14 research outputs found

    A steganalytic algorithm for 3D polygonal meshes

    Get PDF
    We propose a steganalytic algorithm for watermarks embedded by Cho et al.'s mean-based algorithm [1]. The main observation is that while in a clean model the means of Cho et al.'s normalized histogram bins are expected to follow a Gaussian distribution, in a marked model their distribution will be bimodal. The proposed algorithm estimates the number of bins through an exhaustive search and then the presence of a watermark is decided by a tailor made normality test. We also propose a modification of Cho et al.'s algorithm which is more resistant to the steganalytic attack and offers an improved robustness/capacity trade-off

    An energy balancing strategy based on Hilbert curve and genetic algorithm for wireless sensor networks

    Get PDF
    A wireless sensor network is a sensing system composed of a few or thousands of sensor nodes. These nodes, however, are powered by internal batteries, which cannot be recharged or replaced, and have a limited lifespan. Traditional two-tier networks with one sink node are thus vulnerable to communication gaps caused by nodes dying when their battery power is depleted. In such cases, some nodes are disconnected with the sink node because intermediary nodes on the transmission path are dead. Energy load balancing is a technique for extending the lifespan of node batteries, thus preventing communication gaps and extending the network lifespan. However, while energy conservation is important, strategies that make the best use of available energy are also important. To decrease transmission energy cost and prolong network lifespan, a three-tier wireless sensor network is proposed, in which the first level is the sink node and the third-level nodes communicate with the sink node via the service sites on the second level. Moreover, this study aims to minimize the number of service sites to decrease the construction cost. Statistical evaluation criteria are used as benchmarks to compare traditional methods and the proposed method in the simulations.Web of Scienceart. ID 572065

    Steganalytic Methods for 3D Objects

    Get PDF
    This PhD thesis provides new research results in the area of using 3D features for steganalysis. The research study presented in the thesis proposes new sets of 3D features, greatly extending the previously proposed features. The proposed steganlytic feature set includes features representing the vertex normal, curvature ratio, Gaussian curvature, the edge and vertex position of the 3D objects in the spherical coordinate system. Through a second contribution, this thesis presents a 3D wavelet multiresolution analysis-based steganalytic method. The proposed method extracts the 3D steganalytic features from meshes of different resolutions. The third contribution proposes a robustness and relevance-based feature selection method for solving the cover-source mismatch problem in 3D steganalysis. This method selects those 3D features that are robust to the variation of the cover source, while preserving the relevance of such features to the class label. All the proposed methods are applied for identifying stego-meshes produced by several steganographic algorithms

    Appearance Based Stage Recognition of Drosophila Embryos

    Get PDF
    Stages in Drosophila development denote the time after fertilization at which certain specific events occur in the developmental cycle. Stage information of a host embryo, as well as spatial information of a gene expression region is indispensable input for the discovery of the pattern of gene-gene interaction. Manual labeling of stages is becoming a bottleneck under the circumstance of high throughput embryo images. Automatic recognition based on the appearances of embryos is becoming a more desirable scheme. This problem, however, is very challenging due to severe variations of illumination and gene expressions. In this research thesis, we propose an appearance based recognition method using orientation histograms and Gabor filter. Furthermore, we apply Principal Component Analysis to reduce the dimension of the low-level features, aiming to accelerate the speed of recognition. With the experiments on BDGP images, we show the promise of the proposed method

    Near Optimal Rate Homomorphic Encryption for Branching Programs

    Get PDF
    We initiate the study of good rate homomorphic encryption schemes. Based on previous work on securely evaluating (binary I/O) branching programs, we propose a leveled homomorphic encryption scheme for {\em large-output} polynomial-size branching programs (which we call L/poly\mathbf{L/poly}) that possesses near optimal-rate. The rate analysis of the new scheme is intricate: the best rate is achieved if a certain parameter ss is set equal to the only positive root of a degree-mm polynomial, where mm is the length of the branching program. We employ the Newton-Puiseux algorithm to find a Puiseux series for this parameter, and based on this, propose a Θ(logm)\Theta (\log m)-time algorithm to find an integer approximation to ss. We also describe a rate-optimal 1-out-of-nn CPIR based on rate-optimal homomorphic encryption. In concrete terms, when applied to say, a movie database with n=216n = 2^{16} elements of =3.8109\ell = 3.8 \cdot 10^{9}-bits, the client can privately download a movie with a communication rate of almost 0.990.99, hence sacrificing only about 1%1\% of bandwidth for privacy. We also analyze the optimality of the rate efficiency of our scheme in a novel model that may be of independent interest. Our 11-out-of-nn CPIR has rate 11.72k/log2n+O(1) 1- 1.72 \sqrt{k / \ell} \cdot \log_{2} n + O_\ell(\ell^{-1}), while we show that no black-box construction surpasses 1k/(logn/loglogn)+O(1)1 - \sqrt{k / \ell} (\log n/ \log \log n) + O_\ell(\ell^{-1}) in terms of rate, where \ell is the length of the database elements and kk the security parameter

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    A study of spaceraft technology and design concepts, volume 1

    Get PDF
    Concepts for advancing the state of the art in the design of unmanned spacecraft, the requirements that gave rise to its configuration, and the programs of technology that are suggested as leading to its eventual development are examined. Particular technology issues discussed include: structures and materials; thermal control; propulsion; electrical power; communications; data management; and guidance, navigation, and control

    The dynamics of complex systems. Studies and applications in computer science and biology

    Get PDF
    Our research has focused on the study of complex dynamics and on their use in both information security and bioinformatics. Our first work has been on chaotic discrete dynamical systems, and links have been established between these dynamics on the one hand, and either random or complex behaviors. Applications on information security are on the pseudorandom numbers generation, hash functions, informationhiding, and on security aspects on wireless sensor networks. On the bioinformatics level, we have applied our studies of complex systems to theevolution of genomes and to protein folding

    Digital Watermarking for Verification of Perception-based Integrity of Audio Data

    Get PDF
    In certain application fields digital audio recordings contain sensitive content. Examples are historical archival material in public archives that preserve our cultural heritage, or digital evidence in the context of law enforcement and civil proceedings. Because of the powerful capabilities of modern editing tools for multimedia such material is vulnerable to doctoring of the content and forgery of its origin with malicious intent. Also inadvertent data modification and mistaken origin can be caused by human error. Hence, the credibility and provenience in terms of an unadulterated and genuine state of such audio content and the confidence about its origin are critical factors. To address this issue, this PhD thesis proposes a mechanism for verifying the integrity and authenticity of digital sound recordings. It is designed and implemented to be insensitive to common post-processing operations of the audio data that influence the subjective acoustic perception only marginally (if at all). Examples of such operations include lossy compression that maintains a high sound quality of the audio media, or lossless format conversions. It is the objective to avoid de facto false alarms that would be expectedly observable in standard crypto-based authentication protocols in the presence of these legitimate post-processing. For achieving this, a feasible combination of the techniques of digital watermarking and audio-specific hashing is investigated. At first, a suitable secret-key dependent audio hashing algorithm is developed. It incorporates and enhances so-called audio fingerprinting technology from the state of the art in contentbased audio identification. The presented algorithm (denoted as ”rMAC” message authentication code) allows ”perception-based” verification of integrity. This means classifying integrity breaches as such not before they become audible. As another objective, this rMAC is embedded and stored silently inside the audio media by means of audio watermarking technology. This approach allows maintaining the authentication code across the above-mentioned admissible post-processing operations and making it available for integrity verification at a later date. For this, an existent secret-key ependent audio watermarking algorithm is used and enhanced in this thesis work. To some extent, the dependency of the rMAC and of the watermarking processing from a secret key also allows authenticating the origin of a protected audio. To elaborate on this security aspect, this work also estimates the brute-force efforts of an adversary attacking this combined rMAC-watermarking approach. The experimental results show that the proposed method provides a good distinction and classification performance of authentic versus doctored audio content. It also allows the temporal localization of audible data modification within a protected audio file. The experimental evaluation finally provides recommendations about technical configuration settings of the combined watermarking-hashing approach. Beyond the main topic of perception-based data integrity and data authenticity for audio, this PhD work provides new general findings in the fields of audio fingerprinting and digital watermarking. The main contributions of this PhD were published and presented mainly at conferences about multimedia security. These publications were cited by a number of other authors and hence had some impact on their works
    corecore