5,822 research outputs found
Towards joint decoding of binary Tardos fingerprinting codes
The class of joint decoder of probabilistic fingerprinting codes is of utmost
importance in theoretical papers to establish the concept of fingerprint
capacity. However, no implementation supporting a large user base is known to
date. This article presents an iterative decoder which is, as far as we are
aware of, the first practical attempt towards joint decoding. The
discriminative feature of the scores benefits on one hand from the
side-information of previously accused users, and on the other hand, from
recently introduced universal linear decoders for compound channels. Neither
the code construction nor the decoder make precise assumptions about the
collusion (size or strategy). The extension to incorporate soft outputs from
the watermarking layer is straightforward. An extensive experimental work
benchmarks the very good performance and offers a clear comparison with
previous state-of-the-art decoders.Comment: submitted to IEEE Trans. on Information Forensics and Security. -
typos corrected, one new plot, references added about ECC based
fingerprinting code
Fingerprinting Smart Devices Through Embedded Acoustic Components
The widespread use of smart devices gives rise to both security and privacy
concerns. Fingerprinting smart devices can assist in authenticating physical
devices, but it can also jeopardize privacy by allowing remote identification
without user awareness. We propose a novel fingerprinting approach that uses
the microphones and speakers of smart phones to uniquely identify an individual
device. During fabrication, subtle imperfections arise in device microphones
and speakers which induce anomalies in produced and received sounds. We exploit
this observation to fingerprint smart devices through playback and recording of
audio samples. We use audio-metric tools to analyze and explore different
acoustic features and analyze their ability to successfully fingerprint smart
devices. Our experiments show that it is even possible to fingerprint devices
that have the same vendor and model; we were able to accurately distinguish
over 93% of all recorded audio clips from 15 different units of the same model.
Our study identifies the prominent acoustic features capable of fingerprinting
devices with high success rate and examines the effect of background noise and
other variables on fingerprinting accuracy
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Authentication and authorization are critical security layers to protect a
wide range of online systems, services and content. However, the increased
prevalence of wearable and mobile devices, the expectations of a frictionless
experience and the diverse user environments will challenge the way users are
authenticated. Consumers demand secure and privacy-aware access from any
device, whenever and wherever they are, without any obstacles. This paper
reviews emerging trends and challenges with frictionless authentication systems
and identifies opportunities for further research related to the enrollment of
users, the usability of authentication schemes, as well as security and privacy
trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security
Information, Systems and Technologies (SECURWARE 2017
Seeking Anonymity in an Internet Panopticon
Obtaining and maintaining anonymity on the Internet is challenging. The state
of the art in deployed tools, such as Tor, uses onion routing (OR) to relay
encrypted connections on a detour passing through randomly chosen relays
scattered around the Internet. Unfortunately, OR is known to be vulnerable at
least in principle to several classes of attacks for which no solution is known
or believed to be forthcoming soon. Current approaches to anonymity also appear
unable to offer accurate, principled measurement of the level or quality of
anonymity a user might obtain.
Toward this end, we offer a high-level view of the Dissent project, the first
systematic effort to build a practical anonymity system based purely on
foundations that offer measurable and formally provable anonymity properties.
Dissent builds on two key pre-existing primitives - verifiable shuffles and
dining cryptographers - but for the first time shows how to scale such
techniques to offer measurable anonymity guarantees to thousands of
participants. Further, Dissent represents the first anonymity system designed
from the ground up to incorporate some systematic countermeasure for each of
the major classes of known vulnerabilities in existing approaches, including
global traffic analysis, active attacks, and intersection attacks. Finally,
because no anonymity protocol alone can address risks such as software exploits
or accidental self-identification, we introduce WiNon, an experimental
operating system architecture to harden the uses of anonymity tools such as Tor
and Dissent against such attacks.Comment: 8 pages, 10 figure
Development of aquatic animal genetic improvement and dissemination programs : current status and action plans
Aquatic animals, Breeding, Genetics, Fish
An integrated molecular and conventional breeding scheme for enhancing genetic gain in maize in Africa
Open Access Journal; Published online: 06 Nov 2019Maize production in West and Central Africa (WCA) is constrained by a wide range of interacting stresses that keep productivity below potential yields. Among the many problems afflicting maize production in WCA, drought, foliar diseases, and parasitic weeds are the most critical. Several decades of efforts devoted to the genetic improvement of maize have resulted in remarkable genetic gain, leading to increased yields of maize on farmers’ fields. The revolution unfolding in the areas of genomics, bioinformatics, and phenomics is generating innovative tools, resources, and technologies for transforming crop breeding programs. It is envisaged that such tools will be integrated within maize breeding programs, thereby advancing these programs and addressing current and future challenges. Accordingly, the maize improvement program within International Institute of Tropical Agriculture (IITA) is undergoing a process of modernization through the introduction of innovative tools and new schemes that are expected to enhance genetic gains and impact on smallholder farmers in the region. Genomic tools enable genetic dissections of complex traits and promote an understanding of the physiological basis of key agronomic and nutritional quality traits. Marker-aided selection and genome-wide selection schemes are being implemented to accelerate genetic gain relating to yield, resilience, and nutritional quality. Therefore, strategies that effectively combine genotypic information with data from field phenotyping and laboratory-based analysis are currently being optimized. Molecular breeding, guided by methodically defined product profiles tailored to different agroecological zones and conditions of climate change, supported by state-of-the-art decision-making tools, is pivotal for the advancement of modern, genomics-aided maize improvement programs. Accelerated genetic gain, in turn, catalyzes a faster variety replacement rate. It is critical to forge and strengthen partnerships for enhancing the impacts of breeding products on farmers’ livelihood. IITA has well-established channels for delivering its research products/technologies to partner organizations for further testing, multiplication, and dissemination across various countries within the subregion. Capacity building of national agricultural research system (NARS) will facilitate the smooth transfer of technologies and best practices from IITA and its partners
- …