Fouad M.A.,National Telecommunication Institute |
International Journal of Multimedia and Ubiquitous Engineering | Year: 2015
This paper proposes a novel scheme for securing and authenticating digital data. Although, the experiments were applied to digital images, it is valid for sound, and video without any modifications of the core scheme. The developed scheme could be applied to the encoded data at the sender and the receiver sides, apart from the compression and decompression processes. The watermark information is generated automatically from the input data and hidden into the Least Significant Bits (LSBs) of specified pixels according to innovative criteria. Experimentally, the received data is authenticated if it is 100% match the sent data, exposing both geometric and signal processing attacks. The hidden watermark is completely invisible, achieving Peak Signal to Noise Ratio (PSNR) more than 67 decibels (dB) for grayscale images that vary in size and content. The developed scheme is evaluated by verifying images of the testing set before and after tampering, showing comparable performance. A comprehensive analysis for the experimental results revealed performance and efficiency of the proposed scheme is presented. An extensive review of previous work concerning image authentication approaches is presented, showing the need for robust and powerful authentication scheme. © 2015 SERSC.
Petukhov A.,University of Georgia |
2015 International Conference on Sampling Theory and Applications, SampTA 2015 | Year: 2015
We describe the Fast Greedy Sparse Subspace Clustering (FGSSC) algorithm providing an efficient method for clustering data belonging to a few low-dimensional linear or affine subspaces. FGSSC is a modification of the SSC algorithm. The main difference of our algorithm from predecessors is its ability to work with noisy data having a high rate of erasures (missed entries at the known locations) and errors (corrupted entries at unknown locations). The algorithm has significant advantage over predecessor on synthetic models as well as for the Extended Yale B dataset of facial images. In particular, the face recognition misclassification rate turned out to be 6-20 times lower than for the SSC algorithm. © 2015 IEEE.
2012 IEEE Photonics Conference, IPC 2012 | Year: 2012
The Data Center LAN has traditionally been a network contained within a single location and has not required carrier class capabilities. However the optical networking component of the Data Center LAN will become increasingly important as this LAN will be forced to grow into something between a carrier class metro network and a campus WAN due to the trend to distribute Data Centers and move them closer to the end users of the services they provide, both over the internet and over private networks. © 2012 IEEE.
SMPTE Annual Technical Conference and Exhibition 2012, SMPTE 2012 | Year: 2012
The cloud is an ideal location for media data and computationally intensive media services. Burst mode processing and granular resource availability make the cloud a highly suitable platform for hosting and processing data in delivery of media related services. Pay-as-you-go service delivery models allow new partners within an e-commerce framework (think about the App Store model). As more and more services become cloud ready and enabled, data churn for media owners is significantly reduced. Data flows quickly and at low cost between various media service providers within the cloud. The cloud media ecosystem directly addresses the challenges that the media industry faces in managing exploding data volumes and computational requirements that embracing new technologies (which staying competitive) requires. The cloud media ecosystem allows media owners to genuinely embrace agile work flows cost effectively in a manageable framework in a way not practically achievable on dedicated in-house set-ups that by their nature are more entrenched.
Rathsman A.,CTO |
Hyvonen P.,Satellite Management Services
14th International Conference on Space Operations, 2016 | Year: 2016
Nano and microsatellites, including CubeSats and even minisatellites are today mainly launched as piggyback payloads with very limited opportunities for choosing orbit or even knowing in which orbit the satellite will be placed. As the satellites and their applications get more sophisticated, the need to launch them into carefully designed orbits has arisen. There is already a queue of Cubesats looking for launch opportunities and we can expect a further increase in the future. Thus, there is a need for dedicated launchers for small satellites which regularly launch into standardized orbits. To meet these needs for access to space, SSC has initiated SmallSat Express, a launch capability for small satellites from SSC’s launching facility Esrange Space Center. Esrange is located in the very north of Sweden, above the Arctic Circle (68°N, 21°E) and has access to a vast, unpopulated recovery area. The facility has been operated since 1966 and is presently used for sounding rocket and balloon launches. It also hosts one of the world’s largest civilian satellite ground stations. Esrange already has a well-equipped infrastructure and experience of range and launch safety as well as handling large rocket motors and launching of guided rockets. The launch service is intended for 1-150 kg satellites, however, CubeSats are the target payloads. The launch periods, one to three per year, will be fixed. Today, there are no dedicated CubeSat launch vehicles that offer standardized orbits. The launch service from Esrange will enable a standardized orbit suitable for most CubeSats; sun-synchronous orbit at 500 km altitude (inclination = 97.4°) with the ascending node at 0600, 2200, and 1400 (“dawn-dusk” orbit) Local Solar Time. By using the launch service on three consecutive launches a constellation of satellites covering every local time can be established. Esrange will be a “green” launch site meaning that Hydrazine will be banned. A phase A study with the aim to investigate if a satellite launch service can be implemented at Esrange has been conducted and the outcome is that it is technically feasible. A phase A study shows that it is technically feasible. A phase B1 study, recently finalized, aimed for political endorsement, mainly in Sweden as well as obtaining data for different launch vehicle options. The evaluation of the launch vehicle options resulted in choosing the Brazilian/German VLM launcher as the base case. However, the final decision is not taken and other alternatives will be considered. The next phase, B2 will commence in 2016 and includes, amongst other things, flight safety risk assessment and design of infrastructure at Esrange. The goal is to launch the first satellite from the “green” launch site Esrange in 2020. © 2016, American Institute of Aeronautics and Astronautics Inc, AIAA. All rights reserved.
WIT Transactions on the Built Environment | Year: 2011
Water scarcity and variability are increasing worldwide. Once isolated to developing nations, water scarcity is dramatically affecting first world nations like Australia, Spain, and the United States. All nations are now recognizing that the world's water is a finite resource, and that resource is being drastically altered in both availability and quality by development, climate change and population growth. To survive in this new reality, water managers must not only increase the availability of conservation infrastructure - dual water mains, etc. - they must also increase the availability of information available to consumers. Addressing this water crisis requires a fundamental change in the planning and infrastructure deployment employed for water resources; a change from the largesse policies of the past to stewardship of the future and a commitment to engage the consumer in active conservation. © 2012 WIT Press.
Large Lithium Ion Battery Technology and Application Symposium, LLIBTA 2015 - Held at AABC 2015 | Year: 2015
Ultrathin ALD Films for Li-ion Battery Systems Improvements available for Cathode Powders (capacity retention) Anode Electrodes (capacity retention and physical stability) Separators (wetting and thermal stability) Manufacturing is scalable Uses scalable, pre-existing equipment Gas phase and efficient Robust, self-limiting process ALD NanoSolutions is an ideal development partner Broad IP protection Unmatched experience and existing clientele. © (2015) by Cambridge EnerTech.
Proceedings of the ACM Conference on Computer and Communications Security | Year: 2013
In a very short space of time consumer mobile devices have changed the way we live and work, resulting in huge amounts of sensitive data - personal and corporate - flowing through these tiny devices. As the value of data on these devices grows so do the threats they face, and the unique way the mobile industry works presents many challenges to achieving verifiable security while enabling an open ecosystem. Modern mobile devices are complex composed systems made up of multiple off-the-shelf components in hardware (SoC, GPU, memories), software (OS, drivers, applications) and firmware (boot stack). The devices have a relatively short life and are updated/replaced at a very fast pace, meaning that development, test and maintenance cycles are very short and major components frequently change from generation to generation. Achieving and maintaining whole system security in this scenario is extremely difficult. This keynote introduces some of the past and near future hardware assisted mobile security techniques and highlights some of the key areas of research needed to improve quality and confidence in the security of applications in these fast-evolving composed systems. © 2013 Author.
Information Security Technical Report | Year: 2012
Information security has become a boardroom topic, lost laptops and hacked systems make front page news across the globe, but while technology is a key piece of any corporate security strategy, it is not enough. In this paper, Dr. Bunker examines the change in emphasis for information security from being hidden in the backroom of IT to a responsibility of every employee. Security needs to be taken into account in every IT activity, but it has to match the requirements and needs of the business. Information security has given way to the more comprehensive information assurance which can be categorized into more than thirty different strategic, operational and tactical controls. This paper examines the different controls and how a maturity model can be used to prioritise improvements by concentrating on the people and the processes as well as the technology. Finally it looks at the implications of cloud computing on information assurance and on how people can be an organizations greatest security asset. © 2011 Elsevier Ltd. All rights reserved.
Institute of Navigation International Technical Meeting 2016, ITM 2016 | Year: 2016
• Driver assisted and driverless cars are here today⋯ • ⋯requiring very complex navigation systems • Much more than just GNSS • INS, mapping, radars, vision systems, realtime networks • Simulation and Test must address interaction effects in complex control loops • Traffic and road conditions, objects, weather • Wireless network latency a key factor in the control system • Fault tolerance, route changes, re-transmission, multiple hops • Time Sensitive Networks.