9,317 research outputs found

    New Cloud-Based Service for Broadcasting and Identification for Solving Data Traffic Re-Using for Mobile Communications

    Get PDF
    In recent decades, the majority of mobile communications data traffic has relied on RF technology. Even if optimization efficiency for use or reuse is implemented, there are limits to the growing traffic demand for RF communications. Visible light communications (VLC) is a new technology that can work with RF to overcome these limitations. The standard for VLC was published in 2011 as IEEE 802.15.7, which specifies specifications for the MAC layer and PHY layer. This standard is one of the first for this technology. The light emission decoding operation at the receiver in IEEE 802.15.7 is mainly based on photo detectors. However, with the development of image sensors (photodiode arrays) in smart devices, changes to the IEEE 802.15.7 specification are being considered. This expansion will primarily focus on communications with image sensors, called optical camera communications (OCC). In this paper, we analyze the performance of camera communication systems based on different types of image sensor architectures. We then propose OCC-ID, a novel streaming service application that uses camera communication and a cloud model. The proposed architecture is a general implementation scenario for camera communications. Optical camera communication has great potential in future wireless communications due to the advantages of VLC and business trends. A revision of the IEEE 802.17.5 standard is currently under study. However, OCC's issues regarding timing, data rate, and interference still need to be resolved. Synchronization is an important issue because the signal received from the camera is a discrete image from the transmitter without any feedback information and because camera communication applications are based on a transmission topology. Roller blinds have more advantages in terms of timing than overall blinds. In this study, we present and evaluate the performance of two image detection techniques, namely rolling shutter and global shutter. The performance of the two image sensors and their considerations will play an important role in the standard's contribution. Finally, we propose a new service application for OCC based on cloud architecture, called OCC-ID. Invisible identification can be accomplished using visible light communications, camera communications, and cloud computing technology. The ID is integrated into the optical channel using OOK or OOK frequency shift modulation. The receiver uses the camera to decode the information embedded in the LED and then transmits it to the cloud server transmission link based on the detected ID. The OCC-ID system shows the advantages of dynamic content management compared to traditional identification systems

    xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs

    Full text link
    In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it is known that some network equipment emanates optical signals correlated with the information being processed by the device ('side-channel'), intentionally controlling the status LEDs to carry any type of data ('covert-channel') has never studied before. A malicious code is executed on the LAN switch or router, allowing full control of the status LEDs. Sensitive data can be encoded and modulated over the blinking of the LEDs. The generated signals can then be recorded by various types of remote cameras and optical sensors. We provide the technical background on the internal architecture of switches and routers (at both the hardware and software level) which enables this type of attack. We also present amplitude and frequency based modulation and encoding schemas, along with a simple transmission protocol. We implement a prototype of an exfiltration malware and discuss its design and implementation. We evaluate this method with a few routers and different types of LEDs. In addition, we tested various receivers including remote cameras, security cameras, smartphone cameras, and optical sensors, and also discuss different detection and prevention countermeasures. Our experiment shows that sensitive data can be covertly leaked via the status LEDs of switches and routers at a bit rates of 10 bit/sec to more than 1Kbit/sec per LED

    Optimal Radiometric Calibration for Camera-Display Communication

    Full text link
    We present a novel method for communicating between a camera and display by embedding and recovering hidden and dynamic information within a displayed image. A handheld camera pointed at the display can receive not only the display image, but also the underlying message. These active scenes are fundamentally different from traditional passive scenes like QR codes because image formation is based on display emittance, not surface reflectance. Detecting and decoding the message requires careful photometric modeling for computational message recovery. Unlike standard watermarking and steganography methods that lie outside the domain of computer vision, our message recovery algorithm uses illumination to optically communicate hidden messages in real world scenes. The key innovation of our approach is an algorithm that performs simultaneous radiometric calibration and message recovery in one convex optimization problem. By modeling the photometry of the system using a camera-display transfer function (CDTF), we derive a physics-based kernel function for support vector machine classification. We demonstrate that our method of optimal online radiometric calibration (OORC) leads to an efficient and robust algorithm for computational messaging between nine commercial cameras and displays.Comment: 10 pages, Submitted to CVPR 201

    Perfectly secure steganography: hiding information in the quantum noise of a photograph

    Full text link
    We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now. The protocol is such that the digital picture in which the secret message is embedded is perfectly undistinguishable from an ordinary photograph. This implies that, on a fundamental level, it is impossible to discriminate a private communication from an exchange of photographs.Comment: 5 pages, 3 figures + appendix : 5 pages, 6 figure

    Image Watermaking With Biometric Data For Copyright Protection

    Full text link
    In this paper, we deal with the proof of ownership or legitimate usage of a digital content, such as an image, in order to tackle the illegitimate copy. The proposed scheme based on the combination of the watermark-ing and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer. The use of cancelable biometrics permits to provide a privacy compliant proof of identity. We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content

    Embedding Invisible Fingerprints in Displayed Content to Facilitate Seamless Sharing

    Get PDF
    Participants in a physical meeting are often interested in accessing content that is presented on a display during the meeting. However, to enable participant access, the presenter needs to obtain their contact information and share a link to the contact to all participants. This manual approach is cumbersome, inefficient, and error prone. This disclosure describes techniques for seamless and dynamic sharing of content by augmenting the user interface (UI) of presented content by embedding spatial and/or temporal fingerprints. The fingerprints are invisible to the human eye, but detectable by device cameras of participants. Meeting participants can capture a photo of the screen that displays the content. The captured image is processed on-device to detect the embedded fingerprint that is linked to the content and an option to access the content is displayed to the user. The techniques described in this disclosure provide a distributed user experience (UX) for content sharing triggered by actions taken by interested participants and avoid unnecessarily broadcasting the content link to others

    The Profiling Potential of Computer Vision and the Challenge of Computational Empiricism

    Full text link
    Computer vision and other biometrics data science applications have commenced a new project of profiling people. Rather than using 'transaction generated information', these systems measure the 'real world' and produce an assessment of the 'world state' - in this case an assessment of some individual trait. Instead of using proxies or scores to evaluate people, they increasingly deploy a logic of revealing the truth about reality and the people within it. While these profiling knowledge claims are sometimes tentative, they increasingly suggest that only through computation can these excesses of reality be captured and understood. This article explores the bases of those claims in the systems of measurement, representation, and classification deployed in computer vision. It asks if there is something new in this type of knowledge claim, sketches an account of a new form of computational empiricism being operationalised, and questions what kind of human subject is being constructed by these technological systems and practices. Finally, the article explores legal mechanisms for contesting the emergence of computational empiricism as the dominant knowledge platform for understanding the world and the people within it
    corecore