Christine Servière

Learn More
We consider the blind separation of convolutive mixtures based on the joint diagonalization of time varying spectral matrices of the observation records. The goal is to separate audio mixtures in which the mixing filter has quite long impulse responses and the signals are highly non stationary. We rely on the continuity of the frequency response of the(More)
This paper presents a method for blind separation of convolutive mixtures of speech signals, based on the joint diagonalization of the time varying spectral matrices of the observation records and a novel technique to handle the problem of permutation ambiguity in the frequency domain. Simulations show that our method works well even for rather realistic(More)
In pattern recognition-based myoelectric control, high accuracy for multiple discriminated motions is presented in most of related literature. However, there is a gap between the classification accuracy and the usability of practical applications of myoelectric control, especially the effect of long-term usage. This paper proposes and investigates the(More)
This paper presents a method for blind separation of convolutive mixtures of speech signals, based on the joint diagonalization of the time varying spectral matrices of the observation records. The main and still largely open problem in a frequency domain approach is permutation ambiguity. In an earlier paper of the authors, the continuity of the frequency(More)
Recently, several three-axial MEMS-based force sensors have been developed. This kind of force micro sensor is also called tactile sensor in literature for its similarities in size and sensitivity with human mechanoreceptors. Therefore, we believe these three-axial force sensors being able to analyse textures properties while sliding on a surface, as would(More)
Side channel attacks exploit physical information leaked during the operation of a cryptographic device (e.g., a smart card). The confidential data, which can be leaked from side channels, are timing of operations, power consumption, and electromagnetic emanation. In this paper, we propose a preprocessing method based on the fourth-order cumulant, which(More)
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA(More)
BSS performance is not still enough for speech signals and long acoustic responses. An original frequency model, strictly equivalent to a time linear convolution, is used for speech signals under highly reverberant conditions. If the responses are virtually sectioned in K blocks of N samples, the time linear convolutions are strictly transformed in(More)
Side channel analysis like differential power analysis (DPA) has been known as an efficient attack for uncovering secret data of cryptosystems. However, the temporal misalignment of side channel signals is an issue of concern that destabilizes side channel attack efficiency. In this paper, we propose a new method to surmount the misalignment problem in DPA.(More)