5,822 research outputs found

    Towards joint decoding of binary Tardos fingerprinting codes

    Get PDF
    The class of joint decoder of probabilistic fingerprinting codes is of utmost importance in theoretical papers to establish the concept of fingerprint capacity. However, no implementation supporting a large user base is known to date. This article presents an iterative decoder which is, as far as we are aware of, the first practical attempt towards joint decoding. The discriminative feature of the scores benefits on one hand from the side-information of previously accused users, and on the other hand, from recently introduced universal linear decoders for compound channels. Neither the code construction nor the decoder make precise assumptions about the collusion (size or strategy). The extension to incorporate soft outputs from the watermarking layer is straightforward. An extensive experimental work benchmarks the very good performance and offers a clear comparison with previous state-of-the-art decoders.Comment: submitted to IEEE Trans. on Information Forensics and Security. - typos corrected, one new plot, references added about ECC based fingerprinting code

    Fingerprinting Smart Devices Through Embedded Acoustic Components

    Full text link
    The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting smart devices can assist in authenticating physical devices, but it can also jeopardize privacy by allowing remote identification without user awareness. We propose a novel fingerprinting approach that uses the microphones and speakers of smart phones to uniquely identify an individual device. During fabrication, subtle imperfections arise in device microphones and speakers which induce anomalies in produced and received sounds. We exploit this observation to fingerprint smart devices through playback and recording of audio samples. We use audio-metric tools to analyze and explore different acoustic features and analyze their ability to successfully fingerprint smart devices. Our experiments show that it is even possible to fingerprint devices that have the same vendor and model; we were able to accurately distinguish over 93% of all recorded audio clips from 15 different units of the same model. Our study identifies the prominent acoustic features capable of fingerprinting devices with high success rate and examines the effect of background noise and other variables on fingerprinting accuracy

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Get PDF
    Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and wherever they are, without any obstacles. This paper reviews emerging trends and challenges with frictionless authentication systems and identifies opportunities for further research related to the enrollment of users, the usability of authentication schemes, as well as security and privacy trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017

    Seeking Anonymity in an Internet Panopticon

    Full text link
    Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to be forthcoming soon. Current approaches to anonymity also appear unable to offer accurate, principled measurement of the level or quality of anonymity a user might obtain. Toward this end, we offer a high-level view of the Dissent project, the first systematic effort to build a practical anonymity system based purely on foundations that offer measurable and formally provable anonymity properties. Dissent builds on two key pre-existing primitives - verifiable shuffles and dining cryptographers - but for the first time shows how to scale such techniques to offer measurable anonymity guarantees to thousands of participants. Further, Dissent represents the first anonymity system designed from the ground up to incorporate some systematic countermeasure for each of the major classes of known vulnerabilities in existing approaches, including global traffic analysis, active attacks, and intersection attacks. Finally, because no anonymity protocol alone can address risks such as software exploits or accidental self-identification, we introduce WiNon, an experimental operating system architecture to harden the uses of anonymity tools such as Tor and Dissent against such attacks.Comment: 8 pages, 10 figure

    An integrated molecular and conventional breeding scheme for enhancing genetic gain in maize in Africa

    Get PDF
    Open Access Journal; Published online: 06 Nov 2019Maize production in West and Central Africa (WCA) is constrained by a wide range of interacting stresses that keep productivity below potential yields. Among the many problems afflicting maize production in WCA, drought, foliar diseases, and parasitic weeds are the most critical. Several decades of efforts devoted to the genetic improvement of maize have resulted in remarkable genetic gain, leading to increased yields of maize on farmers’ fields. The revolution unfolding in the areas of genomics, bioinformatics, and phenomics is generating innovative tools, resources, and technologies for transforming crop breeding programs. It is envisaged that such tools will be integrated within maize breeding programs, thereby advancing these programs and addressing current and future challenges. Accordingly, the maize improvement program within International Institute of Tropical Agriculture (IITA) is undergoing a process of modernization through the introduction of innovative tools and new schemes that are expected to enhance genetic gains and impact on smallholder farmers in the region. Genomic tools enable genetic dissections of complex traits and promote an understanding of the physiological basis of key agronomic and nutritional quality traits. Marker-aided selection and genome-wide selection schemes are being implemented to accelerate genetic gain relating to yield, resilience, and nutritional quality. Therefore, strategies that effectively combine genotypic information with data from field phenotyping and laboratory-based analysis are currently being optimized. Molecular breeding, guided by methodically defined product profiles tailored to different agroecological zones and conditions of climate change, supported by state-of-the-art decision-making tools, is pivotal for the advancement of modern, genomics-aided maize improvement programs. Accelerated genetic gain, in turn, catalyzes a faster variety replacement rate. It is critical to forge and strengthen partnerships for enhancing the impacts of breeding products on farmers’ livelihood. IITA has well-established channels for delivering its research products/technologies to partner organizations for further testing, multiplication, and dissemination across various countries within the subregion. Capacity building of national agricultural research system (NARS) will facilitate the smooth transfer of technologies and best practices from IITA and its partners
    • …
    corecore