Quantcast


CURATOR
A pinboard by
Yushu Zhang

Alfred Deakin Postdoctoral Research Fellow, Deakin University

PINBOARD SUMMARY

In the era of big data, we are now witnessing an explosion of data generated through social media, messaging, emails and more. To cope with Exabyte of such ever-increasing data volume in terms of storage, communication and computation, technological service providers now usually resort to cloud computing for storage and service hosting, as it can provide economical and on-demand usage of abundant storage and computation resources. Despite the well-known prominent benefits, hosting data in the cloud deprives the data owner’s direct control and undesirably raises security concerns. In fact, data disclosure frequently occurs in real-world cloud storage services. Although the full details of the investigation have not been released, as it is still ongoing, it’s likely that this governmental data breach is one of the largest in recent history. Many researchers have suggested using cryptographic techniques to guarantee the security of the remotely stored data. However, for media data type, the threat is not merely about data confidentiality but also the fact that authorized users may become traitors and thus illegally rebroadcast the entire decrypted original content. Such a threat is amplified due to monetary profits or business conflict in real applications. However, redistributing pirated music copies to the public undoubtedly harms the corresponding creator’s profit and hinders the wide adoption of media cloud technology. The traditional wisdom for media copyright protection is to leverage digital watermarking, which refers to a set of technical tools to deter (but not preclude) such risk by implementing a tracing ability to identify copyright violations. We aim to bridge the gap of cryptography and digital watermarking to alleviate security vulnerabilities of cloud computing. We design new techniques for privacy-preserving and copyright-protected media sharing services with public cloud computing resources.

3 ITEMS PINNED

A bio-signal based framework to secure mobile devices

Abstract: Nowadays, mobile devices are often equipped with high-end processing units and large storage space. Mobile users usually store personal, official, and large amount of multimedia data. Security of such devices are mainly dependent on PIN (personal identification number), password, bio-metric data, or gestures/patterns. However, these mechanisms have a lot of security vulnerabilities and prone to various types of attacks such as shoulder surfing. The uniqueness of Electroencephalography (EEG) signal can be exploited to remove some of the drawbacks of the existing systems. Such signals can be recorded and transmitted through wireless medium for processing. In this paper, we propose a new framework to secure mobile devices using EEG signals along with existing pattern-based authentication. The pattern based authentication passwords are considered as identification tokens. We have investigated the use of EEG signals recorded during pattern drawing over the screen of the mobile device in the authentication phase. To accomplish this, we have collected EEG signals of 50 users while drawing different patterns. The robustness of the system has been evaluated against 2400 unauthorized attempts made by 30 unauthorized users who have tried to gain access of the device using known patterns of 20 genuine users. EEG signals are modeled using Hidden Markov Model (HMM), and using a binary classifier implemented with Support Vector Machine (SVM) to verify the authenticity of a test pattern. Verification performances are measured using three popular security matrices, namely Detection Error Trade-off (DET), Half Total Error Rate (HTER), and Receiver Operating Characteristic (ROC) curves. Our experiments revel that, the method is promising and can be a possible alternative to develop robust authentication protocols for hand-held devices.

Pub.: 22 Feb '17, Pinned: 21 Aug '17

Information hiding in edges: A high capacity information hiding technique using hybrid edge detection

Abstract: Abstract The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.AbstractThe multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.

Pub.: 19 Dec '16, Pinned: 21 Aug '17