Computational sensor fingerprints

P Korus, N Memon - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Analysis of imaging sensors is one of the most reliable photo forensic techniques, but it is
increasingly challenged by complex image processing in modern cameras. The underlying …

[HTML][HTML] An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in …

AJ Patil, R Shelke - High-Confidence Computing, 2023 - Elsevier
Watermarking is the advanced technology utilized to secure digital data by integrating
ownership or copyright protection. Most of the traditional extracting processes in audio …

When AI Eats Itself: On the Caveats of Data Pollution in the Era of Generative AI

X Xing, F Shi, J Huang, Y Wu, Y Nan, S Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Generative artificial intelligence (AI) technologies and large models are producing realistic
outputs across various domains, such as images, text, speech, and music. Creating these …

[HTML][HTML] A Security Information Transmission Method Based on DHR for Seafloor Observation Network

F Ying, S Zhao, J Wang - Sensors, 2024 - mdpi.com
A seafloor observation network (SON) consists of a large number of heterogeneous devices
that monitor the deep sea and communicate with onshore data centers. Due to the long …

Colonel blotto game for secure state estimation in interdependent critical infrastructure

A Ferdowsi, W Saad, NB Mandayam - arXiv preprint arXiv:1709.09768, 2017 - arxiv.org
Securing the physical components of a city's interdependent critical infrastructure (ICI) such
as power, natural gas, and water systems is a challenging task due to their interdependence …

A software/hardware secure watermarking scheme for Internet of Things applications

R Dalbouchi, A Zitouni - Multimedia Tools and Applications, 2023 - Springer
The security of applications that run over limited resources such as the Internet of Things
becomes a new challenge for researchers. Digital watermarking (WM) is among the …

AI-assisted authentication: state of the art, taxonomy and future roadmap

G Zhu, Y Al-Qaraghuli - arXiv preprint arXiv:2204.12492, 2022 - arxiv.org
Artificial Intelligence (AI) has found its applications in a variety of environments ranging from
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …

[PDF][PDF] Deep Learning and Industrial Internet Security: Applications and Challenges [J]

Y Chen, M Ruicheng, W Yushi, Z Yanlong… - China Engineering …, 2021 - researchgate.net
Industrial Internet security is crucial for strengthening the manufacturing and network sectors
of China. Deep learning, owing to its strong expression ability, good adaptability, and high …

IoT and machine learning-a technological combination for smart application

J Arora - Proceedings of the 4th International Conference …, 2020 - papers.ssrn.com
With the rapid developments in hardware, software and communication technologies, a new
era of internet connected sensory devices has begun which provides a link between …

[PDF][PDF] A Comprehensive Review of Fault Tolerant and Resilient Cyber-Secure strategies for Critical Infrastructure Protection

A Mohammed, F Muddeen, CJ Ramlal… - The Industrial …, 2022 - researchgate.net
This paper reviews current methods being used to maintain resilient cyber-secure and fault
tolerant critical infrastructure (CI). Two main categories have been presented from a control …