9,317 research outputs found
New Cloud-Based Service for Broadcasting and Identification for Solving Data Traffic Re-Using for Mobile Communications
In recent decades, the majority of mobile communications data traffic has relied on RF technology. Even if optimization efficiency for use or reuse is implemented, there are limits to the growing traffic demand for RF communications. Visible light communications (VLC) is a new technology that can work with RF to overcome these limitations. The standard for VLC was published in 2011 as IEEE 802.15.7, which specifies specifications for the MAC layer and PHY layer. This standard is one of the first for this technology. The light emission decoding operation at the receiver in IEEE 802.15.7 is mainly based on photo detectors. However, with the development of image sensors (photodiode arrays) in smart devices, changes to the IEEE 802.15.7 specification are being considered. This expansion will primarily focus on communications with image sensors, called optical camera communications (OCC). In this paper, we analyze the performance of camera communication systems based on different types of image sensor architectures. We then propose OCC-ID, a novel streaming service application that uses camera communication and a cloud model. The proposed architecture is a general implementation scenario for camera communications. Optical camera communication has great potential in future wireless communications due to the advantages of VLC and business trends. A revision of the IEEE 802.17.5 standard is currently under study. However, OCC's issues regarding timing, data rate, and interference still need to be resolved. Synchronization is an important issue because the signal received from the camera is a discrete image from the transmitter without any feedback information and because camera communication applications are based on a transmission topology. Roller blinds have more advantages in terms of timing than overall blinds. In this study, we present and evaluate the performance of two image detection techniques, namely rolling shutter and global shutter. The performance of the two image sensors and their considerations will play an important role in the standard's contribution. Finally, we propose a new service application for OCC based on cloud architecture, called OCC-ID. Invisible identification can be accomplished using visible light communications, camera communications, and cloud computing technology. The ID is integrated into the optical channel using OOK or OOK frequency shift modulation. The receiver uses the camera to decode the information embedded in the LED and then transmits it to the cloud server transmission link based on the detected ID. The OCC-ID system shows the advantages of dynamic content management compared to traditional identification systems
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
In this paper we show how attackers can covertly leak data (e.g., encryption
keys, passwords and files) from highly secure or air-gapped networks via the
row of status LEDs that exists in networking equipment such as LAN switches and
routers. Although it is known that some network equipment emanates optical
signals correlated with the information being processed by the device
('side-channel'), intentionally controlling the status LEDs to carry any type
of data ('covert-channel') has never studied before. A malicious code is
executed on the LAN switch or router, allowing full control of the status LEDs.
Sensitive data can be encoded and modulated over the blinking of the LEDs. The
generated signals can then be recorded by various types of remote cameras and
optical sensors. We provide the technical background on the internal
architecture of switches and routers (at both the hardware and software level)
which enables this type of attack. We also present amplitude and frequency
based modulation and encoding schemas, along with a simple transmission
protocol. We implement a prototype of an exfiltration malware and discuss its
design and implementation. We evaluate this method with a few routers and
different types of LEDs. In addition, we tested various receivers including
remote cameras, security cameras, smartphone cameras, and optical sensors, and
also discuss different detection and prevention countermeasures. Our experiment
shows that sensitive data can be covertly leaked via the status LEDs of
switches and routers at a bit rates of 10 bit/sec to more than 1Kbit/sec per
LED
Optimal Radiometric Calibration for Camera-Display Communication
We present a novel method for communicating between a camera and display by
embedding and recovering hidden and dynamic information within a displayed
image. A handheld camera pointed at the display can receive not only the
display image, but also the underlying message. These active scenes are
fundamentally different from traditional passive scenes like QR codes because
image formation is based on display emittance, not surface reflectance.
Detecting and decoding the message requires careful photometric modeling for
computational message recovery. Unlike standard watermarking and steganography
methods that lie outside the domain of computer vision, our message recovery
algorithm uses illumination to optically communicate hidden messages in real
world scenes. The key innovation of our approach is an algorithm that performs
simultaneous radiometric calibration and message recovery in one convex
optimization problem. By modeling the photometry of the system using a
camera-display transfer function (CDTF), we derive a physics-based kernel
function for support vector machine classification. We demonstrate that our
method of optimal online radiometric calibration (OORC) leads to an efficient
and robust algorithm for computational messaging between nine commercial
cameras and displays.Comment: 10 pages, Submitted to CVPR 201
Perfectly secure steganography: hiding information in the quantum noise of a photograph
We show that the quantum nature of light can be used to hide a secret message
within a photograph. Using this physical principle we achieve
information-theoretic secure steganography, which had remained elusive until
now. The protocol is such that the digital picture in which the secret message
is embedded is perfectly undistinguishable from an ordinary photograph. This
implies that, on a fundamental level, it is impossible to discriminate a
private communication from an exchange of photographs.Comment: 5 pages, 3 figures + appendix : 5 pages, 6 figure
Image Watermaking With Biometric Data For Copyright Protection
In this paper, we deal with the proof of ownership or legitimate usage of a
digital content, such as an image, in order to tackle the illegitimate copy.
The proposed scheme based on the combination of the watermark-ing and
cancelable biometrics does not require a trusted third party, all the exchanges
are between the provider and the customer. The use of cancelable biometrics
permits to provide a privacy compliant proof of identity. We illustrate the
robustness of this method against intentional and unintentional attacks of the
watermarked content
Embedding Invisible Fingerprints in Displayed Content to Facilitate Seamless Sharing
Participants in a physical meeting are often interested in accessing content that is presented on a display during the meeting. However, to enable participant access, the presenter needs to obtain their contact information and share a link to the contact to all participants. This manual approach is cumbersome, inefficient, and error prone. This disclosure describes techniques for seamless and dynamic sharing of content by augmenting the user interface (UI) of presented content by embedding spatial and/or temporal fingerprints. The fingerprints are invisible to the human eye, but detectable by device cameras of participants. Meeting participants can capture a photo of the screen that displays the content. The captured image is processed on-device to detect the embedded fingerprint that is linked to the content and an option to access the content is displayed to the user. The techniques described in this disclosure provide a distributed user experience (UX) for content sharing triggered by actions taken by interested participants and avoid unnecessarily broadcasting the content link to others
Recommended from our members
Spectral imaging in preclinical research and clinical pathology.
Spectral imaging methods are attracting increased interest from researchers and practitioners in basic science, pre-clinical and clinical arenas. A combination of better labeling reagents and better optics creates opportunities to detect and measure multiple parameters at the molecular and cellular level. These tools can provide valuable insights into the basic mechanisms of life, and yield diagnostic and prognostic information for clinical applications. There are many multispectral technologies available, each with its own advantages and limitations. This chapter will present an overview of the rationale for spectral imaging, and discuss the hardware, software and sample labeling strategies that can optimize its usefulness in clinical settings
The Profiling Potential of Computer Vision and the Challenge of Computational Empiricism
Computer vision and other biometrics data science applications have commenced
a new project of profiling people. Rather than using 'transaction generated
information', these systems measure the 'real world' and produce an assessment
of the 'world state' - in this case an assessment of some individual trait.
Instead of using proxies or scores to evaluate people, they increasingly deploy
a logic of revealing the truth about reality and the people within it. While
these profiling knowledge claims are sometimes tentative, they increasingly
suggest that only through computation can these excesses of reality be captured
and understood. This article explores the bases of those claims in the systems
of measurement, representation, and classification deployed in computer vision.
It asks if there is something new in this type of knowledge claim, sketches an
account of a new form of computational empiricism being operationalised, and
questions what kind of human subject is being constructed by these
technological systems and practices. Finally, the article explores legal
mechanisms for contesting the emergence of computational empiricism as the
dominant knowledge platform for understanding the world and the people within
it
- …