4,937 research outputs found

    Image fusion in the JPEG 2000 domain

    Get PDF

    Security and Privacy Dimensions in Next Generation DDDAS/Infosymbiotic Systems: A Position Paper

    Get PDF
    AbstractThe omnipresent pervasiveness of personal devices will expand the applicability of the Dynamic Data Driven Application Systems (DDDAS) paradigm in innumerable ways. While every single smartphone or wearable device is potentially a sensor with powerful computing and data capabilities, privacy and security in the context of human participants must be addressed to leverage the infinite possibilities of dynamic data driven application systems. We propose a security and privacy preserving framework for next generation systems that harness the full power of the DDDAS paradigm while (1) ensuring provable privacy guarantees for sensitive data; (2) enabling field-level, intermediate, and central hierarchical feedback-driven analysis for both data volume mitigation and security; and (3) intrinsically addressing uncertainty caused either by measurement error or security-driven data perturbation. These thrusts will form the foundation for secure and private deployments of large scale hybrid participant-sensor DDDAS systems of the future

    On the Control of Microgrids Against Cyber-Attacks: A Review of Methods and Applications

    Get PDF
    Nowadays, the use of renewable generations, energy storage systems (ESSs) and microgrids (MGs) has been developed due to better controllability of distributed energy resources (DERs) as well as their cost-effective and emission-aware operation. The development of MGs as well as the use of hierarchical control has led to data transmission in the communication platform. As a result, the expansion of communication infrastructure has made MGs as cyber-physical systems (CPSs) vulnerable to cyber-attacks (CAs). Accordingly, prevention, detection and isolation of CAs during proper control of MGs is essential. In this paper, a comprehensive review on the control strategies of microgrids against CAs and its defense mechanisms has been done. The general structure of the paper is as follows: firstly, MGs operational conditions, i.e., the secure or insecure mode of the physical and cyber layers are investigated and the appropriate control to return to a safer mode are presented. Then, the common MGs communication system is described which is generally used for multi-agent systems (MASs). Also, classification of CAs in MGs has been reviewed. Afterwards, a comprehensive survey of available researches in the field of prevention, detection and isolation of CA and MG control against CA are summarized. Finally, future trends in this context are clarified

    Lessons Learned from Establishing the Energy-Informatics Business Model: Case of a German Energy Company

    Get PDF
    Energy and utilities companies find themselves in a paradoxical situation in which their traditional business models are losing profitability, and they must advocate energy efficiency and climate-protection goals, and thus encourage their customers to save energy. As a result, they must partially cannibalize their business models and experiment with new models and techniques. Energy Informatics (EI) offers promising business opportunities that alleviate the concerns of energy companies about traditional revenue streams. However, recent discussions on this issue lack proof of concept and success determinants. This business case study fills this gap by describing the journey of German energy company Energiequelle, which established a sustainable business model based on EI. On the basis of our interview data, we analyzed Energiequelle’s EI strategy and stakeholder management and present six lessons learned. We believe that our practice-oriented research provides profound insight, especially to high-level executives and policymakers.DFG, 414044773, Open Access Publizieren 2019 - 2020 / Technische Universität Berli

    Fast watermarking of MPEG-1/2 streams using compressed-domain perceptual embedding and a generalized correlator detector

    Get PDF
    A novel technique is proposed for watermarking of MPEG-1 and MPEG-2 compressed video streams. The proposed scheme is applied directly in the domain of MPEG-1 system streams and MPEG-2 program streams (multiplexed streams). Perceptual models are used during the embedding process in order to avoid degradation of the video quality. The watermark is detected without the use of the original video sequence. A modified correlation-based detector is introduced that applies nonlinear preprocessing before correlation. Experimental evaluation demonstrates that the proposed scheme is able to withstand several common attacks. The resulting watermarking system is very fast and therefore suitable for copyright protection of compressed video

    Graph Spectral Domain Watermarking for Unstructured Data from Sensor Networks

    Get PDF
    The modern applications like social networks and sensors networks are increasingly used in the recent years. These applications can be represented as a weighted graph using irregular structure. Unfortunately, we cannot apply the techniques of the traditional signal processing on those graphs. In this paper, graph spread spectrum watermarking is proposed for networked sensor data authentication. Firstly, the graph spectrum is computed based on the eigenvector decomposition of the graph Laplacian. Then, graph Fourier coefficients are obtained by projecting the graph signals onto the basis functions which are the eigenvectors of the graph Laplacian. Finally, the watermark bits are embedded in the graph spectral coefficients using a watermark strength parameter varied according to the eigenvector number. We have considered two scenarios: blind and non-blind watermarking. The experimental results show that the proposed methods are robust, high capacity and result in low distortion in data. The proposed algorithms are robust to many types of attacks: noise, data modification, data deletion, rounding and down-sampling
    corecore