316 research outputs found

    Ensuring message embedding in wet paper steganography

    Get PDF
    International audienceSyndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded decoding. In 2005, Fridrich et al. introduced wet paper codes to improve the undetectability of the embedding by nabling the sender to lock some components of the cover-data, according to the nature of the cover-medium and the message. Unfortunately, almost all existing methods solving the bounded decoding syndrome problem with or without locked components have a non-zero probability to fail. In this paper, we introduce a randomized syndrome coding, which guarantees the embedding success with probability one. We analyze the parameters of this new scheme in the case of perfect codes

    A study on the false positive rate of Stegdetect

    Get PDF
    In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images from the ASIRRA (Animal Species Image Recognition for Restricting Access) public corpus. The aim of this study is to help digital forensic analysts, aiming to study a large number of image files during an investigation, to better understand the capabilities and the limitations of steganalysis tools like Stegdetect. The results obtained show that the rate of false positives generated by Stegdetect depends highly on the chosen sensitivity value, and it is generally quite high. This should support the forensic expert to have better interpretation in their results, and taking the false positive rates into consideration. Additionally, we have provided a detailed statistical analysis for the obtained results to study the difference in detection between selected groups, close groups and different groups of images. This method can be applied to any steganalysis tool, which gives the analyst a better understanding of the detection results, especially when he has no prior information about the false positive rate of the tool

    HIV-assoziiertes Lymphom — ungewöhnliche Ursache einer pathologischen Unterkieferfraktur: Fallbericht und Behandlungsoptionen bei Immundefizienz

    Get PDF
    Zusammenfassung: Das diffuse großzellige B-Zell-Lymphom (DGBZL) bleibt trotz der Einführung der kombinierten antiviralen Therapie (HAART) ein häufiger maligner Tumor bei HIV-infizierten Patienten. Über 50% dieser Lymphome verlaufen extranodal, davon manifestiert sich die Hälfte in der Kopf-Hals-Region. Bei oralen Manifestationen zählen Schmerzen, Schwellung, Parästhesien und Zahnlockerungen zu den ersten klinischen Symptomen. Im vorliegenden Beitrag wird über einen 52-jährigen Patienten mit einer Fraktur im linken Kieferwinkelbereich bei bekannter HIV-Infektion berichtet. Eine primäre osteosynthetische Versorgung brachte diese nicht zur Ausheilung. Die anlässlich der Revision durchgeführte Biopsie ergab die Diagnose eines primären Lymphoms im Unterkiefer. Eine Konsolidierung der Defektfraktur trat erst nach dessen Vollremission und nachfolgender Rekonstruktion mit freiem kortikospongiösem Beckenkammtransplantat auf. Anhand dieser Kasuistik werden nach Darstellung des Krankheitsbildes die Therapieoptionen bei Unterkieferfrakturen im Rahmen einer Immundefizienz vor dem Hintergrund der verfügbaren Literatur diskutier

    Digital fragile watermarking scheme for authentication of JPEG images

    Full text link

    A novel semi-fragile forensic watermarking scheme for remote sensing images

    Get PDF
    Peer-reviewedA semi-fragile watermarking scheme for multiple band images is presented. We propose to embed a mark into remote sensing images applying a tree structured vector quantization approach to the pixel signatures, instead of processing each band separately. The signature of themmultispectral or hyperspectral image is used to embed the mark in it order to detect any significant modification of the original image. The image is segmented into threedimensional blocks and a tree structured vector quantizer is built for each block. These trees are manipulated using an iterative algorithm until the resulting block satisfies a required criterion which establishes the embedded mark. The method is shown to be able to preserve the mark under lossy compression (above a given threshold) but, at the same time, it detects possibly forged blocks and their position in the whole image.Se presenta un esquema de marcas de agua semi-frágiles para múltiples imágenes de banda. Proponemos incorporar una marca en imágenes de detección remota, aplicando un enfoque de cuantización del vector de árbol estructurado con las definiciones de píxel, en lugar de procesar cada banda por separado. La firma de la imagen hiperespectral se utiliza para insertar la marca en el mismo orden para detectar cualquier modificación significativa de la imagen original. La imagen es segmentada en bloques tridimensionales y un cuantificador de vector de estructura de árbol se construye para cada bloque. Estos árboles son manipulados utilizando un algoritmo iteractivo hasta que el bloque resultante satisface un criterio necesario que establece la marca incrustada. El método se muestra para poder preservar la marca bajo compresión con pérdida (por encima de un umbral establecido) pero, al mismo tiempo, detecta posiblemente bloques forjados y su posición en la imagen entera.Es presenta un esquema de marques d'aigua semi-fràgils per a múltiples imatges de banda. Proposem incorporar una marca en imatges de detecció remota, aplicant un enfocament de quantització del vector d'arbre estructurat amb les definicions de píxel, en lloc de processar cada banda per separat. La signatura de la imatge hiperespectral s'utilitza per inserir la marca en el mateix ordre per detectar qualsevol modificació significativa de la imatge original. La imatge és segmentada en blocs tridimensionals i un quantificador de vector d'estructura d'arbre es construeix per a cada bloc. Aquests arbres són manipulats utilitzant un algoritme iteractiu fins que el bloc resultant satisfà un criteri necessari que estableix la marca incrustada. El mètode es mostra per poder preservar la marca sota compressió amb pèrdua (per sobre d'un llindar establert) però, al mateix temps, detecta possiblement blocs forjats i la seva posició en la imatge sencera

    Dynamical Disorder and Self-Correlation in the Characterization of Nonlinear Systems. Application to Deterministic Chaos.

    Get PDF
    A new methodology to characterize nonlinear systems is described. It is based on the measurement over the time series of two quantities: the "Dynamical order" and the "Self-correlation". The averaged "Scalar" and "Perpendicular" products are introduced to measure these quantities. While this approach can be applied to general nonlinear systems, the aim of this work is to focus on the characterization and modeling of chaotic systems. In order to illustrate the method, applications to a two-dimensional chaotic system and the modeling of real telephony traffic series are presented. Three important aspects are discussed: the use of the averaged "Scalar" product as supplement of the "Lyapunov exponent", the use of the averaged "Perpendicular" product as a refinement of the "Mutual information" and the reduction of m-dimensional systems to the study of only one dimension. This new conceptual framework introduces a perspective to characterize real and theoretical processes with a unifying method, irrespective of the system classification

    Digital image watermarking: its formal model, fundamental properties and possible attacks

    Get PDF
    While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes

    Amisulpride augmentation in clozapine-unresponsive schizophrenia: A double-blind, placebo-controlled, randomised trial of clinical and cost-effectiveness.

    Get PDF
    BACKGROUND: When treatment-refractory schizophrenia shows an insufficient response to a trial of clozapine, clinicians commonly add a second antipsychotic, despite the lack of robust evidence to justify this practice. OBJECTIVES: The main objectives of the study were to establish the clinical effectiveness and cost-effectiveness of augmentation of clozapine medication with a second antipsychotic, amisulpride, for the management of treatment-resistant schizophrenia. DESIGN: The study was a multicentre, double-blind, individually randomised, placebo-controlled trial with follow-up at 12 weeks. SETTINGS: The study was set in NHS multidisciplinary teams in adult psychiatry. PARTICIPANTS: Eligible participants were people aged 18-65 years with treatment-resistant schizophrenia unresponsive, at a criterion level of persistent symptom severity and impaired social function, to an adequate trial of clozapine monotherapy. INTERVENTIONS: Interventions comprised clozapine augmentation over 12 weeks with amisulpride or placebo. Participants received 400 mg of amisulpride or two matching placebo capsules for the first 4 weeks, after which there was a clinical option to titrate the dosage of amisulpride up to 800 mg or four matching placebo capsules for the remaining 8 weeks. MAIN OUTCOME MEASURES: The primary outcome measure was the proportion of 'responders', using a criterion response threshold of a 20% reduction in total score on the Positive and Negative Syndrome Scale. RESULTS: A total of 68 participants were randomised. Compared with the participants assigned to placebo, those receiving amisulpride had a greater chance of being a responder by the 12-week follow-up (odds ratio 1.17, 95% confidence interval 0.40 to 3.42) and a greater improvement in negative symptoms, although neither finding had been present at 6-week follow-up and neither was statistically significant. Amisulpride was associated with a greater side effect burden, including cardiac side effects. Economic analyses indicated that amisulpride augmentation has the potential to be cost-effective in the short term [net saving of between £329 and £2011; no difference in quality-adjusted life-years (QALYs)] and possibly in the longer term. LIMITATIONS: The trial under-recruited and, therefore, the power of statistical analysis to detect significant differences between the active and placebo groups was limited. The economic analyses indicated high uncertainty because of the short duration and relatively small number of participants. CONCLUSIONS: The risk-benefit of amisulpride augmentation of clozapine for schizophrenia that has shown an insufficient response to a trial of clozapine monotherapy is worthy of further investigation in larger studies. The size and extent of the side effect burden identified for the amisulpride-clozapine combination may partly reflect the comprehensive assessment of side effects in this study. The design of future trials of such a treatment strategy should take into account that a clinical response may be not be evident within the 4- to 6-week follow-up period usually considered adequate in studies of antipsychotic treatment of acute psychotic episodes. Economic evaluation indicated the need for larger, longer-term studies to address uncertainty about the extent of savings because of amisulpride and impact on QALYs. The extent and nature of the side effect burden identified for the amisulpride-clozapine combination has implications for the nature and frequency of safety and tolerability monitoring of clozapine augmentation with a second antipsychotic in both clinical and research settings. TRIAL REGISTRATION: EudraCT number 2010-018963-40 and Current Controlled Trials ISRCTN68824876. FUNDING: This project was funded by the National Institute for Health Research (NIHR) Health Technology Assessment programme and will be published in full in Health Technology Assessment; Vol. 21, No. 49. See the NIHR Journals Library website for further project information
    corecore