280 research outputs found
How low can you go? Privacy-preserving people detection with an omni-directional camera
In this work, we use a ceiling-mounted omni-directional camera to detect
people in a room. This can be used as a sensor to measure the occupancy of
meeting rooms and count the amount of flex-desk working spaces available. If
these devices can be integrated in an embedded low-power sensor, it would form
an ideal extension of automated room reservation systems in office
environments. The main challenge we target here is ensuring the privacy of the
people filmed. The approach we propose is going to extremely low image
resolutions, such that it is impossible to recognise people or read potentially
confidential documents. Therefore, we retrained a single-shot low-resolution
person detection network with automatically generated ground truth. In this
paper, we prove the functionality of this approach and explore how low we can
go in resolution, to determine the optimal trade-off between recognition
accuracy and privacy preservation. Because of the low resolution, the result is
a lightweight network that can potentially be deployed on embedded hardware.
Such embedded implementation enables the development of a decentralised smart
camera which only outputs the required meta-data (i.e. the number of persons in
the meeting room)
Security and Privacy for Ubiquitous Mobile Devices
We live in a world where mobile devices are already ubiquitous. It is estimated that in the United States approximately two thirds of adults own a smartphone, and that for many, these devices are their primary method of accessing the Internet. World wide, it is estimated that in May of 2014 there were 6.9 billion mobile cellular subscriptions, almost as much as the world population. of these 6.9 billion, approximately 1 billion are smart devices, which are concentrated in the developed world. In the developing world, users are moving from feature phones to smart devices as a result of lower prices and marketing efforts. Because smart mobile devices are ubiquitous, security and privacy are primary concerns. Threats such as mobile malware are already substantial, with over 2500 different types identified in 2010 alone. It is likely that, as the smart device market continues to grow, so to will concerns about privacy, security, and malicious software. This is especially true, because these mobile devices are relatively new. Our research focuses on increasing the security and privacy of user data on smart mobile devices. We propose three applications in this domain: (1) a service that provides private, mobile location sharing; (2) a secure, intuitive proximity networking solution; and (3) a potential attack vector in mobile devices, which utilizes novel covert channels. We also propose a first step defense mechanism against these covert channels. Our first project is the design and implementation of a service, which provides users with private and secure location sharing. This is useful for a variety of applications such as online dating, taxi cab services, and social networking. Our service allows users to share their location with one another with trust and location based access controls. We allow users to identify if they are within a certain distance of one another, without either party revealing their location to one another, or any third party. We design this service to be practical and efficient, requiring no changes to the cellular infrastructure and no explicit encryption key management for the users. For our second application, we build a modem, which enables users to share relatively small pieces of information with those that are near by, also known as proximity based networking. Currently there are several mediums which can be used to achieve proximity networking such as NFC, bluetooth, and WiFi direct. Unfortunately, these currently available schemes suffer from a variety of drawbacks including slow adoption by mobile device hardware manufactures, relatively poor usability, and wide range, omni-directional propagation. We propose a new scheme, which utilizes ultrasonic (high frequency) audio on typical smart mobile devices, as a method of communication between proximal devices. Because mobile devices already carry the necessary hardware for ultrasound, adoption is much easier. Additionally, ultrasound has a limited and highly intuitive propagation pattern because it is highly directional, and can be easily controlled using the volume controls on the devices. Our ultrasound modem is fast, achieving several thousand bits per second throughput, non-intrusive because it is inaudible, and secure, requiring attackers with normal hardware to be less than or equal to the distance between the sender and receiver (a few centimeters in our tests). Our third work exposes a novel attack vector utilizing physical media covert channels on smart devices, in conjunction with privilege escalation and confused deputy attacks. This ultimately results in information leakage attacks, which allow the attacker to gain access to sensitive information stored on a user\u27s smart mobile device such as their location, passwords, emails, SMS messages and more. Our attack uses our novel physical media covert channels to launder sensitive information, thereby circumventing state of the art, taint-tracking analysis based defenses and, at the same time, the current, widely deployed permission systems employed by mobile operating systems. We propose and implement a variety of physical media covert channels, which demonstrate different strengths such as high speed, low error rate, and stealth. By proposing several different channels, we make defense of such an attack much more difficult. Despite the challenging situation, in this work we also propose a novel defense technique as a first step towards research on more robust approaches. as a contribution to the field, we present these three systems, which together enrich the smart mobile experience, while providing mobile security and keeping privacy in mind. Our third approach specifically, presents a unique attack, which has not been seen in the wild , in an effort to keep ahead of malicious efforts
Money & Trust in Digital Society, Bitcoin and Stablecoins in ML enabled Metaverse Telecollaboration
We present a state of the art and positioning book, about Digital society
tools, namely; Web3, Bitcoin, Metaverse, AI/ML, accessibility, safeguarding and
telecollaboration. A high level overview of Web3 technologies leads to a
description of blockchain, and the Bitcoin network is specifically selected for
detailed examination. Suitable components of the extended Bitcoin ecosystem are
described in more depth. Other mechanisms for native digital value transfer are
described, with a focus on `money'. Metaverse technology is over-viewed,
primarily from the perspective of Bitcoin and extended reality. Bitcoin is
selected as the best contender for value transfer in metaverses because of it's
free and open source nature, and network effect. Challenges and risks of this
approach are identified. A cloud deployable virtual machine based technology
stack deployment guide with a focus on cybersecurity best practice can be
downloaded from GitHub to experiment with the technologies. This deployable lab
is designed to inform development of secure value transaction, for small and
medium sized companies
Recommended from our members
Design and Implementation of System Components for Radio Frequency Based Asset Tracking Devices to Enhance Location Based Services. Study of angle of arrival techniques, effects of mutual coupling, design of an angle of arrival algorithm, design of a novel miniature reconfigurable antenna optimised for wireless communication systems
The angle of arrival estimation of multiple sources plays a vital role in the field of array signal
processing as MIMO systems can be employed at both the transmitter and the receiver end
and the system capacity, reliability and throughput can be significantly increased by using array
signal processing. Almost all applications require accurate direction of arrival (DOA) estimation
to localize the sources of the signals. Another important parameter of localization systems is
the array geometry and sensor design which can be application specific and is used to
estimate the DOA.
In this work, various array geometries and arrival estimation algorithms are studied and then a
new scheme for multiple source estimation is proposed and evaluated based on the
performance of subspace and non-subspace decomposition methods. The proposed scheme
has shown to outperform the conventional Multiple Signal Classification (MUSIC) estimation
and Bartlett estimation techniques. The new scheme has a better performance advantage at
low and high signal to noise ratio values (SNRs).
The research work also studies different array geometries for both single and multiple incident
sources and proposes a geometry which is cost effective and efficient for 3, 4, and 5 antenna
array elements. This research also considers the shape of the ground plane and its effects on
the angle of arrival estimation and in addition it shows how the mutual couplings between the
elements effect the overall estimation and how this error can be minimised by using a decoupling
matrix.
At the end, a novel miniaturised multi element reconfigurable antenna to represent the receiver
base station is designed and tested. The antenna radiation patterns in the azimuth angle are
almost omni-directional with linear polarisation. The antenna geometry is uniplanar printed logspiral
with striplines feeding network and biased components to improve the impedance
bandwidth. The antenna provides the benefit of small size, and re-configurability and is very
well suited for the asset tracking applications
Designing privacy-preserving personalized public display systems
Public Displays sind heute ein allgegenwärtiges Kommunikationsmedium. Benutzern relevante Inhalte zu präsentieren ist zweifelsohne wichtig. Persönliche Inhalte sind meist relevant, erfordern jedoch besondere Datenschutzmaßnahmen. Diese Arbeit konzentriert sich auf den Entwurf personalisierter Public Displays, die die Privatsphäre schützen. Sie untersucht drei Forschungsfragen: (1) Was sind die größten Gefahren für die Privatsphäre auf Public Displays? (2) Welche Gegenmaßnahmen existieren für diese Gefahren? (3) Wie kann der Entwurf von Public Displays unterstützt werden?Drei konkrete Beiträge widmen sich je einer Forschungsfrage: (1) Ein Gefahren-Modell, (2) eine Liste samt Klassifizierung von Gegenmaßnahmen, und (3) eine neue Methodik für die Entwicklung von Public Displays. Designer und Forscher können diese Ergebnisse nutzen, um Systeme zu erstellen, die die Privatsphäre der Benutzer schützen. Zusammenfassend kann diese Arbeit dazu beitragen, die Entwicklung solcher personalisierter Public Displays zu vereinfachen und zu beschleunigen.Digital public displays are a popular means of communication nowadays. Showing users content that is relevant to them is an important issue. Personal content is often regarded as relevant, but that calls for certain means of privacy in turn. This thesis focuses on designing privacy-preserving personalized public display systems. It addresses three research questions: (1) What are main privacy threats on public displays? (2) What are countermeasures to those privacy threats? (3) How to support the design process of public displays?Three tangible contributions address each research question: (1) a privacy threat model for public displays, (2) a list and classification of countermeasures, and (3) a novel methodology to design, prototype, and evaluate public display systems. Designers and researchers can use these contributions to create public displays, that do not pose a threat to the user's privacy. In conclusion, this thesis can thus contribute towards simplifying and accelerating the development of privacy-preserving personalized public display systems
Supporting public participation through interactive
A thesis submitted in partial fulfillment of the requirements for the degree of Doctor in Information Management, specialization in Geographic Information SystemsCitizen participation as a key priority of open cities, gives citizens the chance to
influence public decision-making. Effectively engaging broader types of citizens into
high participation levels has long been an issue due to various situational and technical
constrains. Traditional public participation technologies (e.g. public hearing)
usually are blame for low accessibility by the general public. The development of
Information Communication Technology brings new methods to engage a broader
spectrum of citizens in deeper participation level during urban planning processes.
Interactive public displays as a public communication medium, hold some key advantages
in comparison to other media. Compared to personal devices, public displays
make public spaces into sociable places, where social communication and interaction
can be enriched without intentionally or unintentionally excluding some groups’
opinions. Public displays can increase the visibility of public events while it is more
flexible and up-to-date regarding showing information. Besides, they can also foster
a collective awareness and support group behavioral changes. Moreover, due to the
public nature of public displays, they provide broad accessibility to different groups
of citizens.
Public displays have a great potential in bringing new opportunities to facilitate
public participation in an urban planning process. In the light of previous work on
public displays, the research goal is to investigate a relatively new form of citizen
participation known as Public Display Participation. This participation form refers to
the use of public displays for citizen participation in the context of urban planning.
The main research question of the thesis is how public displays can be used for
facilitating citizen consultation in an urban planning process. First, a systematic
literature review is done to get an understanding of the current achievements and
gaps of research on public displays for public participation. Second, an elicitation
study has been conducted to design end user centered interactions with public
displays for citizens’ consulting activities. Finally, we run a usability to evaluate the
usability of public displays for citizen consultation and their user experience.
The main contributions of this thesis can be summarized as: (1) the identification
of key challenges and opportunities for future research in using public displays
for public participation in urban contexts; (2) two sets of user-defined gestures
for two sets of user-defined phone gestures and hand gestures for performing
eleven consulting activities, which are about examining the urban planning designs
and giving feedback related to design alternatives, are also identified. (3) a new
approach for using public displays for voting and commenting in urban planning,
and a multi-level evaluation of a prototypical system implementing the proposed
approach. Designers and researchers can use the contributions of this thesis, to
create interactive public displays for supporting higher public participat i.e.
citizen collaboration and empowerment
Wireless multimedia sensor networks, security and key management
Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques.
These mentioned characteristics, challenges, and requirements of designing WMSNs open many research issues and future research directions to develop protocols, algorithms, architectures, devices, and testbeds to maximize the network lifetime while satisfying the quality of service requirements of the various applications. In this thesis dissertation, we outline the design challenges of WMSNs and we give a comprehensive discussion of the proposed architectures and protocols for the different layers of the communication protocol stack for WMSNs along with their open research issues. Also, we conduct a comparison among the existing WMSN hardware and testbeds based on their specifications and features along with complete classification based on their functionalities and capabilities. In addition, we introduce our complete classification for content security and contextual privacy in WSNs. Our focus in this field, after conducting a complete survey in WMSNs and event privacy in sensor networks, and earning the necessary knowledge of programming sensor motes such as Micaz and Stargate and running simulation using NS2, is to design suitable protocols meet the challenging requirements of WMSNs targeting especially the routing and MAC layers, secure the wirelessly exchange of data against external attacks using proper security algorithms: key management and secure routing, defend the network from internal attacks by using a light-weight intrusion detection technique, protect the contextual information from being leaked to unauthorized parties by adapting an event unobservability scheme, and evaluate the performance efficiency and energy consumption of employing the security algorithms over WMSNs
Optimization for Deep Learning Systems Applied to Computer Vision
149 p.Since the DL revolution and especially over the last years (2010-2022), DNNs have become an essentialpart of the CV field, and they are present in all its sub-fields (video-surveillance, industrialmanufacturing, autonomous driving, ...) and in almost every new state-of-the-art application that isdeveloped. However, DNNs are very complex and the architecture needs to be carefully selected andadapted in order to maximize its efficiency. In many cases, networks are not specifically designed for theconsidered use case, they are simply recycled from other applications and slightly adapted, without takinginto account the particularities of the use case or the interaction with the rest of the system components,which usually results in a performance drop.This research work aims at providing knowledge and tools for the optimization of systems based on DeepLearning applied to different real use cases within the field of Computer Vision, in order to maximizetheir effectiveness and efficiency
Audio beacon technologies, surveillance and social order
This thesis explores audio beacon technology with the aim of elucidating the implications of this technology for the individual in contemporary society. Audio beacons are hidden inside digital devices. They emit and receive high frequency audio signals which are inaudible to the human ear, thereby generating and transmitting data without our knowledge. The motivation for this research is to raise awareness of the prevalence of audio beacon technologies and to explore their implications for contemporary society. The research takes an interdisciplinary approach involving – 1) a survey of audio beacon technology, 2) a contextualization in terms of contemporary theories of surveillance and control and 3) an interpretation in terms of 20th century dystopian literature. The hidden surveillance and privacy of this technology is examined mainly through the humanistic perspective of George Orwell’s book Nineteen Eighty-Four. The general conclusion formed is that audio beacon technologies can serve as a surveillance method enhancing authoritarian and exploitative regimes. To mitigate the negative impacts of audio beacons, this research proposes two types of solutions – 1) individual actions that will have an immediate effect and 2) governmental legislation that can improve privacy in the longer term. Both of these solutions cannot happen without a raised public awareness, towards which this research hopes to make a contribution. Finally, this research introduces the notion of a \u27digital paradox\u27 in which the dystopian worlds of George Orwell and Aldous Huxley are brought together in order to characterize surveillance and control in contemporary society
- …