14,483 research outputs found

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen

    Street slang and schizophrenia

    Get PDF
    We report the case of a 26 year old streetwise young postman who presented with a six month history of reduced occupational and social function, low mood, and lack of motivation. He complained of feeling less sociable and less interested in his friends and of being clumsy and finding it harder to think. He was otherwise fit and healthy, with no physical abnormalities, neurological signs, or objective cognitive impairments. There was no history of a recent stressor that might have precipitated his symptoms. He was referred to a specialist service for patients in the prodromal phase of psychotic illness for further assessment after he had seen his general practitioner and the local community mental health team. The differential diagnosis at this stage was depression, the prodrome of schizophrenia, or no formal clinical disorder. His premorbid occupational and social function had been good. There was no history of abnormal . social, language, and motor development and he left school with two A levels. After three years of service at the post office he had been promoted to a supervisory role. He had a good relationship with his family and had six or so good friends. There has been a number of previous heterosexual relationships, although none in the past year. Aside from smoking cannabis on two occasions when he was 19, there was no history of illicit substance use. Detailed and repeated assessment of his mental state found a normal affect, no delusions, hallucinations, or catatonia, and no cognitive dysfunction. His speech, however, was peppered with what seemed (to his middle class and older psychiatrist) to be an unusual use of words, although he said they were street slang (table).Go It was thus unclear whether he was displaying subtle signs of formal thought disorder (manifest as disorganised speech, including the use of unusual words or phrases, and neologisms) or using a "street" argot. This was a crucial diagnostic distinction as thought disorder is a feature of psychotic illnesses and can indicate a diagnosis of schizophrenia. We sought to verify his explanations using an online dictionary of slang (urbandictionary.com). To our surprise, many of the words he used were listed and the definitions accorded with those he gave (see table). We further investigated whether his speech showed evidence of thought disorder by examining recordings of his speech as he described a series of ambiguous pictures from the thematic apperception test, a procedure that elicits thought disordered speech. His speech was transcribed and rated with the thought and language index, a standardised scale for assessing thought disorder. Slang used in a linguistically appropriate way is not scored as abnormal on this scale. His score was 5.25, primarily reflecting a mild loosening of associations. For example, he described a picture of a boat on a lake thus: "There’s a boat and a tree. There seems to be a reflection. There are no beds, and I wonder why there are no beds. There’s a breeze going through the branches of the tree." His score was outside the normal range (mean for normal controls 0.88, SD 1.15) and indicates subtle thought disorder, equivalent to that evident in remitted patients with schizophrenia (mean in remitted patients 3.89, SD 2.56) but lower than that in patients with formal thought disorder (mean 27.4, SD 8.3). Over the following year his social and occupational functioning deteriorated further, and he developed frank formal thought disorder as well as grandiose and persecutory delusions to the extent that he met DSM-IV criteria for schizophrenia. His speech was assessed as before, and the thought and language index score had increased to 11.75. This mainly reflected abnormalities on items comprising "positive" thought disorder, particularly the use of neologisms such as "chronocolising" and non-sequiturs. To our knowledge this is the first case report to describe difficulties in distinguishing "street" argots from formal thought disorder. It is perhaps not surprising that slang can complicate the assessment of disorganised speech as psychotic illnesses usually develop in young adults, whereas the assessing clinician is often from an older generation (and different sociocultural background) less familiar with contemporary urban slang. Online resources offer a means of distinguishing street argot from neologisms or a peculiar use of words, and linguistic rating scales may be a useful adjunct to clinical assessment when thought disorder is subtle. Differentiating thought disorder from slang can be especially difficult in the context of "prodromal" signs of psychosis, when speech abnormalities, if present, are usually subtle. Nevertheless, accurate speech assessment is important as subtle thought disorder can, as in this case, predate the subsequent onset of schizophrenia, and early detection and treatment of psychosis might be associated with a better long term clinical outcome

    Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution

    Get PDF
    Block ciphers are widely used for securing data and are known for their resistance to various types of attacks. The strength of a block cipher against these attacks often depends on the S-boxes used in the cipher. There are many chaotic map-based techniques in the literature for constructing the dynamic S-Boxes. While chaos-based approaches have certain attractive properties for this purpose, they also have some inherent weaknesses, including finite precision effect, dynamical degradation of chaotic systems, non-uniform distribution, discontinuity in chaotic sequences. These weaknesses can limit the effectiveness of chaotic map-based substitution boxes. In this paper, we propose an innovative approach for constructing dynamic S-boxes using Gaussian distribution-based pseudo-random sequences. The proposed technique overcomes the weaknesses of existing chaos-based S-box techniques by leveraging the strength of pseudo-randomness sequences. However, one of the main drawbacks of using Gaussian distribution-based pseudo-random sequences is the low nonlinearity of the resulting S-boxes. To address this limitation, we introduce the use of genetic algorithms (GA) to optimize the nonlinearity of Gaussian distribution-based S-boxes while preserving a high level of randomness. The proposed technique is evaluated using standard S-box performance criteria, including nonlinearity, bit independence criterion (BIC), linear approximation probability (LP), strict avalanche criterion (SAC), and differential approximation probability (DP). Results demonstrate that the proposed technique achieves a maximum nonlinearity of 112, which is comparable to the ASE algorithm

    Enhanced Hardware Security Using Charge-Based Emerging Device Technology

    Get PDF
    The emergence of hardware Trojans has largely reshaped the traditional view that the hardware layer can be blindly trusted. Hardware Trojans, which are often in the form of maliciously inserted circuitry, may impact the original design by data leakage or circuit malfunction. Hardware counterfeiting and IP piracy are another two serious issues costing the US economy more than $200 billion annually. A large amount of research and experimentation has been carried out on the design of these primitives based on the currently prevailing CMOS technology. However, the security provided by these primitives comes at the cost of large overheads mostly in terms of area and power consumption. The development of emerging technologies provides hardware security researchers with opportunities to utilize some of the otherwise unusable properties of emerging technologies in security applications. In this dissertation, we will include the security consideration in the overall performance measurements to fully compare the emerging devices with CMOS technology. The first approach is to leverage two emerging devices (Silicon NanoWire and Graphene SymFET) for hardware security applications. Experimental results indicate that emerging device based solutions can provide high level circuit protection with relatively lower performance overhead compared to conventional CMOS counterpart. The second topic is to construct an energy-efficient DPA-resilient block cipher with ultra low-power Tunnel FET. Current-mode logic is adopted as a circuit-level solution to countermeasure differential power analysis attack, which is mostly used in the cryptographic system. The third investigation targets on potential security vulnerability of foundry insider\u27s attack. Split manufacturing is adopted for the protection on radio-frequency (RF) circuit design

    LeakyOhm: Secret Bits Extraction using Impedance Analysis

    Full text link
    The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such data-dependent influence can be exploited by, for instance, power or electromagnetic analysis. In this work, we introduce a novel non-invasive physical side-channel attack, which exploits the data-dependent changes in the impedance of the chip. Our attack relies on the fact that the temporarily stored contents in registers alter the physical characteristics of the circuit, which results in changes in the die's impedance. To sense such impedance variations, we deploy a well-known RF/microwave method called scattering parameter analysis, in which we inject sine wave signals with high frequencies into the system's power distribution network (PDN) and measure the echo of the signals. We demonstrate that according to the content bits and physical location of a register, the reflected signal is modulated differently at various frequency points enabling the simultaneous and independent probing of individual registers. Such side-channel leakage challenges the tt-probing security model assumption used in masking, which is a prominent side-channel countermeasure. To validate our claims, we mount non-profiled and profiled impedance analysis attacks on hardware implementations of unprotected and high-order masked AES. We show that in the case of the profiled attack, only a single trace is required to recover the secret key. Finally, we discuss how a specific class of hiding countermeasures might be effective against impedance leakage
    • …
    corecore