#### Filter Results:

- Full text PDF available (38)

#### Publication Year

1982

2017

- This year (4)
- Last 5 years (30)
- Last 10 years (51)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Frans M. J. Willems, Yuri M. Shtarkov, Tjalling J. Tjalkens
- IEEE Trans. Information Theory
- 1995

We describe a sequential universal data compression procedure for binary tree sources that performs the “double mixture.” Using a context tree, this method weights in an efficient recursive way the coding distributions corresponding to all bounded memory tree sources, and achieves a desirable coding distribution for tree sources with an unknown model and… (More)

- Frans M. J. Willems
- IEEE Trans. Information Theory
- 1983

- Frans M. J. Willems
- IEEE Trans. Information Theory
- 1998

First we modify the basic (binary) context-tree weighting method such that the past symbols x 1?D ; x 2?D ; ; x 0 are not needed by the encoder and the decoder. Then we describe how to make the context tree depth D innnite, which results in optimal redundancy behavior for all tree sources, while the number of records in the context tree is not larger than… (More)

- Frans M. J. Willems
- IEEE Trans. Information Theory
- 1996

- Frans M. J. Willems, Edward C. van der Meulen
- IEEE Trans. Information Theory
- 1985

- Andries P. Hekstra, Frans M. J. Willems
- IEEE Trans. Information Theory
- 1989

- Ton Kalker, Frans M. J. Willems
- Security and Watermarking of Multimedia Contents
- 2003

We investigate fundamental properties of biometrical identification systems. We focus on the capacity, i.e. a measure for the number of individuals that can be reliably identified. It can be expressed using standard information-theoretical concepts. I. Model description, result identification phase -

- Paul A. J. Volf, Frans M. J. Willems
- Data Compression Conference
- 1998

This paper discusses a switching method which can be used to combine two sequential universal source coding algorithms. The switching method treats these two algorithms as black-boxes and can only use their estimates of the probability distributions for the consecutive symbols of the source sequence. Three weighting algorithms based on this switching method… (More)

- Tanya Ignatenko, Frans M. J. Willems
- IEEE Transactions on Information Forensics and…
- 2009

This paper addresses privacy leakage in biometric secrecy systems. Four settings are investigated. The first one is the standard Ahlswede-Csiszar secret-generation setting in which two terminals observe two correlated sequences. They form a common secret by interchanging a public message. This message should only contain a negligible amount of information… (More)