110 research outputs found
Secure covert communications over streaming media using dynamic steganography
Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out.
A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance.
The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process.
A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel.
The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms
Ai-Empowered Inclusive Strategies for Fishing Villages
With the development of the economy and society, the continuous development and application of artificial intelligence have gradually become an important factor and driving force to promote the transformation and upgrading of all walks of life. Promoting artificial intelligence has inevitably become the best way to empower the governance and services of fishing village communities, which is also the general trend of future development. Artificial intelligence, as an organized force, plays an important role in community governance, but at present, the potential of artificial intelligence to empower community governance in fishing villages has not been fully tapped. Through literature survey, literature review and comparative analysis, this paper investigates and studies the current situation of community governance in artificial intelligence-empowered fishing villages, finds and raises some related problems. Then the survey found the significant role of artificial intelligence on community governance in fishing villages. Finally, according to the current situation of AI-empowered fishing village community governance, some constructive suggestions are put forward about AI-empowered inclusive strategies for fishing villages
Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking
With an explosive growth in the deployment of networked applications over the Internet, searching the encrypted information that the user needs becomes increasingly important. However, the information search precision is quite low when using Vector space model for mass information retrieval, because long documents having poor similarity values are poorly represented in the vector space model and the order in which the terms appear in the document is lost in the vector space representation with intuitive weighting. To address the problems, this study proposed an N-level vector model (NVM)-based relevancy ranking scheme with an introduction of a new formula of the term weighting, taking into account the location of the feature term in the document to describe the content of the document properly, investigated into ways of ranking the encrypted documents using the proposed scheme, and conducted realistic simulation of information retrieval of mass encrypted data over multimedia networking. Results indicated that the timing of the index building, the most costing part of the relevancy ranking scheme, increased with the increase in both the document size and the multimedia content of the document being searched, which is in agreement with the expected. Performance evaluation demonstrated that our specially designed NVM-based encrypted information retrieval system is effective in ranking the encrypted documents transmitted over multimedia networks with large recall ratio and great retrieval precision
Covert communication over VoIP streaming media with dynamic key distribution and authentication
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. VoIP streams can be used as innocuous cover objects to hide the secret data in steganographic systems. The security offered by VoIP signaling protocols is likely to be compromised due to a sharp increase in computing power. This article describes a theoretical and experimental investigation of covert steganographic communications over VoIP streaming media. A new information-theoretical model of secure covert VoIP communications was constructed to depict the security scenarios in steganographic systems against the passive attacks. A one-way accumulation-based steganographic algorithm was devised to integrate dynamic key updating and exchange with data embedding and extraction, so as to protect steganographic systems from adversary attacks. The theoretical analysis of steganographic security using information theory proves that the proposed model for covert VoIP communications is secure against a passive adversary. The effectiveness of the steganographic algorithm for covert VoIP communications was examined by means of performance and robustness measurements. The results reveal that the algorithm has no or little impact on real-time VoIP communications in terms of imperceptibility, speech quality, and signal distortion, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates
Viia-hand: a Reach-and-grasp Restoration System Integrating Voice interaction, Computer vision and Auditory feedback for Blind Amputees
Visual feedback plays a crucial role in the process of amputation patients
completing grasping in the field of prosthesis control. However, for blind and
visually impaired (BVI) amputees, the loss of both visual and grasping
abilities makes the "easy" reach-and-grasp task a feasible challenge. In this
paper, we propose a novel multi-sensory prosthesis system helping BVI amputees
with sensing, navigation and grasp operations. It combines modules of voice
interaction, environmental perception, grasp guidance, collaborative control,
and auditory/tactile feedback. In particular, the voice interaction module
receives user instructions and invokes other functional modules according to
the instructions. The environmental perception and grasp guidance module
obtains environmental information through computer vision, and feedbacks the
information to the user through auditory feedback modules (voice prompts and
spatial sound sources) and tactile feedback modules (vibration stimulation).
The prosthesis collaborative control module obtains the context information of
the grasp guidance process and completes the collaborative control of grasp
gestures and wrist angles of prosthesis in conjunction with the user's control
intention in order to achieve stable grasp of various objects. This paper
details a prototyping design (named viia-hand) and presents its preliminary
experimental verification on healthy subjects completing specific
reach-and-grasp tasks. Our results showed that, with the help of our new
design, the subjects were able to achieve a precise reach and reliable grasp of
the target objects in a relatively cluttered environment. Additionally, the
system is extremely user-friendly, as users can quickly adapt to it with
minimal training
Fast Fourier Transform-based steganalysis of covert communications over streaming media
Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a new steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. Results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media
An efficient approximation method for calculating confidence level of negative survey
The confidence level of negative survey is one of the key scientific problems. Present work uses generation function to analyse the confidence level, and uses a greedy algorithm to calculate that, which is used to evaluate the dependable level of negative survey. However, the present method is low efficiency and complex. This study focuses on an efficient approximation method for calculating the confidence level of negative survey. This approximation method based on central limit theorem and Bayesian method can get the results efficiently
Spontaneous rotational symmetry breaking in KTaO interface superconductors
Strongly correlated electrons could display intriguing spontaneous broken
symmetries in the ground state. Understanding these symmetry breaking states is
fundamental to elucidate the various exotic quantum phases in condensed matter
physics. Here, we report an experimental observation of spontaneous rotational
symmetry breaking of the superconductivity at the interface of
YAlO/KTaO (111) with a superconducting transition temperature of 1.86
K. Both the magnetoresistance and upper critical field in an in-plane field
manifest striking twofold symmetric oscillations deep inside the
superconducting state, whereas the anisotropy vanishes in the normal state,
demonstrating that it is an intrinsic property of the superconducting phase. We
attribute this behavior to the mixed-parity superconducting state, which is an
admixture of -wave and -wave pairing components induced by strong
spin-orbit coupling. Our work demonstrates an unconventional nature of the
pairing interaction in the KTaO interface superconductor, and provides a
new platform to clarify a delicate interplay of electron correlation and
spin-orbit coupling.Comment: 7 pages, 4 figure
Proximity effect induced intriguing superconductivity in van der Waals heterostructure of magnetic topological insulator and conventional superconductor
Nontrivial topological superconductivity has received enormous research
attentions due to its potential for diverse applications in topological quantum
computing. The intrinsic issue concerning the correlation between a topological
insulator and a superconductor is, however, still widely open. Here, we
systemically report an emergent superconductivity in a cross-junction composed
of a magnetic topological insulator MnBi2Te4 and a conventional superconductor
NbSe2. Remarkably, the interface indicates existence of a reduced
superconductivity at surface of NbSe2 and a proximity-effectinduced
superconductivity at surface of MnBi2Te4. Furthermore, the in-plane
angular-dependent magnetoresistance measurements reveal the fingerprints of the
paring symmetry behaviors for these superconducting gaps as a unconventional
nature. Our findings extend our views and ideas of topological
superconductivity in the superconducting heterostructures with time-reversal
symmetry breaking, offering an exciting opportunity to elucidate the
cooperative effects on the surface state of a topological insulator aligning a
superconductor.Comment: 6 pages, 4 figure
- …