首页 > 最新文献

Proceedings of the 2nd International Workshop on Multimedia Privacy and Security最新文献

英文 中文
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security 第二届多媒体隐私与安全国际研讨会论文集
{"title":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","authors":"","doi":"10.1145/3267357","DOIUrl":"https://doi.org/10.1145/3267357","url":null,"abstract":"","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Reactive Acoustic Jamming for Personal Voice Assistants 针对个人语音助手的被动声干扰研究
Peng Cheng, I. E. Bagci, Jeff Yan, U. Roedig
Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to always be in range of at least one PVA. Although the devices are very helpful they are also continuously monitoring conversations. When a PVA detects a wake word, the immediately following conversation is recorded and transported to a cloud system for further analysis. In this paper we investigate an active protection mechanism against PVAs: reactive jamming. A Protection Jamming Device (PJD) is employed to observe conversations. Upon detection of a PVA wake word the PJD emits an acoustic jamming signal. The PJD must detect the wake word faster than the PVA such that the jamming signal still prevents wake word detection by the PVA. The paper presents an evaluation of the effectiveness of different jamming signals. We quantify the impact of jamming signal and wake word overlap on jamming success. Furthermore, we quantify the jamming false positive rate in dependence of the overlap. Our evaluation shows that a 100% jamming success can be achieved with an overlap of at least 60% with a negligible false positive rate. Thus, reactive jamming of PVAs is feasible without creating a system perceived as a noise nuisance.
像亚马逊Echo这样的个人语音助手(PVA)很常见,现在它可能总是在至少一个PVA的范围内。尽管这些设备非常有用,但它们也在持续监控对话。当PVA检测到唤醒字时,紧接着的对话将被记录并传输到云系统进行进一步分析。本文研究了一种针对pva的主动保护机制:无功干扰。一个保护干扰装置(PJD)被用来观察对话。在检测到PVA尾迹字后,PJD发出声干扰信号。PJD必须比PVA更快地检测到唤醒字,这样干扰信号仍然会阻止PVA检测到唤醒字。本文对不同干扰信号的有效性进行了评价。我们量化了干扰信号和尾迹重叠对干扰成功的影响。此外,我们量化了干扰误报率与重叠的关系。我们的评估表明,100%的干扰成功率可以在重叠至少60%的情况下实现,假阳性率可以忽略不计。因此,pva的反应性干扰是可行的,而不会产生被认为是噪声干扰的系统。
{"title":"Towards Reactive Acoustic Jamming for Personal Voice Assistants","authors":"Peng Cheng, I. E. Bagci, Jeff Yan, U. Roedig","doi":"10.1145/3267357.3267359","DOIUrl":"https://doi.org/10.1145/3267357.3267359","url":null,"abstract":"Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to always be in range of at least one PVA. Although the devices are very helpful they are also continuously monitoring conversations. When a PVA detects a wake word, the immediately following conversation is recorded and transported to a cloud system for further analysis. In this paper we investigate an active protection mechanism against PVAs: reactive jamming. A Protection Jamming Device (PJD) is employed to observe conversations. Upon detection of a PVA wake word the PJD emits an acoustic jamming signal. The PJD must detect the wake word faster than the PVA such that the jamming signal still prevents wake word detection by the PVA. The paper presents an evaluation of the effectiveness of different jamming signals. We quantify the impact of jamming signal and wake word overlap on jamming success. Furthermore, we quantify the jamming false positive rate in dependence of the overlap. Our evaluation shows that a 100% jamming success can be achieved with an overlap of at least 60% with a negligible false positive rate. Thus, reactive jamming of PVAs is feasible without creating a system perceived as a noise nuisance.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129262370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Double Embedding Steganalysis: Steganalysis with Low False Positive Rate 双嵌入隐写分析:具有低假阳性率的隐写分析
M. Steinebach, A. Ester, Huajian Liu, Sascha Zmuzinksi
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography. It also creates a new set of challenges for steganalysts, who have to shift their field of work away from a purely scientific laboratory environment and into a diverse real-world scenario, while at the same time having to deal with entirely new problems, such as the detection of steganographic channels or the impact that even a low false positive rate has when investigating the millions of images which are shared every day on social networks. We evaluate how to address these challenges with traditional steganographic and statistical methods, rather then using high performance computing and machine learning. By the double embedding attack on the well-known F5 steganographic algorithm we achieve a false positive rate well below known attacks.
在过去的10年里,社交网络的兴起创造了一个局面,每天有多达1亿的新图像和照片被用户上传和分享。这种环境为那些希望通过隐写术进行秘密通信的人提供了理想的背景。这也给隐写分析人员带来了一系列新的挑战,他们必须将他们的工作领域从纯粹的科学实验室环境转移到多样化的现实世界场景中,同时还必须处理全新的问题,例如检测隐写通道,或者在调查每天在社交网络上分享的数百万张图像时,即使是低误报率也会产生影响。我们评估了如何用传统的隐写术和统计方法来应对这些挑战,而不是使用高性能计算和机器学习。通过对著名的F5隐写算法的双重嵌入攻击,我们实现了远低于已知攻击的误报率。
{"title":"Double Embedding Steganalysis: Steganalysis with Low False Positive Rate","authors":"M. Steinebach, A. Ester, Huajian Liu, Sascha Zmuzinksi","doi":"10.1145/3267357.3267364","DOIUrl":"https://doi.org/10.1145/3267357.3267364","url":null,"abstract":"The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography. It also creates a new set of challenges for steganalysts, who have to shift their field of work away from a purely scientific laboratory environment and into a diverse real-world scenario, while at the same time having to deal with entirely new problems, such as the detection of steganographic channels or the impact that even a low false positive rate has when investigating the millions of images which are shared every day on social networks. We evaluate how to address these challenges with traditional steganographic and statistical methods, rather then using high performance computing and machine learning. By the double embedding attack on the well-known F5 steganographic algorithm we achieve a false positive rate well below known attacks.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133536664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Expiring Decisions for Stream-based Data Access in a Declarative Privacy Policy Framework 声明性隐私策略框架中基于流的数据访问的过期决策
Karsten Martiny, G. Denker
This paper describes how a privacy policy framework can be extended with timing information to not only decide if requests for data are allowed at a given point in time, but also to decide for how long such permission is granted. Augmenting policy decisions with expiration information eliminates the need to reason about access permissions prior to every individual data access operation. This facilitates the application of privacy policy frameworks to protect multimedia streaming data where repeated re-computations of policy decisions are not a viable option. We show how timing information can be integrated into an existing declarative privacy policy framework. In particular, we discuss how to obtain valid expiration information in the presence of complex sets of policies with potentially interacting policies and varying timing information.
本文描述了如何使用定时信息扩展隐私策略框架,以便不仅决定在给定时间点是否允许对数据的请求,还决定授予这种权限的时间。使用过期信息扩充策略决策,消除了在每个单独的数据访问操作之前对访问权限进行推理的需要。这有助于应用隐私策略框架来保护多媒体流数据,其中重复重新计算策略决策是不可行的选择。我们将展示如何将计时信息集成到现有的声明性隐私策略框架中。特别地,我们将讨论如何在存在复杂策略集的情况下获得有效的过期信息,这些策略集具有潜在的交互策略和不同的定时信息。
{"title":"Expiring Decisions for Stream-based Data Access in a Declarative Privacy Policy Framework","authors":"Karsten Martiny, G. Denker","doi":"10.1145/3267357.3267361","DOIUrl":"https://doi.org/10.1145/3267357.3267361","url":null,"abstract":"This paper describes how a privacy policy framework can be extended with timing information to not only decide if requests for data are allowed at a given point in time, but also to decide for how long such permission is granted. Augmenting policy decisions with expiration information eliminates the need to reason about access permissions prior to every individual data access operation. This facilitates the application of privacy policy frameworks to protect multimedia streaming data where repeated re-computations of policy decisions are not a viable option. We show how timing information can be integrated into an existing declarative privacy policy framework. In particular, we discuss how to obtain valid expiration information in the presence of complex sets of policies with potentially interacting policies and varying timing information.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FRiCS: A Framework for Risk-driven Cloud Selection FRiCS:风险驱动的云选择框架
Patricia Arias Cabarcos, F. Almenárez, Daniel Díaz Sánchez, Andrés Marín López
Our devices and interactions in a world where physical and digital realities are more and more blended, generate a continuum of multimedia data that needs to be stored, shared and processed to provide services that enrich our daily lives. Cloud computing plays a key role in these tasks, dissolving resource allocation and computational boundaries, but it also requires advanced security mechanisms to protect the data and provide privacy guarantees. Therefore, security assurance must be evaluated before offloading tasks to a cloud provider, a process which is currently manual, complex and inadequate for dynamic scenarios. However, though there are many tools for evaluating cloud providers according to quality of service criteria, automated categorization and selection based on risk metrics is still challenging. To address this gap, we present FRiCS, a Framework for Risk-driven Cloud Selection, which contributes with: 1) a set of cloud security metrics and risk-based weighting policies, 2) distributed components for metric extraction and aggregation, and 3) decision-making plugins for ranking and selection. We have implemented the whole system and conducted a case-study validation based on public cloud providers' security data, showing the benefits of the proposed approach.
在一个物理现实和数字现实越来越融合的世界里,我们的设备和互动产生了一个连续的多媒体数据,需要存储、共享和处理,以提供丰富我们日常生活的服务。云计算在这些任务中发挥着关键作用,它消除了资源分配和计算边界,但它也需要先进的安全机制来保护数据并提供隐私保障。因此,在将任务移交给云提供商之前,必须对安全保证进行评估,这个过程目前是手动的、复杂的,并且不适合动态场景。然而,尽管有许多工具可以根据服务质量标准评估云提供商,但基于风险度量的自动分类和选择仍然具有挑战性。为了解决这一差距,我们提出了FRiCS,一个风险驱动的云选择框架,它有助于:1)一组云安全指标和基于风险的加权策略,2)用于度量提取和聚合的分布式组件,以及3)用于排名和选择的决策插件。我们已经实施了整个系统,并基于公共云提供商的安全数据进行了案例研究验证,显示了所提出方法的好处。
{"title":"FRiCS: A Framework for Risk-driven Cloud Selection","authors":"Patricia Arias Cabarcos, F. Almenárez, Daniel Díaz Sánchez, Andrés Marín López","doi":"10.1145/3267357.3267362","DOIUrl":"https://doi.org/10.1145/3267357.3267362","url":null,"abstract":"Our devices and interactions in a world where physical and digital realities are more and more blended, generate a continuum of multimedia data that needs to be stored, shared and processed to provide services that enrich our daily lives. Cloud computing plays a key role in these tasks, dissolving resource allocation and computational boundaries, but it also requires advanced security mechanisms to protect the data and provide privacy guarantees. Therefore, security assurance must be evaluated before offloading tasks to a cloud provider, a process which is currently manual, complex and inadequate for dynamic scenarios. However, though there are many tools for evaluating cloud providers according to quality of service criteria, automated categorization and selection based on risk metrics is still challenging. To address this gap, we present FRiCS, a Framework for Risk-driven Cloud Selection, which contributes with: 1) a set of cloud security metrics and risk-based weighting policies, 2) distributed components for metric extraction and aggregation, and 3) decision-making plugins for ranking and selection. We have implemented the whole system and conducted a case-study validation based on public cloud providers' security data, showing the benefits of the proposed approach.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124398401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deriving Privacy and Security Considerations for CORE: An Indoor IoT Adaptive Context Environment 为核心提供隐私和安全考虑:室内物联网自适应上下文环境
Alexis Morris, Nadine Lessio
The internet-of-things (IoT) consists of embedded devices and their networks of communication as they form decentralized frameworks of ubiquitous computing services. Within such decentralized systems the potential for malicious actors to impact the system is significant, with far-reaching consequences. Hence this work addresses the challenge of providing IoT systems engineers with a framework to elicit privacy and security design considerations, specifically for indoor adaptive smart environments. It introduces a new ambient intelligence indoor adaptive environment framework (CORE) which leverages multiple forms of data, and aims to elicit the privacy and security needs of this representative system. This contributes both a new adaptive IoT framework, but also an approach to systematically derive privacy and security design requirements via a combined and modified OCTAVE-Allegro and Privacy-by-Design methodology. This process also informs the future developments and evaluations of the CORE system, toward engineering more secure and private IoT systems.
物联网(IoT)由嵌入式设备及其通信网络组成,因为它们形成了无处不在的计算服务的分散框架。在这种分散的系统中,恶意行为者影响系统的可能性是巨大的,并会产生深远的后果。因此,这项工作解决了为物联网系统工程师提供一个框架来引出隐私和安全设计考虑的挑战,特别是对于室内自适应智能环境。它引入了一种新的环境智能室内自适应环境框架(CORE),该框架利用多种形式的数据,旨在引出该代表性系统的隐私和安全需求。这不仅提供了一个新的自适应物联网框架,而且还提供了一种通过组合和修改的OCTAVE-Allegro和privacy -by- design方法系统地导出隐私和安全设计要求的方法。这一过程也为CORE系统的未来发展和评估提供了信息,以设计更安全和私有的物联网系统。
{"title":"Deriving Privacy and Security Considerations for CORE: An Indoor IoT Adaptive Context Environment","authors":"Alexis Morris, Nadine Lessio","doi":"10.1145/3267357.3267363","DOIUrl":"https://doi.org/10.1145/3267357.3267363","url":null,"abstract":"The internet-of-things (IoT) consists of embedded devices and their networks of communication as they form decentralized frameworks of ubiquitous computing services. Within such decentralized systems the potential for malicious actors to impact the system is significant, with far-reaching consequences. Hence this work addresses the challenge of providing IoT systems engineers with a framework to elicit privacy and security design considerations, specifically for indoor adaptive smart environments. It introduces a new ambient intelligence indoor adaptive environment framework (CORE) which leverages multiple forms of data, and aims to elicit the privacy and security needs of this representative system. This contributes both a new adaptive IoT framework, but also an approach to systematically derive privacy and security design requirements via a combined and modified OCTAVE-Allegro and Privacy-by-Design methodology. This process also informs the future developments and evaluations of the CORE system, toward engineering more secure and private IoT systems.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ETERNAL: Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices ETERNAL:轻量级设备上带有纠错、实时、抗噪声装置的加密传输
Quinn Grier, B. Falk, Steve Lu, R. Ostrovsky
In this work, we describe the design and implementation of a private-key voice encryption system that is designed to encrypt and decrypt voice communications between two people using lightweight computational devices (such as a Raspberry Pi) that sits between the headset and the communication platform (computer, phone, etc.). The key challenge in this work is designing lightweight encryption algorithms in such a way that even before voice enters the phone/computer platform, voice is encrypted, yet such that modern audio communication channels such as popular VoIP applications (such as Skype, Google Voice, etc.), or mobile communications (GSM, etc.) or other (Radio, etc.) do not filter encrypted voice out as "noise" and voice quality is preserved. Thus, two people with two such devices can communicate securely even if their smart phones and/or computers are compromised. Unlike previous solutions, our proposed work does not rely on special-purpose hardware, nor does it rely on trusting the communication device. It is a standalone solution that can be readily deployed on lightweight commodity hardware. We have tested our solution on two Raspberry Pi models and over a variety of communication channels, where we were able to carry a real-time voice conversation.
在这项工作中,我们描述了一个私钥语音加密系统的设计和实现,该系统旨在加密和解密使用位于耳机和通信平台(计算机,电话等)之间的轻量级计算设备(如树莓派)的两个人之间的语音通信。这项工作的关键挑战是设计轻量级的加密算法,即使在语音进入电话/计算机平台之前,语音也被加密,但这样的现代音频通信渠道,如流行的VoIP应用程序(如Skype, Google voice等),或移动通信(GSM等)或其他(无线电等)不会将加密的语音作为“噪声”过滤掉,并且语音质量得到保留。因此,两个人拥有两个这样的设备,即使他们的智能手机和/或电脑受到威胁,也可以安全地通信。与以前的解决方案不同,我们提出的工作不依赖于专用硬件,也不依赖于信任通信设备。它是一个独立的解决方案,可以很容易地部署在轻量级商用硬件上。我们已经在两个树莓派模型和各种通信渠道上测试了我们的解决方案,我们能够进行实时语音对话。
{"title":"ETERNAL: Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices","authors":"Quinn Grier, B. Falk, Steve Lu, R. Ostrovsky","doi":"10.1145/3267357.3267360","DOIUrl":"https://doi.org/10.1145/3267357.3267360","url":null,"abstract":"In this work, we describe the design and implementation of a private-key voice encryption system that is designed to encrypt and decrypt voice communications between two people using lightweight computational devices (such as a Raspberry Pi) that sits between the headset and the communication platform (computer, phone, etc.). The key challenge in this work is designing lightweight encryption algorithms in such a way that even before voice enters the phone/computer platform, voice is encrypted, yet such that modern audio communication channels such as popular VoIP applications (such as Skype, Google Voice, etc.), or mobile communications (GSM, etc.) or other (Radio, etc.) do not filter encrypted voice out as \"noise\" and voice quality is preserved. Thus, two people with two such devices can communicate securely even if their smart phones and/or computers are compromised. Unlike previous solutions, our proposed work does not rely on special-purpose hardware, nor does it rely on trusting the communication device. It is a standalone solution that can be readily deployed on lightweight commodity hardware. We have tested our solution on two Raspberry Pi models and over a variety of communication channels, where we were able to carry a real-time voice conversation.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Tracking of Kids and Teens by Means of Invisible Images: COPPA vs. GDPR 通过隐形图像对儿童和青少年进行在线跟踪:COPPA与GDPR
N. Vlajic, Marmara El Masri, Gianluigi M. Riva, Marguerite Barry, Derek Doran
The recent news of a large-scale online tracking campaign involving Facebook users, which gave way to systematic misuse of the collected user-related data, have left millions of people deeply concerned about the state of their online privacy as well as the state of the overall information security in the cyber world. While most to-date revelations pertaining to user tracking are related to websites and social media generally intended for adult online users, relatively little is known about the prevalence of online tracking in websites geared towards children and teens. In this paper, we first provide a brief overview of two laws that seek to protect the privacy of kids and teens online ? the US Children's Online Privacy Act (COPPA) and the EU General Data Protection Regulation (GDPR). Subsequently, we present the results of our study which has looked for potential signs of user tracking in twenty select children-oriented websites in case of a user located in the USA (where COPPA is applicable) as well as a user located in the EU (where GDPR is applicable). The key findings of this study are alarming as they point to overwhelming evidence of widespread and highly covert user tracking in a range of different children-oriented websites. The majority of the discovered tracking is in direct conflict with both COPPA and GDPR, since it is performed without parental consent and by third-party advertising and tracking companies. The results also imply that, relative to their US counterparts, the children residing in the EU may be somewhat less subjected (but are still significantly exposed) to tracking by third-party companies.
最近一则涉及Facebook用户的大规模在线跟踪活动的新闻,导致收集到的用户相关数据被系统性滥用,这让数百万人对自己的在线隐私状况以及网络世界的整体信息安全状况深感担忧。虽然大多数关于用户跟踪的披露都与通常面向成人在线用户的网站和社交媒体有关,但对于面向儿童和青少年的网站中在线跟踪的流行程度知之甚少。在本文中,我们首先简要概述了两项旨在保护儿童和青少年在线隐私的法律。美国儿童在线隐私法案(COPPA)和欧盟通用数据保护条例(GDPR)。随后,我们展示了我们的研究结果,该研究在位于美国(适用COPPA)的用户以及位于欧盟(适用GDPR)的用户的情况下,在20个选定的面向儿童的网站中寻找用户跟踪的潜在迹象。这项研究的主要发现令人震惊,因为它们指出了大量证据,表明在一系列不同的儿童网站上广泛而高度隐蔽地跟踪用户。大多数被发现的跟踪都与COPPA和GDPR直接冲突,因为它是在未经父母同意的情况下由第三方广告和跟踪公司执行的。研究结果还表明,与美国儿童相比,居住在欧盟的儿童可能较少受到第三方公司的跟踪(但仍然严重暴露于此)。
{"title":"Online Tracking of Kids and Teens by Means of Invisible Images: COPPA vs. GDPR","authors":"N. Vlajic, Marmara El Masri, Gianluigi M. Riva, Marguerite Barry, Derek Doran","doi":"10.1145/3267357.3267370","DOIUrl":"https://doi.org/10.1145/3267357.3267370","url":null,"abstract":"The recent news of a large-scale online tracking campaign involving Facebook users, which gave way to systematic misuse of the collected user-related data, have left millions of people deeply concerned about the state of their online privacy as well as the state of the overall information security in the cyber world. While most to-date revelations pertaining to user tracking are related to websites and social media generally intended for adult online users, relatively little is known about the prevalence of online tracking in websites geared towards children and teens. In this paper, we first provide a brief overview of two laws that seek to protect the privacy of kids and teens online ? the US Children's Online Privacy Act (COPPA) and the EU General Data Protection Regulation (GDPR). Subsequently, we present the results of our study which has looked for potential signs of user tracking in twenty select children-oriented websites in case of a user located in the USA (where COPPA is applicable) as well as a user located in the EU (where GDPR is applicable). The key findings of this study are alarming as they point to overwhelming evidence of widespread and highly covert user tracking in a range of different children-oriented websites. The majority of the discovered tracking is in direct conflict with both COPPA and GDPR, since it is performed without parental consent and by third-party advertising and tracking companies. The results also imply that, relative to their US counterparts, the children residing in the EU may be somewhat less subjected (but are still significantly exposed) to tracking by third-party companies.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Mechanism and Implementation of Watermarked Sample Scanning Method for Speech Data Tampering Detection 语音数据篡改检测中水印样本扫描方法的机制与实现
Xuping Huang
The integrity and reliability of speech data have been important issues to probative use. Watermarking technologies supplies an alternative solution to guarantee the the authenticity of multiple data besides digital signature. This work proposes a novel digital watermarking based on a reversible compression algorithm with sample scanning to detect tampering in time domain. In order to detect tampering precisely, the digital speech data is divided into length-fixed frames and the content-based hash information of each frame is calculated and embedded into the speech data for verification. Huffman compression algorithm is applied to each four sampling bits from least significant bit in each sample after pulse-code modulation processing to achieve low distortion and high capacity for hiding payload. Experimental experiments on audio quality, detection precision and robustness towards attacks are taken, and the results show the effectiveness of tampering detection with a precision with an error around 0.032 s for a 10 s speech clip. Distortion is imperceptible with an average 22.068 dB for Huffman-based and 24.139 dB for intDCT-based method in terms of signal-to-noise, and with an average MOS 3.478 for Huffman-based and 4.378 for intDCT-based method. The bit error rate (BER) between stego data and attacked stego data in both of time-domain and frequency domain is approximate 28.6% in average, which indicates the robustness of the proposed hiding method.
语音数据的完整性和可靠性一直是证据使用的重要问题。水印技术为保证多重数据的真实性提供了数字签名之外的另一种解决方案。本文提出了一种基于可逆压缩算法的新型数字水印算法,并利用采样扫描在时域检测篡改。为了精确检测篡改,将数字语音数据分成固定长度的帧,计算每帧的基于内容的哈希信息并嵌入到语音数据中进行验证。在脉冲码调制处理后,对每个采样的最低有效位进行每4个采样位的霍夫曼压缩算法,以达到低失真和高负载隐藏能力的目的。在音频质量、检测精度和对攻击的鲁棒性等方面进行了实验,结果表明,对10s语音片段进行篡改检测,检测精度在0.032 s左右。在信噪比方面,基于huffman方法的平均失真为22.068 dB,基于intdct方法的平均失真为24.139 dB,基于huffman方法的平均MOS为3.478,基于intdct方法的平均MOS为4.378。在时域和频域上,隐进数据与被攻击的隐进数据的误码率平均约为28.6%,表明了所提隐藏方法的鲁棒性。
{"title":"Mechanism and Implementation of Watermarked Sample Scanning Method for Speech Data Tampering Detection","authors":"Xuping Huang","doi":"10.1145/3267357.3267371","DOIUrl":"https://doi.org/10.1145/3267357.3267371","url":null,"abstract":"The integrity and reliability of speech data have been important issues to probative use. Watermarking technologies supplies an alternative solution to guarantee the the authenticity of multiple data besides digital signature. This work proposes a novel digital watermarking based on a reversible compression algorithm with sample scanning to detect tampering in time domain. In order to detect tampering precisely, the digital speech data is divided into length-fixed frames and the content-based hash information of each frame is calculated and embedded into the speech data for verification. Huffman compression algorithm is applied to each four sampling bits from least significant bit in each sample after pulse-code modulation processing to achieve low distortion and high capacity for hiding payload. Experimental experiments on audio quality, detection precision and robustness towards attacks are taken, and the results show the effectiveness of tampering detection with a precision with an error around 0.032 s for a 10 s speech clip. Distortion is imperceptible with an average 22.068 dB for Huffman-based and 24.139 dB for intDCT-based method in terms of signal-to-noise, and with an average MOS 3.478 for Huffman-based and 4.378 for intDCT-based method. The bit error rate (BER) between stego data and attacked stego data in both of time-domain and frequency domain is approximate 28.6% in average, which indicates the robustness of the proposed hiding method.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124328308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Session details: Internet of Things and Cloud-based Services 会议详情:物联网和云服务
Roger A. Hallman
{"title":"Session details: Internet of Things and Cloud-based Services","authors":"Roger A. Hallman","doi":"10.1145/3285940","DOIUrl":"https://doi.org/10.1145/3285940","url":null,"abstract":"","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1