500 research outputs found

    Digital watermarking and novel security devices

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones Científicas y Técnica

    State-of-the-art application of artificial neural network in digital watermarking and the way forward

    Get PDF
    Several high-ranking watermarking schemes using neural networks have been proposed in order to make the watermark stronger to resist attacks.The ability of Artificial Neural Network, ANN to learn, do mapping, classify, and adapt has increased the interest of researcher in application of different types ANN in watermarking.In this paper, ANN based approached have been categorized based on their application to different components of watermarking such as; capacity estimate, watermark embedding, recovery of watermark and error rate detection. We propose a new component of water marking, Secure Region, SR in which, ANN can be used to identify such region within the estimated capacity. Hence an attack-proof watermarking system can be achieved

    But also full of seeds for a future that could have turned out differently.

    Get PDF
    This thesis examines the relationship between illusion, allusion, and their relationship to contemporary images which announce, shield, or reference information. Beginning by discussing Casualist and Post-Digital Painting discourse, two styles I work within, we see connecting tissue in announcing and shielding of meaning. We look at the meaning of marks, and in the parallel exhibition, marks that utilize camouflage strategies appear as a metaphor for illuding to information which appears as conveying depth when there is none, and using paintings\u27 symbols in objects that are not paintings. The work \u27alludes\u27 to what the viewer has seen before and relies on semiotics to reference contemporary events and painting. Discovering the oscillating development of camouflage (that utilized paint, assemblage, and textiles), surveillance photography, and the screen, we see that the materials that make up this exhibition have an eerie tie to warfare, and thus we begin to look at the holographic textile, also appear- ing here, as a utopian object that did not evolve within military technology. The use of holographic textiles, then, becomes the ethical solution to critiquing illusion and allusion in contemporary images due to their lack of incorporating images of oppressed or victimized communities to profitize news organizations, as one example. This thesis uses the writing styles of philosophy, critical theory, and social sciences to discuss these findings above. Meaning, we will take a lengthy amount of time introducing the various literature that this thesis contributes to and so it may at times feel like three different areas of research. This is by design, as this document serves to conclude my Master of Fine Arts studies whilst benefiting my future studies in the Digital Humanities

    Immersive technologies as a solution for general data protection regulation in Europe and impact on the COVID-19 pandemic

    Get PDF
    Background: General data protection regulation (GDPR) provides rules according to which datashould be managed and processed in a secure and appropriate way for patient requirements and security.Currently, everyone in Europe is covered by GDPR. Thus, the medical practice also requires accessto patient data in a safe and secure way.Methods: Holographic technology allows users to see everything visible on a computer screen in a newand less restricted way, i.e. without the limitations of traditional computers and screens.Results: In this study, a three-dimensional holographic doctors’ assistant is designed and implementedin a way that meets the GDPR requirements. The HoloView application, which is tailored to run onMicrosoft HoloLens, is proposed toallow display and access to personal data and so-called sensitiveinformation of all individual patients without the risk that it will be presented to unauthorized persons.Conclusions: To enhance the user experience and remain consistent with GSPR, a holographic deskis proposed that allows displaying patient data and sensitive information only in front of the doctor’seyes using mixed reality glasses. Last but not least, it boasts of a reduction in infection risk for the staffduring the COVID-19 pandemic, affording medical care to be carried out by as few doctors as possible
    • …
    corecore