121 research outputs found
Data hiding in multimedia - theory and applications
Multimedia data hiding or steganography is a means of communication using subliminal channels. The resource for the subliminal communication scheme is the distortion of the original content that can be tolerated. This thesis addresses two main issues of steganographic communication schemes:
1. How does one maximize the distortion introduced without affecting fidelity of the content?
2. How does one efficiently utilize the resource (the distortion introduced) for communicating as many bits of information as possible? In other words, what is a good signaling strategy for the subliminal communication scheme?
Close to optimal solutions for both issues are analyzed. Many techniques for the issue for maximizing the resource, viz, the distortion introduced imperceptibly in images and video frames, are proposed. Different signaling strategies for steganographic communication are explored, and a novel signaling technique employing a floating signal constellation is proposed. Algorithms for optimal choices of the parameters of the signaling technique are presented.
Other application specific issues like the type of robustness needed are taken into consideration along with the established theoretical background to design optimal data hiding schemes. In particular, two very important applications of data hiding are addressed - data hiding for multimedia content delivery, and data hiding for watermarking (for proving ownership). A robust watermarking protocol for unambiguous resolution of ownership is proposed
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
In emerging networks consisting of large-scale deployments of mobile devices, efficient security mechanisms are required to facilitate cryptographic authentication. While computation and bandwidth overheads are expensive for mobile devices, the cost of storage resources continue to fall at a rapid rate. We propose a simple novel key predistribution scheme, \textit{key subset and symmetric certificates} (KSSC) which can take good advantage of inexpensive storage resources, and has many compelling advantages over other approaches for facilitating ad hoc establishment of pairwise secrets in mobile computing environments. We argue that a combination of KSSC with a variant of an elegant KDS proposed by Leighton and Micali is an appealing choice for securing large scale deployments of mobile devices
Deep Sensitivity Analysis for Objective-Oriented Combinatorial Optimization
Pathogen control is a critical aspect of modern poultry farming, providing
important benefits for both public health and productivity. Effective poultry
management measures to reduce pathogen levels in poultry flocks promote food
safety by lowering risks of food-borne illnesses. They also support animal
health and welfare by preventing infectious diseases that can rapidly spread
and impact flock growth, egg production, and overall health. This study frames
the search for optimal management practices that minimize the presence of
multiple pathogens as a combinatorial optimization problem. Specifically, we
model the various possible combinations of management settings as a solution
space that can be efficiently explored to identify configurations that
optimally reduce pathogen levels. This design incorporates a neural network
feedback-based method that combines feature explanations with global
sensitivity analysis to ensure combinatorial optimization in multiobjective
settings. Our preliminary experiments have promising results when applied to
two real-world agricultural datasets. While further validation is still needed,
these early experimental findings demonstrate the potential of the model to
derive targeted feature interactions that adaptively optimize pathogen control
under varying real-world constraints.Comment: The 2023 International Conference on Computational Science &
Computational Intelligence (CSCI'23
EndToEndML: An Open-Source End-to-End Pipeline for Machine Learning Applications
Artificial intelligence (AI) techniques are widely applied in the life
sciences. However, applying innovative AI techniques to understand and
deconvolute biological complexity is hindered by the learning curve for life
science scientists to understand and use computing languages. An open-source,
user-friendly interface for AI models, that does not require programming skills
to analyze complex biological data will be extremely valuable to the
bioinformatics community. With easy access to different sequencing technologies
and increased interest in different 'omics' studies, the number of biological
datasets being generated has increased and analyzing these high-throughput
datasets is computationally demanding. The majority of AI libraries today
require advanced programming skills as well as machine learning, data
preprocessing, and visualization skills. In this research, we propose a
web-based end-to-end pipeline that is capable of preprocessing, training,
evaluating, and visualizing machine learning (ML) models without manual
intervention or coding expertise. By integrating traditional machine learning
and deep neural network models with visualizations, our library assists in
recognizing, classifying, clustering, and predicting a wide range of
multi-modal, multi-sensor datasets, including images, languages, and
one-dimensional numerical data, for drug discovery, pathogen classification,
and medical diagnostics.Comment: 2024 7th International Conference on Information and Computer
Technologies (ICICT
Towards Interpreting Multi-Objective Feature Associations
Understanding how multiple features are associated and contribute to a
specific objective is as important as understanding how each feature
contributes to a particular outcome. Interpretability of a single feature in a
prediction may be handled in multiple ways; however, in a multi-objective
prediction, it is difficult to obtain interpretability of a combination of
feature values. To address this issue, we propose an objective specific feature
interaction design using multi-labels to find the optimal combination of
features in agricultural settings. One of the novel aspects of this design is
the identification of a method that integrates feature explanations with global
sensitivity analysis in order to ensure combinatorial optimization in
multi-objective settings. We have demonstrated in our preliminary experiments
that an approximate combination of feature values can be found to achieve the
desired outcome using two agricultural datasets: one with pre-harvest poultry
farm practices for multi-drug resistance presence, and one with post-harvest
poultry farm practices for food-borne pathogens. In our combinatorial
optimization approach, all three pathogens are taken into consideration
simultaneously to account for the interaction between conditions that favor
different types of pathogen growth. These results indicate that
explanation-based approaches are capable of identifying combinations of
features that reduce pathogen presence in fewer iterations than a baseline.Comment: The 18th Annual IEEE International Systems Conference 2024 (IEEE
SYSCON 2024
Int. J. Security and Networks, Vol. 1, Nos. 1/2, 2006 113 Secure collaborations over message boards
We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and low complexity trust modules with each participant. The trust modules are used to protect group secrets and reduce susceptibility to denial of service attacks. We outline an architecture and elements of a protocol for Secure Collaborations over Message Boards (SCMB). The SCMB protocol can serve as a foundation over which a wide range of collaborative applications can be realised
- …
