Covert Channel Cyber-Attack over Video Stream DCT Payload

Author(s):  
Yoram Segal ◽  
Ofer Hadar
2018 ◽  
Vol 14 (5) ◽  
pp. 155014771877956 ◽  
Author(s):  
Yu-an Tan ◽  
Xinting Xu ◽  
Chen Liang ◽  
Xiaosong Zhang ◽  
Quanxin Zhang ◽  
...  

Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality of service for Internet protocol–based services such as audio, video, and multimedia messaging. The research of covert timing channels aims at transmitting covert message stealthily to the receiver using variations of timing behavior. Existing approaches mainly modulate the covert message into inter-packet delays of overt traffic, which are not suitable for Voice over Long-Term Evolution, since most of the inter-packet delays of Voice over Long-Term Evolution traffic are of regular distribution, and any modification on inter-packet delays is easy to be detected. To address the issue, in this work, we propose a novel covert timing channel for the video stream in Voice over Long-Term Evolution, which modulates the covert message by deliberately dropping out video packets. Based on the two-dimensional mapping matrix, the blocks of covert message are mapped into dropout-packet sequence numbers. To recover the covert message, the receiver retrieves the sequence numbers of lost packets and identifies them to be translated into blocks of the covert message. To evaluate our scheme, the simulations with different packet loss rates are conducted to validate the undetectability, throughput, and robustness, finally, the results show that this scheme is effective and reliable.


2020 ◽  
Vol 39 (6) ◽  
pp. 8463-8475
Author(s):  
Palanivel Srinivasan ◽  
Manivannan Doraipandian

Rare event detections are performed using spatial domain and frequency domain-based procedures. Omnipresent surveillance camera footages are increasing exponentially due course the time. Monitoring all the events manually is an insignificant and more time-consuming process. Therefore, an automated rare event detection contrivance is required to make this process manageable. In this work, a Context-Free Grammar (CFG) is developed for detecting rare events from a video stream and Artificial Neural Network (ANN) is used to train CFG. A set of dedicated algorithms are used to perform frame split process, edge detection, background subtraction and convert the processed data into CFG. The developed CFG is converted into nodes and edges to form a graph. The graph is given to the input layer of an ANN to classify normal and rare event classes. Graph derived from CFG using input video stream is used to train ANN Further the performance of developed Artificial Neural Network Based Context-Free Grammar – Rare Event Detection (ACFG-RED) is compared with other existing techniques and performance metrics such as accuracy, precision, sensitivity, recall, average processing time and average processing power are used for performance estimation and analyzed. Better performance metrics values have been observed for the ANN-CFG model compared with other techniques. The developed model will provide a better solution in detecting rare events using video streams.


2019 ◽  
pp. 73-81
Author(s):  
Oleh Poshedin

The purpose of the article is to describe the changes NATO undergoing in response to the challenges of our time. Today NATO, as a key element of European and Euro-Atlantic security, is adapting to changes in the modern security environment by increasing its readiness and ability to respond to any threat. Adaptation measures include the components required to ensure that the Alliance can fully address the security challenges it might face. Responsiveness NATO Response Force enhanced by developing force packages that are able to move rapidly and respond to potential challenges and threats. As part of it, was established a Very High Readiness Joint Task Force, a new Allied joint force that deploy within a few days to respond to challenges that arise, particularly at the periphery of NATO’s territory. NATO emphasizes, that cyber defence is part of NATO’s core task of collective defence. A decision as to when a cyber attack would lead to the invocation of Article 5 would be taken by the North Atlantic Council on a case-by-case basis. Cooperation with NATO already contributes to the implementation of national security and defense in state policy. At the same time, taking into account that all decision-making in NATO based on consensus, Ukraine’s membership in the Alliance quite vague perspective. In such circumstances, in Ukraine you often can hear the idea of announcement of a neutral status. It is worth reminding that non-aligned status did not save Ukraine from Russian aggression. Neutral status will not accomplish it either. All talks about neutrality and the impossibility of Ukraine joining NATO are nothing but manipulations, as well as recognition of the Ukrainian territory as Russian Federation area of influence (this country seeks to sabotage the Euro-Atlantic movement of Ukraine). Think about it, Moldova’s Neutrality is enshrined in the country’s Constitution since 1994. However, this did not help Moldova to restore its territorial integrity and to force Russia to withdraw its troops and armaments from Transnistria.


2012 ◽  
Vol 132 (6) ◽  
pp. 344-348 ◽  
Author(s):  
Hideaki KOBAYASHI ◽  
Isao KAINE ◽  
Shunsuke TANIGUCHI
Keyword(s):  

2019 ◽  
Vol 4 (91) ◽  
pp. 21-29 ◽  
Author(s):  
Yaroslav Trofimenko ◽  
Lyudmila Vinogradova ◽  
Evgeniy Ershov

2017 ◽  
Vol 2 (1) ◽  
pp. 80-87
Author(s):  
Puyda V. ◽  
◽  
Stoian. A.

Detecting objects in a video stream is a typical problem in modern computer vision systems that are used in multiple areas. Object detection can be done on both static images and on frames of a video stream. Essentially, object detection means finding color and intensity non-uniformities which can be treated as physical objects. Beside that, the operations of finding coordinates, size and other characteristics of these non-uniformities that can be used to solve other computer vision related problems like object identification can be executed. In this paper, we study three algorithms which can be used to detect objects of different nature and are based on different approaches: detection of color non-uniformities, frame difference and feature detection. As the input data, we use a video stream which is obtained from a video camera or from an mp4 video file. Simulations and testing of the algoritms were done on a universal computer based on an open-source hardware, built on the Broadcom BCM2711, quad-core Cortex-A72 (ARM v8) 64-bit SoC processor with frequency 1,5GHz. The software was created in Visual Studio 2019 using OpenCV 4 on Windows 10 and on a universal computer operated under Linux (Raspbian Buster OS) for an open-source hardware. In the paper, the methods under consideration are compared. The results of the paper can be used in research and development of modern computer vision systems used for different purposes. Keywords: object detection, feature points, keypoints, ORB detector, computer vision, motion detection, HSV model color


2013 ◽  
Vol 18 (2-3) ◽  
pp. 49-60 ◽  
Author(s):  
Damian Dudzńiski ◽  
Tomasz Kryjak ◽  
Zbigniew Mikrut

Abstract In this paper a human action recognition algorithm, which uses background generation with shadow elimination, silhouette description based on simple geometrical features and a finite state machine for recognizing particular actions is described. The performed tests indicate that this approach obtains a 81 % correct recognition rate allowing real-time image processing of a 360 X 288 video stream.


2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


2009 ◽  
Vol 29 (7) ◽  
pp. 1796-1798
Author(s):  
Xiao-dong XU ◽  
Chuan-an WANG ◽  
Shi-rui ZHU

2003 ◽  
Author(s):  
David A. Wheeler ◽  
Gregory N. Larsen

Sign in / Sign up

Export Citation Format

Share Document