Browsing by Author "Dawoud, Peter Dawoud Shenouda."
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item An improved randomization of a multi-blocking jpeg based steganographic system.(2010) Dawoud, Peter Dawoud Shenouda.; Peplow, Roger Charles Samuel.; Naidoo, Bashan.Steganography is classified as the art of hiding information. In a digital context, this refers to our ability to hide secret messages within innocent digital cover data. The digital domain offers many opportunities for possible cover mediums, such as cloud based hiding (saving secret information within the internet and its structure), image based hiding, video and audio based hiding, text based documents as well as the potential of hiding within any set of compressed data. This dissertation focuses on the image based domain and investigates currently available image based steganographic techniques. After a review of the history of the field, and a detailed survey of currently available JPEG based steganographic systems, the thesis focuses on the systems currently considered to be secure and introduces mechanisms that have been developed to detect them. The dissertation presents a newly developed system that is designed to counter act the current weakness in the YASS JPEG based steganographic system. By introducing two new levels of randomization to the embedding process, the proposed system offers security benefits over YASS. The introduction of randomization to the B‐block sizes as well as the E‐block sizes used in the embedding process aids in increasing security and the potential for new, larger E‐block sizes also aids in providing an increased set of candidate coefficients to be used for embedding. The dissertation also introduces a new embedding scheme which focuses on hiding in medium frequency coefficients. By hiding in these medium frequency coefficients, we allow for more aggressive embedding without risking more visual distortion but trade this off with a risk of higher error rates due to compression losses. Finally, the dissertation presents simulation aimed at testing the proposed system performance compared to other JPEG based steganographic systems with similar embedding properties. We show that the new system achieves an embedding capacity of 1.6, which represents round a 7 times improvement over YASS. We also show that the new system, although introducing more bits in error per B‐block, successfully allows for the embedding of up to 2 bits per B‐block more than YASS at a similar error rate per B‐block. We conclude the results by demonstrating the new systems ability to resist detection both through human observation, via a survey, as well as resist computer aided analysis.Item A multi-objective particle swarm optimized fuzzy logic congestion detection and dual explicit notification mechanism for IP networks.(2006) Nyirenda, Clement Nthambazale.; Dawoud, Peter Dawoud Shenouda.The Internet has experienced a tremendous growth over the past two decades and with that growth have come severe congestion problems. Research efforts to alleviate the congestion problem can broadly be classified into three groups: Cl) Router based congestion detection; (2) Generation and transmission of congestion notification signal to the traffic sources; (3) End-to-end algorithms which control the flow of traffic between the end hosts. This dissertation has largely addressed the first two groups which are basically router initiated. Router based congestion detection mechanisms, commonly known as Active Queue Management (AQM), can be classified into two groups: conventional mathematical analytical techniques and fuzzy logic based techniques. Research has shown that fuzzy logic techniques are more effective and robust compared to the conventional techniques because they do not rely on the availability of a precise mathematical model of Internet. They use linguistic knowledge and are, therefore, better placed to handle the complexities associated with the non-linearity and dynamics of the Internet. In spite of all these developments, there still exists ample room for improvement because, practically, there has been a slow deployment of AQM mechanisms. In the first part of this dissertation, we study the major AQM schemes in both the conventional and the fuzzy logic domain in order to uncover the problems that have hampered their deployment in practical implementations. Based on the findings from this study, we model the Internet congestion problem as a multi-objective problem. We propose a Fuzzy Logic Congestion Detection (FLCD) which synergistically combines the good characteristics of the fuzzy approaches with those of the conventional approaches. We design the membership functions (MFs) of the FLCD algorithm automatically by using Multi-objective Particle Swarm Optimization (MOPSO), a population based stochastic optimization algorithm. This enables the FLCD algorithm to achieve optimal performance on all the major objectives of Internet congestion control. The FLCD algorithm is compared with the basic Fuzzy Logic AQM and the Random Explicit Marking (REM) algorithms on a best effort network. Simulation results show that the FLCD algorithm provides high link utilization whilst maintaining lower jitter and packet loss. It also exhibits higher fairness and stability compared to its basic variant and REM. We extend this concept to Proportional Differentiated Services network environment where the FLCD algorithm outperforms the traditional Weighted RED algorithm. We also propose self learning and organization structures which enable the FLCD algorithm to achieve a more stable queue, lower packet losses and UDP traffic delay in dynamic traffic environments on both wired and wireless networks. In the second part of this dissertation, we present the congestion notification mechanisms which have been proposed for wired and satellite networks. We propose an FLCD based dual explicit congestion notification algorithm which combines the merits of the Explicit Congestion Notification (ECN) and the Backward Explicit Congestion Notification (BECN) mechanisms. In this proposal, the ECN mechanism is invoked based on the packet marking probability while the BECN mechanism is invoked based on the BECN parameter which helps to ensure that BECN is invoked only when congestion is severe. Motivated by the fact that TCP reacts to tbe congestion notification signal only once during a round trip time (RTT), we propose an RTT based BECN decay function. This reduces the invocation of the BECN mechanism and resultantly the generation of reverse traffic during an RTT. Compared to the traditional explicit notification mechanisms, simulation results show that the new approach exhibits lower packet loss rates and higher queue stability on wired networks. It also exhibits lower packet loss rates, higher good-put and link utilization on satellite networks. We also observe that the BECN decay function reduces reverse traffic significantly on both wired and satellite networks while ensuring that performance remains virtually the same as in the algorithm without BECN traffic reduction.Item Opportunistic scheduling algorithms in downlink centralized wireless networks.(2005) Yin, Rui.; Dawoud, Peter Dawoud Shenouda.; Xu, Hongjun.As wireless spectrum efficiency is becoming increasingly important with the growing demands for wideband wireless service scheduling algorithm plays an important role in the design of advanced wireless networks. Opportunistic scheduling algorithms for wireless communication networks under different QoS constraints have gained popularity in recent years since they have potentials of achieving higher system performance. In this dissertation firstly we formulate the framework of opportunistic scheduling algorithms. Then we propose three new opportunistic scheduling schemes under different QoS criteria and situations (single channel or multiple channel). 1. Temporal fairness opportunistic scheduling algorithm in the short term. We replicate the temporal fairness opportunistic scheduling algorithm in the long term. From simulation results we find that this algorithm improves the system performance and complies with the temporal fairness constraint in the long term. However, the disadvantage of this algorithm is that it is unfair from the beginning of simulation to 10000 time slot on system resource (time slots) allocation - we say it is unfair in the short term. With such a scheme, it is possible that some users with bad channel conditions would starve for a long time (more than a few seconds) , which is undesirable to certain users (say, real-time users). So we propose the new scheme called temporal fairness opportunistic scheduling algorithm in the short term to satisfy users ' requirements of system resource in both short term and long term. Our simulation results show that the new scheme performs well with respect to both temporal fairness constraint and system performance improvement. 2. Delay-concerned opportunistic scheduling algorithm. While most work has been done on opportunistic scheduling algorithm under fairness constraints on user level, we consider users' packet delay in opportunistic scheduling. Firstly we examine the packet delay performance under the long term temporal fairness opportunistic scheduling (TFOL) algorithm. We also simulate the earliest deadline-first (EDF) scheduling algorithm in the wireless environment. We find that the disadvantage of opportunistic scheduling algorithm is that it is unfair in packet delay distribution because it results in a bias for users with good channel conditions in packet delay to improve system performance. Under EDF algorithm, packet delay of users with different channel conditions is almost the same but the problem is that it is worse than the opportunistic scheduling algorithm. So we propose another new scheme which considers both users' channel conditions and packet delay. Simulation results show that the new scheme works well with respect to both system performance improvement and the balance of packet delay distribution. 3. Utilitarian fairness scheduling algorithm in multiple wireless channel networks. Existing studies have so far focused on the design of scheduling algorithm in the single wireless communication network under the fairness constraint. A common assumption of existing designs is that only a single user can access the channel at a given time slot. However, spread spectrum techniques are increasingly being deployed to allow multiple data users to transmit simultaneously on a relatively small number of separate high-rate channels. Not much work has been done on the scheduling algorithm in the multiple wireless channel networks. Furthermore in wire-line network, when a certain amount of resource is assigned to a user, it guarantees that the user gets some amount of performance, but in wireless network this point is different because channel conditions are different among users. Hence, in wireless channel the user's performance does not directly depend on its allocation of system resource. Finally the opportunistic scheduling mechanism for wireless communication networks is gaining popularity because it utilizes the "multi-user diversity" to maximize the system performance. So, considering these three points in the fourth section, we propose utilitarian fairness scheduling algorithm in multiple wireless channel networks. Utilitarian fairness is to guarantee that every user can get its performance requirement which is pre-defined. The proposed criterion fits in with wireless networks. We also use the opportunistic scheduling mechanism to maximize system performance under the utilitarian fairness constraint. Simulation results show that the new scheme works well in both utilitarian fairness and utilitarian efficiency of system resource in the multiple wireless channel situation.Item Trust establishment in mobile ad hoc networks.(2010) Gordon, Richard Lawrence; Dawoud, Peter Dawoud Shenouda.The central focus of this dissertation is mobile ad hoc networks (MANETs) and their security. MANETs are autonomous networks of wireless nodes connected in an ad hoc manner, and have unique characteristics that make them difficult to secure. The principal aims of this investigation are to discuss the research and evaluation of existing mechanisms to secure MANETs and to design the implementation of a unique security mechanism. Key management is a major challenge in these networks due to the lack of fixed network infrastructure. In presenting a survey of the existing key management solutions for MANETs, the findings indicate that most security attacks target the network layer and more specifically the routing protocol. Consequently, the provision of secure routes is a vital element for trust establishment, and accordingly a survey is provided of the existing secure ad hoc routing protocols. The observation is made that most secure ad hoc routing protocols assume the existence of a key management system to certify, authenticate, and distribute keying information. Mobile ad hoc networks cannot assume the existence of a centralized authority member to perform key management tasks, and the problem of key management must be addressed. A novel key management solution called Direct Indirect Trust Distribution (DITD) is proposed for an on-demand ad hoc routing protocol. The solution includes a trust evaluation mechanism and a key distribution scheme to distribute keying information in the form of certificates. The key distribution scheme performs localized certificate exchanges following the routing procedure. A security evaluation metric is proposed that aggregates trust along a path based on a security metric and the path distance. The proposed solution is implemented on a modified AODV routing protocol, and simulated on the ns2 Network Simulator. Simulations are conducted in order to compare the performance of the AODV and DITD protocols. The simulation results show that the DITD model provides key distribution and trust path selection with minimal effect on the routing agent. The findings of the investigation confirm that DITD can be used as a basis for the operation of existing security protocols requiring a secure key distribution mechanism.