The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed wireless networks often employ voting to perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus. Voting is implemented by exchanging messages with a fusion center or just between the participants. However, the communication and delay overheads of message-based voting can be prohibitive when voting is frequent. Additional overheads...
In a model-based Covert Timing Channel (CTC), the (covert) sender modulates the inter-packet delays (IPDs) of the packet stream generated by the overt application (source) by following a well-known statistical model of the application traffic. Implementing a CTC system that operates on real application traffic such as Skype requires addressing several challenges. First, packets generated by Skype...
Wireless sensor networks are very popular now a days. They affect each and every aspect of our life. Most important use of sensor node is in Defense areas. Data transfer in Defense areas are very crucial issue in Defense. Sensor nodes are ad-hoc network consists of very small devices having limited energy and capacity with fixed transmission power. Recharging cost of these sensor nodes is very high...
This paper examines a two-player, non-zero-sum, sequential detection game motivated by problems arising in the cyber-security domain. A defender agent seeks to sequentially detect the presence of an attacker agent via the drift of a stochastic process. The attacker strategically chooses the drift of the observed stochastic process, while his payoff increases in both the drift of the stochastic process...
Audio hashes are compact and robust representations of audio data and allow the efficient identification of specific recordings and their transformations. Audio hashing for music identification is well established and similar algorithms can also be used for speech data. A possible application is the identification of replayed telephone spam. This contribution investigates the security and privacy...
When outsourcing large sets of data to the cloud, it is desirable for clients to efficiently check, whether all outsourced data is still retrievable at any later point in time without requiring to download all of it. Provable data possession (PDP)/proofs of retrievability (PoR), for which various constructions exist, are concepts to solve this issue. Interestingly, by now, no PDP/PoR scheme leading...
In this paper, we approach encryption through the properties of complex logarithm and the complex plane. We introduce a mathematical concept to be used in cryptography. As an example, we propose a new crypto-system, by mixing known robust techniques such as chain-block encryption and AES-like structures together with complex exponentiation to provide robust encryption of plaintext messages. The proposed...
Higher species diversity in biological systems increases the robustness of the system against the spread of disease or infection. However, computers are remarkably less diverse. Such lack of diversity poses serious risks to the today's homogeneous computer networks. An adversary learns with the initial compromises and then applies the learned knowledge to compromise subsequent systems with less effort...
In a time when personal data circulates constantly between devices and within the cloud, biometric security systems represents one of the most viable security solutions. A relatively new biometric modality based on the individual's Electroencephalogram (EEG) is starting now to gain popularity among researchers. Its relevance relay mainly on its prospects of high security and robustness against intruders...
This paper addresses the issues of security and vulnerability of links in the stabilization of networked control systems from robustness viewpoint. As is done in recent research, we view network security as a robustness issue. However, in this paper we shed considerable new insight into this topic and offer a new and differing perspective. We argue that ‘robustness’ aspect is a common theme related...
This paper presents a novel approach for the transmission network expansion planning under generalized joint generation and transmission n-K security criteria. The proposed methodology identifies the optimal expansion plan while modeling the power system operation under both normal and contingency states. An adjustable robust optimization approach is presented to circumvent the tractability issues...
In this paper we propose a robust method to determine, allocate and price the contingency reserves required to fully comply with N-1 security criteria in real-time operations. Unlike the traditional fixed reserve requirement, the method identifies adequate reserves in terms of type, quantity and location, needed to respond to expected generation outages. The provision of energy and responsive reserves...
A large number of players such as content holders, platform service providers, and application service providers will continue to increase rapidly along with the utilization of electronic commerce such as internet shopping. Internet shopping using a point card system or virtual currency will be especially common. Therefore, many agents who manage billing issues will appear in the near future. Because...
A new algorithm is proposed for the detection and accurate localization of copy-move video forgeries. Major ingredients of the proposed algorithm are i) noise-resilient rotation-invariant features, ii) dense-field matching over the whole video by means of a suitably modified fast algorithm for approximate nearest neighbor search, iii) ad hoc fast post-processing for forgery detection and false alarm...
Due to the high robustness against various image transformations, Scale Invariant Feature Transform (SIFT) has been widely employed in many computer vision and multimedia security areas to extract image local features. Though SIFT has been extensively studied from various perspectives, its security against malicious attack has rarely been addressed. In this work, we demonstrate that the SIFT keypoints...
In today's world a lot much of the intellectual work is produced and distributed in the digital form and thus it becomes very difficult to prove the ownership claim by the legitimate owner and to stop the unauthorized use of the intellectual property. Robust watermarking provides solution to this problem. In this paper, we have categorized the popular techniques of transform domain robust image-adaptive...
Data security is always an important aspect of any data transmission system. With the advancement of internet, various security threats and challenges are also becoming more powerful. However, among the various security challenges in any transmission system, confidentiality, portability, and data losses are most important concern. Therefore, to solve these issues, we have proposed a lossless fixed...
The widespread availability of audio editing software has made it very easy to create forgeries without perceptual trace. Copy-move is one of popular audio forgeries. It is very important to identify audio recording with duplicated segments. However, copy-move detection in digital audio with sample by sample comparison is invalid due to post-processing after forgeries. In this paper we present a method...
This paper proposes a novel robust audio watermarking method based on phase coding. The quantization index modulation technique is employed for embedding watermarks into the phase spectrum of audio signals. To increase robustness of the proposed method, the region of phase spectrum that is resistant against attacks is selected for embedding. We experimentally analyzed the phase spectrum to find out...
In this paper, we address physical layer security for amplify-and-forward (AF) multi-antenna relay systems in the presence of multiple eavesdroppers. A robust joint design of cooperative beamforming (CB) and artificial noise (AN) is proposed with imperfect channel state information (CSI) of both the destination and the eavesdroppers. We aim to maximize the worst-case secrecy rate subject to the sum...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.