304 research outputs found
A Framework for Multimedia Data Hiding (Security)
With the proliferation of multimedia data such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary document images. The difficulty lies in the fact that changing pixel values in a binary document could introduce Irregularities that is very visually noticeable. We have seen but limited number of papers proposing new techniques and ideas for document image watermarking and data hiding. In this paper, we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques
Major Security Issue That Facing Social Networks with Its Main Defense Strategies
The Social Network Service "SNS" has enabled significant advancements in a wide variety of scientific fields, and as a result, it has become an extremely popular subject in both academia and business. SNSs can be extremely beneficial to users because they eliminate economic and geographical barriers and can be used for job searching, entertainment and education. Regardless of the economic and social benefits, protecting businesses and users\u27 security and privacy remains a critical issue that must be addressed. It is critical to address and evaluate social network service challenges, as they vary according to the variety of SNS sites. Thus, by discussing SNS challenges alongside available and potential solutions, users, developers, and businesses can identify relevant and timely responses to specific threats, resulting in the best SNS-based services possible. The objective of this article is to discuss the inherent challenges of social networking sites and some critical solutions for resolving them. We extracted and analyzed seminal papers to add to the corpus of literature by focusing on several critical challenges in the social network service domain and shedding light on how these challenges affect a variety of domains, including users, sites, and business. The most frequently mentioned difficulties concerned privacy risks, anonymity risks, malware, spam, identity theft, phishing, business data, social content, technical issues, and psychological difficulties. By incorporating previously discovered solutions, this paper addressed these issues. The implications for both researchers and practitioners have been discussed
Identifying and Mitigating the Security Risks of Generative AI
Every major technical invention resurfaces the dual-use dilemma -- the new
technology has the potential to be used for good as well as for harm.
Generative AI (GenAI) techniques, such as large language models (LLMs) and
diffusion models, have shown remarkable capabilities (e.g., in-context
learning, code-completion, and text-to-image generation and editing). However,
GenAI can be used just as well by attackers to generate new attacks and
increase the velocity and efficacy of existing attacks.
This paper reports the findings of a workshop held at Google (co-organized by
Stanford University and the University of Wisconsin-Madison) on the dual-use
dilemma posed by GenAI. This paper is not meant to be comprehensive, but is
rather an attempt to synthesize some of the interesting findings from the
workshop. We discuss short-term and long-term goals for the community on this
topic. We hope this paper provides both a launching point for a discussion on
this important topic as well as interesting problems that the research
community can work to address
Confidence-Building Measures for Artificial Intelligence: Workshop Proceedings
Foundation models could eventually introduce several pathways for undermining
state security: accidents, inadvertent escalation, unintentional conflict, the
proliferation of weapons, and the interference with human diplomacy are just a
few on a long list. The Confidence-Building Measures for Artificial
Intelligence workshop hosted by the Geopolitics Team at OpenAI and the Berkeley
Risk and Security Lab at the University of California brought together a
multistakeholder group to think through the tools and strategies to mitigate
the potential risks introduced by foundation models to international security.
Originating in the Cold War, confidence-building measures (CBMs) are actions
that reduce hostility, prevent conflict escalation, and improve trust between
parties. The flexibility of CBMs make them a key instrument for navigating the
rapid changes in the foundation model landscape. Participants identified the
following CBMs that directly apply to foundation models and which are further
explained in this conference proceedings: 1. crisis hotlines 2. incident
sharing 3. model, transparency, and system cards 4. content provenance and
watermarks 5. collaborative red teaming and table-top exercises and 6. dataset
and evaluation sharing. Because most foundation model developers are
non-government entities, many CBMs will need to involve a wider stakeholder
community. These measures can be implemented either by AI labs or by relevant
government actors
Recommended from our members
Cross-device media: a review of second screening and multi-device television
Television viewers interacting with second screens has become a common sight in the modern living room. Such activities are a mixture of related, semi-related, and non-related browsing of content. This growing trend is revolutionising the way that broadcasters think about their content. Through the envisioned connected home, driven by end-to-end IP connected networks, television content creators and app developers are now considering the design space for multi-device, interactive experiences. In this review paper, we consider the pre-digital beginnings of such scenarios, and progress to discuss how the introduction of mobile devices has affected the TV viewing experience. We discuss dual-screen usage over a variety of contexts in the connected home, with a focus on ‘designed’ dual-screen experiences such as companion applications. We conclude with reflections on the future of this area so that app developers, broadcasters, and academics may push further the space and improve future dual- and multi-screen experiences
SciTech News Volume 71, No. 1 (2017)
Columns and Reports From the Editor 3
Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11
Reviews Sci-Tech Book News Reviews 12
Advertisements IEEE
Recommended from our members
The Need for International AI Activities Monitoring
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The paper reviews factors involved in the international monitoring of AI activities, strategies of dual-use technologies regulation, challenges, and potential solutions
Regaining control through Digital Rights Management (DRM): What\u27s in store for the music industry?
This paper, as part of the final requirement for the completion of a Master of Science in Information Technology at the Rochester Institute of Technology, will examine the current state of digital media content and its inherent problems with regard to rendering and distribution. Discussions will focus on the protection and sales of digitalized intellectual property through Digital Rights Management (DRM) while also concentrating on how these technologies can be employed to acquire copyright protection. Though much of the discussion may apply to a wide range of media types, e.g. - movies, software and digital books, the primary focus will be on music content. Part 1 of the paper will explore the current state of the music industry and the problems it faces, while building a case for the application of digital protection technologies that will ensure the integrity of digital music copyright ownership. The concept of DRM will then be presented in Part 2, with a focused discussion on several of the underpinning technologies. Strong emphasis will be placed on how these technologies can be utilized to reach the final goal, secure sales of online music content. The final section, Part 3, will examine how DRM can be applied by the music industry to safeguard their interests while promoting an online business. Case studies will be presented in an attempt to gain an understanding of the current state of the industry
- …