311 |
Digital Video Watermarking Robust to Geometric Attacks and CompressionsLiu, Yan January 2011 (has links)
This thesis focuses on video watermarking robust against geometric attacks and
video compressions. In addition to the requirements for an image watermarking algorithm,
a digital video watermarking algorithm has to be robust against advanced
video compressions, frame loss, frame swapping, aspect ratio change, frame rate change,
intra- and inter-frame filtering, etc. Video compression, especially, the most efficient
compression standard, H.264, and geometric attacks, such as rotation and cropping,
frame aspect ratio change, and translation, are considered the most challenging attacks
for video watermarking algorithms.
In this thesis, we first review typical watermarking algorithms robust against geometric
attacks and video compressions, and point out their advantages and disadvantages.
Then, we propose our robust video watermarking algorithms against Rotation,
Scaling and Translation (RST) attacks and MPEG-2 compression based on the logpolar
mapping and the phase-only filtering method. Rotation or scaling transformation
in the spatial domain results in vertical or horizontal shift in the log-polar mapping
(LPM) of the magnitude of the Fourier spectrum of the target frame. Translation has
no effect in this domain. This method is very robust to RST attacks and MPEG-2
compression. We also demonstrate that this method can be used as a RST parameters
detector to work with other watermarking algorithms to improve their robustness to
RST attacks.
Furthermore, we propose a new video watermarking algorithm based on the 1D
DFT (one-dimensional Discrete Fourier Transform) and 1D projection. This algorithm
enhances the robustness to video compression and is able to resist the most advanced video compression, H.264. The 1D DFT for a video sequence along the temporal domain
generates an ideal domain, in which the spatial information is still kept and the
temporal information is obtained. With detailed analysis and calculation, we choose
the frames with highest temporal frequencies to embed the fence-shaped watermark
pattern in the Radon transform domain of the selected frames. The performance of the
proposed algorithm is evaluated by video compression standards MPEG-2 and H.264;
geometric attacks such as rotation, translation, and aspect-ratio changes; and other
video processing. The most important advantages of this video watermarking algorithm
are its simplicity, practicality and robustness.
|
312 |
Measuring the Impact of email Headers on the Predictive Accuracy of Machine Learning TechniquesTout, Hicham Refaat 01 January 2013 (has links)
The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning algorithms to detect phishing attack did increase the predictive accuracy of these learning algorithms. The same research also recommended further investigation of the impact of including an expanded set of email headers on the predictive accuracy of machine learning algorithms.
In addition, research has shown that the cost of misclassifying legitimate emails as phishing attacks--false positives--was far higher than that of misclassifying phishing emails as legitimate--false negatives, while the opposite was true in the case of fraud detection. Consequently, they recommended that cost sensitive measures be taken in order to further improve the weighted predictive accuracy of machine learning algorithms.
Motivated by the potentially high impact of the inclusion of email headers on the predictive accuracy of machines learning algorithms and the significance of enabling cost-sensitive measures as part of the learning process, the goal of this research was to quantify the impact of including an extended set of email headers and to investigate the impact of imposing penalty as part of the learning process on the number of false positives. It was believed that if email headers were included and cost-sensitive measures were taken as part of the learning process, than the overall weighted, predictive accuracy of the machine learning algorithm would be improved. The results showed that adding email headers as features did improve the overall predictive accuracy of machine learning algorithms and that cost-sensitive measure taken as part of the learning process did result in lower false positives.
|
313 |
A framework for evaluating countermeasures against sybil attacks in wireless sensor networksGovender, Servapalan 12 July 2011 (has links)
Although Wireless Sensor Networks (WSNs) have found a niche in numerous applications, they are constrained by numerous factors. One of these important factors is security in WSNs. There are various types of security attacks that WSNs are susceptible to. The focus of this study is centred on Sybil attacks, a denial of service attack. In this type of attack, rogue nodes impersonate valid nodes by falsely claiming to possess authentic identities, thereby rendering numerous core WSN operations ineffective. The diverse nature of existing solutions poses a difficult problem for system engineers wanting to employ a best fit countermeasure. This problem is the largely unanswered question posed to all system engineers and developers alike whose goal is to design/develop a secure WSN. Resolving this dilemma proves to be quite a fascinating task, since there are numerous factors to consider and more especially one cannot assume that every application is affected by all identified factors. A framework methodology presented in this study addresses the abovementioned challenges by evaluating countermeasure effectiveness based on theoretical and practical security factors. Furthermore, a process is outlined to determine the application’s engineering requirements and the framework also suggests what security components the system engineer ought to incorporate into the application, depending on the application’s risk profile. The framework then numerically aligns these considerations, ensuring an accurate and fairly unbiased best fit countermeasure selection. Although the framework concentrates on Sybil countermeasures, the methodology can be applied to other classes of countermeasures since it answers the question of how to objectively study and compare security mechanisms that are both diverse and intended for different application environments. The report documents the design and development of a comparative framework that can be used to evaluate countermeasures against Sybil attacks in wireless sensor networks based on various criteria that will be discussed in detail. This report looks briefly at the aims and description of the research. Following this, a literature survey on the body of knowledge concerning WSN security and a discussion on the proposed methodology of a specific design approach are given. Assumptions and a short list of factors that were considered are then described. Metrics, the taxonomy for WSN countermeasures, the framework and a formal model are developed. Risk analysis and the best fit methodology are also discussed. Finally, the results and recommendations are shown for the research, after which the document is concluded. / Dissertation (MEng)--University of Pretoria, 2011. / Electrical, Electronic and Computer Engineering / unrestricted
|
314 |
Nonclinical panic: A useful analogue for panic disorder?Hamilton, Gia Renee 01 January 2002 (has links)
The objective of this study is to see if nonclinical panickers with unexpected panic attacks (NCPs-U) may be a more useful panic disorder (PD) analogue than nonclinical panickers with expected panic attacks (NCPs-E).
|
315 |
Applications of Tropical Geometry in Deep Neural NetworksAlfarra, Motasem 04 1900 (has links)
This thesis tackles the problem of understanding deep neural network with piece- wise linear activation functions. We leverage tropical geometry, a relatively new field in algebraic geometry to characterize the decision boundaries of a single hidden layer neural network. This characterization is leveraged to understand, and reformulate three interesting applications related to deep neural network. First, we give a geo- metrical demonstration of the behaviour of the lottery ticket hypothesis. Moreover, we deploy the geometrical characterization of the decision boundaries to reformulate the network pruning problem. This new formulation aims to prune network pa- rameters that are not contributing to the geometrical representation of the decision boundaries. In addition, we propose a dual view of adversarial attack that tackles both designing perturbations to the input image, and the equivalent perturbation to the decision boundaries.
|
316 |
Umass September 11 InterventionFarzinmoghadam, Mohamad 07 November 2016 (has links)
September 11 terrorist attacks not only affect the United States but also the entire international community. Hundreds perished; most of them innocent citizens from over ninety different nations. It has changed the history of America, much like Japan’s strike against Pearl Harbor. The 9/11 attacks triggered the United States’ ongoing war against terrorism, starting with Afghanistan as the first target to overthrow Taliban, changing the course of world history.
The significance of the incident and severity of that traumatic loss makes a case for a memorial on the UMass campus in tribute to those victims. It is worth mentioning that a UMass community member (computer research specialist) lost his life in that event. The intention of this design is to pay a well-deserved tribute to the victims of the September 11 tragedy, together with providing information about the whole story. The statistics of the event have a visceral interpretation. All different aspects and numbers are incorporated into the design: number of the flights, number of the people killed, nationality of the victims, each have their specific place in the design pattern.
|
317 |
Offensive Cyber Operations: An Examination of Their Revolutionary CapabilitiesWardle, Madelyn 28 May 2021 (has links)
No description available.
|
318 |
Metody klasifikace síťového provozu / Methods for Network Traffic ClassificationJacko, Michal January 2017 (has links)
This paper deals with a problem of detection of network traffic anomaly and classification of network flows. Based on existing methods, paper describes proposal and implementaion of a tool, which can automatically classify network flows. The tool uses CUDA platform for network data processing and computation of network flow metrics using graphics processing unit. Processed flows are subsequently classified by proposed methods for network anomaly detection.
|
319 |
Pokročilé metody zabezpečení sítě proti útokům / Advanced network security methods against attacksKusy, Filip January 2018 (has links)
This student work focuses on security against network attacks. It focus on network attacks and ways to prevent them. Subsequently, it deals with the Snort variant of the IPS/IDS system. It deal with the connection between Mikrotik and the Snort Linux server
|
320 |
Pobočková VoIP ústředna Asterisk a její nástavby / Asterisk VoIP private branch exchange and its distributionsMelichar, Ondřej January 2018 (has links)
This master’s thesis delves into the possibilities of the open-source Private Branch Exchange Asterisk, elaborates on its features and compares it with several other distros. The term SIP stack is explained here with the mention of two of its representatives. Further in the thesis, the security risks of the VoIP technology are explained, and specific attacks are described and then realized. As a part of the testing process, the possibilities of a custom module and its following implementation are explored, as well as the portability between the individual distros and its proper functioning.
|
Page generated in 0.0385 seconds