• Home
  • Sofia Tsekeridou
Sofia Tsekeridou

Sofia Tsekeridou
INTRASOFT International · Research and Innovation Development

PhD

About

96
Publications
11,109
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
943
Citations
Additional affiliations
February 2006 - October 2015
Athens Information Technology
Position
  • Professor (Assistant)
February 2006 - December 2015
Athens Information Technology
Position
  • Professor (Associate)
January 2005 - present
Democritus University of Thrace

Publications

Publications (96)
Poster
Full-text available
This poster outlines a distributed data-driven ecosystem addressing those issues and whose purpose is to enable discoverability, accessibility upon enforced sharing policies, data interoperability and re-use of both open, non-commercial but also privately owned health and other data in situ and in batch in the fight against pandemics. It is address...
Article
Full-text available
This paper presents the components and integrated outcome of a system that aims to achieve early detection, monitoring and mitigation of pandemic outbreaks. The architecture of the platform aims at providing a number of pandemic-response-related services, on a modular basis, that allows for the easy customization of the platform to address user’s n...
Article
Accurate, target-oriented, and timely information is a strategic input in effective decision-making for a plethora of actors within society. The exponential growth in the amount of legal data generated, collected, stored and processed in today's digitalised world, and its emergence as an essential input in everyday interactions, compels us to take...
Article
Full-text available
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learning formulations for detecting threats and alerts on network logs that were acquired by pfSense,...
Chapter
Community Policing (CP) is gaining popularity with police and governments as well as citizens, aiming to improve crime prevention and safety. Multiple ICT tools for CP have emerged to ease citizens’ engagement with CP activities. Most of them are, however, tailor-made to the specific needs of their direct users in a city or country or provide fragm...
Chapter
The European legal system is multi-layered and complex, and large quantities of legal documentation have been produced since its inception. This has significant ramifications for European society, whose various constituent actors require regular access to accurate and timely legal information, and often struggle with basic comprehension of legalese...
Chapter
Full-text available
We present the IMPRESS software system; a tool that can support the first responders in cases of disaster management and resources allocation and the optimisation of response to large-scale emergencies. This is a multi-level architecture system that has desktop and mobile interfaces, supporting the decision makers with different modules. Every modu...
Chapter
Community policing (CP) provides benefits for both police/governments and citizens, aiming to improve safety and crime prevention. As part of e-government initiatives, multiple ICT tools for CP have emerged to ease citizen’s engagement with CP. Most of them are, however, tailor-made to specific needs of their direct users in a city or country or pr...
Conference Paper
Full-text available
In our paper we will present the IMPRESS Platform tools that have been used for tests and validation purposes in the case of Palermo Demo. The demo has been part of a national Italian field test exercise for civil protection authorities and all related services along. The system validation and tests procedures have been fulfilled in alignment with...
Article
Full-text available
Περίληψη The Web has become the biggest knowledge database that users access on a daily basis to retrieve useful information for their personal or professional decisions and actions. With the support of the technology and the IT revolution, the users once merely consumers, are actively producing and sharing content on the Web, using social network...
Conference Paper
The paper presents iGuide, a system that aims at enabling a socially enriched mobile tourist guide service, with the aim to address a much wider range of sites and attractions than existing solutions cover, including historic and traditional settlements, sites of natural beauty or unattended sites of cultural heritage where access to information is...
Conference Paper
Full-text available
English has been set as the language of the sea at international level and its use in situations where safety is at stake such as fighting a fire or berthing a ship is not always non-problematic, especially when one observes that 80% of maritime accidents are imputable to human factors, of which failure of communication represents one third. Furthe...
Conference Paper
Full-text available
Public Safety is nowadays a priority, cornerstone and major concern for governments, majors and policy makers in current (and future) smart cities. Notwithstanding the foregoing, large advances in ICT technologies are foretold to revolutionize our society and enhance our feeling of safety (and hopefully, wellbeing). This chapter presents an introdu...
Chapter
Protecting citizens is one of the key factors and also a priority for governments, majors and policy makers in current (and future) smart cities. In this sense, cities and countries’ authorities are making a great effort in applying innovative approaches and new technologies in the Public Safety domain in recent years. One of these innovative appro...
Article
In this work we present a novel video annotation and media enrichment methodology for enhanced visual communication among first responders (FRs) and their command centers complementing voice communications in order to overcome current shortcomings of the latter. For this purpose, an initial taxonomy of emergency cases and sub-cases handled by a var...
Article
Fraud detection has been an important topic of research in the data mining community for the past two decades. Supervised, semi-supervised, and unsupervised approaches to fraud detection have been proposed for the telecommunications, credit, insurance and health-care industries. We describe a novel hybrid system for detecting fraud in the highly gr...
Article
In this paper we present our research results towards the detection of violent scenes in movies, employing advanced fusion methodologies, based on learning, knowledge representation and reasoning. Towards this goal, a multi-step approach is followed: initially, automated audio and visual analysis is performed to extract audio and visual cues. Then,...
Article
There is no doubt that e-learning systems have dramatically evolved over the last two decades, due to the large penetration of computers and internet access and the advances in both software and hardware systems. However, e-learning has not yet managed to address the full potential of the 'e' sense. The emergence of Web 2.0 that allows people not o...
Article
Full-text available
Emergency situations call for the timely collaboration and error free communication of first responder (FR) teams from their Command Posts (CP) and between themselves. First responder teams must form and adapt their plans and actions as a real-time critical situation unfolds. This paper presents an advanced Command Post application that manages a d...
Article
Full-text available
E-learning technologies have matured to a point where distance learning classes are commonly offered from many leading Universities around the world. A major challenge in such distributed classrooms is the formation of virtual communities among the participating students, enhancing the overall learning experience. Shared virtual laboratories offer...
Conference Paper
A 3D educational mobile game is designed and implemented with the aim to teach hard-to-spell words to young children exploiting their natural affinity towards games entertainment in order to increase the likelihood of useful knowledge acquisition while having fun. The educational game features a fighter plane style environment in which spelling is...
Article
Remote experimentation is an effective e-learning paradigm for supporting hands-on education using laboratory equipment at distance. The current trend is to enable remote experimentation in mobile and ubiquitous learning. In such a context, the remote ...
Article
Full-text available
Enabling learning for members of geographically isolated communities presents benefits in terms of promoting regional development and cost savings for governments and companies. However, notwithstanding recent advances in e-Learning, from both technological and pedagogical perspectives, there are very few, if any, recognised methodologies for user-...
Chapter
E-learning technologies have matured to a point where distance learning classes are commonly offered from many leading Universities around the world. A major challenge in such distributed classrooms is the formation of virtual communities among the participating students, enhancing the overall learning experience. Shared virtual laboratories offer...
Article
Full-text available
Virtual campuses are gradually becoming a reality with the advances in e-learning and Web technologies, distributed systems and broadband communication, as well as the emerging needs of remote Universities for collaboration on offering common programs. The advances in grid-based distributed infrastructures have further significantly contributed to...
Article
Full-text available
Advanced tele-education services provision to remote geographically dispersed user communities, such as agriculture and maritime, based on the specific needs and requirements of such communities, implies significant infrastructural and broadband connectivity requirements for rich media, timely and quality-assured content delivery and interactivity....
Article
Enabling learning for members of geographically isolated communities presents benefits in terms of promoting regional development and cost savings for governments and companies. However, notwithstanding recent advances in e-Learning, from both technological and pedagogical perspectives, there are very few, if any, recognised methodologies for user-...
Conference Paper
Classification algorithms are gaining more and more importance in many fields such as Artificial Intelligence, Information Retrieval, Data Mining and Machine Vision. Many classification algorithms have emerged, belonging to different families, among which the tree-based and the clustering-based ones. Such extensive availability of classifiers makes...
Conference Paper
Full-text available
Along with the rapid increase of available multimedia data, comes the proliferation of objectionable content such as violence and pornography. We need efficient tools for automatically identifying, classifying and filtering out harmful or undesirable video content for the protection of sensitive user groups (e.g. children). In this paper we present...
Conference Paper
Enabling learning for members of geographically isolated communities such as agrarian, or maritime communities presents benefits in terms of promoting regional development and cost savings for governments and companies. We present a methodology for designing a satellite and wireless based network infrastructure and learning services to support dist...
Conference Paper
The paper discusses scalable video streaming traffic delivery over heterogeneous DiffServ/WLAN networks. A prototype architecture is proposed and further validated that explores the joint use of packet prioritization and scalable video coding (SVC) together with the appropriate mapping of 802.11e access categories to the DiffServ traffic classes. A...
Article
The rapid expand of Internet and the drastic turn to the digital era have led to the investigation of digital watermarking as a complementary technology to traditional protection mechanisms to ensure digital content protection. Significant research efforts have been reported in the fields of audio and image watermarking, with video and 3D data wate...
Conference Paper
Advanced tele-education services provision to remote geographically dispersed user communities, such as agriculture and maritime, based on the specific needs and requirements of such communities, implies significant infrastructural and broadband connectivity requirements for rich media, timely and quality-assured content delivery and interactivity....
Conference Paper
Full-text available
There are specific sectors of the economy that can benefit from satellite-based tele-education. Areas, such as maritime and agriculture, share common needs for both broadband connectivity at remote geographical areas that cannot otherwise be covered, and for innovative content for tele-education purposes. Furthermore, each area has special requirem...
Conference Paper
Full-text available
The paper presents definition extensions to MPEG-7 meta-data ones, mainly related to audio descriptors, introduced to e ciently describe traditional Greek music data features in order to further enable e cient music retrieval. A number of advanced content-based retrieval scenarios have been defined such as query by music rhythm, query by example an...
Conference Paper
E-learning practice is continuously using experimentation in order to enhance the basic information transfer model where knowledge is passed from the system/ tutors to the students. Boosting student productivity through on-line experimentation is not simple since many organizational, educational and technological issues need to be dealt with. This...
Article
Full-text available
E-learning practice is continuously using experimentation in order to enhance the basic information transfer model where knowledge is passed from the system/ tutors to the students. Boosting student productivity through on-line experimentation is not simple since many organizational, educational and technological issues need to be dealt with. This...
Conference Paper
The paper presents an MPEG-7 MDS-based metadata and user profile model used within an enhanced DTV environment for semantic annotation and personalized access to multiple sports DTV services. It is shown that in order to enable intelligent and personalized processing, management and use of multimedia content and services in a personalised way, the...
Conference Paper
Full-text available
We evaluate the impact of network, and protocol heterogeneity on real-time application performance. We focus on TCP and UDP supportive role, also in the context of network stability and fairness. We reach several conclusions on the specific impact of wireless links, MPEG traffic friendliness, and TCP version efficiency. Beyond that, we also reach a...
Conference Paper
Full-text available
This manuscript introduces the concept of self similar watermarks for the purpose of counterfeiting geometrical attacks on copyright protected still images. Geometrical transformations result in the de-synchronization of watermark detection mechanisms enforcing the adoption of exhaustive search strategies for optimizing the algorithm’s efficiency....
Conference Paper
Full-text available
The paper presents an MPEG-7 Multimedia Description Schemes (MDS)-based metadata and user profile model used within an en-hanced DTV environment for semantic annotation and personal-ized access to multiple sports DTV services. It is shown that in order to enable intelligent and personalized processing, manage-ment and use of multimedia content and...
Article
Full-text available
A study on the use of vector rational interpolation for the estimation of erroneously received motion fields of MPEG-2 predictively coded frames is undertaken in this paper, aiming further at error concealment (EC). Various rational interpolation schemes have been investigated, some of which are applied to different interpolation directions. One sc...
Conference Paper
To efficiently compress rasterized compound documents, an encoder must be content-adaptive. Content adaptivity may be achieved by using a layered approach. In such an approach, a compound image is segmented into layers and then the appropriate encoders are employed to compress these layers individually. A major factor in using these standard encode...
Article
Full-text available
In this paper, theoretical performance analysis of watermarking schemes based on correlation detection is undertaken, leading to a number of important observations on the watermarking system detection performance. Statistical properties of watermark sequences generated by piecewise-linear Markov maps are investigated. Correlation/spectral propertie...
Article
Research Report ISO/IEC JTC1/SC29/WG11, MPEG02/M9031 , Shanghai, Chine
Conference Paper
Full-text available
Three simple speaker verification techniques based on vector quantization, sphericity models and dynamic time warping, respectively, are developed and tested using the same experimental protocol. Two types of feature vectors, the linear prediction derived cepstral coefficients and the mel-frequency cepstral coefficients are considered. The efficien...
Article
Full-text available
In this paper, statistical analysis of watermarking schemes based on correlation detection is presented. Statistical properties of watermark sequences generated by piecewise-linear Markov maps are exploited, resulting in superior watermark detection reliability. Correlation/spectral properties of such sequences are easily controllable, a fact that...
Article
Full-text available
A thorough investigation on all possible scenarios where digital imperceptible watermarking is applicable is presented in this paper. All previously proposed watermarking schemes fall to at least one of the referenced application categories. Possible attacks are divided into categories and application scenarios are presented, always referring to th...
Article
Full-text available
A scene boundary detection method is presented, which analyzes both aural and visual information sources and accounts for their inter-relations and coincidence to semantically identify video scenes. Audio analysis focuses on the segmentation of the audio source into three types of semantic primitives, i.e. silence, speech and music. Further process...
Article
Full-text available
In this paper, statistical analysis of watermarking schemes based on correlation detection is presented. Statistical properties of watermark sequences generated by piecewise-linear Markov maps are exploited, resulting in superior watermark detection reliability. Correlation/spectral properties of such sequences are easily controllable, a fact that...
Article
comparison of still image watermarking methods is presented in this paper. Robustness against a variety of attacks is evaluated. Performance assessment is based on ROC curve estimation and comparison. As an example, two distinct watermarking methods are tested by the benchmarking system and conclusions about their comparative performance are drawn.
Article
Full-text available
In this paper we present a shot cut detection technique based on the fusion of information provided by three individual methods of analyzing both the static and the dynamic features of video sequences. The presented video analysis focuses on extracting multiple low-level content descriptors that once combined, enhance the shot boundary detection re...
Conference Paper
Full-text available
In this paper, statistical analysis of watermarking schemes based on correlation detection is presented. Statistical properties of watermark sequences generated by piecewise-linear Markov maps are exploited, resulting in superior watermark detection reliability. Correlation/spectral properties of such sequences are easily controllable, a fact that...
Article
Full-text available
The paper deals with the statistical analysis of the behaviour of a blind copyright protection watermarking system based on chaotic watermark signals generated by n-way Bernoulli shift maps. The analysis involves theoretical evaluation of the system detection reliability, when a correlator detector is used. The effect of distortions (lowpass filter...
Article
Full-text available
The paper statistically analyzes the behaviour of chaotic watermark signals generated by n-way Bernoulli shift maps. For this purpose, a simple blind copyright protection watermarking system is considered. The analysis involves theoretical evaluation of the system detection reliability, when a correlator detector is used. The system is modeled in a...
Article
A content-based video parsing and indexing method is presented in this paper, which analyzes both information sources (auditory and visual) and accounts for their inter-relations and synergy to extract high-level semantic information. Both frame- and object-based access to the visual information is employed. The aim of the method is to extract sema...
Conference Paper
Full-text available
A thorough investigation on all possible scenarios where digital imperceptible watermarking is applicable is presented. All previously proposed watermarking schemes fall to at least one of the referenced application categories. Possible attacks are divided into categories and application scenarios are presented, always referring to the watermarking...
Conference Paper
Full-text available
A benchmarking system for watermarking algorithms is described. The proposed benchmarking system can be used to evaluate the performance of watermarking methods used for copyright protection, authentication, fingerprinting, etc. Although the system described is used for image watermarking, the general framework can be used, by introducing a differe...
Conference Paper
Full-text available
In this paper, statistical analysis of watermarking schemes based on correlation detection is presented. Statistical properties of watermark sequences generated by piecewise-linear Markov maps are exploited, resulting in superior watermark detection reliability. Correlation/spectral properties of such sequences are easily controllable, a fact that...
Conference Paper
Full-text available
The paper statistically analyzes the behaviour of a simple blind copyright protection watermarking system based on chaotic watermark signals generated by n-way Bernoulli shift maps. The analysis involves theoretic evaluation of the system detection reliability, when a correlator detector is used. The eect of simple distortions on the detection reli...