393 research outputs found
Recommended from our members
Multimedia delivery in the future internet
The term âNetworked Mediaâ implies that all kinds of media including text, image, 3D graphics, audio
and video are produced, distributed, shared, managed and consumed on-line through various networks,
like the Internet, Fiber, WiFi, WiMAX, GPRS, 3G and so on, in a convergent manner [1]. This white
paper is the contribution of the Media Delivery Platform (MDP) cluster and aims to cover the Networked
challenges of the Networked Media in the transition to the Future of the Internet.
Internet has evolved and changed the way we work and live. End users of the Internet have been confronted
with a bewildering range of media, services and applications and of technological innovations concerning
media formats, wireless networks, terminal types and capabilities. And there is little evidence that the pace
of this innovation is slowing. Today, over one billion of users access the Internet on regular basis, more
than 100 million users have downloaded at least one (multi)media file and over 47 millions of them do so
regularly, searching in more than 160 Exabytes1 of content. In the near future these numbers are expected
to exponentially rise. It is expected that the Internet content will be increased by at least a factor of 6, rising
to more than 990 Exabytes before 2012, fuelled mainly by the users themselves. Moreover, it is envisaged
that in a near- to mid-term future, the Internet will provide the means to share and distribute (new)
multimedia content and services with superior quality and striking flexibility, in a trusted and personalized
way, improving citizensâ quality of life, working conditions, edutainment and safety.
In this evolving environment, new transport protocols, new multimedia encoding schemes, cross-layer inthe
network adaptation, machine-to-machine communication (including RFIDs), rich 3D content as well as
community networks and the use of peer-to-peer (P2P) overlays are expected to generate new models of
interaction and cooperation, and be able to support enhanced perceived quality-of-experience (PQoE) and
innovative applications âon the moveâ, like virtual collaboration environments, personalised services/
media, virtual sport groups, on-line gaming, edutainment. In this context, the interaction with content
combined with interactive/multimedia search capabilities across distributed repositories, opportunistic P2P
networks and the dynamic adaptation to the characteristics of diverse mobile terminals are expected to
contribute towards such a vision.
Based on work that has taken place in a number of EC co-funded projects, in Framework Program 6 (FP6)
and Framework Program 7 (FP7), a group of experts and technology visionaries have voluntarily
contributed in this white paper aiming to describe the status, the state-of-the art, the challenges and the way
ahead in the area of Content Aware media delivery platforms
Software Obfuscation with Symmetric Cryptography
Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another companyâs proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the softwareâs sensitive internal algorithms, from adversarial analysis. Software protection through obfuscation is a relatively new research initiative. The mathematical and security community have yet to agree upon a model to describe the problem let alone the metrics used to evaluate the practical solutions proposed by computer scientists. We propose evaluating solutions to obfuscation under the intent protection model, a combination of white-box and black-box protection to reflect how reverse engineers analyze programs using a combination white-box and black-box attacks. In addition, we explore use of experimental methods and metrics in analogous and more mature fields of study such as hardware circuits and cryptography. Finally, we implement a solution under the intent protection model that demonstrates application of the methods and evaluation using the metrics adapted from the aforementioned fields of study to reflect the unique challenges in a software-only software protection technique
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?
Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is nevertheless popular in practice. Still, it remains largely unexplored to what extent todayâs software obfuscations keep up with state-of-the-art code analysis and where we stand in the arms race between software developers and code analysts. The main goal of this survey is to analyze the effectiveness of different classes of software obfuscation against the continuously improving deobfuscation techniques and off-the-shelf code analysis tools.
The answer very much depends on the goals of the analyst and the available resources. On the one hand, many forms of lightweight static analysis have difficulties with even basic obfuscation schemes, which explains the unbroken popularity of obfuscation among malware writers. On the other hand, more expensive analysis techniques, in particular when used interactively by a human analyst, can easily defeat many obfuscations. As a result, software obfuscation for the purpose of intellectual property protection remains highly challenging.</jats:p
Utilização da Norma JPEG2000 para codificar proteger e comercializar Produtos de Observação Terrestre
Applications like, change detection, global monitoring, disaster detection and management have emerging requirements that need the availability of large amounts of data. This data is currently being capture by a multiplicity of instruments and EO (Earth Observation) sensors originating large volumes of data that needs to be stored, processed and accessed in order to be useful â as an example, ENVISAT accumulates, in a yearly basis, several hundred terabytes of data.
This need to recover, store, process and access brings some interesting challenges, like storage space, processing power, bandwidth and security, just to mention a few. These challenges are still very important on todayâs technological world. If we take a look for example at the number of subscribers of ISP (Internet Service Providers) broadband services on the developed world today, one can notice that broadband services are still far from being common and dominant. On the underdeveloped countries the picture is even dimmer, not only from a bandwidth point of view but also in all other aspects regarding information and communication technologies (ICTs).
All this challenges need to be taken into account if a service is to reach the broadest audience possible. Obviously protection and securing of services and contents is an extra asset that helps on the preservation of possible business values, especially if we consider such a costly business as the space industry.
This thesis presents and describes a system which allows, not only the encoding and decoding of several EO products into a JPEG2000 format, but also supports some of the security requirements identified previously that allows ESA (European Space Agency) and related EO services to define and apply efficient EO data access security policies and even to exploit new ways to commerce EO products over the Internet.AplicaçÔes como, detecção de mudanças no terreno, monitorização planetĂĄria, detecção e gestĂŁo de desastres, tĂȘm necessidades prementes que necessitam de vastas quantidades de dados. Estes dados estĂŁo presentemente a ser capturados por uma multiplicidade de instrumentos e sensores de observação terrestre, que originam uma enormidade de dados que necessitam de ser armazenados processados e acedidos de forma a se tornarem Ășteis â por exemplo, a ENVISAT acumula anualmente varias centenas de terabytes de dados.
Esta necessidade de recuperar, armazenar, processar e aceder introduz alguns desafios interessantes como o espaço de armazenamento, poder de processamento, largura de banda e segurança dos dados só para mencionar alguns.
Estes desafios sĂŁo muito importantes no mundo tecnolĂłgico de hoje. Se olharmos, por exemplo, ao nĂșmero actual de subscritores de ISP (Internet Service Providers) de banda larga nos paĂses desenvolvidos podemos ficar surpreendidos com o facto do nĂșmero de subscritores desses serviços ainda nĂŁo ser uma maioria da população ou dos agregados familiares. Nos paĂses subdesenvolvidos o quadro Ă© ainda mais negro nĂŁo sĂł do ponto de vista da largura de banda mas tambĂ©m de todos os outros aspectos relacionados com Tecnologias da Informação e Comunicação (TICs).
Todos estes aspectos devem ser levados em consideração se se pretende que um serviço se torne o mais abrangente possĂvel em termos de audiĂȘncias. Obviamente a protecção e segurança dos conteĂșdos Ă© um factor extra que ajuda a preservar possĂveis valores de negĂłcio, especialmente considerando industrias tĂŁo onerosas como a Industria Espacial.
Esta tese apresenta e descreve um sistema que permite, nĂŁo sĂł a codificação e descodificação de diversos produtos de observação terrestre para formato JPEG2000 mas tambĂ©m o suporte de alguns requisitos de segurança identificados previamente que permitem, ĂĄ AgĂȘncia Espacial Europeia e a outros serviços relacionados com observação terrestre, a aplicação de politicas eficientes de acesso seguro a produtos de observação terrestre, permitindo atĂ© o aparecimento de novas forma de comercialização de produtos de observação terrestre atravĂ©s da Internet
Framework for privacy-aware content distribution in peer-to- peer networks with copyright protection
The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. This mass popularity is primarily driven by the efficient distribution of content, also giving rise to piracy and copyright infringement as well as privacy concerns. An end user (buyer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further redistribute the content illegally. Therefore, there is a strong need for content distribution mechanisms over P2P networks that do not pose security and privacy threats to copyright holders and end users, respectively. However, the current systems being developed to provide copyright and privacy protection to merchants and end users employ cryptographic mechanisms, which incur high computational and communication costs, making these systems impractical for the distribution of big files, such as music albums or movies.El uso de soluciones de igual a igual (peer-to-peer, P2P) para la distribuciĂłn multimedia se ha extendido mundialmente en los Ășltimos años. La amplia popularidad de este paradigma se debe, principalmente, a la distribuciĂłn eficiente de los contenidos, pero tambiĂ©n da lugar a la piraterĂa, a la violaciĂłn del copyright y a problemas de privacidad. Un usuario final (comprador) de un sistema de distribuciĂłn de contenidos P2P no quiere revelar su identidad durante una transacciĂłn con un propietario de contenidos (comerciante), mientras que el comerciante no quiere que el comprador pueda redistribuir ilegalmente el contenido mĂĄs adelante. Por lo tanto, existe una fuerte necesidad de mecanismos de distribuciĂłn de contenidos por medio de redes P2P que no supongan un riesgo de seguridad y privacidad a los titulares de derechos y los usuarios finales, respectivamente. Sin embargo, los sistemas actuales que se desarrollan con el propĂłsito de proteger el copyright y la privacidad de los comerciantes y los usuarios finales emplean mecanismos de cifrado que implican unas cargas computacionales y de comunicaciones muy elevadas que convierten a estos sistemas en poco prĂĄcticos para distribuir archivos de gran tamaño, tales como ĂĄlbumes de mĂșsica o pelĂculas.L'Ășs de solucions d'igual a igual (peer-to-peer, P2P) per a la distribuciĂł multimĂšdia s'ha estĂšs mundialment els darrers anys. L'Ă mplia popularitat d'aquest paradigma es deu, principalment, a la distribuciĂł eficient dels continguts, perĂČ tambĂ© dĂłna lloc a la pirateria, a la violaciĂł del copyright i a problemes de privadesa. Un usuari final (comprador) d'un sistema de distribuciĂł de continguts P2P no vol revelar la seva identitat durant una transacciĂł amb un propietari de continguts (comerciant), mentre que el comerciant no vol que el comprador pugui redistribuir il·legalment el contingut mĂ©s endavant. Per tant, hi ha una gran necessitat de mecanismes de distribuciĂł de continguts per mitjĂ de xarxes P2P que no comportin un risc de seguretat i privadesa als titulars de drets i els usuaris finals, respectivament. Tanmateix, els sistemes actuals que es desenvolupen amb el propĂČsit de protegir el copyright i la privadesa dels comerciants i els usuaris finals fan servir mecanismes d'encriptaciĂł que impliquen unes cĂ rregues computacionals i de comunicacions molt elevades que fan aquests sistemes poc prĂ ctics per a distribuir arxius de grans dimensions, com ara Ă lbums de mĂșsica o pel·lĂcules
- âŠ