Proposal of Access Control Scheme and Digital Watermarking to Prevent Information Leakage
What kind of research?
A method of changing the read/write permissions of a file according to the role of the user is called access control. In our laboratory, we theoretically analyze the risk of information leakage that can occur when using this access control.
We are also proposing various approaches to digital watermarking, a method of embedding information for copyright protection.
There are many types of IoT devices, and each one tends to behave differently, making it very difficult to detect attacks. This paper aims to find a way to accurately detect DDoS attacks with as little computation as possible while supporting a wide variety of devices. We are aiming to create a detection system that is robust against device differences, lightweight, and easy to use.
We aim to minimize the differences between the embedded image and the original image as much as possible by successfully embedding the necessary information. For example, by using the characteristics of the compression method used to embed JPEG images, which have a rough image quality, it is possible to embed necessary information without feeling any difference from the original JPEG image. We also propose a technique to manage watermark information using blockchain technology used in Bitcoin.