15 research outputs found

    Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

    Full text link
    Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be used to identify the original owners of the media. Steganography, another form of data hiding, embeds data for the purpose of secure and secret communication. This survey summarises recent developments in deep learning techniques for data hiding for the purposes of watermarking and steganography, categorising them based on model architectures and noise injection methods. The objective functions, evaluation metrics, and datasets used for training these data hiding models are comprehensively summarised. Finally, we propose and discuss possible future directions for research into deep data hiding techniques

    Research on digital image watermark encryption based on hyperchaos

    Get PDF
    The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value

    Exploiting Spatio-Temporal Coherence for Video Object Detection in Robotics

    Get PDF
    This paper proposes a method to enhance video object detection for indoor environments in robotics. Concretely, it exploits knowledge about the camera motion between frames to propagate previously detected objects to successive frames. The proposal is rooted in the concepts of planar homography to propose regions of interest where to find objects, and recursive Bayesian filtering to integrate observations over time. The proposal is evaluated on six virtual, indoor environments, accounting for the detection of nine object classes over a total of ∌ 7k frames. Results show that our proposal improves the recall and the F1-score by a factor of 1.41 and 1.27, respectively, as well as it achieves a significant reduction of the object categorization entropy (58.8%) when compared to a two-stage video object detection method used as baseline, at the cost of small time overheads (120 ms) and precision loss (0.92).</p

    Discrete Wavelet Transforms

    Get PDF
    The discrete wavelet transform (DWT) algorithms have a firm position in processing of signals in several areas of research and industry. As DWT provides both octave-scale frequency and spatial timing of the analyzed signal, it is constantly used to solve and treat more and more advanced problems. The present book: Discrete Wavelet Transforms: Algorithms and Applications reviews the recent progress in discrete wavelet transform algorithms and applications. The book covers a wide range of methods (e.g. lifting, shift invariance, multi-scale analysis) for constructing DWTs. The book chapters are organized into four major parts. Part I describes the progress in hardware implementations of the DWT algorithms. Applications include multitone modulation for ADSL and equalization techniques, a scalable architecture for FPGA-implementation, lifting based algorithm for VLSI implementation, comparison between DWT and FFT based OFDM and modified SPIHT codec. Part II addresses image processing algorithms such as multiresolution approach for edge detection, low bit rate image compression, low complexity implementation of CQF wavelets and compression of multi-component images. Part III focuses watermaking DWT algorithms. Finally, Part IV describes shift invariant DWTs, DC lossless property, DWT based analysis and estimation of colored noise and an application of the wavelet Galerkin method. The chapters of the present book consist of both tutorial and highly advanced material. Therefore, the book is intended to be a reference text for graduate students and researchers to obtain state-of-the-art knowledge on specific applications

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    MediaSync: Handbook on Multimedia Synchronization

    Get PDF
    This book provides an approachable overview of the most recent advances in the fascinating field of media synchronization (mediasync), gathering contributions from the most representative and influential experts. Understanding the challenges of this field in the current multi-sensory, multi-device, and multi-protocol world is not an easy task. The book revisits the foundations of mediasync, including theoretical frameworks and models, highlights ongoing research efforts, like hybrid broadband broadcast (HBB) delivery and users' perception modeling (i.e., Quality of Experience or QoE), and paves the way for the future (e.g., towards the deployment of multi-sensory and ultra-realistic experiences). Although many advances around mediasync have been devised and deployed, this area of research is getting renewed attention to overcome remaining challenges in the next-generation (heterogeneous and ubiquitous) media ecosystem. Given the significant advances in this research area, its current relevance and the multiple disciplines it involves, the availability of a reference book on mediasync becomes necessary. This book fills the gap in this context. In particular, it addresses key aspects and reviews the most relevant contributions within the mediasync research space, from different perspectives. Mediasync: Handbook on Multimedia Synchronization is the perfect companion for scholars and practitioners that want to acquire strong knowledge about this research area, and also approach the challenges behind ensuring the best mediated experiences, by providing the adequate synchronization between the media elements that constitute these experiences

    Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey

    Full text link
    Adversarial attacks and defenses in machine learning and deep neural network have been gaining significant attention due to the rapidly growing applications of deep learning in the Internet and relevant scenarios. This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on deep neural network-based classification models. Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually appealing tables and tree diagrams. This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations. We also categorize the methods into counter-attack detection and robustness enhancement, with a specific focus on regularization-based methods for enhancing robustness. New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks, and a hierarchical classification of the latest defense methods is provided, highlighting the challenges of balancing training costs with performance, maintaining clean accuracy, overcoming the effect of gradient masking, and ensuring method transferability. At last, the lessons learned and open challenges are summarized with future research opportunities recommended.Comment: 46 pages, 21 figure

    The dynamics of complex systems. Studies and applications in computer science and biology

    Get PDF
    Our research has focused on the study of complex dynamics and on their use in both information security and bioinformatics. Our first work has been on chaotic discrete dynamical systems, and links have been established between these dynamics on the one hand, and either random or complex behaviors. Applications on information security are on the pseudorandom numbers generation, hash functions, informationhiding, and on security aspects on wireless sensor networks. On the bioinformatics level, we have applied our studies of complex systems to theevolution of genomes and to protein folding

    Das Digitale "GedÀchtnis der Menschheit" : eine Untersuchung dokumentarischer Praktiken im Zeitalter der digitalen Technologie

    Get PDF
    This research is a study of the UNESCO “Memory of the World” Programme established with the purpose to increase awareness of the existence and relevance of documentary heritage, and to achieve its universal and permanent accessibility. In this context, digital technology is increasingly used to provide access to documentary heritage but this activity also leads to a series of changes in how documents are understood and handled. Starting from the observation that the conceptual and practical changes triggered by digital technology in the “Memory of the World” do not seem to accurately reflect its stated philosophy, this research pursues the aim to critically analyze the possibilities and limits it offers. This analysis is facilitated by a conceptual framework anchored in the medium theory of Harold Innis and his concepts of medium, bias, space and time, and balance, which serve as analytical lenses to closely study selected aspects of digital technology and their influence. Despite popular beliefs that digital technology is most suitable for universal access, the findings of this present research lead to the observation that this cannot really be the case, and it reveals that an over-emphasis on the technical possibilities of digital access is not supportive of the overall purpose of the “Memory of the World”, leading to the narrowing down of its potential relevance. At first glance, this may suggest not recommending at all the use of digital technology. However, acknowledging that each medium has both limits and possibilities, instead of rejecting digital technology the study searches for solutions that may assist with integrating it in the “Memory of the World” in accordance with its overall purpose and philosophy. To this end, three recommendations are elaborated, the same conceptual framework that revealed the limits of digital technology being applied to construct on their possibilities. In order to motivate why following the recommendations of this analysis would be necessary, the study concludes by shifting attention from the relevance of digital technology in the “Memory of the World” Programme to the relevance of the Programme in a world changed by digital technology.Diese Forschung befasst sich mit dem UNESCO-Programm „Memory of the World“, das eingefĂŒhrt wurde, um Achtsamkeit ĂŒber die Existenz und Bedeutung von Dokumentenerbe zu schaffen, und um ihre universale und permanente ZugĂ€nglichkeit zu erreichen. In diesem Zusammenhang benutzt man zunehmend die digitale Technologie, um Zugang zu Dokumentenerbe zu ermöglichen, aber dies fĂŒhrt auch zu einer Reihe von VerĂ€nderungen wie Dokumente verstanden und behandelt werden. Angefangen von der Beobachtung, dass die konzeptionellen und praktischen VerĂ€nderungen, die durch die digitale Technologie im Memory of the World Programm ausgelöst werden, scheinbar nicht genau die festgelegte Philosophie reflektieren, verfolgt diese Forschung den Zweck, deren Möglichkeiten und Grenzen kritisch zu analysieren. Diese Analyse wird von einem konzeptionellen Rahmen gestĂŒtzt, welcher in der Medium Theorie von Harold Innis und seinen Konzepten ĂŒber das Medium, Bias, Space and Time, und Balance verankert ist. Diese Theorie dient als analytisches Objektiv, um ausgesuchte Aspekte der digitalen Technologie und ihren Einfluss nĂ€her zu untersuchen. Entgegen der allgemeinen Meinung, dass die digitale Technologie am besten geeignet ist fĂŒr den universellen Zugang, fĂŒhren die Resultate dieser aktuellen Forschung zu der Beobachtung, dass dieses nicht wirklich der Fall sein kann, und sie beweisen, das eine Überbewertung der technischen Möglichkeiten des digitalen Zugangs nicht hilfreich fĂŒr die allumfassenden Absichten des Memory of the World Programms sind, und zu einer EinschrĂ€nkung seiner potenziellen Bedeutung fĂŒhrt. Auf den ersten Blick könnte dieses heißen, den Gebrauch der digitalen Technologie ĂŒberhaupt nicht zu empfehlen. Allerdings anerkennend, dass jedes Medium sowohl Grenzen wie auch Möglichkeiten hat, lehnt diese Forschung die digitale Technologie nicht ab, sondern sucht nach Lösungen die helfen könnten, diese in das Memory of the World Programm zu integrieren, und zwar im Einklang mit den allumfassenden Absichten und ihrer Philosophie. Um zu motivieren warum es notwendig wĂ€re den Empfehlungen dieser Analyse zu folgen, beendet diese Forschung ihre Schlussfolgerung durch das Verlagern der Aufmerksamkeit von der Bedeutung der digitalen Technologie im Memory of the World Programm, zu der Bedeutung des Programms in einer durch digitale Technologie verĂ€nderten Welt
    corecore