36 research outputs found

    Side-Information For Steganography Design And Detection

    Get PDF
    Today, the most secure steganographic schemes for digital images embed secret messages while minimizing a distortion function that describes the local complexity of the content. Distortion functions are heuristically designed to predict the modeling error, or in other words, how difficult it would be to detect a single change to the original image in any given area. This dissertation investigates how both the design and detection of such content-adaptive schemes can be improved with the use of side-information. We distinguish two types of side-information, public and private: Public side-information is available to the sender and at least in part also to anybody else who can observe the communication. Content complexity is a typical example of public side-information. While it is commonly used for steganography, it can also be used for detection. In this work, we propose a modification to the rich-model style feature sets in both spatial and JPEG domain to inform such feature sets of the content complexity. Private side-information is available only to the sender. The previous use of private side-information in steganography was very successful but limited to steganography in JPEG images. Also, the constructions were based on heuristic with little theoretical foundations. This work tries to remedy this deficiency by introducing a scheme that generalizes the previous approach to an arbitrary domain. We also put forward a theoretical investigation of how to incorporate side-information based on a model of images. Third, we propose to use a novel type of side-information in the form of multiple exposures for JPEG steganography

    High-Fidelity Provenance:Exploring the Intersection of Provenance and Security

    Get PDF
    In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. However, the euphoria for the democratization of news publishing was soon followed by scepticism, as a new phenomenon emerged: fake news. With no gatekeepers to vouch for it, the veracity of the information served over the World Wide Web became a major public concern. The Reuters Digital News Report 2020 cites that in at least half of the EU member countries, 50% or more of the population is concerned about online fake news. To help address the problem of trust on information communi- cated over the World Wide Web, it has been proposed to also make available the provenance metadata of the information. Similar to artwork provenance, this would include a detailed track of how the information was created, updated and propagated to produce the result we read, as well as what agents—human or software—were involved in the process. However, keeping track of provenance information is a non-trivial task. Current approaches, are often of limited scope and may require modifying existing applications to also generate provenance information along with thei regular output. This thesis explores how provenance can be automatically tracked in an application-agnostic manner, without having to modify the individual applications. We frame provenance capture as a data flow analysis problem and explore the use of dynamic taint analysis in this context. Our work shows that this appoach improves on the quality of provenance captured compared to traditonal approaches, yielding what we term as high-fidelity provenance. We explore the performance cost of this approach and use deterministic record and replay to bring it down to a more practical level. Furthermore, we create and present the tooling necessary for the expanding the use of using deterministic record and replay for provenance analysis. The thesis concludes with an application of high-fidelity provenance as a tool for state-of-the art offensive security analysis, based on the intuition that software too can be misguided by "fake news". This demonstrates that the potential uses of high-fidelity provenance for security extend beyond traditional forensics analysis

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Balkanising Taxonomy : How to capture and transfer an experience of the event - the case of Belgrade protest in '96/'97

    Get PDF
    The Serbian uprising in 1996/1997 was an attempt to overthrow the dictatorship of president Milosevic after he annulled elections because of the opposition party’s victory. Ashamed by the unsuccessful outcome of their protest, the people of the capital Belgrade, have never produced an archive of the photos, banners and graffiti, which emerged during these demonstrations. Scarce information on the Internet and the inability of the media to reveal the data gathered during the protest has left the public without a full account of the uprising. My project is that archive – the map of images, leaflets, badges, flags, vouchers, cartoons, crochets, poems etc., an online record of the elucidated protest available to the participants, scholars and the public. The narratives of this event have been locked within the community and there are only odd visual references hidden in people’s houses. My research has generated them through interviews and image elicitation that looks at the uprising by analysing these accumulated historic relics. Presented in sections on the website (timelines, artists, routes) and pages of art formats (poems, photos, badges), this overview of the geographical, political and social circumstances within which the protest’s artwork was produced demonstrates how it influenced the actions of the citizens. This urban spectacle was enthused by the creative participation exposed in the walks of the masses that became the force of the protest. The reflexive method of my practice, just like this communal approach at the uprising challenges dominant representations of culture, history and politics from the whole of the Balkans. My online package for capturing the past (hi)stories shifts the official narratives, predominantly from the West and saturated by the wars of the ‘90s into only one possibility among others. It maps the failed revolution in Serbia under Milosevic from its beginnings, revealing the accomplishment of academics, artists and citizens buried under the war stories..

    3D-in-2D Displays for ATC.

    Get PDF
    This paper reports on the efforts and accomplishments of the 3D-in-2D Displays for ATC project at the end of Year 1. We describe the invention of 10 novel 3D/2D visualisations that were mostly implemented in the Augmented Reality ARToolkit. These prototype implementations of visualisation and interaction elements can be viewed on the accompanying video. We have identified six candidate design concepts which we will further research and develop. These designs correspond with the early feasibility studies stage of maturity as defined by the NASA Technology Readiness Level framework. We developed the Combination Display Framework from a review of the literature, and used it for analysing display designs in terms of display technique used and how they are combined. The insights we gained from this framework then guided our inventions and the human-centered innovation process we use to iteratively invent. Our designs are based on an understanding of user work practices. We also developed a simple ATC simulator that we used for rapid experimentation and evaluation of design ideas. We expect that if this project continues, the effort in Year 2 and 3 will be focus on maturing the concepts and employment in a operational laboratory settings

    An historical geography of the Nilgiri cinchona plantations, 1860-1900

    Get PDF
    In 1859, the British government launched an expedition to South America with the aim of collecting seeds and plants of the quinine-producing cinchona tree for establishing plantations in British India, so as to relieve the British Government of the escalating costs and uncertainties in the supply of this valuable, and increasingly popular anti-malarial drug. Drawing on recent work on the commodities of empire, tropical acclimatization, and imperial medicine, this thesis provides a detailed study of the first British cinchona plantations established on the Nilgiri Hills of Southern India. Focused on the period between 1860 and 1900, and at the local geographic scale, the research critically examines the engagement and connections between government officials, planters, venture capitalists, labourers, plant material and ideas in the context of the cinchona plantations through a thorough study of archival and secondary sources. Contributions are also made to the study of the spaces of science and the management of the tropical environment. Cinchona is placed in a wider context of the history of botany and plantations in the Nilgiri region, and the major events in the development of cinchona plantations described. In the resulting historical geography the Nilgiri cinchona plantations emerge as a 'nodal' point in the global cinchona network that also relied upon global networks of imperial power, capital and leisure tourism. The experiment was essentially an exertion of power but one that also demonstrated the very vulnerable nature of the empire

    An historical geography of the Nilgiri cinchona plantations, 1860-1900

    Get PDF
    In 1859, the British government launched an expedition to South America with the aim of collecting seeds and plants of the quinine-producing cinchona tree for establishing plantations in British India, so as to relieve the British Government of the escalating costs and uncertainties in the supply of this valuable, and increasingly popular anti-malarial drug. Drawing on recent work on the commodities of empire, tropical acclimatization, and imperial medicine, this thesis provides a detailed study of the first British cinchona plantations established on the Nilgiri Hills of Southern India. Focused on the period between 1860 and 1900, and at the local geographic scale, the research critically examines the engagement and connections between government officials, planters, venture capitalists, labourers, plant material and ideas in the context of the cinchona plantations through a thorough study of archival and secondary sources. Contributions are also made to the study of the spaces of science and the management of the tropical environment. Cinchona is placed in a wider context of the history of botany and plantations in the Nilgiri region, and the major events in the development of cinchona plantations described. In the resulting historical geography the Nilgiri cinchona plantations emerge as a 'nodal' point in the global cinchona network that also relied upon global networks of imperial power, capital and leisure tourism. The experiment was essentially an exertion of power but one that also demonstrated the very vulnerable nature of the empire

    Preface

    Get PDF

    Resilience-Building Technologies: State of Knowledge -- ReSIST NoE Deliverable D12

    Get PDF
    This document is the first product of work package WP2, "Resilience-building and -scaling technologies", in the programme of jointly executed research (JER) of the ReSIST Network of Excellenc

    Factors Influencing Customer Satisfaction towards E-shopping in Malaysia

    Get PDF
    Online shopping or e-shopping has changed the world of business and quite a few people have decided to work with these features. What their primary concerns precisely and the responses from the globalisation are the competency of incorporation while doing their businesses. E-shopping has also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction while operating in the e-retailing environment. It is very important that customers are satisfied with the website, or else, they would not return. Therefore, a crucial fact to look into is that companies must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s point of view. With is in mind, this study aimed at investigating customer satisfaction towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students randomly selected from various public and private universities located within Klang valley area. Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust, design of the website, online security and e-service quality. Finally, recommendations and future study direction is provided. Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia
    corecore