280 research outputs found

    How low can you go? Privacy-preserving people detection with an omni-directional camera

    Full text link
    In this work, we use a ceiling-mounted omni-directional camera to detect people in a room. This can be used as a sensor to measure the occupancy of meeting rooms and count the amount of flex-desk working spaces available. If these devices can be integrated in an embedded low-power sensor, it would form an ideal extension of automated room reservation systems in office environments. The main challenge we target here is ensuring the privacy of the people filmed. The approach we propose is going to extremely low image resolutions, such that it is impossible to recognise people or read potentially confidential documents. Therefore, we retrained a single-shot low-resolution person detection network with automatically generated ground truth. In this paper, we prove the functionality of this approach and explore how low we can go in resolution, to determine the optimal trade-off between recognition accuracy and privacy preservation. Because of the low resolution, the result is a lightweight network that can potentially be deployed on embedded hardware. Such embedded implementation enables the development of a decentralised smart camera which only outputs the required meta-data (i.e. the number of persons in the meeting room)

    Security and Privacy for Ubiquitous Mobile Devices

    Get PDF
    We live in a world where mobile devices are already ubiquitous. It is estimated that in the United States approximately two thirds of adults own a smartphone, and that for many, these devices are their primary method of accessing the Internet. World wide, it is estimated that in May of 2014 there were 6.9 billion mobile cellular subscriptions, almost as much as the world population. of these 6.9 billion, approximately 1 billion are smart devices, which are concentrated in the developed world. In the developing world, users are moving from feature phones to smart devices as a result of lower prices and marketing efforts. Because smart mobile devices are ubiquitous, security and privacy are primary concerns. Threats such as mobile malware are already substantial, with over 2500 different types identified in 2010 alone. It is likely that, as the smart device market continues to grow, so to will concerns about privacy, security, and malicious software. This is especially true, because these mobile devices are relatively new. Our research focuses on increasing the security and privacy of user data on smart mobile devices. We propose three applications in this domain: (1) a service that provides private, mobile location sharing; (2) a secure, intuitive proximity networking solution; and (3) a potential attack vector in mobile devices, which utilizes novel covert channels. We also propose a first step defense mechanism against these covert channels. Our first project is the design and implementation of a service, which provides users with private and secure location sharing. This is useful for a variety of applications such as online dating, taxi cab services, and social networking. Our service allows users to share their location with one another with trust and location based access controls. We allow users to identify if they are within a certain distance of one another, without either party revealing their location to one another, or any third party. We design this service to be practical and efficient, requiring no changes to the cellular infrastructure and no explicit encryption key management for the users. For our second application, we build a modem, which enables users to share relatively small pieces of information with those that are near by, also known as proximity based networking. Currently there are several mediums which can be used to achieve proximity networking such as NFC, bluetooth, and WiFi direct. Unfortunately, these currently available schemes suffer from a variety of drawbacks including slow adoption by mobile device hardware manufactures, relatively poor usability, and wide range, omni-directional propagation. We propose a new scheme, which utilizes ultrasonic (high frequency) audio on typical smart mobile devices, as a method of communication between proximal devices. Because mobile devices already carry the necessary hardware for ultrasound, adoption is much easier. Additionally, ultrasound has a limited and highly intuitive propagation pattern because it is highly directional, and can be easily controlled using the volume controls on the devices. Our ultrasound modem is fast, achieving several thousand bits per second throughput, non-intrusive because it is inaudible, and secure, requiring attackers with normal hardware to be less than or equal to the distance between the sender and receiver (a few centimeters in our tests). Our third work exposes a novel attack vector utilizing physical media covert channels on smart devices, in conjunction with privilege escalation and confused deputy attacks. This ultimately results in information leakage attacks, which allow the attacker to gain access to sensitive information stored on a user\u27s smart mobile device such as their location, passwords, emails, SMS messages and more. Our attack uses our novel physical media covert channels to launder sensitive information, thereby circumventing state of the art, taint-tracking analysis based defenses and, at the same time, the current, widely deployed permission systems employed by mobile operating systems. We propose and implement a variety of physical media covert channels, which demonstrate different strengths such as high speed, low error rate, and stealth. By proposing several different channels, we make defense of such an attack much more difficult. Despite the challenging situation, in this work we also propose a novel defense technique as a first step towards research on more robust approaches. as a contribution to the field, we present these three systems, which together enrich the smart mobile experience, while providing mobile security and keeping privacy in mind. Our third approach specifically, presents a unique attack, which has not been seen in the wild , in an effort to keep ahead of malicious efforts

    Irish Machine Vision and Image Processing Conference Proceedings 2017

    Get PDF

    Money & Trust in Digital Society, Bitcoin and Stablecoins in ML enabled Metaverse Telecollaboration

    Full text link
    We present a state of the art and positioning book, about Digital society tools, namely; Web3, Bitcoin, Metaverse, AI/ML, accessibility, safeguarding and telecollaboration. A high level overview of Web3 technologies leads to a description of blockchain, and the Bitcoin network is specifically selected for detailed examination. Suitable components of the extended Bitcoin ecosystem are described in more depth. Other mechanisms for native digital value transfer are described, with a focus on `money'. Metaverse technology is over-viewed, primarily from the perspective of Bitcoin and extended reality. Bitcoin is selected as the best contender for value transfer in metaverses because of it's free and open source nature, and network effect. Challenges and risks of this approach are identified. A cloud deployable virtual machine based technology stack deployment guide with a focus on cybersecurity best practice can be downloaded from GitHub to experiment with the technologies. This deployable lab is designed to inform development of secure value transaction, for small and medium sized companies

    Designing privacy-preserving personalized public display systems

    Full text link
    Public Displays sind heute ein allgegenwärtiges Kommunikationsmedium. Benutzern relevante Inhalte zu präsentieren ist zweifelsohne wichtig. Persönliche Inhalte sind meist relevant, erfordern jedoch besondere Datenschutzmaßnahmen. Diese Arbeit konzentriert sich auf den Entwurf personalisierter Public Displays, die die Privatsphäre schützen. Sie untersucht drei Forschungsfragen: (1) Was sind die größten Gefahren für die Privatsphäre auf Public Displays? (2) Welche Gegenmaßnahmen existieren für diese Gefahren? (3) Wie kann der Entwurf von Public Displays unterstützt werden?Drei konkrete Beiträge widmen sich je einer Forschungsfrage: (1) Ein Gefahren-Modell, (2) eine Liste samt Klassifizierung von Gegenmaßnahmen, und (3) eine neue Methodik für die Entwicklung von Public Displays. Designer und Forscher können diese Ergebnisse nutzen, um Systeme zu erstellen, die die Privatsphäre der Benutzer schützen. Zusammenfassend kann diese Arbeit dazu beitragen, die Entwicklung solcher personalisierter Public Displays zu vereinfachen und zu beschleunigen.Digital public displays are a popular means of communication nowadays. Showing users content that is relevant to them is an important issue. Personal content is often regarded as relevant, but that calls for certain means of privacy in turn. This thesis focuses on designing privacy-preserving personalized public display systems. It addresses three research questions: (1) What are main privacy threats on public displays? (2) What are countermeasures to those privacy threats? (3) How to support the design process of public displays?Three tangible contributions address each research question: (1) a privacy threat model for public displays, (2) a list and classification of countermeasures, and (3) a novel methodology to design, prototype, and evaluate public display systems. Designers and researchers can use these contributions to create public displays, that do not pose a threat to the user's privacy. In conclusion, this thesis can thus contribute towards simplifying and accelerating the development of privacy-preserving personalized public display systems

    Supporting public participation through interactive

    Get PDF
    A thesis submitted in partial fulfillment of the requirements for the degree of Doctor in Information Management, specialization in Geographic Information SystemsCitizen participation as a key priority of open cities, gives citizens the chance to influence public decision-making. Effectively engaging broader types of citizens into high participation levels has long been an issue due to various situational and technical constrains. Traditional public participation technologies (e.g. public hearing) usually are blame for low accessibility by the general public. The development of Information Communication Technology brings new methods to engage a broader spectrum of citizens in deeper participation level during urban planning processes. Interactive public displays as a public communication medium, hold some key advantages in comparison to other media. Compared to personal devices, public displays make public spaces into sociable places, where social communication and interaction can be enriched without intentionally or unintentionally excluding some groups’ opinions. Public displays can increase the visibility of public events while it is more flexible and up-to-date regarding showing information. Besides, they can also foster a collective awareness and support group behavioral changes. Moreover, due to the public nature of public displays, they provide broad accessibility to different groups of citizens. Public displays have a great potential in bringing new opportunities to facilitate public participation in an urban planning process. In the light of previous work on public displays, the research goal is to investigate a relatively new form of citizen participation known as Public Display Participation. This participation form refers to the use of public displays for citizen participation in the context of urban planning. The main research question of the thesis is how public displays can be used for facilitating citizen consultation in an urban planning process. First, a systematic literature review is done to get an understanding of the current achievements and gaps of research on public displays for public participation. Second, an elicitation study has been conducted to design end user centered interactions with public displays for citizens’ consulting activities. Finally, we run a usability to evaluate the usability of public displays for citizen consultation and their user experience. The main contributions of this thesis can be summarized as: (1) the identification of key challenges and opportunities for future research in using public displays for public participation in urban contexts; (2) two sets of user-defined gestures for two sets of user-defined phone gestures and hand gestures for performing eleven consulting activities, which are about examining the urban planning designs and giving feedback related to design alternatives, are also identified. (3) a new approach for using public displays for voting and commenting in urban planning, and a multi-level evaluation of a prototypical system implementing the proposed approach. Designers and researchers can use the contributions of this thesis, to create interactive public displays for supporting higher public participat i.e. citizen collaboration and empowerment

    Wireless multimedia sensor networks, security and key management

    Get PDF
    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques. These mentioned characteristics, challenges, and requirements of designing WMSNs open many research issues and future research directions to develop protocols, algorithms, architectures, devices, and testbeds to maximize the network lifetime while satisfying the quality of service requirements of the various applications. In this thesis dissertation, we outline the design challenges of WMSNs and we give a comprehensive discussion of the proposed architectures and protocols for the different layers of the communication protocol stack for WMSNs along with their open research issues. Also, we conduct a comparison among the existing WMSN hardware and testbeds based on their specifications and features along with complete classification based on their functionalities and capabilities. In addition, we introduce our complete classification for content security and contextual privacy in WSNs. Our focus in this field, after conducting a complete survey in WMSNs and event privacy in sensor networks, and earning the necessary knowledge of programming sensor motes such as Micaz and Stargate and running simulation using NS2, is to design suitable protocols meet the challenging requirements of WMSNs targeting especially the routing and MAC layers, secure the wirelessly exchange of data against external attacks using proper security algorithms: key management and secure routing, defend the network from internal attacks by using a light-weight intrusion detection technique, protect the contextual information from being leaked to unauthorized parties by adapting an event unobservability scheme, and evaluate the performance efficiency and energy consumption of employing the security algorithms over WMSNs

    Optimization for Deep Learning Systems Applied to Computer Vision

    Get PDF
    149 p.Since the DL revolution and especially over the last years (2010-2022), DNNs have become an essentialpart of the CV field, and they are present in all its sub-fields (video-surveillance, industrialmanufacturing, autonomous driving, ...) and in almost every new state-of-the-art application that isdeveloped. However, DNNs are very complex and the architecture needs to be carefully selected andadapted in order to maximize its efficiency. In many cases, networks are not specifically designed for theconsidered use case, they are simply recycled from other applications and slightly adapted, without takinginto account the particularities of the use case or the interaction with the rest of the system components,which usually results in a performance drop.This research work aims at providing knowledge and tools for the optimization of systems based on DeepLearning applied to different real use cases within the field of Computer Vision, in order to maximizetheir effectiveness and efficiency

    Audio beacon technologies, surveillance and social order

    Get PDF
    This thesis explores audio beacon technology with the aim of elucidating the implications of this technology for the individual in contemporary society. Audio beacons are hidden inside digital devices. They emit and receive high frequency audio signals which are inaudible to the human ear, thereby generating and transmitting data without our knowledge. The motivation for this research is to raise awareness of the prevalence of audio beacon technologies and to explore their implications for contemporary society. The research takes an interdisciplinary approach involving – 1) a survey of audio beacon technology, 2) a contextualization in terms of contemporary theories of surveillance and control and 3) an interpretation in terms of 20th century dystopian literature. The hidden surveillance and privacy of this technology is examined mainly through the humanistic perspective of George Orwell’s book Nineteen Eighty-Four. The general conclusion formed is that audio beacon technologies can serve as a surveillance method enhancing authoritarian and exploitative regimes. To mitigate the negative impacts of audio beacons, this research proposes two types of solutions – 1) individual actions that will have an immediate effect and 2) governmental legislation that can improve privacy in the longer term. Both of these solutions cannot happen without a raised public awareness, towards which this research hopes to make a contribution. Finally, this research introduces the notion of a \u27digital paradox\u27 in which the dystopian worlds of George Orwell and Aldous Huxley are brought together in order to characterize surveillance and control in contemporary society
    • …
    corecore