To guarantee s e curity and privacy in image transmission and archival applications, adequate e cient bulk encryption techniques are n e cessary which are able to cope with the vast amounts of image data involved. Experience has shown that block-oriented symmetric product ciphers constitute an adequate design paradigm for resolving this task, since t h e y c an o er a very high level of security as well as very high encryption rates.In this contribution we introduce a new product cipher which encrypts large blocks of plain-text images by repeated intertwined application of substitution and permutation operations. While almost all of the current product ciphers use xed prede ned permutation operations on small data blocks, our approach involves parameterizable keyed permutations on large data blocks whole images induced b y s p eci c chaotic systems Kolmogorov ows. By combining these highly unstable dynamics with an adaption of a very fast shift register based pseudo-random number generator we obtain a new class of computationally secure product ciphers which are rmly grounded on systems theoretic concepts, o ering many features that make them superior to contemporary bulk encryption systems when aiming at e cient image data encryption.
No abstract
Abstract-This paper presents an approach to probabilistic active perception planning for scene modeling in cluttered and realistic environments. When dealing with complex, multiobject scenes with arbitrary object positions, the estimation of 6D poses including their expected uncertainties is essential. The scene model keeps track of the probabilistic object hypotheses over several sequencing sensing actions to represent the real object constellation.To improve detection results and to tackle occlusion problems a method for active planning is proposed which reasons about model and state transition uncertainties in continuous and highdimensional domains. Information theoretic quality criteria are used for sequential decision making to evaluate probability distributions. The probabilistic planner is realized as a partially observable Markov decision process (POMDP).The active perception system for autonomous service robots is evaluated in experiments in a kitchen environment. In 80 test runs the efficiency and satisfactory behavior of the proposed methodology is shown in comparison to a random and a stepaside action selection strategy. The objects are selected from a large database consisting of 100 different household items.
A Brain-Computer Interface (BCI) provides a completely new output pathway that can provide an additional option for a person to express himself/herself if he/she suffers a disorder like amyotrophic lateral sclerosis (ALS), brainstem stroke, brain or spinal cord injury or other diseases which impair the function of the common output pathways which are responsible for the control of muscles. For a P300 based BCI a matrix of randomly flashing characters is presented to the participant. To spell a character the person has to attend to it and to count how many times the character flashes. Although most BCIs are designed to help people with disabilities, they are mainly tested on healthy, young subjects who may achieve better results than people with impairments. In this study we compare measurements, performed on people suffering motor impairments, such as stroke or ALS, to measurements performed on healthy people. The overall accuracy of the persons with motor impairments reached 70.1% in comparison to 91% obtained for the group of healthy subjects. When looking at single subjects, one interesting example shows that under certain circumstances, when it is difficult for a patient to concentrate on one character for a longer period of time, the accuracy is higher when fewer flashes (i.e., stimuli) are presented. Furthermore, the influence of several tuning parameters is discussed as it shows that for some participants adaptations for achieving valuable spelling results are required. Finally, exclusion criteria for people who are not able to use the device are defined.
This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how these relay attacks can be applied to the Google Wallet. Finally, it gives an overview of the components and results of a successful attempt to relay an EMV Mag-Stripe transaction between a Google Wallet device and an external card emulator over a wireless network.
Status: FinalThis work is part of the project "4EMOBILITY" within the EU programme "Regionale Wettbewerbsfähigkeit OÖ 2007-2013 (Regio 13)" funded by the European regional development fund (ERDF) and the Province of Upper Austria (Land Oberösterreich). Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack The revised version gives a more detailed analysis of the Google Wallet oncard component, adds new ideas on how to improve the attack, details further information on our test setup, and adds an analysis of Google's approach to fix the vulnerability. Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack Michael Roland
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.