8 research outputs found

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis

    Data hiding in images based on fractal modulation and diversity combining

    Get PDF
    The current work provides a new data-embedding infrastructure based on fractal modulation. The embedding problem is tackled from a communications point of view. The data to be embedded becomes the signal to be transmitted through a watermark channel. The channel could be the image itself or some manipulation of the image. The image self noise and noise due to attacks are the two sources of noise in this paradigm. At the receiver, the image self noise has to be suppressed, while noise due to the attacks may sometimes be predicted and inverted. The concepts of fractal modulation and deterministic self-similar signals are extended to 2-dimensional images. These novel techniques are used to build a deterministic bi-homogenous watermark signal that embodies the binary data to be embedded. The binary data to be embedded, is repeated and scaled with different amplitudes at each level and is used as the wavelet decomposition pyramid. The binary data is appended with special marking data, which is used during demodulation, to identify and correct unreliable or distorted blocks of wavelet coefficients. This specially constructed pyramid is inverted using the inverse discrete wavelet transform to obtain the self-similar watermark signal. In the data embedding stage, the well-established linear additive technique is used to add the watermark signal to the cover image, to generate the watermarked (stego) image. Data extraction from a potential stego image is done using diversity combining. Neither the original image nor the original binary sequence (or watermark signal) is required during the extraction. A prediction of the original image is obtained using a cross-shaped window and is used to suppress the image self noise in the potential stego image. The resulting signal is then decomposed using the discrete wavelet transform. The number of levels and the wavelet used are the same as those used in the watermark signal generation stage. A thresholding process similar to wavelet de-noising is used to identify whether a particular coefficient is reliable or not. A decision is made as to whether a block is reliable or not based on the marking data present in each block and sometimes corrections are applied to the blocks. Finally the selected blocks are combined based on the diversity combining strategy to extract the embedded binary data

    A Survey on Biometrics based Key Authentication using Neural Network

    Get PDF
    The conventional method for user authentication is a password known to the user only. There is no security in the use of passwords if the password is known to an imposter and also it can be forgotten. So it is necessary to develop a better security system. Hence, to improve the user authentication passwords are replaced with biometric identification of the user. Thus usage of biometrics in authentication system becomes a vital technique. Biometric scheme are being widely employed because of their security merits over the earlier authentication system based on records that can be easily lost, guessed or forged. This is because the biometrics is unique for every individual and is complex than passwords. Commonly used biometrics is fingerprint, iris, retina, face, hand geometry, palm, etc. The two issues to be considered for user authentication system are recognition of the authorized user and rejection of the impostor. So a better classifier is necessary to perform this task. Some of the widely used classifier is based on fuzzy logic, neural network, etc. Among those, neural network can be efficient in classification. This survey provides various biometrics based authentication system based on neural network

    A Survey on Biometrics based Key Authentication using Neural Network

    Get PDF
    The conventional method for user authentication is a password known to the user only. There is no security in the use of passwords if the password is known to an imposter and also it can be forgotten. So it is necessary to develop a better security system. Hence, to improve the user authentication passwords are replaced with biometric identification of the user. Thus usage of biometrics in authentication system becomes a vital technique. Biometric scheme are being widely employed because of their security merits over the earlier authentication system based on records that can be easily lost, guessed or forged. This is because the biometrics is unique for every individual and is complex than passwords. Commonly used biometrics is fingerprint, iris, retina, face, hand geometry, palm, etc. The two issues to be considered for user authentication system are recognition of the authorized user and rejection of the impostor. So a better classifier is necessary to perform this task. Some of the widely used classifier is based on fuzzy logic, neural network, etc. Among those, neural network can be efficient in classification. This survey provides various biometrics based authentication system based on neural network

    Connected Attribute Filtering Based on Contour Smoothness

    Get PDF

    Connected Attribute Filtering Based on Contour Smoothness

    Get PDF
    A new attribute measuring the contour smoothness of 2-D objects is presented in the context of morphological attribute filtering. The attribute is based on the ratio of the circularity and non-compactness, and has a maximum of 1 for a perfect circle. It decreases as the object boundary becomes irregular. Computation on hierarchical image representation structures relies on five auxiliary data members and is rapid. Contour smoothness is a suitable descriptor for detecting and discriminating man-made structures from other image features. An example is demonstrated on a very-high-resolution satellite image using connected pattern spectra and the switchboard platform

    Optimization of scientific algorithms in heterogeneous systems and accelerators for high performance computing

    Get PDF
    Actualmente, la computaci贸n de prop贸sito general en GPU es uno de los pilares b谩sicos de la computaci贸n de alto rendimiento. Aunque existen cientos de aplicaciones aceleradas en GPU, a煤n hay algoritmos cient铆ficos poco estudiados. Por ello, la motivaci贸n de esta tesis ha sido investigar la posibilidad de acelerar significativamente en GPU un conjunto de algoritmos pertenecientes a este grupo. En primer lugar, se ha obtenido una implementaci贸n optimizada del algoritmo de compresi贸n de v铆deo e imagen CAVLC (Context-Adaptive Variable Length Encoding), que es el m茅todo entr贸pico m谩s usado en el est谩ndar de codificaci贸n de v铆deo H.264. La aceleraci贸n respecto a la mejor implementaci贸n anterior est谩 entre 2.5x y 5.4x. Esta soluci贸n puede aprovecharse como el componente entr贸pico de codificadores H.264 software, y utilizarse en sistemas de compresi贸n de v铆deo e imagen en formatos distintos a H.264, como im谩genes m茅dicas. En segundo lugar, se ha desarrollado GUD-Canny, un detector de bordes de Canny no supervisado y distribuido. El sistema resuelve las principales limitaciones de las implementaciones del algoritmo de Canny, que son el cuello de botella causado por el proceso de hist茅resis y el uso de umbrales de hist茅resis fijos. Dada una imagen, esta se divide en un conjunto de sub-im谩genes, y, para cada una de ellas, se calcula de forma no supervisada un par de umbrales de hist茅resis utilizando el m茅todo de MedinaCarnicer. El detector satisface el requisito de tiempo real, al ser 0.35 ms el tiempo promedio en detectar los bordes de una imagen 512x512. En tercer lugar, se ha realizado una implementaci贸n optimizada del m茅todo de compresi贸n de datos VLE (Variable-Length Encoding), que es 2.6x m谩s r谩pida en promedio que la mejor implementaci贸n anterior. Adem谩s, esta soluci贸n incluye un nuevo m茅todo scan inter-bloque, que se puede usar para acelerar la propia operaci贸n scan y otros algoritmos, como el de compactaci贸n. En el caso de la operaci贸n scan, se logra una aceleraci贸n de 1.62x si se usa el m茅todo propuesto en lugar del utilizado en la mejor implementaci贸n anterior de VLE. Esta tesis doctoral concluye con un cap铆tulo sobre futuros trabajos de investigaci贸n que se pueden plantear a partir de sus contribuciones
    corecore