120 research outputs found
Robust image steganography method suited for prining = Robustna steganografska metoda prilagođena procesu tiska
U ovoj doktorskoj dizertaciji prezentirana je robustna steganografska metoda razvijena i
prilagođena za tisak. Osnovni cilj metode je pružanje zaštite od krivotvorenja ambalaže.
Zaštita ambalaže postiže se umetanjem više bitova informacije u sliku pri enkoderu, a potom
maskiranjem informacije kako bi ona bila nevidljiva ljudskom oku. Informacija se pri
dekoderu detektira pomoću infracrvene kamere. Preliminarna istraživanja pokazala su da u
relevantnoj literaturi nedostaje metoda razvijenih za domenu tiska. Razlog za takav
nedostatak jest činjenica da razvijanje steganografskih metoda za tisak zahtjeva veću količinu
resursa i materijala, u odnosu na razvijanje sličnih domena za digitalnu domenu. Također,
metode za tisak često zahtijevaju višu razinu kompleksnosti, budući da se tijekom
reprodukcije pojavljuju razni oblici procesiranja koji mogu kompromitirati informaciju u slici
[1]. Da bi se sačuvala skrivena informacija, metoda mora biti otporna na procesiranje koje se
događa tijekom reprodukcije.
Kako bi se postigla visoka razina otpornosti, informacija se može umetnuti unutar
frekvencijske domene slike [2], [3]. Frekvencijskoj domeni slike možemo pristupiti pomoću
matematičkih transformacija. Najčešće se koriste diskretna kosinusna transformacija (DCT),
diskretna wavelet transformacija (DWT) i diskretna Fourierova transformacija (DFT) [2], [4].
Korištenje svake od navedenih transformacija ima određene prednosti i nedostatke, ovisno o
kontekstu razvijanja metode [5]. Za metode prilagođene procesu tiska, diskretna Fourierova
transformacija je optimalan odabir, budući da metode bazirane na DFT-u pružaju otpornost
na geometrijske transformacije koje se događaju tijekom reprodukcije [5], [6].
U ovom istraživanju korištene su slike u cmyk prostoru boja. Svaka slika najprije je
podijeljena u blokove, a umetanje informacije vrši se za svaki blok pojedinačno. Pomoću
DFT-a, ???? kanal slikovnog bloka se transformira u frekvencijsku domenu, gdje se vrši
umetanje informacije. Akromatska zamjena koristi se za maskiranje vidljivih artefakata
nastalih prilikom umetanja informacije. Primjeri uspješnog korištenja akromatske zamjene za
maskiranje artefakata mogu se pronaći u [7] i [8]. Nakon umetanja informacije u svaki
slikovni blok, blokovi se ponovno spajaju u jednu, jedinstvenu sliku. Akromatska zamjena
tada mijenja vrijednosti c, m i y kanala slike, dok kanal k, u kojemu se nalazi umetnuta
informacija, ostaje nepromijenjen. Time nakon maskiranja akromatskom zamjenom označena
slika posjeduje ista vizualna svojstva kao i slika prije označavanja. U eksperimentalnom dijelu rada koristi se 1000 slika u cmyk prostoru boja. U digitalnom
okruženju provedeno je istraživanje otpornosti metode na slikovne napade specifične za
reprodukcijski proces - skaliranje, blur, šum, rotaciju i kompresiju. Također, provedeno je
istraživanje otpornosti metode na reprodukcijski proces, koristeći tiskane uzorke. Objektivna
metrika bit error rate (BER) korištena je za evaluaciju. Mogućnost optimizacije metode
testirala se procesiranjem slike (unsharp filter) i korištenjem error correction kodova (ECC).
Provedeno je istraživanje kvalitete slike nakon umetanja informacije. Za evaluaciju su
korištene objektivne metrike peak signal to noise ratio (PSNR) i structural similarity index
measure (SSIM). PSNR i SSIM su tzv. full-reference metrike. Drugim riječima, potrebne su i
neoznačena i označena slika istovremeno, kako bi se mogla utvrditi razina sličnosti između
slika [9], [10]. Subjektivna analiza provedena je na 36 ispitanika, koristeći ukupno 144
uzorka slika. Ispitanici su ocijenjivali vidljivost artefakata na skali od nula (nevidljivo) do tri
(vrlo vidljivo).
Rezultati pokazuju da metoda posjeduje visoku razinu otpornosti na reprodukcijski proces.
Također, metoda se uistinu optimizirala korištenjem unsharp filtera i ECC-a. Kvaliteta slike
ostaje visoka bez obzira na umetanje informacije, što su potvrdili rezultati eksperimenata s
objektivnim metrikama i subjektivna analiza
Modern trends in digital transformation of marketing & management
The monograph examines the current trends in the development of digital technologies in marketing, management and business administration. The prospects for the development of digital technologies in various sectors of the economy of Ukraine and the trends of the influence of digital technologies on global shifts in the systems of marketing management and business administration are determined. The transformations of business models in the conditions of the digital economy are analyzed, the impact of blockchain technologies on the development of promising areas of the marketing management system and business administration is analyzed. Reasonable impact of digital technologies on the transformation of management systems in social, public, legal and administrative spheres and various sectors of the economy. The contours of the formation of the digital economy in the sectors of economic activity and the social sphere have been developed
Guideline for Trustworthy Artificial Intelligence -- AI Assessment Catalog
Artificial Intelligence (AI) has made impressive progress in recent years and
represents a key technology that has a crucial impact on the economy and
society. However, it is clear that AI and business models based on it can only
reach their full potential if AI applications are developed according to high
quality standards and are effectively protected against new AI risks. For
instance, AI bears the risk of unfair treatment of individuals when processing
personal data e.g., to support credit lending or staff recruitment decisions.
The emergence of these new risks is closely linked to the fact that the
behavior of AI applications, particularly those based on Machine Learning (ML),
is essentially learned from large volumes of data and is not predetermined by
fixed programmed rules.
Thus, the issue of the trustworthiness of AI applications is crucial and is
the subject of numerous major publications by stakeholders in politics,
business and society. In addition, there is mutual agreement that the
requirements for trustworthy AI, which are often described in an abstract way,
must now be made clear and tangible. One challenge to overcome here relates to
the fact that the specific quality criteria for an AI application depend
heavily on the application context and possible measures to fulfill them in
turn depend heavily on the AI technology used. Lastly, practical assessment
procedures are needed to evaluate whether specific AI applications have been
developed according to adequate quality standards. This AI assessment catalog
addresses exactly this point and is intended for two target groups: Firstly, it
provides developers with a guideline for systematically making their AI
applications trustworthy. Secondly, it guides assessors and auditors on how to
examine AI applications for trustworthiness in a structured way
Recommended from our members
TOWARDS RELIABLE CIRCUMVENTION OF INTERNET CENSORSHIP
The Internet plays a crucial role in today\u27s social and political movements by facilitating the free circulation of speech, information, and ideas; democracy and human rights throughout the world critically depend on preserving and bolstering the Internet\u27s openness. Consequently, repressive regimes, totalitarian governments, and corrupt corporations regulate, monitor, and restrict the access to the Internet, which is broadly known as Internet \emph{censorship}. Most countries are improving the internet infrastructures, as a result they can implement more advanced censoring techniques. Also with the advancements in the application of machine learning techniques for network traffic analysis have enabled the more sophisticated Internet censorship. In this thesis, We take a close look at the main pillars of internet censorship, we will introduce new defense and attacks in the internet censorship literature.
Internet censorship techniques investigate users’ communications and they can decide to interrupt a connection to prevent a user from communicating with a specific entity. Traffic analysis is one of the main techniques used to infer information from internet communications. One of the major challenges to traffic analysis mechanisms is scaling the techniques to today\u27s exploding volumes of network traffic, i.e., they impose high storage, communications, and computation overheads. We aim at addressing this scalability issue by introducing a new direction for traffic analysis, which we call \emph{compressive traffic analysis}. Moreover, we show that, unfortunately, traffic analysis attacks can be conducted on Anonymity systems with drastically higher accuracies than before by leveraging emerging learning mechanisms. We particularly design a system, called \deepcorr, that outperforms the state-of-the-art by significant margins in correlating network connections. \deepcorr leverages an advanced deep learning architecture to \emph{learn} a flow correlation function tailored to complex networks. Also to be able to analyze the weakness of such approaches we show that an adversary can defeat deep neural network based traffic analysis techniques by applying statistically undetectable \emph{adversarial perturbations} on the patterns of live network traffic.
We also design techniques to circumvent internet censorship. Decoy routing is an emerging approach for censorship circumvention in which circumvention is implemented with help from a number of volunteer Internet autonomous systems, called decoy ASes. We propose a new architecture for decoy routing that, by design, is significantly stronger to rerouting attacks compared to \emph{all} previous designs. Unlike previous designs, our new architecture operates decoy routers only on the downstream traffic of the censored users; therefore we call it \emph{downstream-only} decoy routing. As we demonstrate through Internet-scale BGP simulations, downstream-only decoy routing offers significantly stronger resistance to rerouting attacks, which is intuitively because a (censoring) ISP has much less control on the downstream BGP routes of its traffic. Then, we propose to use game theoretic approaches to model the arms races between the censors and the censorship circumvention tools. This will allow us to analyze the effect of different parameters or censoring behaviors on the performance of censorship circumvention tools. We apply our methods on two fundamental problems in internet censorship.
Finally, to bring our ideas to practice, we designed a new censorship circumvention tool called \name. \name aims at increasing the collateral damage of censorship by employing a ``mass\u27\u27 of normal Internet users, from both censored and uncensored areas, to serve as circumvention proxies
Marketing in the Digital Environment
The textbook contains provisions that reveal the main points of marketing in the digital environment and the basic tools necessary for a marketer to successfully implement a variety of projects on the Internet. In particular, the types of Internet business, business models and characteristics of creating a business in the Internet environment, Internet marketing, development and promotion of web resources. It provides analysis of the practical aspects that illustrate the theoretical positions of marketing in the digital environment.
The publication contains a series of practical exercises, cases and tests to assess the level of knowledge. It is recommended for students of economics and specialities in the field of Internet business, marketers, teachers, graduate students, as well as a wide range of readers interested in marketing in the digital environment
Privacy-aware Biometric Blockchain based e-Passport System for Automatic Border Control
In the middle of 1990s, World Wide Web technology initially steps into our life. Now, 30 years after that, widespread internet access and established computing technology bring embodied real life into Metaverse by digital twin. Internet is not only blurring the concept of physical distance, but also blurring the edge between the real and virtual world. Another breakthrough in computing is the blockchain, which shifts the root of trust attached to a system administrator to the computational power of the system. Furthermore, its favourable properties such as immutable time-stamped transaction history and atomic smart contracts trigger the development of decentralized autonomous organizations (DAOs). Combining above two, this thesis presents a privacy-aware biometric Blockchain based e-passport system for automatic border control(ABC), which aims for improving the efficiency of existing ABC system. Specifically, through constructing a border control Metaverse DAO, border control workload can be autonomously self-executed by atomic smart contracts as transaction and then immutably recorded on Blockchain. What is more, to digitize border crossing documentation, biometric Blockchain based e-passport system(BBCVID) is created to generate an immutable real-world identity digital twin in the border control Metaverse DAO through Blockchain and biometric identity authentication. That is to say, by digitizing border crossing documentation and automatizing both biometric identity authentication and border crossing documentation verification, our proposal is able to significantly improve existing border control efficiency. Through system simulation and performance evaluation by Hyperledger Caliper, the proposed system turns out to be able to improve existing border control efficiency by 3.5 times more on average, which is remarkable. What is more, the dynamic digital twin constructed by BBCVID enables computing techniques such as machine learning and big data analysis applicable to real-world entity, which has a huge potential to create more value by constructing smarter ABC systems
Multimedia Forensics
This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
Exploring Written Artefacts
This collection, presented to Michael Friedrich in honour of his academic career at of the Centre for the Study of Manuscript Cultures, traces key concepts that scholars associated with the Centre have developed and refined for the systematic study of manuscript cultures. At the same time, the contributions showcase the possibilities of expanding the traditional subject of ‘manuscripts’ to the larger perspective of ‘written artefacts’
Electronic Imaging & the Visual Arts. EVA 2019 Florence
The Publication is following the yearly Editions of EVA FLORENCE. The State of Art is presented regarding the Application of Technologies (in particular of digital type) to Cultural Heritage. The more recent results of the Researches in the considered Area are presented. Information Technologies of interest for Culture Heritage are presented: multimedia systems, data-bases, data protection, access to digital content, Virtual Galleries. Particular reference is reserved to digital images (Electronic Imaging & the Visual Arts), regarding Cultural Institutions (Museums, Libraries, Palace - Monuments, Archaeological Sites). The International Conference includes the following Sessions: Strategic Issues; New Science and Culture Developments & Applications; New Technical Developments & Applications; Cultural Activities – Real and Virtual Galleries and Related Initiatives, Access to the Culture Information. One Workshop regards Innovation and Enterprise. The more recent results of the Researches at national and international level are reported in the Area of Technologies and Culture Heritage, also with experimental demonstrations of developed Activities
An Approach to Guide Users Towards Less Revealing Internet Browsers
When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed
- …