75 research outputs found

    On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    Get PDF
    Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small probability of attack, the system fails with overwhelming probability. We then propose a novel signature scheme that allows packet-level Byzantine detection. This scheme allows one-hop containment of the contamination, and saves bandwidth by allowing nodes to detect and drop the contaminated packets. We compare the net cost of our signature scheme with various other Byzantine schemes, and show that when the probability of Byzantine attacks is high, our scheme is the most bandwidth efficient.Comment: 26 pages, 9 figures, Submitted to IEEE Journal on Selected Areas in Communications (JSAC) "Mission Critical Networking

    Groebner bases and multidimensional FIR multirate systems

    Get PDF
    The polyphase representation with respect to sampling lattices in multidimensional (M-D) multirate signal processing allows us to identify perfect reconstruction (PR) filter banks with unimodular Laurent polynomial matrices, and various problems in the design and analysis of invertible MD multirate systems can be algebraically formulated with the aid of this representation. While the resulting algebraic problems can be solved in one dimension (1-D) by the Euclidean Division Algorithm, we show that Gröbner bases offers an effective solution to them in the M-D case

    Audio watermarking for monitoring and copy protection

    Full text link
    Based on existing technology used in image and video wa-termarking, we have developed a robust audio watermark-ing technique. The embedding algorithm operates in fre-quency domain, where the magnitudes of the Fourier co-efficients are slightly modified. In the temporal domain, an additional scale parameter and gain function are neces-sary to refine the watermark and achieve perceptual trans-parency. Watermark detection relies on the Symmetrical Phase Only Matched Filtering (SPOMF) cross-correlation approach. Not only the presence of a watermark, but also its cyclic shift is detected. This shift supports a multi-bit payload for one particular watermark sequence. The water-marking technology proved to be very robust o a large num-ber of signal processing "attacks " such as MP3 (64 kb/s), all-pass filtering, echo addition, time-scale modification, re-sampling, noise addition, etc. It is expected that this ap-proach may contribute in a wide variety of existing (e.g. monitoring and copy protection) and future applications

    Title: A Security Risk for Publicly Available Watermark Detectors

    No full text
    this paper we have addressed the issue of watermark security based on the availability of a watermark detector and a single watermarked image. We extended the work started in #5# and #1# by presenting a simple attack method. A slight extension of the theory shows that the same method is applicable to all correlation based watermark methods. This implies that watermarking methods based upon thresholded correlation are not suited for applications where the detector is publicly available #DVD

    Decision Making with Side Information

    No full text
    decision, learning, risk, loss, convergence, identification, estimation We consider the problem of decision-making with side information and unbounded loss functions. Inspired by probably approximately correct learning model, we use a slightly different model that incorporates the notion of side information in a more generic form to make it applicable to a broader class of applications including parameter estimation and system identification. We address sufficient conditions for consistent decisionmaking with exponential convergence behavior. In this regard, besides a certain condition on the growth function of the class of loss functions, it suffices that the class of loss functions be dominated by a measurable function whose exponential Orlicz expectation is uniformly bounded over the probabilistic model. Decay exponent, decay constant, and sample complexity are discussed. Example applications to method of moments, maximum likelihood estimation, and system identification are illustrated, as well
    • …
    corecore