib |
DOI |
Preprint |
URL ]
Pseudo-random number generation is a fundamental problem
in computer programming.
In the case of sequential processing the problem is very
well researched, but parallel processing raises new problems
whereof far too little is currently understood.
Splittable pseudo-random generators have been proposed to
meet the challenges of parallelism.
While applicable to any programming paradigm, they are
designed to be particularly suitable for pure functional
programming. In this paper we review and evaluate known
constructions of such generators, and we identify flaws
in several large classes of generators, including Lehmer
trees, the implementation in Haskell's standard library,
leapfrog, and subsequencing (substreaming).
Keywords: splittable pseudo-random number generators, Lehmer tree,
Monte Carlo tree, parallel programming,
pure functional programming, Haskell
|
[31]
|
Yingguang Chu, Lars Hatledal, Filippo Sanfilippo, Hans Schaathun, Vilmar
Æsøy, and Houxiang Zhang.
Virtual prototyping system for maritime crane design and operation
based on functional mock-up interface.
In OCEANS, May 2015.
Genova, Italy, 18--21 May.
[ bib |
Preprint |
URL ]
|
[32]
|
Robin T. Bye and Hans Georg Schaathun.
Evaluation heuristics for tug fleet optimisation algorithms: A
computational simulation study of a receding horizon genetic algorithm.
In Proceedings of the 4th International Conference on
Operations Research and Enterprise Systems (ICORES'15), pages 270--282,
2015.
[ bib |
DOI |
URL |
.pdf ]
|
[33]
|
Lars Ivar Hatledal, Hans Georg Schaathun, and Houxiang Zhang.
A software architecture for simulation and visualisation based on the
functional mock-up interface and web technologies.
In Proceedings of the 56th Conference on Simulation and
Modelling (SIMS 56), October, 7-9, 2015, Linköping University, Sweden,
pages 123--129. Linköping University Electronic Press, 2015.
[ bib |
URL |
.pdf ]
|
[34]
|
Robin T. Bye and Hans Georg Schaathun.
A simulation study of evaluation heuristics for tug fleet
optimisation problems.
Communications in Computer and Information Science, pages
165--190, 2015.
[ bib |
DOI ]
Tug fleet optimisation algorithms can be designed to solve the problem of dynamically positioning a fleet of tugs in order to mitigate the risk of oil tanker drifting accidents. In this paper, we define the 1D tug fleet optimisation problem and present a receding horizon genetic algorithm for solving it. The algorithm can be configured with a set of cost functions such that each configuration effectively constitute a unique tug fleet optimisation algorithm. To measure the performance, or merit, of such algorithms, we propose two evaluation heuristics and test them by means of a computational simulation study. Finally, we discuss our findings and some of our related work on a parallel implementation and an alternative 2D nonlinear mixed integer programming formulation of the problem.
|
[35]
|
Øivind Strand, Rigmor Einang Alnes, Hans Georg Schaathun, and Helen Berg.
Drivers and barriers in public sector innovations, regional
perspectives and lessons learned from the alv project.
In Øivind Strand, Erik Nesset, and Harald Yndestad, editors,
Fragmentering eller mobilisering? Regional Utvikling i Nordvest, volume 2014
of Fjordantologien, pages 155--174. forlag1, 2015.
[ bib |
URL ]
|
[36]
|
Welie Annett Schaathun, Hans Georg Schaathun, and Robin T. Bye.
Aktiv læring i mikrokontrollarar.
Uniped, 38(4):381--389, 2015.
Special issue following MNT-konferansen, Bergen, Norway 18-19
March 2015.
[ bib |
URL |
.pdf ]
|
[37]
|
Adrian Rutle, Kent Inge Fagerland Simonsen, Hans Georg Schaathun, and Ralf
Kirchhoff.
Model-driven software engineering in practice: a content analysis
software for health reform agreements.
Procedia Computer Science, 63(Supplement C):545--552, 2015.
The 6th International Conference on Emerging Ubiquitous Systems and
Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current
and Future Trends of Information and Communication Technologies in Healthcare
(ICTH-2015)/ Affiliated Workshops.
[ bib |
DOI |
URL ]
Abstract The Coordination Reform of 2012 requires Norwegian municipalities and regional health authorities to enter into legally binding service agreements. Although several research projects have been undertaken to analyse the implications of this reform, there is no central database where researches can be given access and analyse the service agreements. In this paper we present how we use model-driven software engineering and user-centric design in an initial development of an information system designed to allow researches to access and analyse service agreements. For this project, it was crucial to discuss the requirements of the system with domain-experts at a high level of abstraction in order to elicit feedback so that the development could proceed at a fast pace and in the right direction. Furthermore, given time and resource constraints, we elected to use a model driven approach using automatic code generation coupled with high-productivity frameworks. In this way we were able to create prototypes so that the developers could get fast feedback from the domain-experts and improvements could be implemented with minimal effort.
Keywords: Model-driven Software Engineering, Coordination Reforms in healthcare, Metamodelling, MVCore
|
[38]
|
Robin T. Bye and Hans G. Schaathun.
An improved receding horizon genetic algorithm for the tug fleet
optimisation problem.
In Proceedings of the 28th European Conference on Modelling and
Simulation, pages 682--690, May 2014.
Brescia, Italy.
[ bib |
Preprint |
URL ]
|
[39]
|
Hans Georg Schaathun, Sven Inge Molnes, Helen Berg, and Rigmor Einang Alnes.
Electronic tracking of users with cognitive impairment (contrasting a
literature review with local experience).
In 2nd European Workshop on Practical Aspects of Health
Informatics (PAHI 2014), volume 1251 of CEUR Workshop Proceedings, May
2014.
[ bib |
Open Access |
URL |
.pdf ]
|
[40]
|
Hans Georg Schaathun.
Attacks on Kuribayashi's fingerprinting scheme.
Information Forensics and Security, IEEE Transactions on,
9(4):607--609, April 2014.
[ bib |
DOI |
Preprint |
Companion Source Code ]
The main threat against fingerprinting systems is collusion
attacks. The attack most commonly assumed in the literature
is a combination of averaging the collusion fingerprints and
additive noise. In this correspondence, we demonstrate that the
recently proposed fingerprinting scheme of Kuribayashi's is very
vulnerable to certain nonlinear collusion attacks.
Keywords: data compression;fingerprint identification;image coding;
image denoising;image watermarking;
Kuribayashi fingerprinting scheme;additive noise;
collusion fingerprints;fingerprinting systems;
nonlinear collusion attacks;Additive noise;
Detectors;Discrete cosine transforms;
Educational institutions;Interference;Transform coding;
Watermarking;Fingerprinting;collusion attack;watermarking
|
[41]
|
Hans Georg Schaathun.
Parallell slump (Om å parallellisera genetiske algoritmar i
Haskell).
In Norsk Informatikkonferanse, 2014.
Open access at http://ojs.bibsys.no/index.php/NIK/index. ISSN
1892-0721.
[ bib |
.pdf ]
|
[42]
|
Hans Georg Schaathun, Magne Aarset, Runar Ostnes, and Robert Rylander.
Hierarchical task analysis, situation-awareness and support software.
In Webjørn Rekdalsbakken, Robin T. Bye, and Houxiang Zhang, editors,
27th European Conference on Modelling and Simulation, pages 184+.
European Council for Modelling and Simulation, 2013.
[ bib |
.pdf ]
|
[43]
|
Filippo Sanfilippo, Lars Ivar Hatledal, Hans Georg Schaathun, Kristin Ytterstad
Pettersen, and Houxiang Zhang.
A universal control architecture for maritime cranes and robots using
genetic algorithms as a possible mapping approach.
In Proceeding of the IEEE International Conference on Robotics
and Biomimetics (ROBIO) Shenzhen, China, December 2013, pages 322--327.
IEEE, 2013.
[ bib |
Preprint ]
|
[44]
|
Hans Georg Schaathun and Magne Aarset.
Operational planning in state machines.
Norsk informatikkonferanse (NIK), 2013.
[ bib |
.pdf ]
|
[45]
|
Hans Georg Schaathun.
Tekstur og dekkval i biletsteganografi.
In Norsk Informatikkonferanse, Bodø, Norway, November 2012.
[ bib |
.pdf ]
|
[46]
|
Hans Georg Schaathun.
Vurdering av features for steganalyse i JPEG.
In Norsk Informatikkonferanse, Tromsø, Norway, November 2011.
[ bib |
.pdf ]
|
[47]
|
Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, and Mehmet Utku
Celik.
Tardos fingerprinting codes in the combined digit model.
IEEE Transactions on Information Forensics and Security,
6(3):906--919, September 2011.
[ bib |
DOI ]
We formalize a new attack model for collusion secure codes, incorporating attacks on the underlying watermarking scheme as well as cut-and-paste attacks traditionally considered for collusion secure codes. We use this model to analyze the collusion resistance of two versions of the Tardos code, both for binary and nonbinary alphabets. The model allows us to consider different signal processing attacks on the content, namely the addition of noise and averaging attacks. The latter may result in content segments that have multiple watermarks embedded. We study two versions of the q-ary Tardos code in which the accusation method has been modified so as to allow for the detection of multiple symbols in the same content segment. We show that both variants yield efficient codes in the new model, parametrized for realistic attacker strengths.
Keywords: fingerprint identification;image watermarking;Tardos fingerprinting codes;accusation method;binary alphabets;collusion resistance;collusion secure codes;combined digit model;content segment;cut-and-paste attacks;nonbinary alphabets;q-ary Tardos code;signal processing attacks;watermarking scheme;Analytical models;Detectors;Mathematical model;Noise;Watermarking;Collusion attacks;fingerprinting;watermarking
|
[48]
|
J.A. Briffa, H.G. Schaathun, and S. Wesemeyer.
An improved decoding algorithm for the Davey-MacKay
construction.
In Communications (ICC), 2010 IEEE International Conference on,
pages 1--5, May 2010.
[ bib |
DOI |
Preprint |
URL ]
The Deletion-Insertion Correcting Code construction proposed by Davey and MacKay consists of an inner code that recovers synchronization and an outer code that provides substitution error protection. The inner code uses low-weight codewords which are added (modulo two) to a pilot sequence. The receiver is able to synchronise on the pilot sequence in spite of the changes introduced by the added codeword. The original bit-level formulation of the inner decoder assumes that all bits in the sparse codebook are identically and independently distributed. Not only is this assumption inaccurate, but it also prevents the use of soft a- priori input to the decoder. We propose an alternative symbol-level inner decoding algorithm that takes the actual codebook into account. Simulation results show that the proposed algorithm has an improved performance with only a small penalty in complexity, and it allows other improvements using inner codes with larger minimum distance.
Keywords: turbo codes;Davey-MacKay construction;alternative symbol-level inner decoding algorithm;deletion-insertion correcting code construction;improved decoding algorithm;inner decoder;nonbinary codes;pilot sequence;sparse codebook;substitution error protection;turbo codes;Communications Society;Decoding;Delta modulation;Demodulation;Error correction codes;Iterative algorithms;Partial transmit sequences;Peer to peer computing;Turbo codes;Watermarking
|
[49]
|
Johann A. Briffa, Hans Georg Schaathun, and Ainuddin Wahid Abdul Wahab.
Has F5 really been broken?
In Intern. Conf. on Imaging for Crime Detection and Prevention
(ICDP), December 2009.
[ bib |
DOI |
URL ]
|
[50]
|
Hans Georg Schaathun.
On higher weights and code existence.
In The twelfth IMA International Conference on Cryptography and
Coding, Springer Lecture Notes in Computer Science, pages 56--64. Springer,
December 2009.
Cirencester, England.
[ bib |
Preprint ]
Several open questions in coding theory relate to
non-existence or construction of certain optimal codes.
Many previous problems of this kind have been solved by
studying possible weight enumerators.
A couple of authors in this decade have proposed using higher
weights (generalised Hamming weights) to a similar effect.
In this paper we suggest one approach based on the weight
hierarchy, and it allows us to conduct an extremely rapid
computer search to prove that there are exactly two
inequivalent [36,8,16] codes.
The technique can also be used to gain new information about
the weight hierarchy of the putative [72,36,16] code,
but not yet enough to say if it exists or not.
|
[51]
|
B. Skoric, S. Katzenbeisser, H.G. Schaathun, and M.U. Celik.
Tardos fingerprinting codes in the combined digit model.
In Information Forensics and Security, 2009. WIFS 2009. First
IEEE International Workshop on, pages 41--45, December 2009.
[ bib |
DOI ]
We introduce a new attack model for collusion-secure codes, called the combined digit model, which represents signal processing attacks against the underlying watermarking level better than existing models. In this paper, we analyze the performance of two variants of the Tardos code and show that both variants can accommodate the new model and resist collusion attacks with only a modest increase in code length as compared to the results for the commonly used restricted digit model.
Keywords: codes;watermarking;Tardos fingerprinting codes;collusion-secure codes;combined digit model;restricted digit model;signal processing;watermarking level;Codes;Data security;Fingerprint recognition;Forensics;Information security;Performance analysis;Resists;Signal processing;Signal processing algorithms;Watermarking
|
[52]
|
Ainuddin Wahid Abdul Wahab, Hans Georg Schaathun, and Anthony TS Ho.
Markov process based steganalysis by using second-order transition
probability matrix.
In 8th European Conference on Information Warfare and Security,
ECIW 09, Military Academy, Lisbon and the University of Minho, Braga,
Portugal, July 2009.
[ bib ]
|
[53]
|
Johann Briffa, Anthony TS Ho, Hans Georg Schaathun, and Ainuddin Wahid Abdul
Wahab.
Conditional probability based steganalysis for JPEG steganography.
In International Conference on Signal Processing Systems (ICSPS
2009), May 2009.
[ bib |
URL ]
|
[54]
|
Ainuddin Wahid Abdul Wahab, Johann A Briffa, and Hans Georg Schaathun.
On the performance of wavelet decomposition steganalysis with jsteg
steganography.
In Hyoung-Joong Kim, Stefan Katzenbeisser, and AnthonyT.S. Ho,
editors, International Workshop on Digital Watermarking 2008, volume
5450 of Springer Lecture Notes in Computer Science, pages 342--349.
Springer Berlin Heidelberg, 2009.
Korea.
[ bib |
DOI |
Preprint ]
|
[55]
|
J.A. Briffa and H.G. Schaathun.
Improvement of the Davey-MacKay construction.
In Information Theory and Its Applications, 2008. ISITA 2008.
International Symposium on, pages 1--4, December 2008.
[ bib |
DOI |
Conference |
URL ]
The Davey-MacKay construction is a deletion-insertion correcting code scheme consisting of an inner code that functions as a pilot sequence to which the receiver seeks to synchronize, and an outer code that provides error protection. We analyse the performance of the inner code in isolation, arguing that these codes provide unequal protection, and demonstrate empirically that the error rate is dependent on the date symbol values. We also propose modifications to the code construction that alleviate this asymmetry. Simulation results show that these codes have an improved performance with no penalty.
Keywords: error correction codes;Davey-MacKay construction;code construction;deletion-insertion correcting code scheme;error protection code;inner code;outer code;Decoding;Delta modulation;Error analysis;Error correction codes;Information theory;Parity check codes;Partial transmit sequences;Performance analysis;Protection;Watermarking
|
[56]
|
Hans Georg Schaathun.
On the assumption of equal contributions in fingerprinting.
IEEE Transaction on Information Forensics and Security,
3(3):569--572, September 2008.
[ bib |
DOI |
Preprint ]
With a digital fingerprinting scheme, a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates due to this fingerprint. A coalition of pirates may combine their copies to produce an unauthorized copy with a false, hybrid fingerprint. It is often assumed in the literature that the members of the collusion will make equal contributions to the hybrid fingerprint, because nobody will accept an increased risk of being caught. We argue that no such assumption is valid a priori, and we show that a published solution by Sebe and Domingo-Ferrer can be broken by breaking the assumption.
Keywords: copyright;fingerprint identification;image coding;copyrighted material;digital copy protection;digital fingerprinting scheme;hybrid fingerprint;illegal copying;Collusion-attack;collusion-secure code (CSC);digital fingerprinting;scattering codes
|
[57]
|
J.A. Briffa and H.G. Schaathun.
Non-binary turbo codes and applications.
In Turbo Codes and Related Topics, 2008 5th International
Symposium on, pages 294--298, September 2008.
[ bib |
DOI ]
In this paper we consider the use of q-ary turbo codes on abstract q-ary channels. Simulations show that our 16-ary codes perform well on the q-ary symmetric channel. This validates their suitability as outer codes in non-binary applications. We also compare with the performance of same codes on conventional PSK and QAM modulation, and demonstrate an application of these codes to the insertion/deletion channel.
Keywords: channel coding;phase shift keying;quadrature amplitude modulation;turbo codes;PSK modulation;QAM modulation;insertion/deletion channel;nonbinary turbo codes;q-ary channels;q-ary turbo codes;Construction industry;Decoding;Delta modulation;Error analysis;Modulation;Turbo codes;Watermarking;deletion-insertion correcting codes;non-binary codes;q-ary symmetric channel;turbo codes
|
[58]
|
Hans Georg Schaathun.
On error-correcting fingerprinting codes for use with watermarking.
Multimedia Systems, 13(5--6):331--344, February 2008.
[ bib |
DOI |
Preprint |
URL ]
Digital fingerprinting has been suggested for copyright
protection. Using a watermarking scheme, a fingerprint
identifying the buyer is embedded in every copy sold.
If an illegal copy appears, it can be traced back to the
guilty user. By using collusion-secure codes, the
fingerprinting system is made secure against cut-and-paste
attacks. In this paper we study the interface between the
collusion-secure fingerprinting codes and the underlying
watermarking scheme, and we construct several codes which
are both error-correcting and collusion-secure.
Error-correction makes the system robust against successful
attacks on the watermarking layer.
Keywords: Collusion-secure fingerprinting; Copyright protection;
Error-correcting codes; Watermarking; Soft-decision decoding
|
[59]
|
Hans Georg Schaathun.
Novel attacks on spread-spectrum fingerprinting.
EURASIP J. Information Security, 2008, 2008.
[ bib |
URL |
.pdf ]
Spread-spectrum watermarking is generally considered to be
robust against collusion attacks, and thereby suitable for
digital fingerprinting. We have previously introduced the
minority extreme attack (IWDW ’07), and showed that it is
effective against orthogonal fingerprints. In this paper,
we show that it is also effective against random Gaussian
fingerprint. Furthermore, we develop new randomised attacks
which counter the effect of the decoder preprocessing of
Zhao et al.
|
[60]
|
Hans Georg Schaathun.
A key-recovery attack on authentication watermarking by Li and
Yuan.
In 10th ACM Workshop on Multimedia & Security, 2008.
[ bib |
Handouts |
Slides |
.pdf ]
|
[61]
|
Hans Georg Schaathun.
Attack analysis for He&Wu's joint watermarking/fingerprinting
scheme.
In The 6th International Workshop on Digital Watermarking,
volume 3304 of Springer Lecture Notes in Computer Science, 2007.
Canton (Guangzhou) China.
[ bib |
Preprint ]
|
[62]
|
Hans Georg Schaathun and Marcel Fernandez-Muñoz.
Soft decision decoding of Boneh-Shaw fingerprinting codes.
IEICE Transactions, E89-A(10):2603--2608, October 2006.
[ bib |
URL |
.pdf ]
|
[63]
|
Hans Georg Schaathun.
On watermarking/fingerprinting for copyright protection.
In Innovative Computing, Information and Control, 2006. ICICIC
'06. First International Conference on, volume 3, pages 50--53, Beijing,
China, August 2006.
[ bib |
DOI |
URL ]
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks. In this paper we study the interface between the collusion-secure fingerprinting codes and the underlying watermarking scheme, and we construct several codes which are both error-correcting and collusion-secure. Error-correction makes the system robust against successful attacks on the watermarking layer
Keywords: error correction codes;fingerprint identification;watermarking;collusion-secure codes;copyright protection;cut-and-paste attacks;digital fingerprinting;error-correcting code;watermarking;Computer errors;Copyright protection;Decoding;Error correction codes;Fingerprint recognition;Image segmentation;Marketing and sales;Robustness;Steganography;Watermarking;collusion-secure fingerprinting;copyright protection;error-correcting codes;soft-decision decoding;watermarking
|
[64]
|
Hans Georg Schaathun.
The Boneh-Shaw fingerprinting scheme is better than we thought.
IEEE Transaction on Information Forensics and Security, June
2006.
[ bib |
DOI |
Preprint ]
Digital fingerprinting is a forensic method against illegal copying. The distributor marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates due to this fingerprint. To work against a coalition of several pirates, the fingerprinting scheme must be based on a collusion-secure code. This paper addresses binary collusion-secure codes in the setting of Boneh and Shaw (1995/1998). We prove that the Boneh-Shaw scheme is more efficient than originally proven, and we propose adaptations to further improve the scheme. We also point out some differences between our model and others in the literature.
Keywords: binary codes;copy protection;Boneh-Shaw fingerprinting;binary collusion-secure codes;forensic method;illegal copying;Copyright protection;Councils;Data security;Fingerprint recognition;Forensics;Law;Legal factors;Legislation;Marketing and sales;Motion pictures;Collusion-secure codes;copyright protection;digital fingerprinting (FP);traitor tracing
|
[65]
|
Hans Georg Schaathun.
Nested codes for constrained memory and for dirty paper.
In Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, Springer Lecture Notes in Computer Science. Springer-Verlag, 2006.
AAECC-16, Las Vegas, USA.
[ bib |
Preprint |
URL ]
|
[66]
|
Gérard D. Cohen and Hans Georg Schaathun.
A trellis-based bound on (2, 1)-separating codes.
In Cryptography and Coding, volume 3796 of Springer
Lecture Notes in Computer Science. Springer-Verlag, December 2005.
10th IMA International Conference, Cirencester, England.
[ bib |
Preprint |
URL ]
|
[67]
|
Hans Georg Schaathun.
On watermarking/fingerprinting for copyright protection.
In Norsk Informatikkonferanse, Bergen, Norway, November 2005.
[ bib |
.pdf ]
|
[68]
|
Hans Georg Schaathun and Tor Helleseth.
The second support weight distribution of the Kasami codes.
Information Theory, IEEE Transactions on, 51(8):2892--2894,
August 2005.
[ bib |
DOI |
Preprint ]
We compute the second support weight distribution of the
Kasami codes.
Keywords: Galois fields, dual codes, linear codes GF,
Galois field, Kasami code, SWD, dual code,
linear code, support weight distribution
|
[69]
|
Hans Georg Schaathun and Marcel Fernandez-Muñoz.
Boneh-Shaw fingerprinting and soft decision decoding.
In Information Theory Workshop, 2005.
Rotorua, NZ.
[ bib |
URL ]
|
[70]
|
Tor Helleseth and Hans Georg Schaathun.
On the (2,1)-separating weight of the Kerdock code.
IEEE Trans. Inform. Theory, 50(12):3312--3315, December 2004.
[ bib |
DOI |
Preprint |
URL ]
Separating codes find applications in many fields including automata theory and digital fingerprinting. It is known that the Kerdock code of sufficient order is (2,1)- and (2,2)-separating, but the separating weight is only known by a lower bound due to Sagalovich. In this correspondence, we prove that the lower bound on the (2,1)-separating weight is met with equality.
Keywords: automata theory;binary codes;linear codes;(2, 1)-separating weight;automata theory;binary Kerdock code;digital fingerprinting;linear codes;separating codes;Binary codes;Councils;Hamming distance;Informatics;65;Fingerprinting;Kerdock code;linear codes over;separating systems
|
[71]
|
Hans Georg Schaathun.
Fighting three pirates with scattering codes.
In Proc. IEEE Intern. Symp. Inform. Theory, page 202, June
2004.
[ bib |
URL ]
|
[72]
|
Hans Georg Schaathun.
Duality and support weight distributions.
Information Theory, IEEE Transactions on, 50(5):862--867, May
2004.
[ bib |
DOI |
Preprint ]
We show how to compute the support weight distribution
A/sub i//sup r/ for r/spl ges/k-d/sub 2//sup /spl perp//+3,
where d/sub 2//sup /spl perp// is the second minimum support
weight of a code, provided the weight enumerator of the dual
code is known.
Keywords: dual codes dual code, support weight distribution,
weight enumerator
|
[73]
|
Gérard D. Cohen and Hans Georg Schaathun.
Separating codes: Constructions and bounds.
In LATIN 2004: Theoretical Informatics: 6th Latin American
Symposium, Buenos Aires, Argentina, April 5-8, 2004. Proceedings, volume
2976, pages 322--328, April 2004.
[ bib |
Preprint ]
|
[74]
|
Gérard D. Cohen and Hans Georg Schaathun.
Upper bounds on separating codes.
IEEE Trans. Inform. Theory, 50(6):1291--1295, 2004.
[ bib |
DOI |
Preprint ]
The combinatorial concept of separating systems has numerous applications, such as automata theory, digital fingerprinting, group testing, and hashing. In this correspondence, we derive upper bounds on the size of codes with various separating properties.
Keywords: combinatorial mathematics;error correction codes;automata theory;combinatorial concept;digital finger printing;error-correcting codes;group testing;hashing;separating codes;separating system;superimposed codes;upper bound;Cryptography;Cyclic redundancy check;Error-correcting codes;hashing;separating systems;superimposed codes
|
[75]
|
Hans Georg Schaathun.
A lower bound for the greedy weights of product codes.
Designs, Codes, and Cryptography, 31(1):27--42, January 2004.
[ bib |
Preprint ]
|
[76]
|
Hans Georg Schaathun.
On collusion-secure codes for copyright protection.
In Norsk Informatikkonferanse, Stavanger, Norway, 2004.
[ bib |
.pdf ]
|
[77]
|
Hans Georg Schaathun and Tor Helleseth.
Separating and intersecting properties of BCH and Kasami codes.
In Cryptography and Coding, volume 2898 of Springer
Lecture Notes in Computer Science, pages 52--65. Springer-Verlag, December
2003.
9th IMA International Conference, Cirencester, England.
[ bib |
Preprint ]
Separating codes have recently been applied in the
construction of collusion secure fingerprinting schemes.
They are related to other combinatorial concepts like
intersecting codes, superimposed codes, hashing families,
and group testing. In this paper we study some good, binary
asymptotic constructions of such codes.
Keywords: separating systems, fingerprinting, BCH codes, Kasami codes
|
[78]
|
Hans Georg Schaathun.
Fighting two pirates.
In Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, volume 2643 of Springer Lecture Notes in Computer Science,
pages 71--78, May 2003.
[ bib |
Preprint ]
|
[79]
|
Gérard D. Cohen and Hans Georg Schaathun.
New upper bounds on separating codes.
In 2003 International Conference on Telecommunications,
February 2003.
[ bib |
URL ]
|
[80]
|
Gérard D. Cohen and Hans Georg Schaathun.
New bounds on separating families, 2003.
Pseudo-proceedings of the cancelled CCC'03 in Yellow Mountain, China.
[ bib ]
|
[81]
|
Gérard D. Cohen, Sylvia B. Encheva, Simon Litsyn, and Hans Georg Schaathun.
Erratum to: “Intersecting codes and separating codes” [Discrete
Appl. Math. 128 (2003), no. 1, 75--83].
Discrete Applied Mathematics, 131(3):689--690, 2003.
[ bib ]
|
[82]
|
Gérard D. Cohen, Sylvia B. Encheva, Simon Litsyn, and Hans Georg Schaathun.
Intersecting codes and separating codes.
Discrete Applied Mathematics, 128(1):75--83, 2003.
International Workshop on Coding and Cryptography (WCC2001).
[ bib |
DOI |
URL |
.pdf ]
Let Γ be a code of length n. Then x is called a descendant of the coalition of codewords a,b,…,e if xi∈ai,bi,…,ei for i=1,…,n. We study codes with the following property: any two non-intersecting coalitions of a limited size have no common descendant. We present constructions based on linear intersecting codes.
Keywords: Intersecting code, Separating code, Copyright protection
|
[83]
|
Hans Georg Schaathun and Wolfgang Willems.
A lower bound for the weight hierarchies of product codes.
Discrete Applied Mathematics, 128:251--261, 2003.
Special issue for WCC 2001.
[ bib |
Preprint ]
|
[84]
|
Gérard D. Cohen, Sylvia B. Encheva, and Hans Georg Schaathun.
More on (2,2)-separating systems.
IEEE Trans. Inform. Theory, 48(9):2606--2609, September 2002.
[ bib |
DOI |
Preprint ]
The theory of separating systems has been applied in different areas of science and technology such as automata synthesis, technical diagnosis, and authenticating ownership claims. Constructions of (2,2)-separating systems derived from error-correcting codes are given, together with bounds on their parameters based on distance considerations.
Keywords: concatenated codes;error correction codes;linear codes;2,2-separating systems;bounds;concatenated codes;copyright protection;distance considerations;error-correcting codes;linear codes;watermarking;Linear code;Sufficient conditions;Terminology;Watermarking
|
[85]
|
Hans Georg Schaathun.
Duality and greedy weights for linear codes and projective multisets.
In Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, volume 2227 of Springer Lecture Notes in Computer Science,
pages 92--101. Springer-Verlag, November 2001.
AAECC-15, Melbourne, Australia.
[ bib |
Preprint ]
A projective multiset is a collection of projective points,
which are not necessarily distinct. A linear code can be represented
as a projective multiset, by taking the columns of a generator
matrix as projective points. Projective multisets have proved
very powerful in the study of generalised Hamming weights.
In this paper we study relations between a code and its dual.
Keywords: linear codes, projective multiset, weight hierarchy,
greedy weights, dual code
|
[86]
|
Hans Georg Schaathun.
A lower bound on the greedy weights of product codes and projective
multisets.
In Proc. IEEE Intern. Symp. Inform. Theory, page 120, June
2001.
Washington DC.
[ bib |
DOI ]
We present the relation between product codes and projective multisets, and give a lower bound on the greedy weights of product codes
Keywords: linear codes;set theory;greedy weights;linear codes;lower bound;product codes;projective multisets;Councils;Informatics;Linear code;Product codes;Subspace constraints;Tensile stress
|
[87]
|
Hans Georg Schaathun and Wolfgang Willems.
A lower bound for the weight hierarchy of product codes.
In Proc. IEEE Intern. Symp. Inform. Theory, page 59, June 2001.
Washington DC.
[ bib |
URL ]
|
[88]
|
Conchita Martínez-Pérez, Hans Georg Schaathun, and Wolfgang Willems.
On the weight hierarchies of product codes. The Wei-Yang
Conjecture and more.
In Daniel Augot, editor, Workshop on Coding and Cryptography,
pages 373--379, January 2001.
[ bib |
Preprint ]
|
[89]
|
Hans Georg Schaathun.
Upper bounds on weight hierarchies of extremal non-chain codes.
Discrete Math., 241(1--3):449--469, 2001.
Selected Papers in honour of Helge Tverberg.
[ bib |
DOI |
Preprint |
URL ]
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d1,d2,…,dk) where dr is the smallest support weight of an r-dimensional subcode of C. Linear codes may be classified according to a set of chain and non-chain conditions, the extreme cases being codes satisfying the chain condition (due to Wei and Yang) and extremal, non-chain codes (due to Chen and Kløve). This paper gives upper bounds on the weight hierarchies of the latter class of codes.
Keywords: Weight hierarchy, Chain condition, Linear codes,
Projective multiset
|
[90]
|
Hans Georg Schaathun.
The weight hierarchy of product codes.
IEEE Trans. Inform. Theory, 46(7):2648--2651, November 2000.
[ bib |
DOI |
Preprint |
URL ]
The weight of a code is the number of coordinate positions where no codeword is zero. The rth minimum weight dr is the least weight of an r-dimensional subcode. Wei and Yang (1993) gave a conjecture about the minimum weights for some product codes. In this article, we find a relation between product codes and the Segre embedding of a pair of projective systems, and we use this to prove the conjecture
Keywords: linear codes;set theory;Segre embedding;coordinate positions;linear code;minimum weight;minimum weights;product codes;projective multiset;projective systems;subcode;weight hierarchy;Informatics;Linear code;Product codes;Tensile stress;Vectors
|
[91]
|
Hans Georg Schaathun.
Projective systems and higher weights.
In Proc. IEEE Intern. Symp. Inform. Theory, page 255, June
2000.
[ bib |
DOI ]
We use projective multisets (projective systems) to find upper bounds on the weight hierarchies for a special class of codes, namely the extremal non-chain codes. Several code constructions exist meeting the bounds with equality
Keywords: linear codes;code constructions;extremal nonchain codes;higher weights;linear codes;projective multisets;projective systems;upper bounds;weight hierarchies;Algebra;Binary codes;Galois fields;Hamming weight;Informatics;Upper bound
|