When Computer Security Crashes into Multimedia
نویسنده
چکیده
A casual glance on the web, or in your local newspaper, will quickly convince a reader that the two of the hottest fields in computer science right now are computer security and multimedia. Unfortunately, these fields often seem at odds with each other. This talk will take two case studies and show how the fields cause problems for each other. First, I discuss how multimedia can cause problems for computer security. I show how we are able to take recordings of a user typing at a keyboard and using only a generic $10 microphone and an assumption that the user is typing English, we can from the recording alone determine the text being typed with 96% accuracy. In fact, after training this system on English text, we can accurately recover passwords typed by the user. (This is joint work with L. Zhuang and F. Zhou [1].) Second, I discuss how security can cause problems for multimedia. Taking the example of filtering for copyright protected content, I discuss a variety of proposed schemes for restricting distribution of audio files. I conclude with an overview of other research areas where the fields computer security and multimedia jointly have significant contributions to make.
منابع مشابه
A Fuzzy Based Approach for Rate Control in Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) undergo congestion when a link (or a node) becomes overpopulated in terms of incoming packets. In WMSNs this happens especially in upstream nodes where all incoming packets meet and directed to the sink node. Congestion in networks, if not handled properly, might lead to congestion collapse which deteriorates the quality of service (QoS). Therefore, i...
متن کاملScheduling security-critical multimedia applications in heterogeneous networks
Security is becoming an increasingly important issue in the design of multimedia applications, which are widely used in the industry and academic organizations. However, existing scheduling schemes for realtime multimedia service in heterogeneous networks generally do not take into account security requirements when making allocation and control decisions. In this paper, we develop and evaluate...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملAn Application to Secure Multimedia Data in Cloud Environment using Paillier Cryptography
The Cloud is an internet-based computing where shared resources, software and information are provided to the computer. Now a days it is one of the prominent technologies to provide wide variety of services. In this condition data can be categorized into sensitive and insensitive. Among these two types sensitive data requires security. The existing system does not provide any security concerns ...
متن کاملISAMSA:Scheduling Security for Multimedia Applications in Heterogeneous Networks
When scheduling security is very important issue in the design of multimedia applications since these applications are most widely used in industry and academic organizations. Security requirements are not taken into consideration in existing scheduling schemes when making allocation and control decisions for real time multimedia service in heterogeneous networks. In this paper, we propose an i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005