270 research outputs found

    Copyright protection of scalar and multimedia sensor network data using digital watermarking

    Get PDF
    This thesis records the research on watermarking techniques to address the issue of copyright protection of the scalar data in WSNs and image data in WMSNs, in order to ensure that the proprietary information remains safe between the sensor nodes in both. The first objective is to develop LKR watermarking technique for the copyright protection of scalar data in WSNs. The second objective is to develop GPKR watermarking technique for copyright protection of image data in WMSN

    Wireless Multimedia Sensor Networks Applications and Security Challenges

    Get PDF
    The emergence of low-cost and mature technologies in wireless communication, visual sensor devices, and digital signal processing facilitate of wireless multimedia sensor networks (WMSNs). Like sensor networks which respond to sensory information such as humidity and temperature, WMSN interconnects autonomous devices for capturing and processing video and audio sensory information. WMSNs will enable new applications such as multimedia surveillance, traffic enforcement and control systems, advanced health care delivery, structural health monitoring, and industrial process control. Due to WMSNs have some novel features which stem the fact that some of the sensor node will have video cameras and higher computation capabilities. Consequently, the WMSNs bring new security of challenges as well as new opportunities. This paper presents WMSNs application and security challenges

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    Review on Lightweight Cryptography Techniques and Steganography Techniques for IOT Environment

    Get PDF
    In the modern world, technology has connected to our day-to-day life in different forms. The Internet of Things (IoT) has become an innovative criterion for mass implementations and a part of daily life. However, this rapid growth leads the huge traffic and security problems. There are several challenges arise while deploying IoT. The most common challenges are privacy and security during data transmission. To address these issues, various lightweight cryptography and steganography techniques were introduced. These techniques are helpful in securing the data over the IoT. The hybrid of cryptography and steganography mechanisms provides enhanced security to confidential messages. Any messages can be secured by cryptography or by embedding the messages into any media files, including text, audio, image, and video, using steganography. Hence, this article has provided a detailed review of efficient, lightweight security solutions based on cryptography and steganography and their function over IoT applications. The objective of the paper is to study and analyze various Light weight cryptography techniques and Steganography techniques for IoT. A few works of literature were reviewed in addition to their merits and limitations. Furthermore, the common problems in the reviewed techniques are explained in the discussion section with their parametric comparison. Finally, the future scope to improve IoT security solutions based on lightweight cryptography and steganography is mentioned in the conclusion part

    End-to-end security in active networks

    Get PDF
    Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea

    Content Fragile Watermarking for H.264/AVC Video Authentication

    Get PDF
    Discrete Cosine transform (DCT) to generate the authentication data that are treated as a fragile watermark. This watermark is embedded in the motion vectors (MVs) The advances in multimedia technologies and digital processing tools have brought with them new challenges for the source and content authentication. To ensure the integrity of the H.264/AVC video stream, we introduce an approach based on a content fragile video watermarking method using an independent authentication of each Group of Pictures (GOPs) within the video. This technique uses robust visual features extracted from the video pertaining to the set of selected macroblocs (MBs) which hold the best partition mode in a tree-structured motion compensation process. An additional security degree is offered by the proposed method through using a more secured keyed function HMAC-SHA-256 and randomly choosing candidates from already selected MBs. In here, the watermark detection and verification processes are blind, whereas the tampered frames detection is not since it needs the original frames within the tampered GOPs. The proposed scheme achieves an accurate authentication technique with a high fragility and fidelity whilst maintaining the original bitrate and the perceptual quality. Furthermore, its ability to detect the tampered frames in case of spatial, temporal and colour manipulations, is confirmed

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis

    Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods

    Get PDF
    This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read

    Tamper detection in RFID tags, using, fragile watermarking

    Get PDF
    Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security issues in general and data tampering in particular. We specifically consider the issue of detecting data tampering on the RFID tags for applications such as data integrity management. To address this issue, we present a novel fragile watermarking scheme, which embeds a fragile watermark (or pattern) in the serial number partition of the RFID tag. This pattern is verified to identify whether or not the data on the RFID tags has been tampered with. The novelty of this watermarking scheme lies in the fact that we have applied watermarking technology to RFID tags; in comparison, most of the existing watermarking schemes are limited to images, or audio or video applications. We term this scheme TamDetect because it is a tamper detection solution. TamDetect is designed such that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates watermarking and RFID technologies together. This paper provides a detailed theoretical foundation for the TamDetect solution

    A wireless multicast delivery architecture for mobile terminals

    Get PDF
    Content delivery over the Internet to a large number of mobile users offers interesting business opportunities for content providers, intermediaries, and access network operators. A user could receive, for example, music or a digital newspaper directly to a mobile device over wireless networks. Currently, content delivery over the Internet is held back by a number of reasons. Existing network technologies, such as GPRS, have a very limited capacity to transfer large files, such as those required for good-quality pictures in a newspaper. Another problem is security. Content received over the Internet is very vulnerable to being forged. A user who cannot be certain about the source and consistency of the received stock quotes is unlikely to pay for the information. Furthermore, content providers are unwilling to distribute their valuable information over the Internet due to their fear of copyright infringements. Traditionally, content has been considered consumed as soon as it has been downloaded. Content providers have been keen on preventing their content from being transferred over peer-to-peer networks because they consider the delivery itself to be a copyright infringement. In this dissertation, content delivery is separated from content consumption by encrypting the content before delivery. When the users wishes to consume the content, a license which includes the decryption key is provided. The architecture allows content to be delivered to users' devices even before the user commits to consume the content. The user can choose to receive content whenever downloading it is the most convenient and affordable. Thus, the content providers are able to maintain control over the use of their information even after the data has been transferred to the users' terminals. In addition, content received by users can be strongly source authenticated. The architecture allows secure, efficient and reliable delivery of content to a large group of receivers. The architecture does not commit itself to any specific delivery technique, and the content can be delivered using any delivery technique including multicast, broadcast, unicast, and peer-to-peer. This dissertation focuses mostly on multicast as the delivery technique. The efficiency of the multicast delivery over unreliable heterogenous wireless access networks is thoroughly analyzed. Mobile terminals can seamlessly switch between access points and access technologies while continuing to receive data reliably from the network. The multicast delivery uses adaptive error correction and retransmissions to deliver the content as efficiently as possible to a very large number of receivers. The simulations show, that the vast majority of receivers are able to receive the content reliably with a small delay even when the radio network suffers from high packet loss probability. Although the architecture is designed to deliver content to mobile terminals, it is also suitable for delivering content to terminals with fixed Internet connectivity.Digitaalisen sisÀllön siirtÀminen liikkuville kÀyttÀjille Internetin yli tarjoaa uusia liiketoimintamahdollisuuksia niin sisÀllöntuottajille, vÀlittÀjille kuin verkko-operaattoreille. Teknikkaa voidaan kÀyttÀÀ esimerkiksi musiikin tai sÀhköisten lehtien vÀlittÀmiseen kÀyttÀjille langattoman verkon kautta. SisÀllön vÀlittÀmistÀ Internetin kautta hankaloittaa yhÀ usea seikka. Nykyisin laajassa kÀytössÀ olevat verkkotekniikat, kuten GPRS, ovat liian hitaita siirtÀmÀÀn hyvin suuria tiedostoja suurelle mÀÀrÀllÀ vastaanottajia. LisÀksi vÀÀrennetyn tiedon vÀlittÀminen Internetin kautta on erittÀin helppoa. SisÀltö, jonka aitoudesta ja alkuperÀstÀ ei ole varmuutta, on usein arvotonta kÀyttÀjÀlle. SisÀllöntuottajat puolestaan ovat haluttomia kÀyttÀmÀÀn sisÀltönsÀ levittÀmiseen InternetiÀ mikÀli digitaalisesti levitettÀvÀn sisÀllön kopioiminen ja oikeudeton kuluttaminen on liian helppoa. Perinteisesti sisÀltö ajatellaankin kulutetuksi jo sillÀ hetkellÀ, kun se on siirretty kÀyttÀjÀn laitteeseen. Sen vuoksi sisÀllön tuottajat ovatkin kÀyttÀneet paljon resursejaan estÀÀkseen sisÀltönsÀ vÀlittÀmisen vertaisverkoissa, koska jo pelkkÀÀ sisÀllön siirtÀmistÀ pidetÀÀn tekijÀnoikeusrikkomuksena. TÀssÀ työssÀ erotetaan sisÀllön siirtÀminen sisÀllön kuluttamisesta suojaamalla sisÀltö salauksella ennen sen siirtÀmistÀ kÀyttÀjille ja sallimalla vapaa salatun sisÀllön jakelu. Arkkitehtuuri mahdollistaa sisÀllön siirtÀmisen kÀyttÀjien laitteille silloin kun sisÀllön siirtÀminen on edullisinta ja tehokkainta. Vasta kÀyttÀjÀn halutessa kuluttaa aiemmin lataamaansa sisÀltöÀ, tarkistetaan oikeis sisÀllön kÀyttöön. Arkkitehtuuri mahdollistaa myös ladatun sisÀllön alkuperÀn ja eheyden vahvan tarkistamisen. Arkkitehtuuri mahdollistaa turvallisen, tehokkaan ja luotettavan sisÀllön siirtÀmisen suurelle mÀÀrÀlle vastaanottajia. Arkkitehtuuri ei pakota sisÀllön jakelua kÀyttÀmÀÀn mitÀÀn tiettyÀ siirtomenetelmÀÀ vaan sisÀltö voidaan siirtÀÀ kÀyttÀen esimerkiksi ryhmÀlÀhetystÀ (multicast), joukkolÀhetystÀ (broadcast), tÀsmÀlÀhetystÀ (unicast) tai vertaisverkkoja (peer-to-peer). TÀssÀ työssÀ on keskitytty analysoimaan ryhmÀlÀhetyksen soveltuvuutta tiedon siirtomenetelmÀnÀ. RyhmÀlÀhetysmenetelmÀn tehokkuutta on analysoitu siirrettÀessÀ sisÀltöÀ heterogeenisen langattoman liityntÀverkon yli. Liikkuvat pÀÀtelaitteet voivat siirtyÀ saumattomasti liityntÀverkosta toiseen samalla kun ne vastaanottavat sisÀltöÀ. RyhmÀlÀhetys hyödyntÀÀ adaptiivista virheenkorjausta ja uudelleenlÀhetyksiÀ siirtÀÀkseen sisÀllönmahdollisimman tehokkaasti suurelle joukolle vastaanottajia. Simulaatiot osoittavat, ettÀ erittÀin suuri osa vastaanottajista saa sisÀllön luotettavasti ja pienellÀ viiveellÀ vaikka liityntÀverkossa pakettien virhetodennÀköisyys olisi suuri. Arkkitehtuuri on suunniteltu siirtÀmÀÀn sisÀltöÀ liikkuville laitteille, mutta sitÀ voidaan kÀyttÀÀ yhtÀ hyvin myös kiinteÀÀn verkkoon liitettyjen laitteiden kanssa.reviewe
    • 

    corecore