9 research outputs found

    Covert Channels Within IRC

    Get PDF
    The exploration of advanced information hiding techniques is important to understand and defend against illicit data extractions over networks. Many techniques have been developed to covertly transmit data over networks, each differing in their capabilities, methods, and levels of complexity. This research introduces a new class of information hiding techniques for use over Internet Relay Chat (IRC), called the Variable Advanced Network IRC Stealth Handler (VANISH) system. Three methods for concealing information are developed under this framework to suit the needs of an attacker. These methods are referred to as the Throughput, Stealth, and Baseline scenarios. Each is designed for a specific purpose: to maximize channel capacity, minimize shape-based detectability, or provide a baseline for comparison using established techniques applied to IRC. The effectiveness of these scenarios is empirically tested using public IRC servers in Chicago, Illinois and Amsterdam, Netherlands. The Throughput method exfiltrates covert data at nearly 800 bits per second (bps) compared to 18 bps with the Baseline method and 0.13 bps for the Stealth method. The Stealth method uses Reed-Solomon forward error correction to reduce bit errors from 3.1% to nearly 0% with minimal additional overhead. The Stealth method also successfully evades shape-based detection tests but is vulnerable to regularity-based tests

    Preserving Trustworthiness and Confidentiality for Online Multimedia

    Get PDF
    Technology advancements in areas of mobile computing, social networks, and cloud computing have rapidly changed the way we communicate and interact. The wide adoption of media-oriented mobile devices such as smartphones and tablets enables people to capture information in various media formats, and offers them a rich platform for media consumption. The proliferation of online services and social networks makes it possible to store personal multimedia collection online and share them with family and friends anytime anywhere. Considering the increasing impact of digital multimedia and the trend of cloud computing, this dissertation explores the problem of how to evaluate trustworthiness and preserve confidentiality of online multimedia data. The dissertation consists of two parts. The first part examines the problem of evaluating trustworthiness of multimedia data distributed online. Given the digital nature of multimedia data, editing and tampering of the multimedia content becomes very easy. Therefore, it is important to analyze and reveal the processing history of a multimedia document in order to evaluate its trustworthiness. We propose a new forensic technique called ``Forensic Hash", which draws synergy between two related research areas of image hashing and non-reference multimedia forensics. A forensic hash is a compact signature capturing important information from the original multimedia document to assist forensic analysis and reveal processing history of a multimedia document under question. Our proposed technique is shown to have the advantage of being compact and offering efficient and accurate analysis to forensic questions that cannot be easily answered by convention forensic techniques. The answers that we obtain from the forensic hash provide valuable information on the trustworthiness of online multimedia data. The second part of this dissertation addresses the confidentiality issue of multimedia data stored with online services. The emerging cloud computing paradigm makes it attractive to store private multimedia data online for easy access and sharing. However, the potential of cloud services cannot be fully reached unless the issue of how to preserve confidentiality of sensitive data stored in the cloud is addressed. In this dissertation, we explore techniques that enable confidentiality-preserving search of encrypted multimedia, which can play a critical role in secure online multimedia services. Techniques from image processing, information retrieval, and cryptography are jointly and strategically applied to allow efficient rank-ordered search over encrypted multimedia database and at the same time preserve data confidentiality against malicious intruders and service providers. We demonstrate high efficiency and accuracy of the proposed techniques and provide a quantitative comparative study with conventional techniques based on heavy-weight cryptography primitives

    Assessing Canada's Copyright Law in the Digital Context: Digital Locks, Open Licenses, and the Limits of Legislative Change

    Get PDF
    This dissertation examines Canadas copyright law reform in the information age. The overarching theme of my research underscores the importance of considering the purpose(s) of copyright law and the public interest while navigating the copyright law reform process. Additionally, I advocate that in regulating the influence of technology in the copyright system, the default approach should aim to objectively balance the interests of stakeholders to the extent possible. Ultimately, recognizing that stakeholders will continue to develop pragmatic responses to the changing landscape through private contracting and technological measures, I suggest that embracing regulatory pluralism is the most promising path towards achieving balanced copyright in the digital age. I develop these arguments over six chapters

    Assessing Canada\u27s Copyright Law in the Digital Context: Digital Locks, Open Licenses, and the Limits of Legislative Change

    Get PDF
    This dissertation examines Canadas copyright law reform in the information age. The overarching theme of my research underscores the importance of considering the purpose(s) of copyright law and the public interest while navigating the copyright law reform process. Additionally, I advocate that in regulating the influence of technology in the copyright system, the default approach should aim to objectively balance the interests of stakeholders to the extent possible. Ultimately, recognizing that stakeholders will continue to develop pragmatic responses to the changing landscape through private contracting and technological measures, I suggest that embracing regulatory pluralism is the most promising path towards achieving balanced copyright in the digital age. I develop these arguments over six chapters

    Abstracts of Papers, 79th Annual Meeting of the Virginia Academy of Science, May 22-25, 2001, James Madison University, Harrisonburg, Virginia

    Get PDF
    Abstracts of papers that were presented at the 79th Annual Meeting of the Virginia Academy of Science, May 22-25, 2001, James Madison University, Harrisonburg, Virginia

    An analysis of UK copyright and design laws on 3D printing and product design.

    Get PDF
    The thesis aims to investigate the implications of 3D printing for UK copyright and design rights, with an emphasis on the creation, access and use of computer-aided design (CAD) files by consumers for product design. The thesis has two major objectives. The first is to identify and present the context of 3D printing for legal analysis, and the second is to investigate the implications of 3D printing for UK copyright and design laws, especially relating to consumers. To this end, the thesis employs the ‘law in context’ methodology, with the aim of building a contextual framework for the legal analysis of 3D printing. Following the contextual analysis of technological, corporate and societal aspects of 3D printing, it presents the most relevant five scenarios of consumer use of 3D printing, capturing various design activities that are occurring or likely to occur in the 3D printing environment. The thesis demonstrates that consumers’ increased product design prosumption (consumption plus production), as depicted in the scenarios, will pose legal challenges. It is found that there are uncertainties over the protection of and ownership of CAD files, whilst infringement and enforcement issues arise in relation to online platforms facilitating the unauthorised reproduction and dissemination of CAD files. To address the issues, the thesis asserts that there is a need for the review of UK copyright and design laws to seek further clarity on regulation of consumers’ design activities in the 3D printing environment. It is also vital to improve clarity over the regulation of 3D printing online platforms, for which further research is recommended on the enforcement landscape in the 3D printing environment

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Digital disruption in the recording industry

    Get PDF
    With the rise of peer-to-peer software like Napster, many predicted that the digitalisation, sharing and dematerialisation of music would bring a radical transformation within the recording industry. This opened up a period of controversy and uncertainty in which competing visions were articulated of technology-induced change, markedly polarised between utopian and dystopian accounts with no clear view of ways forwards. A series of moves followed as various players sought to valorise music on the digital music networks, culminating in an emergence of successful streaming services. This thesis examines why there was a mismatch between initial predictions and what has actually happened in the market. It offers a detailed examination of the innovation processes through which digital technology was implemented and domesticated in the recording industry. This reveals a complex, contradictory and constantly evolving landscape in which the development of digital music distribution was far removed from the smooth development trajectories envisaged by those who saw these developments as following a simple trajectory shaped by technical or economic determinants. The research is based upon qualitative data analysis of fifty five interviews with a wide range of entrepreneurs and innovators, focusing on two successful innovation cases with different points of insertion within the digital recording industry; (1) Spotify: currently the world’s most popular digital music streaming service; and (2) INgrooves: an independent digital music distribution service provider whose system is also used by Universal Music Group. The thesis applies perspectives from the Social Shaping of Technology (“SST”) and its extension into Social Learning in Technological Innovation. It explores the widely dispersed processes of innovation through which the complex set of interactions amongst heterogeneous players who have conflicting interests and differing commitments involved in the digital music networks guided diverging choices in relation to particular market conditions and user requirements. The thesis makes three major contributions to understanding digital disruption in the recording industry. (1) In contrast to prevailing approaches which take P2P distribution as the single point of focus, the study investigates the multiplicity of actors and sites of innovation in the digital recording industry. It demonstrates that the dematerialisation of music did not lead to a simple, e.g. technologically-driven transformation of the industry. Instead a diverse array of realignments had to take place across the music sector to develop digital music valorisation networks. (2) By examining the detailed processes involved in the evolution of digital music services, it highlights the ways in which business models are shaped through a learning process of matching and finding constantly changing digital music users’ needs. Based on the observation that business models must be discovered in the course of making technologies work in the market, a new framework of ‘social shaping of business models’ is proposed in order to conceptualise business models as an emergent process in which firms refine their strategies in the light of emerging circumstances. (3) Drawing upon the concepts of musical networks (Leyshon 2001) and mediation (Hennion 1989), the thesis investigates the interaction of the diverse actors across the circuit of the recording business – production, distribution, valorisation, and consumption. The comprehensive analysis of the intricate interplay between innovation actors and their interactions in the economic, cultural, legal and institutional context highlights the need to develop a more sophisticated and nuanced understanding of the recording industry

    Personality Identification from Social Media Using Deep Learning: A Review

    Get PDF
    Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed
    corecore