184 research outputs found

    DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks

    Get PDF
    This paper proposes DeepMarks, a novel end-to-end framework for systematic fingerprinting in the context of Deep Learning (DL). Remarkable progress has been made in the area of deep learning. Sharing the trained DL models has become a trend that is ubiquitous in various fields ranging from biomedical diagnosis to stock prediction. As the availability and popularity of pre-trained models are increasing, it is critical to protect the Intellectual Property (IP) of the model owner. DeepMarks introduces the first fingerprinting methodology that enables the model owner to embed unique fingerprints within the parameters (weights) of her model and later identify undesired usages of her distributed models. The proposed framework embeds the fingerprints in the Probability Density Function (pdf) of trainable weights by leveraging the extra capacity available in contemporary DL models. DeepMarks is robust against fingerprints collusion as well as network transformation attacks, including model compression and model fine-tuning. Extensive proof-of-concept evaluations on MNIST and CIFAR10 datasets, as well as a wide variety of deep neural networks architectures such as Wide Residual Networks (WRNs) and Convolutional Neural Networks (CNNs), corroborate the effectiveness and robustness of DeepMarks framework

    Anti-Collusion Fingerprinting for Multimedia

    Get PDF
    Digital fingerprinting is a technique for identifyingusers who might try to use multimedia content for unintendedpurposes, such as redistribution. These fingerprints are typicallyembedded into the content using watermarking techniques that aredesigned to be robust to a variety of attacks. A cost-effectiveattack against such digital fingerprints is collusion, whereseveral differently marked copies of the same content are combinedto disrupt the underlying fingerprints. In this paper, weinvestigate the problem of designing fingerprints that canwithstand collusion and allow for the identification of colluders.We begin by introducing the collusion problem for additiveembedding. We then study the effect that averaging collusion hasupon orthogonal modulation. We introduce an efficient detectionalgorithm for identifying the fingerprints associated with Kcolluders that requires O(K log(n/K)) correlations for agroup of n users. We next develop a fingerprinting scheme basedupon code modulation that does not require as many basis signalsas orthogonal modulation. We propose a new class of codes, calledanti-collusion codes (ACC), which have the property that thecomposition of any subset of K or fewer codevectors is unique.Using this property, we can therefore identify groups of K orfewer colluders. We present a construction of binary-valued ACCunder the logical AND operation that uses the theory ofcombinatorial designs and is suitable for both the on-off keyingand antipodal form of binary code modulation. In order toaccommodate n users, our code construction requires onlyO(sqrt{n}) orthogonal signals for a given number of colluders.We introduce four different detection strategies that can be usedwith our ACC for identifying a suspect set of colluders. Wedemonstrate the performance of our ACC for fingerprintingmultimedia and identifying colluders through experiments usingGaussian signals and real images.This paper has been submitted to IEEE Transactions on Signal Processing</I

    Gap width modification on fully screen-printed coplanar Zn|MnO2 batteries

    Get PDF
    Fully printed primary zinc-manganese dioxide (Zn|MnO2) batteries in coplanar configuration were fabricated by sequential screen printing. While electrode dimensions and transferred active masses were kept at constant levels, electrode separating gaps were incrementally enlarged from 1 mm to 5 mm. Calendering of solely zinc anodes increased interparticle contact of active material within the electrodes while the porosity of manganese dioxide based electrodes was maintained by non-calendering. Chronopotentiometry revealed areal capacities for coplanar batteries up to 2.8 mAh cm−2. Galvanostatic electrochemical impedance spectroscopy measurements and short circuit measurements were used to comprehensively characterise the effect of gap width extension on bulk electrolyte resistance and charge transfer resistance values. Linear relationships between nominal gap widths, short circuit currents and internal resistances were evidenced, but showed only minor impact on actual discharge capacities. The findings contradict previous assumptions to minimise gap widths of printed coplanar batteries to a sub-millimetre range in order to retain useful discharge capacities. The results presented in this study may facilitate process transfer of printed batteries to an industrial environment

    Effects of Alternate Wetting and Drying Irrigation Regime and Nitrogen Fertilizer on Yield and Nitrogen Use Efficiency of Irrigated Rice in the Sahel

    Get PDF
    The objectives of this study were to investigate water saving strategies in the paddy field and to evaluate the performance of some of the newly released rice varieties. Field experiments were conducted at Fanaye in the Senegal River Valley during two rice growing seasons in 2015. Three irrigation regimes ((i) continuous flooding, (ii) trigging irrigation at soil matric potential (SMP) of 30 kPa, (iii) trigging irrigation at SMP of 60 kPa) were tested in an irrigated lowland rice field. Irrigation regimes (ii) and (iii) are alternate wetting and drying (AWD) cycles. Four inbred rice varieties (NERICA S-21, NERICA S-44, Sahel 210 and Sahel 222) and one hybrid rice (Hybrid AR032H) were evaluated under five nitrogen fertilizer rates (0, 50, 100, 150 and 200 kg N ha-1). The results showed that rice yield varied from 0.9 to 12 t ha-1. The maximum yield of 12 t ha-1 was achieved by NERICA S-21 under AWD 30 kPa at 150 kg N ha-1. The AWD irrigation management at 30 kPa resulted in increasing rice yield, rice water use and nitrogen use efficiency and reducing the irrigation applications by 27.3% in comparison with continuous flooding. AWD30 kPa could be adopted as a water saving technology for water productivity under paddy production in the Senegal River Middle Valley. Additional research should be conducted in the upper Valley, where soils are sandier and water is less available, for the sustainability and the adoption of the irrigation water saving practices across the entire Senegal River Valley

    Music Encoding Conference Proceedings 2021, 19–22 July, 2021 University of Alicante (Spain): Onsite & Online

    Get PDF
    Este documento incluye los artículos y pósters presentados en el Music Encoding Conference 2021 realizado en Alicante entre el 19 y el 22 de julio de 2022.Funded by project Multiscore, MCIN/AEI/10.13039/50110001103

    Design of secure mobile payment protocols for restricted connectivity scenarios

    Get PDF
    The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial transactions. It is for this reason that mobile payment systems that consider those situations where direct communications between entities of the system is not posible (temporarily or permanently) basically due to the impossibility of one of the entities connected to the Internet are required. In order to solve the current shortage in the scientific world of previous research works that address the problema of on-line payment from mobile devices in connectivity restricted scenarios, in this thesis we propose a set of secure payment protocols (that use both symmetric and non-traditional asymmetric cryptography), which have low computational power requirements, are fit for scenarios with communications restrictions (where at least two of the entities of the system cannot exchange information in a direct way and must do it through another entity) and offer the same security capabilities as those protocols designed for full connectivity scenarios. The proposed protocols are applicable to other types of networks, such as vehicular ad hoc network (VANETs), where services exist which require on-line payment and scenarios with communication restrictions.On the other hand, the implementation (in a multiplatform programming language) of the designed protocols shows that their performance is suitable for devices with limited computational power.Postprint (published version

    Secure fingerprinting on sound foundations

    Get PDF
    The rapid development and the advancement of digital technologies open a variety of opportunities to consumers and content providers for using and trading digital goods. In this context, particularly the Internet has gained a major ground as a worldwiede platform for exchanging and distributing digital goods. Beside all its possibilities and advantages digital technology can be misuesd to breach copyright regulations: unauthorized use and illegal distribution of intellectual property cause authors and content providers considerable loss. Protections of intellectual property has therefore become one of the major challenges of our information society. Fingerprinting is a key technology in copyright protection of intellectual property. Its goal is to deter people from copyright violation by allowing to provably identify the source of illegally copied and redistributed content. As one of its focuses, this thesis considers the design and construction of various fingerprinting schemes and presents the first explicit, secure and reasonably efficient construction for a fingerprinting scheme which fulfills advanced security requirements such as collusion-tolerance, asymmetry, anonymity and direct non-repudiation. Crucial for the security of such s is a careful study of the underlying cryptographic assumptions. In case of the fingerprinting scheme presented here, these are mainly assumptions related to discrete logarithms. The study and analysis of these assumptions is a further focus of this thesis. Based on the first thorough classification of assumptions related to discrete logarithms, this thesis gives novel insights into the relations between these assumptions. In particular, depending on the underlying probability space we present new reuslts on the reducibility between some of these assumptions as well as on their reduction efficency.Die Fortschritte im Bereich der Digitaltechnologien bieten Konsumenten, Urhebern und Anbietern große Potentiale für innovative Geschäftsmodelle zum Handel mit digitalen Gütern und zu deren Nutzung. Das Internet stellt hierbei eine interessante Möglichkeit zum Austausch und zur Verbreitung digitaler Güter dar. Neben vielen Vorteilen kann die Digitaltechnik jedoch auch missbräuchlich eingesetzt werden, wie beispielsweise zur Verletzung von Urheberrechten durch illegale Nutzung und Verbreitung von Inhalten, wodurch involvierten Parteien erhebliche Schäden entstehen können. Der Schutz des geistigen Eigentums hat sich deshalb zu einer der besonderen Herausforderungen unseres Digitalzeitalters entwickelt. Fingerprinting ist eine Schlüsseltechnologie zum Urheberschutz. Sie hat das Ziel, vor illegaler Vervielfältigung und Verteilung digitaler Werke abzuschrecken, indem sie die Identifikation eines Betrügers und das Nachweisen seines Fehlverhaltens ermöglicht. Diese Dissertation liefert als eines ihrer Ergebnisse die erste explizite, sichere und effiziente Konstruktion, welche die Berücksichtigung besonders fortgeschrittener Sicherheitseigenschaften wie Kollusionstoleranz, Asymmetrie, Anonymität und direkte Unabstreitbarkeit erlaubt. Entscheidend für die Sicherheit kryptographischer Systeme ist die präzise Analyse der ihnen zugrunde liegenden kryptographischen Annahmen. Den im Rahmen dieser Dissertation konstruierten Fingerprintingsystemen liegen hauptsächlich kryptographische Annahmen zugrunde, welche auf diskreten Logarithmen basieren. Die Untersuchung dieser Annahmen stellt einen weiteren Schwerpunkt dieser Dissertation dar. Basierend auf einer hier erstmals in der Literatur vorgenommenen Klassifikation dieser Annahmen werden neue und weitreichende Kenntnisse über deren Zusammenhänge gewonnen. Insbesondere werden, in Abhängigkeit von dem zugrunde liegenden Wahrscheinlichkeitsraum, neue Resultate hinsichtlich der Reduzierbarkeit dieser Annahmen und ihrer Reduktionseffizienz erzielt

    USCID water management conference

    Get PDF
    Presented at Emerging challenges and opportunities for irrigation managers: energy, efficiency and infrastructure: a USCID water management conference held on April 26-29, 2011 in Albuquerque, New Mexico.Includes bibliographical references.Verifying conservation estimates for on-farm agricultural water conservation programs -- Improving irrigation system performance in the Middle Rio Grande through scheduled water delivery -- Urbanization of irrigation districts in the Texas Rio Grande River Basin -- Urbanization issues in the Middle Rio Grande Conservancy District -- From canyons to canals: applying regulated river research to canal bank analysis -- Water for irrigation, streams and economy: evaluating past and future climate change to secure a reliable water supply for multiple needs -- Flow measurement capabilities of diversion works in the Rio Grande Project area -- Open-channel and pipe flow measurement at Mohave Valley Irrigation and Drainage District using Venturi technology with bubbler sensors -- Using an ADCP to determine canal seepage losses in the Middle Rio Grande Conservancy District -- Venturi meters constructed with pipe fittings: an under-appreciated option for measuring agricultural water -- Improving crop water use determination using adjusted eddy covariance heat fluxes -- Performance evaluation of TDT soil water content and Watermark soil water potential sensors -- Meeting water challenges in Idaho through water banking -- Water transfers in California: 20 years of progress, view to the future
    • …
    corecore