1,753 research outputs found
Multimedia Protection using Content and Embedded Fingerprints
Improved digital connectivity has made the Internet an important medium for multimedia distribution and consumption in recent years. At the same time, this increased proliferation of multimedia has raised significant challenges in secure multimedia distribution and intellectual property protection. This dissertation examines two complementary aspects of the multimedia protection problem that utilize content fingerprints and embedded collusion-resistant fingerprints.
The first aspect considered is the automated identification of multimedia using content fingerprints, which is emerging as an important tool for detecting copyright violations on user generated content websites. A content fingerprint is a compact identifier that captures robust and distinctive properties of multimedia content, which can be used for uniquely identifying the multimedia object. In this dissertation, we describe a modular framework for theoretical modeling and analysis of content fingerprinting techniques. Based on this framework, we analyze the impact of distortions in the features on the corresponding fingerprints and also consider the problem of designing a suitable quantizer for encoding the features in order to improve the identification accuracy. The interaction between the fingerprint designer and a malicious adversary seeking to evade detection is studied under a game-theoretic framework and optimal strategies for both parties are derived. We then focus on analyzing and understanding the matching process at the fingerprint level. Models for fingerprints with different types of correlations are developed and the identification accuracy under each model is examined. Through this analysis we obtain useful guidelines for designing practical systems and also uncover connections to other areas of research.
A complementary problem considered in this dissertation concerns tracing the users responsible for unauthorized redistribution of multimedia. Collusion-resistant fingerprints, which are signals that uniquely identify the recipient, are proactively embedded in the multimedia before redistribution and can be used for identifying the malicious users. We study the problem of designing collusion resistant fingerprints for embedding in compressed multimedia. Our study indicates that directly adapting traditional fingerprinting techniques to this new setting of compressed multimedia results in low collusion resistance. To withstand attacks, we propose an anti-collusion dithering technique for embedding fingerprints that significantly improves the collusion resistance compared to traditional fingerprints
Development of variable voltage variable frequency drive system for induction motor speed control
This project describes the development of a Variable Voltage Variable Frequency (VVVF) system that controls the speed of Induction Motor (IM) at specific speed. Texas Instrument C2000 Microcontroller (TMS320F28335) has been used in this project as the interface between the control design with the IM. The Texas Instrument microcontroller has been combined with the MATLAB/Simulink and the VVVF system as the communication interface for processing the speed control system. The combination between power electronic circuits and microcontroller along with variable voltage variable frequency (VVVF) technique is able to control the target speed of IM. The target value of VVVF is implemented inside Lookup table and has been combined with the Proportional Integral (PI) speed control that generates the signal into the sinusoidal pulse width modulation (SPWM) for inverter operation. The SPWM signal is produced from the microcontroller with the instruction from MATLAB/Simulink, where the controller performs the output of the motor speed. The PI speed control receives the output of a closed loop feedback system from the motor speed and the error signal is reduced to achieve the value of desired speed reference. In the conclusion, the VVVF closed loop system is very useful to control the desired speed of motor at different variable voltage and variable frequency value. As collected for the results, its show, the VVVF with PI speed control can achieve the actual speed for the IM at 1297rpm and 1499rpm when the reference speeds have been set at 1300rpm and 1500rpm respectively. At the end it can be concluded that the VVVF combined with microcontroller have created an ecosystem for speed control that have achieved the objectives
Recommended from our members
TOWARDS RELIABLE CIRCUMVENTION OF INTERNET CENSORSHIP
The Internet plays a crucial role in today\u27s social and political movements by facilitating the free circulation of speech, information, and ideas; democracy and human rights throughout the world critically depend on preserving and bolstering the Internet\u27s openness. Consequently, repressive regimes, totalitarian governments, and corrupt corporations regulate, monitor, and restrict the access to the Internet, which is broadly known as Internet \emph{censorship}. Most countries are improving the internet infrastructures, as a result they can implement more advanced censoring techniques. Also with the advancements in the application of machine learning techniques for network traffic analysis have enabled the more sophisticated Internet censorship. In this thesis, We take a close look at the main pillars of internet censorship, we will introduce new defense and attacks in the internet censorship literature.
Internet censorship techniques investigate users’ communications and they can decide to interrupt a connection to prevent a user from communicating with a specific entity. Traffic analysis is one of the main techniques used to infer information from internet communications. One of the major challenges to traffic analysis mechanisms is scaling the techniques to today\u27s exploding volumes of network traffic, i.e., they impose high storage, communications, and computation overheads. We aim at addressing this scalability issue by introducing a new direction for traffic analysis, which we call \emph{compressive traffic analysis}. Moreover, we show that, unfortunately, traffic analysis attacks can be conducted on Anonymity systems with drastically higher accuracies than before by leveraging emerging learning mechanisms. We particularly design a system, called \deepcorr, that outperforms the state-of-the-art by significant margins in correlating network connections. \deepcorr leverages an advanced deep learning architecture to \emph{learn} a flow correlation function tailored to complex networks. Also to be able to analyze the weakness of such approaches we show that an adversary can defeat deep neural network based traffic analysis techniques by applying statistically undetectable \emph{adversarial perturbations} on the patterns of live network traffic.
We also design techniques to circumvent internet censorship. Decoy routing is an emerging approach for censorship circumvention in which circumvention is implemented with help from a number of volunteer Internet autonomous systems, called decoy ASes. We propose a new architecture for decoy routing that, by design, is significantly stronger to rerouting attacks compared to \emph{all} previous designs. Unlike previous designs, our new architecture operates decoy routers only on the downstream traffic of the censored users; therefore we call it \emph{downstream-only} decoy routing. As we demonstrate through Internet-scale BGP simulations, downstream-only decoy routing offers significantly stronger resistance to rerouting attacks, which is intuitively because a (censoring) ISP has much less control on the downstream BGP routes of its traffic. Then, we propose to use game theoretic approaches to model the arms races between the censors and the censorship circumvention tools. This will allow us to analyze the effect of different parameters or censoring behaviors on the performance of censorship circumvention tools. We apply our methods on two fundamental problems in internet censorship.
Finally, to bring our ideas to practice, we designed a new censorship circumvention tool called \name. \name aims at increasing the collateral damage of censorship by employing a ``mass\u27\u27 of normal Internet users, from both censored and uncensored areas, to serve as circumvention proxies
A Comprehensive Review on Digital Image Watermarking
The advent of the Internet led to the easy availability of digital data like
images, audio, and video. Easy access to multimedia gives rise to the issues
such as content authentication, security, copyright protection, and ownership
identification. Here, we discuss the concept of digital image watermarking with
a focus on the technique used in image watermark embedding and extraction of
the watermark. The detailed classification along with the basic
characteristics, namely visual imperceptibility, robustness, capacity, security
of digital watermarking is also presented in this work. Further, we have also
discussed the recent application areas of digital watermarking such as
healthcare, remote education, electronic voting systems, and the military. The
robustness is evaluated by examining the effect of image processing attacks on
the signed content and the watermark recoverability. The authors believe that
the comprehensive survey presented in this paper will help the new researchers
to gather knowledge in this domain. Further, the comparative analysis can
enkindle ideas to improve upon the already mentioned techniques
Joint Compressed Sensing and Manipulation of Wireless Emissions with Intelligent Surfaces
Programmable, intelligent surfaces can manipulate electromagnetic waves
impinging upon them, producing arbitrarily shaped reflection, refraction and
diffraction, to the benefit of wireless users. Moreover, in their recent form
of HyperSurfaces, they have acquired inter-networking capabilities, enabling
the Internet of Material Properties with immense potential in wireless
communications. However, as with any system with inputs and outputs, accurate
sensing of the impinging wave attributes is imperative for programming
HyperSurfaces to obtain a required response. Related solutions include field
nano-sensors embedded within HyperSurfaces to perform minute measurements over
the area of the HyperSurface, as well as external sensing systems. The present
work proposes a sensing system that can operate without such additional
hardware. The novel scheme programs the HyperSurface to perform compressed
sensing of the impinging wave via simple one-antenna power measurements. The
HyperSurface can jointly be programmed for both wave sensing and wave
manipulation duties at the same time. Evaluation via simulations validates the
concept and highlight its promising potential.Comment: Published at IEEE DCOSS 2019 / IoT4.0 workshop
(https://www.dcoss.org/workshops.html). Funded by the European Union via the
Horizon 2020: Future Emerging Topics - Research and Innovation Action call
(FETOPEN-RIA), grant EU736876, project VISORSURF (http://www.visorsurf.eu
Recommended from our members
Secure digital documents using Steganography and QR Code
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University LondonWith the increasing use of the Internet several problems have arisen regarding the processing of electronic documents. These include content filtering, content retrieval/search. Moreover, document security has taken a centre stage including copyright protection, broadcast monitoring etc. There is an acute need of an effective tool which can find the identity, location and the time when the document was created so that it can be determined whether or not the contents of the document were tampered with after creation. Owing the sensitivity of the large amounts of data which is processed on a daily basis, verifying the authenticity and integrity of a document is more important now than it ever was. Unsurprisingly document authenticity verification has become the centre of attention in the world of research. Consequently, this research is concerned with creating a tool which deals with the above problem. This research proposes the use of a Quick Response Code as a message carrier for Text Key-print. The Text Key-print is a novel method which employs the basic element of the language (i.e. Characters of the alphabet) in order to achieve authenticity of electronic documents through the transformation of its physical structure into a logical structured relationship. The resultant dimensional matrix is then converted into a binary stream and encapsulated with a serial number or URL inside a Quick response Code (QR code) to form a digital fingerprint mark. For hiding a QR code, two image steganography techniques were developed based upon the spatial and the transform domains. In the spatial domain, three methods were proposed and implemented based on the least significant bit insertion technique and the use of pseudorandom number generator to scatter the message into a set of arbitrary pixels. These methods utilise the three colour channels in the images based on the RGB model based in order to embed one, two or three bits per the eight bit channel which results in three different hiding capacities. The second technique is an adaptive approach in transforming domain where a threshold value is calculated under a predefined location for embedding in order to identify the embedding strength of the embedding technique. The quality of the generated stego images was evaluated using both objective (PSNR) and Subjective (DSCQS) methods to ensure the reliability of our proposed methods. The experimental results revealed that PSNR is not a strong indicator of the perceived stego image quality, but not a bad interpreter also of the actual quality of stego images. Since the visual difference between the cover and the stego image must be absolutely imperceptible to the human visual system, it was logically convenient to ask human observers with different qualifications and experience in the field of image processing to evaluate the perceived quality of the cover and the stego image. Thus, the subjective responses were analysed using statistical measurements to describe the distribution of the scores given by the assessors. Thus, the proposed scheme presents an alternative approach to protect digital documents rather than the traditional techniques of digital signature and watermarking
- …