110 research outputs found

    Secure covert communications over streaming media using dynamic steganography

    Get PDF
    Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms

    Ai-Empowered Inclusive Strategies for Fishing Villages

    Get PDF
    With the development of the economy and society, the continuous development and application of artificial intelligence have gradually become an important factor and driving force to promote the transformation and upgrading of all walks of life. Promoting artificial intelligence has inevitably become the best way to empower the governance and services of fishing village communities, which is also the general trend of future development. Artificial intelligence, as an organized force, plays an important role in community governance, but at present, the potential of artificial intelligence to empower community governance in fishing villages has not been fully tapped. Through literature survey, literature review and comparative analysis, this paper investigates and studies the current situation of community governance in artificial intelligence-empowered fishing villages, finds and raises some related problems. Then the survey found the significant role of artificial intelligence on community governance in fishing villages. Finally, according to the current situation of AI-empowered fishing village community governance, some constructive suggestions are put forward about AI-empowered inclusive strategies for fishing villages

    Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking

    Get PDF
    With an explosive growth in the deployment of networked applications over the Internet, searching the encrypted information that the user needs becomes increasingly important. However, the information search precision is quite low when using Vector space model for mass information retrieval, because long documents having poor similarity values are poorly represented in the vector space model and the order in which the terms appear in the document is lost in the vector space representation with intuitive weighting. To address the problems, this study proposed an N-level vector model (NVM)-based relevancy ranking scheme with an introduction of a new formula of the term weighting, taking into account the location of the feature term in the document to describe the content of the document properly, investigated into ways of ranking the encrypted documents using the proposed scheme, and conducted realistic simulation of information retrieval of mass encrypted data over multimedia networking. Results indicated that the timing of the index building, the most costing part of the relevancy ranking scheme, increased with the increase in both the document size and the multimedia content of the document being searched, which is in agreement with the expected. Performance evaluation demonstrated that our specially designed NVM-based encrypted information retrieval system is effective in ranking the encrypted documents transmitted over multimedia networks with large recall ratio and great retrieval precision

    Covert communication over VoIP streaming media with dynamic key distribution and authentication

    Get PDF
    Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. VoIP streams can be used as innocuous cover objects to hide the secret data in steganographic systems. The security offered by VoIP signaling protocols is likely to be compromised due to a sharp increase in computing power. This article describes a theoretical and experimental investigation of covert steganographic communications over VoIP streaming media. A new information-theoretical model of secure covert VoIP communications was constructed to depict the security scenarios in steganographic systems against the passive attacks. A one-way accumulation-based steganographic algorithm was devised to integrate dynamic key updating and exchange with data embedding and extraction, so as to protect steganographic systems from adversary attacks. The theoretical analysis of steganographic security using information theory proves that the proposed model for covert VoIP communications is secure against a passive adversary. The effectiveness of the steganographic algorithm for covert VoIP communications was examined by means of performance and robustness measurements. The results reveal that the algorithm has no or little impact on real-time VoIP communications in terms of imperceptibility, speech quality, and signal distortion, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates

    Viia-hand: a Reach-and-grasp Restoration System Integrating Voice interaction, Computer vision and Auditory feedback for Blind Amputees

    Full text link
    Visual feedback plays a crucial role in the process of amputation patients completing grasping in the field of prosthesis control. However, for blind and visually impaired (BVI) amputees, the loss of both visual and grasping abilities makes the "easy" reach-and-grasp task a feasible challenge. In this paper, we propose a novel multi-sensory prosthesis system helping BVI amputees with sensing, navigation and grasp operations. It combines modules of voice interaction, environmental perception, grasp guidance, collaborative control, and auditory/tactile feedback. In particular, the voice interaction module receives user instructions and invokes other functional modules according to the instructions. The environmental perception and grasp guidance module obtains environmental information through computer vision, and feedbacks the information to the user through auditory feedback modules (voice prompts and spatial sound sources) and tactile feedback modules (vibration stimulation). The prosthesis collaborative control module obtains the context information of the grasp guidance process and completes the collaborative control of grasp gestures and wrist angles of prosthesis in conjunction with the user's control intention in order to achieve stable grasp of various objects. This paper details a prototyping design (named viia-hand) and presents its preliminary experimental verification on healthy subjects completing specific reach-and-grasp tasks. Our results showed that, with the help of our new design, the subjects were able to achieve a precise reach and reliable grasp of the target objects in a relatively cluttered environment. Additionally, the system is extremely user-friendly, as users can quickly adapt to it with minimal training

    Fast Fourier Transform-based steganalysis of covert communications over streaming media

    Get PDF
    Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a new steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. Results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media

    An efficient approximation method for calculating confidence level of negative survey

    Get PDF
    The confidence level of negative survey is one of the key scientific problems. Present work uses generation function to analyse the confidence level, and uses a greedy algorithm to calculate that, which is used to evaluate the dependable level of negative survey. However, the present method is low efficiency and complex. This study focuses on an efficient approximation method for calculating the confidence level of negative survey. This approximation method based on central limit theorem and Bayesian method can get the results efficiently

    Spontaneous rotational symmetry breaking in KTaO3_3 interface superconductors

    Full text link
    Strongly correlated electrons could display intriguing spontaneous broken symmetries in the ground state. Understanding these symmetry breaking states is fundamental to elucidate the various exotic quantum phases in condensed matter physics. Here, we report an experimental observation of spontaneous rotational symmetry breaking of the superconductivity at the interface of YAlO3_3/KTaO3_3 (111) with a superconducting transition temperature of 1.86 K. Both the magnetoresistance and upper critical field in an in-plane field manifest striking twofold symmetric oscillations deep inside the superconducting state, whereas the anisotropy vanishes in the normal state, demonstrating that it is an intrinsic property of the superconducting phase. We attribute this behavior to the mixed-parity superconducting state, which is an admixture of ss-wave and pp-wave pairing components induced by strong spin-orbit coupling. Our work demonstrates an unconventional nature of the pairing interaction in the KTaO3_3 interface superconductor, and provides a new platform to clarify a delicate interplay of electron correlation and spin-orbit coupling.Comment: 7 pages, 4 figure

    Proximity effect induced intriguing superconductivity in van der Waals heterostructure of magnetic topological insulator and conventional superconductor

    Full text link
    Nontrivial topological superconductivity has received enormous research attentions due to its potential for diverse applications in topological quantum computing. The intrinsic issue concerning the correlation between a topological insulator and a superconductor is, however, still widely open. Here, we systemically report an emergent superconductivity in a cross-junction composed of a magnetic topological insulator MnBi2Te4 and a conventional superconductor NbSe2. Remarkably, the interface indicates existence of a reduced superconductivity at surface of NbSe2 and a proximity-effectinduced superconductivity at surface of MnBi2Te4. Furthermore, the in-plane angular-dependent magnetoresistance measurements reveal the fingerprints of the paring symmetry behaviors for these superconducting gaps as a unconventional nature. Our findings extend our views and ideas of topological superconductivity in the superconducting heterostructures with time-reversal symmetry breaking, offering an exciting opportunity to elucidate the cooperative effects on the surface state of a topological insulator aligning a superconductor.Comment: 6 pages, 4 figure
    • …
    corecore