{"title":"A novel video steganography algorithm in DCT domain based on hamming and BCH codes","authors":"Ramadhan J. Mstafa, K. Elleithy","doi":"10.1109/SARNOF.2016.7846757","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846757","url":null,"abstract":"In the past decade, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganographic algorithm relies on the embedding efficiency, embedding payload, and robustness against attackers. Low hidden ratio, less security, and low quality of stego videos are the major issues of many existing steganographic methods. In this paper, we propose a novel video steganography method in DCT domain based on Hamming and BCH codes. To improve the security of the proposed algorithm, a secret message is first encrypted and encoded by using BCH codes. Then, it is embedded into the discrete cosine transform (DCT) coefficients of video frames. The hidden message is embedded into DCT coefficients of each Y, U, and V planes excluding DC coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast moving objects. The experiential results of the proposed algorithm are compared with three existing methods. The comparison results show that our proposed algorithm outperformed other algorithms. The hidden ratio of the proposed algorithm is approximately 27.53%, which is considered as a high hiding capacity with a minimal tradeoff of the visual quality. The robustness of the proposed algorithm was tested under different attacks.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A greedy algorithm for decentralized Bayesian detection with feedback","authors":"Weiqiang Dong, Moshe Kam","doi":"10.1109/SARNOF.2016.7846756","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846756","url":null,"abstract":"We consider a decentralized binary detection architecture comprised of n local detectors (LDs) communicating their decisions to a Data Fusion Center (DFC). Each local detector (LD) declares preference for one of two hypotheses (H<inf>0</inf> or H<inf>1</inf>) and transmits it to the DFC. The decision of the k<sup>th</sup> LD at time step t is u<sup>t</sup><inf>k</inf>. The DFC develops a global preference u<sup>t</sup><inf>0</inf> for one of hypotheses based on the vector of local decisions U<sup>t</sup> while minimizing a Bayesian cost. The input to the k<sup>th</sup> LD at time step t is the observation y<sup>t</sup><inf>k</inf> collected from the surveyed environment, and the previous global decision u<sup>t−1</sup><inf>0</inf>. Alhakeem and Varshney developed a person-by-person optimal (PBPO) solution to this problem, namely a PBPO procedure to calculate the global fusion rule and the local decision rules. However, their solution requires that at each time step 2<sup>n</sup> fusion rule equations and 2n local threshold equations be solved simultaneously. In this paper we suggest a suboptimal solution to the problem, based on independent local minimizations of similar Bayesian cost by each LD and by the DFC. To assess the cost of decentralization, the performance of this solution is compared to that of an architecture that processes all observations in one central location.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Majikes, Sean P. Mealin, R. Brugarolas, Katherine Walker, S. Yuschak, B. Sherman, A. Bozkurt, D. Roberts
{"title":"Smart connected canines: IoT design considerations for the lab, home, and mission-critical environments","authors":"J. Majikes, Sean P. Mealin, R. Brugarolas, Katherine Walker, S. Yuschak, B. Sherman, A. Bozkurt, D. Roberts","doi":"10.1109/SARNOF.2016.7846739","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846739","url":null,"abstract":"The canine-human relationship continues to grow as dogs become an increasingly critical part of our society. As reliance on dogs has increased from simple companionship, to service dogs, urban security, and national defense, the opportunities for enhanced communications between the working canine and their handler increase. Wireless sensor networks and the Internet of Things (IoT) can extend traditional canine-human communication to integrate canines into the cyber-enabled world. This is what we call the Smart Connected Canine (SCC). Canine-computer interaction is sufficiently different from human-computer interaction so as to present some challenging research and design problems. There are physical and performance limits to what a dog will naturally tolerate. There are communications requirements for monitoring dogs, monitoring the environment, and for canine-human communications. Depending on the working environment there are different performance, security, and ergonomic considerations. This paper summarizes three example canine-human systems we presented earlier along with their Ion data characteristics and design criteria in order to explore how smart connected canines can improve our lives, the future of smart connected canines, and the requirements on IoT technologies to facilitate this future.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, H. Salameh, Issa M. Khalil
{"title":"On the continuous coverage problem for a swarm of UAVs","authors":"Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, H. Salameh, Issa M. Khalil","doi":"10.1109/SARNOF.2016.7846742","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846742","url":null,"abstract":"Unmanned aerial vehicles (UAVs) can be used to provide wireless network and remote surveillance coverage for disaster-affected areas. During such a situation, the UAVs need to return periodically to a charging station for recharging, due to their limited battery capacity. We study the problem of minimizing the number of UAVs required for a continuous coverage of a given area, given the recharging requirement. We prove that this problem is NP-complete. Due to its intractability, we study partitioning the coverage graph into cycles that start at the charging station. We first characterize the minimum number of UAVs to cover such a cycle based on the charging time, the traveling time, and the number of subareas to be covered by the cycle. Based on this analysis, we then develop an efficient algorithm, the cycles with limited energy algorithm. The straightforward method to continuously cover a given area is to split it into N subareas and cover it by N cycles using N additional UAVs. Our simulation results examine the importance of critical system parameters: the energy capacity of the UAVs, the number of subareas in the covered area, and the UAV charging and traveling times. We demonstrate that the cycles with limited energy algorithm requires 69%–94% fewer additional UAVs relative to the straightforward method, as the energy capacity of the UAVs is increased, and 67%–71% fewer additional UAVs, as the number of subareas is increased.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"28 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Kachroo, M. K. Özdemir, Hatice Tekiner-Mogulkoc
{"title":"Optimization of LTE radio resource block allocation for maritime channels","authors":"Amit Kachroo, M. K. Özdemir, Hatice Tekiner-Mogulkoc","doi":"10.1109/SARNOF.2016.7846771","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846771","url":null,"abstract":"In this study, we describe the behavior of LTE over the sea and investigate the problem of radio resource block allocation in such SINR limited maritime channels. For simulations of such sea environment, we considered a network scenario of Bosphorus Strait in Istanbul, Turkey with different number of ships ferrying between two ports at a given time. After exploiting the network characteristics, we formulated and solved the radio resource allocation problem by max-min integer linear programming method. The radio resource allocation fairness in terms of Jain's fairness index was computed and it was compared with round robin and opportunistic methods. Results show that the max-min optimization method performs better than the opportunistic and round robin methods. This result in turn reflects that the max-min optimization method gives us the high minimum best throughput as compared to other two methods considering different ship density scenarios in the sea. Also, it was observed that as the number of ships begin to increase in the sea, the max-min method performs significantly better with good fairness as compared to the other two methods.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge caching and nearest replica routing in information-centric networking","authors":"Feixiong Zhang, Yanyong Zhang, D. Raychaudhuri","doi":"10.1109/SARNOF.2016.7846751","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846751","url":null,"abstract":"Information-centric networking (ICN) promises to improve content-oriented services by enabling in-network caching and supporting optimal content request forwarding. To achieve this goal, different content caching and request forwarding schemes are proposed in multiple ICN architectures. However, they differ from each other in whether pervasive caching is adopted, and whether nearest-replica routing is supported. In this work, we evaluate these options through extensive simulation over both single domain tree network and multi-domain network scenarios. Our evaluation shows that pervasive caching is not fundamentally better than edge caching; compared with pervasive caching, nearest replica routing brings more benefits, especially in a large network. Based on the observations, we propose a caching system built upon MobilityFirst architecture, in which edge caching is adopted, and nearest replica routing is supported through a global name resolution service. Additional evaluation shows that our proposal retains the advantages of ICN (e.g., requests served from \"best\" location), and is feasible to deploy globally.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130415723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Lartiga, Nicolas Boettcher, Yasmany Prieto, J. Pezoa
{"title":"QoSApp: Dynamic bandwith management for QoS applications using OpenFlow","authors":"Daniel Lartiga, Nicolas Boettcher, Yasmany Prieto, J. Pezoa","doi":"10.1109/SARNOF.2016.7846733","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846733","url":null,"abstract":"Multimedia traffic is characterized by its sensitivity to both network delay and packet losses. In high-load non-dedicated networks, Quality of Service (QoS) must be guaranteed to multimedia traffic to achieve a minimum acceptable quality. This paper presents QoSApp, an OpenFlow-based application that dynamically manages the network-bandwidth to provide QoS guarantees to multimedia traffic, while allowing its coexistence with different traffic types. QoSApp, which was implemented modifying Floodlight's API, classifies network traffic and dynamically computes network routes satisfying QoS demands. Results successfully show video transmission over a test network.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122137475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User density and spatial cloaking algorithm selection: Improving privacy protection of mobile users","authors":"Matthew Chan, Hassan Elsherbini, Xiaowen Zhang","doi":"10.1109/SARNOF.2016.7846722","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846722","url":null,"abstract":"Data sharing and privacy protection of mobile users have always been a challenge to research and development, as well as commercial and enterprise deployment of the Global Positioning System (GPS) and location-based mobile applications. The concepts of k-anonymity, two spatial cloaking algorithms — Nearest Neighbor Cloak (NNC) and Hilbert Cloak (HC) — that utilize k-anonymity, as well as user density's impacts on the performance are discussed in this paper. The proposed research seeks to examine and adopt an adaptive scheme that utilizes these cloaking algorithms to improve security, privacy protection and performance of a system, using k-anonymity to generate the k-ASR in an anonymizer.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Theodoros Soultanopoulos, Stelios Sotiriadis, E. Petrakis, C. Amza
{"title":"Data management of sensor signals for high bandwidth data streaming to the cloud","authors":"Theodoros Soultanopoulos, Stelios Sotiriadis, E. Petrakis, C. Amza","doi":"10.1109/SARNOF.2016.7846764","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846764","url":null,"abstract":"Internet of Things (IoT) and Cloud computing highlight new requirements for data collection, storage and analysis of user data. In this work we focus on the data collection from Bluetooth Low Energy (BLE) devices in order to identify and track data from things in real time, as well as to enhance data analysis by allowing processing in the Cloud. The paper proposes an IoT service architecture and a system implementation for a gateway service running on smart devices (tablets, smartphones) that supports generic access to BLE compliant sensors and allows on-the-fly sensor registration using an easy to use data information schema. The gateway is designed to support the processing (e.g. filtering) of sensor data before they are transferred to the cloud in example of FOG computing (that defines high bandwidth and low latency IoT distributed system). The experimental results demonstrate that the system supports real time communication and fast data collection, as the total time for data transmission (from smart sensors to the cloud) is less than 130 ms.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-to-all regularized logistic regression-based classification for WiFi indoor localization","authors":"Zifan Peng, Yuchen Xie, Donglin Wang, Z. Dong","doi":"10.1109/SARNOF.2016.7846746","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846746","url":null,"abstract":"Wi-Fi based indoor localization is gaining popularity because of the wide adoption of WiFi technologies in existing infrastructure. In order to increase the accuracy of Wi-Fi localization, we develop a novel localization method using One-to-all Regularized Logistic Regression-based Classification (ORLRC). This method is based on logistic regression. The proposed ORLRC is compared with the k-means clustering approach and achieves a location estimation accuracy of 95.8% comparing to an accuracy of 80% by the k-means clustering approach.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}