5 research outputs found

    Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems

    Get PDF
    In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network. Then, without any prior knowledge of hostile intercept receiver, a novel fuzzy chance-constrained programming (FCCP) based security information optimization scheme is presented to achieve enhanced LPID performance in radar network systems, which focuses on minimizing the achievable mutual information (MI) at interceptor, while the attainable MI outage probability at radar network is enforced to be greater than a specified confidence level. Regarding to the complexity and uncertainty of electromagnetic environment in the modern battlefield, the trapezoidal fuzzy number is used to describe the threshold of achievable MI at radar network based on the credibility theory. Finally, the FCCP model is transformed to a crisp equivalent form with the property of trapezoidal fuzzy number. Numerical simulation results demonstrating the performance of the proposed strategy are provided

    A Content Based Region Separation and Analysis Approach for SAR Image Classification

    Get PDF
    SAR images are the images captured through satellite or radar to monitor the specific geographical area or to extract any information regarding the geographical structure. This information can be used to recognize the land areas or regions with specific features such as identification of water area or flood area etc. But the images captured from satellite covers larger land regions with multiple scene pictures. To recognize the specific land area, it is required to process all the images with defined constraints to identify the particular region. The images or the image features can be trained under some classification method to categorize the land regions. There are various supervised and unsupervised classification methods to classify the SAR images. But the SAR images are high resolution images with multiple region types in same images. Because of this, the existing methods are not fully capable to classify the regions accurately. There is the requirement of more effective classification that can identify the land regions more adaptively

    Framework for reversible data hiding using cost-effective encoding system for video steganography

    Get PDF
    Importances of reversible data hiding practices are always higher in contrast to any conventional data hiding schemes owing to its capability to generate distortion free cover media. Review of existing approaches on reversible data hiding approaches shows variable scheme mainly focussing on the embedding mechanism; however, such schemes could be furthermore improved using encoding scheme for optimal embedding performance. Therefore, the proposed manuscript discusses about a cost-effective scheme where a novel encoding scheme has been used with larger block sizes which reduces the dependencies over larger number of blocks. Further a gradient-based image registration technique is applied to ensure higher quality of the reconstructed signal over the decoding end. The study outcome shows that proposed data hiding technique is proven better than existing data hiding scheme with good balance between security and restored signal quality upon extraction of data

    Microphone smart device fingerprinting from video recordings

    Get PDF
    This report aims at summarizing the on-going research activity carried out by DG-JRC in the framework of the institutional project Authors and Victims Identification of Child Abuse on-line, concerning the use of microphone fingerprinting for source device classification. Starting from an exhaustive study of the State of Art regarding the matter, this report describes a feasibility study about the adoption of microphone fingerprinting for source identification of video recordings. A set of operational scenarios have been established in collaboration with EUROPOL law enforcers, according to investigators needs. A critical analysis of the obtained results has demonstrated the feasibility of microphone fingerprinting and it has suggested a set of recommendations, both in terms of usability and future researches in the field.JRC.E.3-Cyber and Digital Citizens' Securit

    INDOOR-WIRELESS LOCATION TECHNIQUES AND ALGORITHMS UTILIZING UHF RFID AND BLE TECHNOLOGIES

    Get PDF
    The work presented herein explores the ability of Ultra High Frequency Radio Frequency (UHF RF) devices, specifically (Radio Frequency Identification) RFID passive tags and Bluetooth Low Energy (BLE) to be used as tools to locate items of interest inside a building. Localization Systems based on these technologies are commercially available, but have failed to be widely adopted due to significant drawbacks in the accuracy and reliability of state of the art systems. It is the goal of this work to address that issue by identifying and potentially improving upon localization algorithms. The work presented here breaks the process of localization into distance estimations and trilateration algorithms to use those estimations to determine a 2D location. Distance estimations are the largest error source in trilateration. Several methods are proposed to improve speed and accuracy of measurements using additional information from frequency variations and phase angle information. Adding information from the characteristic signature of multipath signals allowed for a significant reduction in distance estimation error for both BLE and RFID which was quantified using neural network optimization techniques. The resulting error reduction algorithm was generalizable to completely new environments with very different multipath behavior and was a significant contribution of this work. Another significant contribution of this work is the experimental comparison of trilateration algorithms, which tested new and existing methods of trilateration for accuracy in a controlled environment using the same data sets. Several new or improved methods of triangulation are presented as well as traditional methods from the literature in the analysis. The Antenna Pattern Method represents a new way of compensating for the antenna radiation pattern and its potential impact on signal strength, which is also an important contribution of this effort. The performance of each algorithm for multiple types of inputs are compared and the resulting error matrix allows a potential system designer to select the best option given the particular system constraints
    corecore