36 research outputs found
Side-Information For Steganography Design And Detection
Today, the most secure steganographic schemes for digital images embed secret messages while minimizing a distortion function that describes the local complexity of the content. Distortion functions are heuristically designed to predict the modeling error, or in other words, how difficult it would be to detect a single change to the original image in any given area. This dissertation investigates how both the design and detection of such content-adaptive schemes can be improved with the use of side-information.
We distinguish two types of side-information, public and private: Public side-information is available to the sender and at least in part also to anybody else who can observe the communication. Content complexity is a typical example of public side-information. While it is commonly used for steganography, it can also be used for detection. In this work, we propose a modification to the rich-model style feature sets in both spatial and JPEG domain to inform such feature sets of the content complexity.
Private side-information is available only to the sender. The previous use of private side-information in steganography was very successful but limited to steganography in JPEG images. Also, the constructions were based on heuristic with little theoretical foundations. This work tries to remedy this deficiency by introducing a scheme that generalizes the previous approach to an arbitrary domain. We also put forward a theoretical investigation of how to incorporate side-information based on a model of images. Third, we propose to use a novel type of side-information in the form of multiple exposures for JPEG steganography
High-Fidelity Provenance:Exploring the Intersection of Provenance and Security
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. However, the euphoria for the democratization of news publishing was soon followed by scepticism, as a new phenomenon emerged: fake news. With no gatekeepers to vouch for it, the veracity of the information served over the World Wide Web became a major public concern. The Reuters Digital News Report 2020 cites that in at least half of the EU member countries, 50% or more of the population is concerned about online fake news. To help address the problem of trust on information communi- cated over the World Wide Web, it has been proposed to also make available the provenance metadata of the information. Similar to artwork provenance, this would include a detailed track of how the information was created, updated and propagated to produce the result we read, as well as what agents—human or software—were involved in the process. However, keeping track of provenance information is a non-trivial task. Current approaches, are often of limited scope and may require modifying existing applications to also generate provenance information along with thei regular output. This thesis explores how provenance can be automatically tracked in an application-agnostic manner, without having to modify the individual applications. We frame provenance capture as a data flow analysis problem and explore the use of dynamic taint analysis in this context. Our work shows that this appoach improves on the quality of provenance captured compared to traditonal approaches, yielding what we term as high-fidelity provenance. We explore the performance cost of this approach and use deterministic record and replay to bring it down to a more practical level. Furthermore, we create and present the tooling necessary for the expanding the use of using deterministic record and replay for provenance analysis. The thesis concludes with an application of high-fidelity provenance as a tool for state-of-the art offensive security analysis, based on the intuition that software too can be misguided by "fake news". This demonstrates that the potential uses of high-fidelity provenance for security extend beyond traditional forensics analysis
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
Balkanising Taxonomy : How to capture and transfer an experience of the event - the case of Belgrade protest in '96/'97
The Serbian uprising in 1996/1997 was an attempt to overthrow the dictatorship of president Milosevic after he annulled elections because of the opposition party’s victory. Ashamed by the unsuccessful outcome of their protest, the people of the capital Belgrade, have never produced an archive of the photos, banners and graffiti, which emerged during these demonstrations. Scarce information on the Internet and the inability of the media to reveal the data gathered during the protest has left the public without a full account of the uprising. My project is that archive – the map of images, leaflets, badges, flags, vouchers, cartoons, crochets, poems etc., an online record of the elucidated protest available to the participants, scholars and the public.
The narratives of this event have been locked within the community and there are only odd visual references hidden in people’s houses. My research has generated them through interviews and image elicitation that looks at the uprising by analysing these accumulated historic relics. Presented in sections on the website (timelines, artists, routes) and pages of art formats (poems, photos, badges), this overview of the geographical, political and social circumstances within which the protest’s artwork was produced demonstrates how it influenced the actions of the citizens.
This urban spectacle was enthused by the creative participation exposed in the walks of the masses that became the force of the protest. The reflexive method of my practice, just like this communal approach at the uprising challenges dominant representations of culture, history and politics from the whole of the Balkans.
My online package for capturing the past (hi)stories shifts the official narratives, predominantly from the West and saturated by the wars of the ‘90s into only one possibility among others. It maps the failed revolution in Serbia under Milosevic from its beginnings, revealing the accomplishment of academics, artists and citizens buried under the war stories..
3D-in-2D Displays for ATC.
This paper reports on the efforts and accomplishments
of the 3D-in-2D Displays for ATC project at the end of Year 1.
We describe the invention of 10 novel 3D/2D visualisations that
were mostly implemented in the Augmented Reality ARToolkit.
These prototype implementations of visualisation and interaction
elements can be viewed on the accompanying video. We have
identified six candidate design concepts which we will further
research and develop. These designs correspond with the early
feasibility studies stage of maturity as defined by the NASA
Technology Readiness Level framework. We developed the
Combination Display Framework from a review of the literature,
and used it for analysing display designs in terms of display
technique used and how they are combined. The insights we
gained from this framework then guided our inventions and the
human-centered innovation process we use to iteratively invent.
Our designs are based on an understanding of user work
practices. We also developed a simple ATC simulator that we
used for rapid experimentation and evaluation of design ideas.
We expect that if this project continues, the effort in Year 2 and 3
will be focus on maturing the concepts and employment in a
operational laboratory settings
An historical geography of the Nilgiri cinchona plantations, 1860-1900
In 1859, the British government launched an expedition to South America with the aim of collecting seeds and plants of the quinine-producing cinchona tree for establishing plantations in British India, so as to relieve the British Government of the escalating costs and uncertainties in the supply of this valuable, and increasingly popular anti-malarial drug.
Drawing on recent work on the commodities of empire, tropical acclimatization, and imperial medicine, this thesis provides a detailed study of the first British cinchona plantations established on the Nilgiri Hills of Southern India. Focused on the period between 1860 and 1900, and at the local geographic scale, the research critically examines the engagement and connections between government officials, planters, venture capitalists, labourers, plant material and ideas in the context of the cinchona plantations through a thorough study of archival and secondary sources. Contributions are also made to the study of the spaces of science and the management of the tropical environment. Cinchona is placed in a wider context of the history of botany and plantations in the Nilgiri region, and the major events in the development of cinchona plantations described.
In the resulting historical geography the Nilgiri cinchona plantations emerge as a 'nodal' point in the global cinchona network that also relied upon global networks of imperial power, capital and leisure tourism. The experiment was essentially an exertion of power but one that also demonstrated the very vulnerable nature of the empire
An historical geography of the Nilgiri cinchona plantations, 1860-1900
In 1859, the British government launched an expedition to South America with the aim of collecting seeds and plants of the quinine-producing cinchona tree for establishing plantations in British India, so as to relieve the British Government of the escalating costs and uncertainties in the supply of this valuable, and increasingly popular anti-malarial drug.
Drawing on recent work on the commodities of empire, tropical acclimatization, and imperial medicine, this thesis provides a detailed study of the first British cinchona plantations established on the Nilgiri Hills of Southern India. Focused on the period between 1860 and 1900, and at the local geographic scale, the research critically examines the engagement and connections between government officials, planters, venture capitalists, labourers, plant material and ideas in the context of the cinchona plantations through a thorough study of archival and secondary sources. Contributions are also made to the study of the spaces of science and the management of the tropical environment. Cinchona is placed in a wider context of the history of botany and plantations in the Nilgiri region, and the major events in the development of cinchona plantations described.
In the resulting historical geography the Nilgiri cinchona plantations emerge as a 'nodal' point in the global cinchona network that also relied upon global networks of imperial power, capital and leisure tourism. The experiment was essentially an exertion of power but one that also demonstrated the very vulnerable nature of the empire
Resilience-Building Technologies: State of Knowledge -- ReSIST NoE Deliverable D12
This document is the first product of work package WP2, "Resilience-building and -scaling technologies", in the programme of jointly executed research (JER) of the ReSIST Network of Excellenc
Factors Influencing Customer Satisfaction towards E-shopping in Malaysia
Online shopping or e-shopping has changed the world of business and quite a few people have
decided to work with these features. What their primary concerns precisely and the responses from
the globalisation are the competency of incorporation while doing their businesses. E-shopping has
also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce
industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction
while operating in the e-retailing environment. It is very important that customers are satisfied with
the website, or else, they would not return. Therefore, a crucial fact to look into is that companies
must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s
point of view. With is in mind, this study aimed at investigating customer satisfaction
towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students
randomly selected from various public and private universities located within Klang valley area.
Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for
further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer
satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust,
design of the website, online security and e-service quality. Finally, recommendations and future
study direction is provided.
Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia