117,191 research outputs found

    Video Captioning with Guidance of Multimodal Latent Topics

    Full text link
    The topic diversity of open-domain videos leads to various vocabularies and linguistic expressions in describing video contents, and therefore, makes the video captioning task even more challenging. In this paper, we propose an unified caption framework, M&M TGM, which mines multimodal topics in unsupervised fashion from data and guides the caption decoder with these topics. Compared to pre-defined topics, the mined multimodal topics are more semantically and visually coherent and can reflect the topic distribution of videos better. We formulate the topic-aware caption generation as a multi-task learning problem, in which we add a parallel task, topic prediction, in addition to the caption task. For the topic prediction task, we use the mined topics as the teacher to train a student topic prediction model, which learns to predict the latent topics from multimodal contents of videos. The topic prediction provides intermediate supervision to the learning process. As for the caption task, we propose a novel topic-aware decoder to generate more accurate and detailed video descriptions with the guidance from latent topics. The entire learning procedure is end-to-end and it optimizes both tasks simultaneously. The results from extensive experiments conducted on the MSR-VTT and Youtube2Text datasets demonstrate the effectiveness of our proposed model. M&M TGM not only outperforms prior state-of-the-art methods on multiple evaluation metrics and on both benchmark datasets, but also achieves better generalization ability.Comment: ACM Multimedia 201

    Message Authentication Code over a Wiretap Channel

    Full text link
    Message Authentication Code (MAC) is a keyed function fKf_K such that when Alice, who shares the secret KK with Bob, sends fK(M)f_K(M) to the latter, Bob will be assured of the integrity and authenticity of MM. Traditionally, it is assumed that the channel is noiseless. However, Maurer showed that in this case an attacker can succeed with probability 2H(K)+12^{-\frac{H(K)}{\ell+1}} after authenticating \ell messages. In this paper, we consider the setting where the channel is noisy. Specifically, Alice and Bob are connected by a discrete memoryless channel (DMC) W1W_1 and a noiseless but insecure channel. In addition, an attacker Oscar is connected with Alice through DMC W2W_2 and with Bob through a noiseless channel. In this setting, we study the framework that sends MM over the noiseless channel and the traditional MAC fK(M)f_K(M) over channel (W1,W2)(W_1, W_2). We regard the noisy channel as an expensive resource and define the authentication rate ρauth\rho_{auth} as the ratio of message length to the number nn of channel W1W_1 uses. The security of this framework depends on the channel coding scheme for fK(M)f_K(M). A natural coding scheme is to use the secrecy capacity achieving code of Csisz\'{a}r and K\"{o}rner. Intuitively, this is also the optimal strategy. However, we propose a coding scheme that achieves a higher ρauth.\rho_{auth}. Our crucial point for this is that in the secrecy capacity setting, Bob needs to recover fK(M)f_K(M) while in our coding scheme this is not necessary. How to detect the attack without recovering fK(M)f_K(M) is the main contribution of this work. We achieve this through random coding techniques.Comment: Formulation of model is change
    corecore