2,216 research outputs found

    The Flow Fingerprinting Game

    Full text link
    Linking two network flows that have the same source is essential in intrusion detection or in tracing anonymous connections. To improve the performance of this process, the flow can be modified (fingerprinted) to make it more distinguishable. However, an adversary located in the middle can modify the flow to impair the correlation by delaying the packets or introducing dummy traffic. We introduce a game-theoretic framework for this problem, that is used to derive the Nash Equilibrium. As obtaining the optimal adversary delays distribution is intractable, some approximations are done. We study the concrete example where these delays follow a truncated Gaussian distribution. We also compare the optimal strategies with other fingerprinting schemes. The results are useful for understanding the limits of flow correlation based on packet timings under an active attacker.Comment: Workshop on Information Forensics and Securit

    Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes

    Full text link
    The growing popularity of Deep Neural Networks, which often require computationally expensive training and access to a vast amount of data, calls for accurate authorship verification methods to deter unlawful dissemination of the models and identify the source of the leak. In DNN watermarking the owner may have access to the full network (white-box) or only be able to extract information from its output to queries (black-box), but a watermarked model may include both approaches in order to gather sufficient evidence to then gain access to the network. Although there has been limited research in white-box watermarking that considers traitor tracing, this problem is yet to be explored in the black-box scenario. In this paper, we propose a black-and-white-box watermarking method that opens the door to collusion-resistant traitor tracing in black-box, exploiting the properties of Tardos codes, and making it possible to identify the source of the leak before access to the model is granted. While experimental results show that the method can successfully identify traitors, even when further attacks have been performed, we also discuss its limitations and open problems for traitor tracing in black-box.Comment: This work has been submitted to the IEEE International Workshop on Information Forensics and Security (WIFS) 2023 for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    H? robust memory controllers for networked control systems: uncertain sampling rates and time delays in polytopic domains

    Get PDF
    In this paper, the problem of controller design for networked control systems with time-varying sampling rates and time delays is investigated. By using a memory at the feedback loop, a digital robust controller that minimizes an upper bound to the Hinfin performance of the closed loop system is determined. The design conditions are obtained from the Finsler\u27s Lemma combined with the Lyapunov theory and expressed in terms of bilinear matrix inequalities. Extra variables introduced by the Finsler\u27s Lemma are explored in order to provide a better system behavior. The time-varying uncertainties are modelled using polytopic domains. The controller is obtained by the solution of an optimization problem formulated only in terms of the vertices of the polytope, avoiding grids in the parametric space. Numerical examples illustrate the efficiency of the proposed approach

    BENFORD’S LAW IN IMAGE PROCESSING

    Get PDF
    We present a generalization of Benford’s law for the first significant digit. This generalization is based on keeping two terms of the Fourier expansion of the probability density function of the data in the modular logarithmic domain. We prove that images in the Discrete Cosine Transform domain closely follow this generalization. We use this property to propose an application in image steganalysis, namely, detecting that a given image carries a hidden message

    Redistributive fiscal problems in Colombia

    Get PDF
    From a general perspective, one could argue that large State transformations are reflect-ed in income, expenditure and employment. The information that the National Bureau of Statistics (Dane) have on income (tax and nontax) is accessible and more orderly than spending and employment. This difference is explained, in part because the collection of taxes is more centralized (national, municipal and departmental), and while expenditure on transfers is diversified.Tax Power, Colombia, State, Latin American, Fairness.

    Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack

    Full text link

    A Two-Stage Real-Time Path Planning: Application to the Overtaking Manuever

    Get PDF
    This paper proposes a two-stage local path planning approach to deal with all kinds of scenarios (i.e. intersections, turns, roundabouts). The first stage carries out an off-line optimization, considering vehicle kinematics and road constraints. The second stage includes all dynamic obstacles in the scene, generating a continuous path in real-time. Human-like driving style is provided by evaluating the sharpness of the road bends and the available space among them, optimizing the drivable area. The proposed approach is validated on overtaking scenarios where real-time path planning generation plays a key role. Simulation and real results on an experimental automated platform provide encouraging results, generating real-time collision-free paths while maintaining the defined smoothness criteria.INRIA and VEDECOM Institutes under the Ph.D. Grant; 10.13039/501100011688-Electronic Components and Systems for European Leadership (ECSEL) Project AutoDriv
    • …
    corecore