55 research outputs found

    Information embedding and retrieval in 3D printed objects

    Get PDF
    Deep learning and convolutional neural networks have become the main tools of computer vision. These techniques are good at using supervised learning to learn complex representations from data. In particular, under limited settings, the image recognition model now performs better than the human baseline. However, computer vision science aims to build machines that can see. It requires the model to be able to extract more valuable information from images and videos than recognition. Generally, it is much more challenging to apply these deep learning models from recognition to other problems in computer vision. This thesis presents end-to-end deep learning architectures for a new computer vision field: watermark retrieval from 3D printed objects. As it is a new area, there is no state-of-the-art on many challenging benchmarks. Hence, we first define the problems and introduce the traditional approach, Local Binary Pattern method, to set our baseline for further study. Our neural networks seem useful but straightfor- ward, which outperform traditional approaches. What is more, these networks have good generalization. However, because our research field is new, the problems we face are not only various unpredictable parameters but also limited and low-quality training data. To address this, we make two observations: (i) we do not need to learn everything from scratch, we know a lot about the image segmentation area, and (ii) we cannot know everything from data, our models should be aware what key features they should learn. This thesis explores these ideas and even explore more. We show how to use end-to-end deep learning models to learn to retrieve watermark bumps and tackle covariates from a few training images data. Secondly, we introduce ideas from synthetic image data and domain randomization to augment training data and understand various covariates that may affect retrieve real-world 3D watermark bumps. We also show how the illumination in synthetic images data to effect and even improve retrieval accuracy for real-world recognization applications

    Digital watermarking and novel security devices

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Information Analysis for Steganography and Steganalysis in 3D Polygonal Meshes

    Get PDF
    Information hiding, which embeds a watermark/message over a cover signal, has recently found extensive applications in, for example, copyright protection, content authentication and covert communication. It has been widely considered as an appealing technology to complement conventional cryptographic processes in the field of multimedia security by embedding information into the signal being protected. Generally, information hiding can be classified into two categories: steganography and watermarking. While steganography attempts to embed as much information as possible into a cover signal, watermarking tries to emphasize the robustness of the embedded information at the expense of embedding capacity. In contrast to information hiding, steganalysis aims at detecting whether a given medium has hidden message in it, and, if possible, recover that hidden message. It can be used to measure the security performance of information hiding techniques, meaning a steganalysis resistant steganographic/watermarking method should be imperceptible not only to Human Vision Systems (HVS), but also to intelligent analysis. As yet, 3D information hiding and steganalysis has received relatively less attention compared to image information hiding, despite the proliferation of 3D computer graphics models which are fairly promising information carriers. This thesis focuses on this relatively neglected research area and has the following primary objectives: 1) to investigate the trade-off between embedding capacity and distortion by considering the correlation between spatial and normal/curvature noise in triangle meshes; 2) to design satisfactory 3D steganographic algorithms, taking into account this trade-off; 3) to design robust 3D watermarking algorithms; 4) to propose a steganalysis framework for detecting the existence of the hidden information in 3D models and introduce a universal 3D steganalytic method under this framework. %and demonstrate the performance of the proposed steganalysis by testing it against six well-known 3D steganographic/watermarking methods. The thesis is organized as follows. Chapter 1 describes in detail the background relating to information hiding and steganalysis, as well as the research problems this thesis will be studying. Chapter 2 conducts a survey on the previous information hiding techniques for digital images, 3D models and other medium and also on image steganalysis algorithms. Motivated by the observation that the knowledge of the spatial accuracy of the mesh vertices does not easily translate into information related to the accuracy of other visually important mesh attributes such as normals, Chapters 3 and 4 investigate the impact of modifying vertex coordinates of 3D triangle models on the mesh normals. Chapter 3 presents the results of an empirical investigation, whereas Chapter 4 presents the results of a theoretical study. Based on these results, a high-capacity 3D steganographic algorithm capable of controlling embedding distortion is also presented in Chapter 4. In addition to normal information, several mesh interrogation, processing and rendering algorithms make direct or indirect use of curvature information. Motivated by this, Chapter 5 studies the relation between Discrete Gaussian Curvature (DGC) degradation and vertex coordinate modifications. Chapter 6 proposes a robust watermarking algorithm for 3D polygonal models, based on modifying the histogram of the distances from the model vertices to a point in 3D space. That point is determined by applying Principal Component Analysis (PCA) to the cover model. The use of PCA makes the watermarking method robust against common 3D operations, such as rotation, translation and vertex reordering. In addition, Chapter 6 develops a 3D specific steganalytic algorithm to detect the existence of the hidden messages embedded by one well-known watermarking method. By contrast, the focus of Chapter 7 will be on developing a 3D watermarking algorithm that is resistant to mesh editing or deformation attacks that change the global shape of the mesh. By adopting a framework which has been successfully developed for image steganalysis, Chapter 8 designs a 3D steganalysis method to detect the existence of messages hidden in 3D models with existing steganographic and watermarking algorithms. The efficiency of this steganalytic algorithm has been evaluated on five state-of-the-art 3D watermarking/steganographic methods. Moreover, being a universal steganalytic algorithm can be used as a benchmark for measuring the anti-steganalysis performance of other existing and most importantly future watermarking/steganographic algorithms. Chapter 9 concludes this thesis and also suggests some potential directions for future work

    A robust region-adaptive digital image watermarking system

    Get PDF
    Digital image watermarking techniques have drawn the attention of researchers and practitioners as a means of protecting copyright in digital images. The technique involves a subset of information-hiding technologies, which work by embedding information into a host image without perceptually altering the appearance of the host image. Despite progress in digital image watermarking technology, the main objectives of the majority of research in this area remain improvements in the imperceptibility and robustness of the watermark to attacks. Watermark attacks are often deliberately applied to a watermarked image in order to remove or destroy any watermark signals in the host data. The purpose of the attack is. aimed at disabling the copyright protection system offered by watermarking technology. Our research in the area of watermark attacks found a number of different types, which can be classified into a number of categories including removal attacks, geometry attacks, cryptographic attacks and protocol attacks. Our research also found that both pixel domain and transform domain watermarking techniques share similar levels of sensitivity to these attacks. The experiment conducted to analyse the effects of different attacks on watermarked data provided us with the conclusion that each attack affects the high and low frequency part of the watermarked image spectrum differently. Furthermore, the findings also showed that the effects of an attack can be alleviated by using a watermark image with a similar frequency spectrum to that of the host image. The results of this experiment led us to a hypothesis that would be proven by applying a watermark embedding technique which takes into account all of the above phenomena. We call this technique 'region-adaptive watermarking'. Region-adaptive watermarking is a novel embedding technique where the watermark data is embedded in different regions of the host image. The embedding algorithms use discrete wavelet transforms and a combination of discrete wavelet transforms and singular value decomposition, respectively. This technique is derived from the earlier hypothesis that the robustness of a watermarking process can be improved by using watermark data in the frequency spectrum that are not too dissimilar to that of the host data. To facilitate this, the technique utilises dual watermarking technologies and embeds parts of the watermark images into selected regions of the host image. Our experiment shows that our technique improves the robustness of the watermark data to image processing and geometric attacks, thus validating the earlier hypothesis. In addition to improving the robustness of the watermark to attacks, we can also show a novel use for the region-adaptive watermarking technique as a means of detecting whether certain types of attack have occurred. This is a unique feature of our watermarking algorithm, which separates it from other state-of-the-art techniques. The watermark detection process uses coefficients derived from the region-adaptive watermarking algorithm in a linear classifier. The experiment conducted to validate this feature shows that, on average, 94.5% of all watermark attacks can be correctly detected and identified

    Contribution to the construction of fingerprinting and watermarking schemes to protect mobile agents and multimedia content

    Get PDF
    The main characteristic of fingerprinting codes is the need of high error-correction capacity due to the fact that they are designed to avoid collusion attacks which will damage many symbols from the codewords. Moreover, the use of fingerprinting schemes depends on the watermarking system that is used to embed the codeword into the content and how it honors the marking assumption. In this sense, even though fingerprinting codes were mainly used to protect multimedia content, using them on software protection systems seems an option to be considered. This thesis, studies how to use codes which have iterative-decoding algorithms, mainly turbo-codes, to solve the fingerprinting problem. Initially, it studies the effectiveness of current approaches based on concatenating tradicioanal fingerprinting schemes with convolutional codes and turbo-codes. It is shown that these kind of constructions ends up generating a high number of false positives. Even though this thesis contains some proposals to improve these schemes, the direct use of turbo-codes without using any concatenation with a fingerprinting code as inner code has also been considered. It is shown that the performance of turbo-codes using the appropiate constituent codes is a valid alternative for environments with hundreds of users and 2 or 3 traitors. As constituent codes, we have chosen low-rate convolutional codes with maximum free distance. As for how to use fingerprinting codes with watermarking schemes, we have studied the option of using watermarking systems based on informed coding and informed embedding. It has been discovered that, due to different encodings available for the same symbol, its applicability to embed fingerprints is very limited. On this sense, some modifications to these systems have been proposed in order to properly adapt them to fingerprinting applications. Moreover the behavior and impact over a video produced as a collusion of 2 users by the YouTube’s s ervice has been s tudied. We have also studied the optimal parameters for viable tracking of users who have used YouTube and conspired to redistribute copies generated by a collusion attack. Finally, we have studied how to implement fingerprinting schemes and software watermarking to fix the problem of malicious hosts on mobile agents platforms. In this regard, four different alternatives have been proposed to protect the agent depending on whether you want only detect the attack or avoid it in real time. Two of these proposals are focused on the protection of intrusion detection systems based on mobile agents. Moreover, each of these solutions has several implications in terms of infrastructure and complexity.Els codis fingerprinting es caracteritzen per proveir una alta capacitat correctora ja que han de fer front a atacs de confabulació que malmetran una part important dels símbols de la paraula codi. D'atra banda, la utilització de codis de fingerprinting en entorns reals està subjecta a que l'esquema de watermarking que gestiona la incrustació sigui respectuosa amb la marking assumption. De la mateixa manera, tot i que el fingerprinting neix de la protecció de contingut multimèdia, utilitzar-lo en la protecció de software comença a ser una aplicació a avaluar. En aquesta tesi s'ha estudiat com aplicar codis amb des codificació iterativa, concretament turbo-codis, al problema del rastreig de traïdors en el context del fingerprinting digital. Inicialment s'ha qüestionat l'eficàcia dels enfocaments actuals en la utilització de codis convolucionals i turbo-codis que plantegen concatenacions amb esquemes habituals de fingerprinting. S'ha demostrat que aquest tipus de concatenacions portaven, de forma implícita, a una elevada probabilitat d'inculpar un usuari innocent. Tot i que s'han proposat algunes millores sobre aquests esquemes , finalment s'ha plantejat l'ús de turbocodis directament, evitant així la concatenació amb altres esquemes de fingerprinting. S'ha demostrat que, si s'utilitzen els codis constituents apropiats, el rendiment del turbo-descodificador és suficient per a ser una alternativa aplicable en entorns amb varis centenars d'usuaris i 2 o 3 confabuladors . Com a codis constituents s'ha optat pels codis convolucionals de baix ràtio amb distància lliure màxima. Pel que fa a com utilitzar els codis de fingerprinting amb esquemes de watermarking, s'ha estudiat l'opció d'utilitzar sistemes de watermarking basats en la codificació i la incrustació informada. S'ha comprovat que, degut a la múltiple codificació del mateix símbol, la seva aplicabilitat per incrustar fingerprints és molt limitada. En aquest sentit s'ha plantejat algunes modificacions d'aquests sistemes per tal d'adaptar-los correctament a aplicacions de fingerprinting. D'altra banda s'ha avaluat el comportament i l'impacte que el servei de YouTube produeix sobre un vídeo amb un fingerprint incrustat. A més , s'ha estudiat els paràmetres òptims per a fer viable el rastreig d'usuaris que han confabulat i han utilitzat YouTube per a redistribuir la copia fruït de la seva confabulació. Finalment, s'ha estudiat com aplicar els esquemes de fingerprinting i watermarking de software per solucionar el problema de l'amfitrió maliciós en agents mòbils . En aquest sentit s'han proposat quatre alternatives diferents per a protegir l'agent en funció de si és vol només detectar l'atac o evitar-lo en temps real. Dues d'aquestes propostes es centren en la protecció de sistemes de detecció d'intrusions basats en agents mòbils. Cadascuna de les solucions té diverses implicacions a nivell d'infrastructura i de complexitat.Postprint (published version

    Privacy-preserving information hiding and its applications

    Get PDF
    The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc. Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur. Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud. Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function. In summary, this thesis presents novel schemes and algorithms, including: • two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively. • two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively. • four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference. • three privacy-preserving secret sharing algorithms with different levels of generality

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Microwave Dielectrometry Adapted to Environments

    Full text link
    Tesis por compendio[ES] La permitividad es una propiedad física de los materiales que describe su comportamiento en presencia de un campo electromagnético. Los sensores de microondas pueden desempeñar un papel esencial en las tareas de detección, supervisión o control de procesos, ya que algunos parámetros fisicoquímicos de los materiales producen cambios medibles en las propiedades dieléctricas. Además, la tecnología de calentamiento por microondas está adquiriendo una relevancia creciente para la transición ecológica y la descarbonización de los procesos industriales, y la permitividad es el parámetro esencial para el desarrollo exitoso de estos nuevos procesos. La permitividad depende de muchos factores, por lo que los métodos de medición de la permitividad deben adaptarse a las necesidades del material y del entorno de medición. El número de aplicaciones que requieren la monitorización o medida de las propiedades dieléctricas, las altas dependencias de esta magnitud bajo diferentes condiciones, y la necesidad de poner esta tecnología al alcance de un usuario más amplio y menos especializado, justifican el desarrollo de este trabajo. Esta tesis pretende desarrollar nuevos dispositivos para la monitorización y caracterización de dieléctricos adaptados a diferentes entornos, cubriendo un amplio rango de formatos, formas y propiedades de los materiales. Las dos primeras publicaciones incluidas en la tesis describen dos enfoques diferentes para abordar las mediciones de permitividad. El primer artículo describe un instrumento versátil, autónomo y fácil de usar para medir la permitividad de materiales dentro de tubos. El diseño de la cavidad logró una excelente sensibilidad, y el estudio de la red de acoplamiento permitió la caracterización de materiales de pérdidas bajas, moderadas y altas con una misma configuración. Este dispositivo incluye un reflectómetro vectorial portátil propio, lo que lo hace portátil y asequible. Las características del instrumento desarrollado permiten un uso sencillo por parte de personal no especializado y proporcionan versatilidad en muchas situaciones. La segunda publicación presenta el diseño específico de una sonda coaxial de extremo abierto con una mayor sensibilidad para determinar la permitividad de productos alimenticios de altas pérdidas en función de la temperatura a frecuencias de RF. Este artículo destaca la importancia de seleccionar la técnica de medición más adecuada, adaptada al entorno y a las particularidades del material, para la determinación apropiada de la permitividad. Los dos artículos siguientes describen el desarrollo y la utilización de un microscopio de microondas de campo cercano con resolución micrométrica para determinar mapas de permitividad de materiales planos heterogéneos a frecuencias de microondas. En ambos trabajos se describen los diferentes elementos que componen el instrumento del microscopio y las técnicas de análisis para determinar los valores de permitividad a partir de las medidas de los parámetros de la resonancia. En el primer trabajo se empleó por primera vez la tecnología de microondas en aplicaciones contra la falsificación, obteniendo la marca dieléctrica de la marca de agua de un billete. Además, este estudio demostró la capacidad de la energía de microondas para detectar marcas ocultas detrás de capas dieléctricas o metálicas, lo que abre nuevas posibilidades para el desarrollo de elementos de seguridad ópticamente opacos e imposibles de rastrear por medios ópticos. El segundo estudio demuestra la versatilidad de este sistema para determinar las propiedades dieléctricas de materiales planos heterogéneos midiendo la respuesta dieléctrica de especímenes de roca. Los métodos desarrollados en esta tesis aumentan la cartera de sistemas de caracterización dieléctrica y pueden ayudar a una amplia gama de sectores científicos e industriales en las tareas de monitorización y caracterización dieléctrica, haciendo estos trabajos más cómodos y accesibles.[CA] La permitivitat és una propietat física dels materials que descriu el seu comportament en presència d'un camp electromagnètic. Els sensors de microones poden exercir un paper essencial en les tasques de detecció, supervisió o control de processos, ja que alguns paràmetres fisicoquímics dels materials produeixen canvis mesurables en les propietats dielèctriques. A més, la tecnologia de calfament per microones està adquirint una rellevància creixent per a la transició ecològica i la descarbonització dels processos industrials, i la permitivitat és el paràmetre essencial per al desenvolupament reeixit d'aquests nous processos. La permitivitat depén de molts factors i, per tant, els mètodes de mesurament de la permitivitat han d'adaptar-se a les necessitats del material i de l'entorn de mesurament. El nombre d'aplicacions que requereixen el monitoratge o mesura de les propietats dielèctriques, les altes dependències d'aquesta magnitud sota diferents condicions, i la necessitat de posar aquesta tecnologia a l'abast d'un usuari més ampli i menys especialitzat, justifiquen el desenvolupament d'aquest treball. Aquesta tesi pretén desenvolupar nous dispositius per al monitoratge i caracterització de dielèctrics adaptats a diferents entorns, cobrint un ampli rang de formats, formes i propietats dels materials. Les dues primeres publicacions incloses en la tesi descriuen dos enfocaments diferents per a abordar els mesuraments de permitivitat. El primer article descriu un instrument versàtil, autònom i fàcil d'usar per a mesurar la permitivitat de materials dins de tubs. El disseny de la cavitat va aconseguir una excel·lent sensibilitat, i l'estudi de la xarxa d'acoblament va permetre la caracterització de materials de pèrdues baixes, moderades i altes amb una mateixa configuració. Aquest dispositiu inclou un reflectòmetre vectorial portàtil propi, la qual cosa el fa portàtil i assequible. Les característiques de l'instrument desenvolupat permeten un ús senzill per part de personal no especialitzat i proporcionen versatilitat en moltes situacions. La segona publicació presenta el disseny específic de una sonda coaxial d'extrem obert amb una major sensibilitat per a determinar la permitivitat de productes alimentaris d'altes pèrdues en funció de la temperatura a freqüències de RF. Aquest article destaca la importància de seleccionar la tècnica de mesurament més adequat, adaptada a l'entorn i a les particularitats del material, per a la determinació apropiada de la permitivitat. Els dos articles següents descriuen el desenvolupament i la utilització d'un microscopi de microones de camp pròxim amb resolució micromètrica per a determinar mapes de permitivitat de materials plans heterogenis a freqüències de microones. En tots dos treballs es descriuen els diferents elements que componen l'instrument del microscopi i les tècniques d'anàlisis per a determinar els valors de permitivitat a partir de les mesures dels paràmetres de la ressonància. En el primer treball es va emprar per primera vegada la tecnologia de microones en aplicacions contra la falsificació, obtenint la marca dielèctrica de la marca d'aigua d'un bitllet. A més, aquest estudi va demostrar la capacitat de l'energia de microones per a detectar marques ocultes darrere de capes dielèctriques o metàl·liques, la qual cosa obri noves possibilitats per al desenvolupament d'elements de seguretat òpticament opacs i impossibles de rastrejar per mitjans òptics. El segon estudi demostra la versatilitat d'aquest sistema per a determinar les propietats dielèctriques de materials plans heterogenis mesurant la resposta dielèctrica d'espècimens de roca. Els mètodes desenvolupats en aquesta tesi augmenten la cartera de sistemes de caracterització dielèctrica i poden ajudar a una àmplia gamma de sectors científics i industrials en les tasques de monitoratge i caracterització dielèctrica, fent aquests treballs més còmodes i accessibles.[EN] Permittivity is a physical property of materials describing their behavior in the presence of an electromagnetic field. Microwave sensors can play an essential role in detecting, monitoring, or process control tasks as some physicochemical parameters of materials produce measurable changes in dielectric properties. Besides, microwave heating technology is gaining increasing relevance for the ecological transition and decarbonization of industrial processes, and permittivity is the essential parameter for the successful development of these new processes. Permittivity depends on many factors and thus, permittivity measurement methods must be adapted to the needs of the material and the measurement environment. The number of applications that require the monitoring or measurement of dielectric properties, the high dependencies of this magnitude under different conditions, and the need to make this technology available to a broader and less specialized user justify the development of this work. This thesis aims to develop new devices for the monitoring and characterization of dielectrics adapted to different environments, covering a wide range of materials' formats, shapes, and properties. The first two publications included in the thesis describe two different approaches to address permittivity measurements. The first paper describes a versatile, stand-alone, and easy-to-use instrument for measuring the permittivity materials inside tubes. The design of the cavity achieved an excellent sensitivity, and the study of the coupling network allowed the characterization of low, moderate, and high-loss materials with the same setup. This device included an in-house portable vector reflectometer, making it portable and cost-affordable. The features of the developed instrument allow straightforward use by non-specialized personnel and provide versatility in many situations. The second publication presents a specific open-ended coaxial design with increased sensitivity to determine the permittivity of lossy food products as a function of temperature at RF frequencies. This paper highlight the relevance of selecting the most suitable measurement technique, adapted to the environment and particularities of the material, for the appropriate determination of permittivity. The following two papers describe the development and use of a near-field scanning microwave microscope with micrometric resolution to determine permittivity maps of heterogeneous planar materials at microwave frequencies. The different elements comprising the microscope instrument and the analysis techniques to determine permittivity values from the resonance measurements were described throughout both works. In the first paper, microwave technology was employed for the first time in anti-counterfeiting applications by obtaining the dielectric mark of a banknote watermark. Besides, this study showed the ability of microwave energy to detect hidden marks behind dielectric or metallic layers, opening new possibilities for developing optically opaque security features untraceable by optical means. The second study demonstrates the versatility of this system in determining the dielectric properties of heterogeneous planar materials by measuring the dielectric response of rock specimens. The methods developed in this thesis dissertation increase the portfolio of dielectric characterization systems and can help a wide range of scientific and industrial sectors in dielectric monitoring and characterization tasks, making these works more convenient and accessible.Financial support through the grant reference BES-2016-077296 of the call Convocatoria de las ayudas para contratos predoctorales para la formación de doctores de 2016 by Ministerio de Economía y Competitividad (MINECO) and by European Social Funds (ESF) of European Union is also gratefully acknowledgedGutiérrez Cano, JD. (2022). Microwave Dielectrometry Adapted to Environments [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/186351TESISCompendi

    Sensor Data Integrity Verification for Real-time and Resource Constrained Systems

    Full text link
    Sensors are used in multiple applications that touch our lives and have become an integral part of modern life. They are used in building intelligent control systems in various industries like healthcare, transportation, consumer electronics, military, etc. Many mission-critical applications require sensor data to be secure and authentic. Sensor data security can be achieved using traditional solutions like cryptography and digital signatures, but these techniques are computationally intensive and cannot be easily applied to resource constrained systems. Low complexity data hiding techniques, on the contrary, are easy to implement and do not need substantial processing power or memory. In this applied research, we use and configure the established low complexity data hiding techniques from the multimedia forensics domain. These techniques are used to secure the sensor data transmissions in resource constrained and real-time environments such as an autonomous vehicle. We identify the areas in an autonomous vehicle that require sensor data integrity and propose suitable water-marking techniques to verify the integrity of the data and evaluate the performance of the proposed method against different attack vectors. In our proposed method, sensor data is embedded with application specific metadata and this process introduces some distortion. We analyze this embedding induced distortion and its impact on the overall sensor data quality to conclude that watermarking techniques, when properly configured, can solve sensor data integrity verification problems in an autonomous vehicle.Ph.D.College of Engineering & Computer ScienceUniversity of Michigan-Dearbornhttp://deepblue.lib.umich.edu/bitstream/2027.42/167387/3/Raghavendar Changalvala Final Dissertation.pdfDescription of Raghavendar Changalvala Final Dissertation.pdf : Dissertatio

    Music Encoding Conference Proceedings 2021, 19–22 July, 2021 University of Alicante (Spain): Onsite & Online

    Get PDF
    Este documento incluye los artículos y pósters presentados en el Music Encoding Conference 2021 realizado en Alicante entre el 19 y el 22 de julio de 2022.Funded by project Multiscore, MCIN/AEI/10.13039/50110001103
    corecore