798 research outputs found

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Full text link
    Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements. On the basis of experimental results, our design approaches are compared, and introduced into a protocol engineering approach for micro protocols.Comment: 20 pages, 7 figures, 4 table

    Audio watermarking techniques using singular value decomposition

    Get PDF
    In an increasingly digital world, proving ownership of files is more and more difficult. For audio files, many schemes have been put into place to attempt to protect the rights of the digital content owners. In general, these techniques fall under the classification of Digital Rights Management (DRM). Audio watermarking is one of the less invasive schemes which embeds security into the data itself instead of in an outside layer meant to encapsulate and protect the data. There are many domains in which an audio watermark can be applied. The simplest is that of the time domain; often, however, other domains may be more desirable due to greater imperceptibility and robustness to attack. Common domains include the frequency domain, or domains similar to frequency through functions such as the Wavelet Transform. One domain of particular interest is that of the Singular Value Decomposition. The goal of this thesis is to propose and test many different watermarking schemes as well as test an existing watermarking scheme operating in the SVD domain in order to assess the viability of the SVD as a watermarking carrier domain. Different carrier matrices as well as bit embedding methods are explored. The use of a standard set of audio files was used to help test the systems; a standard set of watermarking tests was unavailable, so a comparable test bed was implemented and utilized

    DeAR: A Deep-learning-based Audio Re-recording Resilient Watermarking

    Full text link
    Audio watermarking is widely used for leaking source tracing. The robustness of the watermark determines the traceability of the algorithm. With the development of digital technology, audio re-recording (AR) has become an efficient and covert means to steal secrets. AR process could drastically destroy the watermark signal while preserving the original information. This puts forward a new requirement for audio watermarking at this stage, that is, to be robust to AR distortions. Unfortunately, none of the existing algorithms can effectively resist AR attacks due to the complexity of the AR process. To address this limitation, this paper proposes DeAR, a deep-learning-based audio re-recording resistant watermarking. Inspired by DNN-based image watermarking, we pioneer a deep learning framework for audio carriers, based on which the watermark signal can be effectively embedded and extracted. Meanwhile, in order to resist the AR attack, we delicately analyze the distortions that occurred in the AR process and design the corresponding distortion layer to cooperate with the proposed watermarking framework. Extensive experiments show that the proposed algorithm can resist not only common electronic channel distortions but also AR distortions. Under the premise of high-quality embedding (SNR=25.86dB), in the case of a common re-recording distance (20cm), the algorithm can effectively achieve an average bit recovery accuracy of 98.55%.Comment: Accepted by AAAI202

    Virtual Eye – Revolutionizing Vision Assistance For People With Disabilities

    Get PDF
    Visually challenged individuals have faced numerous challenges in their daily lives. These challenges include: Visually challenged individuals have difficulty reading printed materials, including books, magazines, and newspapers. This limitation can significantly impact their education, as they may not have access to all the materials they need to learn. Moving around in unfamiliar places can be a daunting task for the visually impaired. They may struggle to access digital or printed materials, as these are often not available in accessible formats. It might be difficult for those who are blind to identify objects. This can be frustrating, especially in situations where they are alone and need to identify objects. To address this issue, we are developing a mobile application for visually challenged individuals by providing a range of features such as text-to-speech, speech-to-text, image-to-audio, and PDF-to-audio. It enables visually challenged individuals to access information, read books, identify objects, communicate, and navigate with ease and independence. The app's user-friendly interface can be accessed both manually and by voice command, making it easy to use for people with varying levels of technical expertise. Overall, the Virtual Eye app helps visually challenged individuals lead more fulfilling and independent lives. Overall, Virtual Eye application is an essential tool for visually challenged individuals, helping them navigate their daily lives with ease and independence. With this app, they can access information, communicate, and identify objects without the need for a third party, enhancing their quality of life and sense of autonomy
    • …
    corecore