Circular Image

67 records found

Privacy Preserving Train Scheduling

Using homomorphic encryption to create train schedules

A substantial number of passengers in Europe rely on trains for transportation, facilitated by a network of high-speed international trains. However, the coordination of train schedules across multiple networks often poses challenges due to incompatible timings. The scheduling of ...

A Comparative Study of Threshold Multiparty Private Set Intersection Protocols

For Cyber Threat Intelligence Sharing in a Medical Setting

Within the field of \emph{cyber threat intelligence} (CTI), healthcare institutions are one of the most targeted organizations by cybercriminals. To mitigate future attacks on their digital infrastructures, healthcare institutions can collaborate and exchange security logs. These ...
Financial crime has seen a surge in complexity over the past decades as a result of digitisation. This required better tools for detecting financial crime, creating a cat-and-mouse game between law enforcement and criminals. Anti-money laundering (AML) is the collective term desc ...
Ensuring the privacy of medical data in a meaningful manner is a complex task. This domain presents a plethora of unique challenges: high stakes, vast differences between possible use cases, long-established methods that limit the number of feasible solutions, and more. Consequen ...

3D mesh object watermarking

Improving robustness of feature vertex localisation by centre-of-volume

Digital modelling is becoming more prevalent in many applications. The underlying 3D mesh objects are therefore getting increasingly valuable, such that methods for ownership protection are required. Watermarking is a solution to this problem, yet the research combining watermark ...
In the digital era, XML data is fundamental for various applications, requiring robust methods to ensure data integrity and security. Traditional digital watermarking techniques face challenges due to XML's hierarchical structure. Zero-watermarking, which derives a watermark from ...

Watermarking time-series data using DWT

Adapting an existing audio technique to watermark non-medical time series

Data security has become more important over the last few years as data sharing over the world has become trivial. Data ownership therefore becomes critical as data can be very valuable and vulnerable to theft. Watermarking is a technique that can help data owners prove ownership ...

Extending Null Embedding for Deep Neural Network (DNN) Watermarking

Improving the accuracy of the original classification task in piracy-resistant DNN watermarking

The advancement of Machine Learning (ML) in the last decade has created new business prospects for developers working on ML models. Models that are expensive and time-consuming to design and train can now be outsourced from others to reduce costs using Machine Learning as a servi ...

Watermarking of numerical datasets used for ML

A DWT approach for watermarking numerical datasets

AI and machine learning have been topics of big interest in the last couple of years, with plenty of applications in many domains. To train these models into useful and desirable tools, a large amount of data is necessary. This data is expensive to collect, becoming one of the mo ...
Federated Learning (FL) is a decentralized machine learning approach that provides a privacy-friendly way of training models by keeping the datasets of participating parties private. Some challenges FL faces are the lack of incentives to encourage participation in the learning pr ...
In modern society, data is increasingly important for people's daily lives and commercial activities to benefit organization, management and analysis. Proper data utilization involves different stages, and the data life cycle is introduced to describe the procedures as generation ...

Trust the System

Auditing Privacy- preserving Medical Data Analysis in a Distributed Manner

Recent developments in the capability and availability of small internet of things devices has meant that networked medical devices, like networked implants and wearable monitors, have become more widespread. This data is invaluable for solving pressing global healthcare concerns ...
Organizations use cloud service providers for outsourcing their data, since this includes advantages such as: scalability, security and no need for in house experts. Therefore, outsourcing data to cloud providers results in reduced costs.
The disadvantage of outsourcing data ...

Cryptpath

Data-oblivious Shortest Path Discovery in Outsourced Settings

Cloud computing and storage solutions have been credited with increasing competitiveness through cost savings, greater flexibility, elasticity and optimal resource allocation. However, the data outsourced to the cloud may contain private information that must be protected from mi ...

Image watermarking for Machine Learning datasets

Using SVD based image watermarking techniques to watermark numerical ML datasets

The media watermarking technique domain has had the last 30 years to develop itself. The non-media side, however, is a way newer sub-domain. [1] The data-gathering process for machine learning algorithms is a tedious and time consuming task. This becomes worse as the scale of the ...
Although digital watermarking has been a well-researched topic for the past decades and has seen numerous implementations for relational databases, it still lacks research for non-relational schema-less databases. In this paper, we explore proposed techniques for non-relational d ...

Extended Geometry based Watermarking of 3D Meshes

Improving robustness of geometrical 3D mesh watermarking by introducing mesh regularization

Digital watermarking has been used extensively in media in recent years. Yet, there are still relatively few techniques for watermarking 3D meshes. In this paper we implement a watermarking algorithm proposed by O. Benedens that encodes a bit string in the distribution of the nor ...
Money laundering is the process of hiding the origin of funds obtained through illicit activities. It is a major problem that has significant impacts on the global financial system and undermines the integrity of financial institutions. To combat this, the Dutch government planni ...
Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. They move payments off-chain, i.e., not all payments have to be included in the blockchain. Thus, they do not require that every payment is broadcast to all participants and verified b ...
Healthcare recommender systems emerged to help patients make better decisions for their health, leveraging the vast amount of data and patient experience. One type of this system focuses on recommending the most appropriate physician based on previous patient feedback in the form ...