Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (19)

Search Parameters:
Keywords = dynamic watermarking

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 5499 KiB  
Article
Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy
by Meidi Wang, Haoyun Liu, Pan Huang and Zhe Wu
Electronics 2024, 13(23), 4729; https://doi.org/10.3390/electronics13234729 - 29 Nov 2024
Viewed by 566
Abstract
Traditional anti-counterfeiting techniques and methods are inadequate to meet the modern, sophisticated anti-counterfeiting requirement in banknotes. We applied our homemade near-field scanning microwave microscopy (NSMM) for penetrating imaging of concealed anti-counterfeiting features in banknotes. This NSMM imaged and characterized several vital concealed anti-counterfeiting [...] Read more.
Traditional anti-counterfeiting techniques and methods are inadequate to meet the modern, sophisticated anti-counterfeiting requirement in banknotes. We applied our homemade near-field scanning microwave microscopy (NSMM) for penetrating imaging of concealed anti-counterfeiting features in banknotes. This NSMM imaged and characterized several vital concealed anti-counterfeiting features in the banknotes, including the dynamic color-shifting security threads, color-changing denomination numbers, magnetically embedded security threads, and white watermarks. At the same time, with the obstruction of red ink, near-field microwaves still penetrated the medium layer to characterize the detailed information of the security threads successfully. Additionally, the cavity perturbation method was used to obtain the effective permittivity of 3.65 and 3.62 for the windowing security thread and middle-embedded security thread. The thickness of the watermark was calculated to be about 3.3 μm with the calibrated fit method. Full article
Show Figures

Figure 1

18 pages, 718 KiB  
Article
Dynamic Black-Box Model Watermarking for Heterogeneous Federated Learning
by Yuying Liao, Rong Jiang and Bin Zhou
Electronics 2024, 13(21), 4306; https://doi.org/10.3390/electronics13214306 - 1 Nov 2024
Viewed by 863
Abstract
Heterogeneous federated learning, as an innovative variant of federated learning, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity in mobile computing scenarios. It introduces heterogeneous and personalized local models, which [...] Read more.
Heterogeneous federated learning, as an innovative variant of federated learning, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity in mobile computing scenarios. It introduces heterogeneous and personalized local models, which effectively accommodates the heterogeneous data distributions and hardware resource constraints of individual clients, and thus improves computation and communication efficiency. However, it poses a challenge to model ownership protection, as watermarks embedded in the global model are corrupted to varying degrees when they are migrated to a user’s heterogeneous model and cannot continue to provide complete ownership protection in the local models. To tackle these issues, we propose a dynamic black-box model watermarking method for heterogeneous federated learning, PWFed. Specifically, we design an innovative dynamic watermark generation method which is based on generative adversarial network technology and is capable of generating watermark samples that are virtually indistinguishable from the original carriers. This approach effectively solves the limitation of the traditional black-box watermarking technique, which only considers static watermarks, and makes the generated watermarks significantly improved in terms of stealthiness and difficult to detect by potential model thieves, thus enhancing the robustness of the watermarks. In addition, we design two watermark embedding strategies with different granularities in the heterogeneous federated learning environment. During the watermark extraction and validation phase, PWFed accesses watermark samples claiming ownership of the model through an API interface and analyzes the differences between their output and the expected labels. Our experimental results show that PWFed achieves a 99.9% watermark verification rate with only a 0.1–4.8% sacrifice of main task accuracy on the CIFAR10 dataset. Full article
Show Figures

Figure 1

23 pages, 4649 KiB  
Article
A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu, Ronghua Xu and Yu Chen
Future Internet 2024, 16(11), 390; https://doi.org/10.3390/fi16110390 - 24 Oct 2024
Cited by 1 | Viewed by 1107
Abstract
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is [...] Read more.
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is critical in enhancing road safety, traffic efficiency, and the overall driving experience by enabling a comprehensive data exchange platform. However, the open and dynamic nature of IoV networks brings significant performance and security challenges to IoV data acquisition, storage, and usage. To comprehensively tackle these challenges, this paper proposes a Decentralized Digital Watermarking framework for smart Vehicular networks (D2WaVe). D2WaVe consists of two core components: FIAE-GAN, a novel feature-integrated and attention-enhanced robust image watermarking model based on a Generative Adversarial Network (GAN), and BloVA, a Blockchain-based Video frames Authentication scheme. By leveraging an encoder–noise–decoder framework, trained FIAE-GAN watermarking models can achieve the invisibility and robustness of watermarks that can be embedded in video frames to verify the authenticity of video data. BloVA ensures the integrity and auditability of IoV data in the storing and sharing stages. Experimental results based on a proof-of-concept prototype implementation validate the feasibility and effectiveness of our D2WaVe scheme for securing and auditing video data exchange in smart vehicular networks. Full article
Show Figures

Figure 1

16 pages, 10786 KiB  
Article
Moving beyond the Content: 3D Scanning and Post-Processing Analysis of the Cuneiform Tablets of the Turin Collection
by Filippo Diara, Francesco Giuseppe Barsacchi and Stefano de Martino
Appl. Sci. 2024, 14(11), 4492; https://doi.org/10.3390/app14114492 - 24 May 2024
Viewed by 1152
Abstract
This work and manuscript focus on how 3D scanning methodologies and post-processing analyses may help us to gain a deeper investigation of cuneiform tablets beyond the written content. The dataset proposed herein is a key part of the archaeological collection preserved in the [...] Read more.
This work and manuscript focus on how 3D scanning methodologies and post-processing analyses may help us to gain a deeper investigation of cuneiform tablets beyond the written content. The dataset proposed herein is a key part of the archaeological collection preserved in the Musei Reali of Turin in Italy; these archaeological artefacts enclose further important semantic information extractable through detailed 3D documentation and 3D model filtering. In fact, this scanning process is a fundamental tool for better reading of sealing impressions beneath the cuneiform text, as well as for understanding micrometric evidence of the fingerprints of scribes. Most of the seal impressions were made before the writing (like a watermark), and thus, they are not detectable to the naked eye due to cuneiform signs above them as well as the state of preservation. In this regard, 3D scanning and post-processing analysis could help in the analysis of these nearly invisible features impressed on tablets. For this reason, this work is also based on how 3D analyses may support the identification of the unperceived and almost invisible features concealed in clay tablets. Analysis of fingerprints and the depths of the signs can tell us about the worker’s strategies and the people beyond the artefacts. Three-dimensional models generated inside the Artec 3D ecosystem via Space Spider scanner and Artec Studio software were further investigated by applying specific filters and shaders. Digital light manipulation can reveal, through the dynamic displacement of light and shadows, particular details that can be deeply analysed with specific post-processing operations: for example, the MSII (multi-scale integral invariant) filter is a powerful tool exploited for revealing hidden and unperceived features such as fingerprints and sealing impressions (stratigraphically below cuneiform signs). Finally, the collected data will be handled twofold: in an open-access repository and through a common data environment (CDE) to aid in the data exchange process for project collaborators and common users. Full article
Show Figures

Figure 1

20 pages, 1159 KiB  
Article
Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness
by Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Algorithms 2024, 17(1), 32; https://doi.org/10.3390/a17010032 - 12 Jan 2024
Cited by 2 | Viewed by 3632
Abstract
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today’s new challenging issues. To address [...] Read more.
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today’s new challenging issues. To address these issues, digital image watermarking techniques have been proposed by several researchers. Image watermarking can be conducted through several transformations, such as discrete wavelet transform (DWT), singular value decomposition (SVD), orthogonal matrix Q and upper triangular matrix R (QR) decomposition, and non-subsampled contourlet transform (NSCT). However, a single transformation cannot simultaneously satisfy all the design requirements of image watermarking, which makes a platform to design a hybrid invisible image watermarking technique in this work. The proposed work combines four-level (4L) DWT and two-level (2L) SVD. The Arnold map initially encrypts the watermark image, and 2L SVD is applied to it to extract the s components of the watermark image. A 4L DWT is applied to the host image to extract the LL sub-band, and then 2L SVD is applied to extract s components that are embedded into the host image to generate the watermarked image. The dynamic-sized watermark maintains a balanced visual impact and non-blind watermarking preserves the quality and integrity of the host image. We have evaluated the performance after applying several intentional and unintentional attacks and found high imperceptibility and improved robustness with enhanced security to the system than existing state-of-the-art methods. Full article
Show Figures

Figure 1

17 pages, 1823 KiB  
Article
E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios
by Lijun Zu, Hongyi Li, Liang Zhang, Zhihui Lu, Jiawei Ye, Xiaoxia Zhao and Shijing Hu
Future Internet 2023, 15(9), 283; https://doi.org/10.3390/fi15090283 - 22 Aug 2023
Cited by 5 | Viewed by 1495
Abstract
With the growing demand for data sharing file formats in financial applications driven by open banking, the use of the OFD (open fixed-layout document) format has become widespread. However, ensuring data security, traceability, and accountability poses significant challenges. To address these concerns, we [...] Read more.
With the growing demand for data sharing file formats in financial applications driven by open banking, the use of the OFD (open fixed-layout document) format has become widespread. However, ensuring data security, traceability, and accountability poses significant challenges. To address these concerns, we propose E-SAWM, a dynamic watermarking service framework designed for edge cloud scenarios. This framework incorporates dynamic watermark information at the edge, allowing for precise tracking of data leakage throughout the data-sharing process. By utilizing semantic analysis, E-SAWM generates highly realistic pseudostatements that exploit the structural characteristics of documents within OFD files. These pseudostatements are strategically distributed to embed redundant bits into the structural documents, ensuring that the watermark remains resistant to removal or complete destruction. Experimental results demonstrate that our algorithm has a minimal impact on the original file size, with the watermarked text occupying less than 15%, indicating a high capacity for carrying the watermark. Additionally, compared to existing explicit watermarking schemes for OFD files based on annotation structure, our proposed watermarking scheme is suitable for the technical requirements of complex dynamic watermarking in edge cloud scenario deployment. It effectively overcomes vulnerabilities associated with easy deletion and tampering, providing high concealment and robustness. Full article
Show Figures

Figure 1

14 pages, 30103 KiB  
Article
The Watermark Imaging System: Revealing the Internal Structure of Historical Papers
by Elisa Ou, Paul Messier, Ruixue Lian, Andrew Messier and William Sethares
Heritage 2023, 6(7), 5093-5106; https://doi.org/10.3390/heritage6070270 - 1 Jul 2023
Viewed by 2612
Abstract
This paper introduces the Watermark Imaging System (WImSy) which can be used to photograph, document, and study sheets of paper. The WImSy provides surface images, raking light images, and transmitted light images of the paper, all in perfect alignment. We develop algorithms that [...] Read more.
This paper introduces the Watermark Imaging System (WImSy) which can be used to photograph, document, and study sheets of paper. The WImSy provides surface images, raking light images, and transmitted light images of the paper, all in perfect alignment. We develop algorithms that exploit this alignment by combining several images together in a process that mimics both the “surface image removal” technique and the method of “high dynamic range” photographs. An improved optimization criterion and an automatic parameter selection procedure streamline the process and make it practical for art historians and conservators to extract the relevant information to study watermarks. The effectiveness of the method is demonstrated in several experiments on images taken with the WImSy at the Metropolitan Museum of Art in New York and at the Getty Museum in Los Angeles, and the results are compared with manually optimized images. Full article
Show Figures

Figure 1

22 pages, 12655 KiB  
Article
A Novel Fractional Sine Chaotic Map and Its Application to Image Encryption and Watermarking
by Dhakshinamoorthy Vignesh, Nur Aisyah Abdul Fataf and Santo Banerjee
Appl. Sci. 2023, 13(11), 6556; https://doi.org/10.3390/app13116556 - 28 May 2023
Cited by 6 | Viewed by 1516
Abstract
This article addresses the telecommunications industry’s priority of ensuring information security during the transition to next-generation networks. It proposes an image encryption system that combines watermarking techniques and a discrete fractional sine chaotic map. The authors also incorporate the principles of blockchain to [...] Read more.
This article addresses the telecommunications industry’s priority of ensuring information security during the transition to next-generation networks. It proposes an image encryption system that combines watermarking techniques and a discrete fractional sine chaotic map. The authors also incorporate the principles of blockchain to enhance the security of transmitted and received image data. The proposed system utilizes a newly developed sine chaotic map with a fractional difference operator, exhibiting long-term chaotic dynamics. The complexity of this map is demonstrated by comparing it with three other fractional chaotic maps from existing literature, using bifurcation diagrams and the largest Lyapunov exponent. The authors also show the map’s sensitivity to changes in initial conditions through time-series diagrams. To encrypt images, the authors suggest a method involving watermarking of two secret images and encryption based on blockchain technology. The cover image is watermarked with the two hidden images using discrete wavelet transformations. Then, the image pixels undergo diffusion using a chaotic matrix generated from the discrete fractional sine chaotic map. This encryption process aims to protect the image data and make it resistant to unauthorized access. To evaluate the algorithm, the authors perform statistical analysis and critical sensitivity analysis to examine its characteristics. They also analyse different attacks to assess the algorithm’s ability to resist such threats and maintain image quality after decryption. The results demonstrate that the proposed algorithm effectively defends against attacks and ensures image security. Full article
(This article belongs to the Special Issue Digital Image Security and Privacy Protection)
Show Figures

Figure 1

24 pages, 6492 KiB  
Article
A Model-Driven Platform for Dynamic Partially Reconfigurable Architectures: A Case Study of a Watermarking System
by Roukaya Dalbouchi, Chiraz Trabelsi, Majdi Elhajji and Abdelkrim Zitouni
Micromachines 2023, 14(2), 481; https://doi.org/10.3390/mi14020481 - 19 Feb 2023
Cited by 2 | Viewed by 2024
Abstract
The reconfigurable feature of FPGAs (Field-Programmable Gate Arrays) has made them a very attractive solution for implementing adaptive systems-on-chip. However, this implies additional design tasks to handle system reconfiguration and control, which increases design complexity. To address this issue, this paper proposes a [...] Read more.
The reconfigurable feature of FPGAs (Field-Programmable Gate Arrays) has made them a very attractive solution for implementing adaptive systems-on-chip. However, this implies additional design tasks to handle system reconfiguration and control, which increases design complexity. To address this issue, this paper proposes a model-driven design flow that guides the designer through the description of the different elements of a reconfigurable system. It is based on high-level modeling using an extended version of the MARTE (Modeling and Analysis of Real-Time and Embedded systems) UML (Unified Modeling Language) profile. Both centralized and decentralized reconfiguration decision-making solutions are possible with the proposed flow, allowing it to adapt to various reconfigurable systems constraints. It also integrates the IP-XACT standard (standard for the description of electronic Intellectual Properties), allowing the designer to easily target different technologies and commercial FPGAs by reusing both high-level models and actual IP-XACT hardware components. At the end of the flow, the implementation code is generated automatically from the high-level models. The proposed design flow was validated through a reconfigurable video watermarking application as a case study. Experimental results showed that the generated system allowed a good trade-off between resource usage, power consumption, execution time, and image quality compared to static implementations. This hardware efficiency was achieved in a very short time thanks to the design acceleration and automation offered by model-driven engineering. Full article
(This article belongs to the Special Issue Network on Chip (NoC) and Reconfigurable Systems)
Show Figures

Figure 1

19 pages, 3637 KiB  
Article
A Fine-Grained Network Congestion Detection Based on Flow Watermarking
by Lusha Mo, Gaofeng Lv and Baosheng Wang
Appl. Sci. 2022, 12(16), 8094; https://doi.org/10.3390/app12168094 - 12 Aug 2022
Cited by 2 | Viewed by 1686
Abstract
With the rapid development of the network, how to effectively reduce the dynamic delay and improve the performance of the network is an important and challenging problem. Specifically, network congestion is one of the key factors that hurt the network performance, so real-time [...] Read more.
With the rapid development of the network, how to effectively reduce the dynamic delay and improve the performance of the network is an important and challenging problem. Specifically, network congestion is one of the key factors that hurt the network performance, so real-time detection of the network congestion is critical for recovering the network failure quickly. Current research in congestion detection mainly faces the problems of occupying extra bandwidth, decreasing the ratio of the effective payload of the packet, increasing the burden of the switches, etc. In this paper, we apply flow watermarking to network congestion detection and propose a fine-grained network congestion detection method based on flow watermarking. We also combine it with the eBPF (extended Berkeley Packet Filter) to improve the performance of congestion detection. Theoretical analysis and experimental results show that the changes in network status can be reflected in real-time and accurately in the watermark decoding information. The network congestion detection based on flow watermarking can detect network status on a small time scale and realize low-overhead and easily deployed congestion detection. Full article
Show Figures

Figure 1

13 pages, 21016 KiB  
Article
A Novel Zero Watermarking Based on DT-CWT and Quaternion for HDR Image
by Jiangtao Huang, Shanshan Shi, Zhouyan He and Ting Luo
Electronics 2021, 10(19), 2385; https://doi.org/10.3390/electronics10192385 - 29 Sep 2021
Cited by 4 | Viewed by 1884
Abstract
This paper presents a high dynamic range (HDR) image zero watermarking method based on dual tree complex wavelet transform (DT-CWT) and quaternion. In order to be against tone mapping (TM), DT-CWT is used to transform the three RGB color channels of the HDR [...] Read more.
This paper presents a high dynamic range (HDR) image zero watermarking method based on dual tree complex wavelet transform (DT-CWT) and quaternion. In order to be against tone mapping (TM), DT-CWT is used to transform the three RGB color channels of the HDR image for obtaining the low-pass sub-bands, respectively, since DT-CWT can extract the contour of the HDR image and the contour change of the HDR image is small after TM. The HDR image provides a wide dynamic range, and thus, three-color channel correlations are higher than inner-relationships and the quaternion is used to consider three color channels as a whole to be transformed. Quaternion fast Fourier transform (QFFT) and quaternion singular value decomposition (QSVD) are utilized to decompose the HDR image for obtaining robust features, which is fused with a binary watermark to generate a zero watermark for copyright protection. Furthermore, the binary watermark is scrambled for the security by using the Arnold transform. Experimental results denote that the proposed zero-watermarking method is robust to TM and other image processing attacks, and can protect the HDR image efficiently. Full article
(This article belongs to the Special Issue Theory and Applications in Digital Signal Processing)
Show Figures

Figure 1

20 pages, 13007 KiB  
Article
Generalized Reversible Data Hiding with Content-Adaptive Operation and Fast Histogram Shifting Optimization
by Limengnan Zhou, Hongyu Han and Hanzhou Wu
Entropy 2021, 23(7), 917; https://doi.org/10.3390/e23070917 - 19 Jul 2021
Cited by 3 | Viewed by 2589
Abstract
Reversible data hiding (RDH) has become a hot spot in recent years as it allows both the secret data and the raw host to be perfectly reconstructed, which is quite desirable in sensitive applications requiring no degradation of the host. A lot of [...] Read more.
Reversible data hiding (RDH) has become a hot spot in recent years as it allows both the secret data and the raw host to be perfectly reconstructed, which is quite desirable in sensitive applications requiring no degradation of the host. A lot of RDH algorithms have been designed by a sophisticated empirical way. It is not easy to extend them to a general case, which, to a certain extent, may have limited their wide-range applicability. Therefore, it motivates us to revisit the conventional RDH algorithms and present a general framework of RDH in this paper. The proposed framework divides the system design of RDH at the data hider side into four important parts, i.e., binary-map generation, content prediction, content selection, and data embedding, so that the data hider can easily design and implement, as well as improve, an RDH system. For each part, we introduce content-adaptive techniques that can benefit the subsequent data-embedding procedure. We also analyze the relationships between these four parts and present different perspectives. In addition, we introduce a fast histogram shifting optimization (FastHiSO) algorithm for data embedding to keep the payload-distortion performance sufficient while reducing the computational complexity. Two RDH algorithms are presented to show the efficiency and applicability of the proposed framework. It is expected that the proposed framework can benefit the design of an RDH system, and the introduced techniques can be incorporated into the design of advanced RDH algorithms. Full article
(This article belongs to the Special Issue Information Hiding and Coding Theory)
Show Figures

Figure 1

25 pages, 1431 KiB  
Article
SACT: A New Model of Covert Communication Based on SDN
by Leyi Shi, Yuxiao Song, Zhiyu Xue, Yihao Liu and Honglong Chen
Sensors 2020, 20(24), 7300; https://doi.org/10.3390/s20247300 - 19 Dec 2020
Cited by 1 | Viewed by 2034
Abstract
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability. Software Defined Network (SDN) boasts more freedom thanks to its separation of the control plane from the data plane. [...] Read more.
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability. Software Defined Network (SDN) boasts more freedom thanks to its separation of the control plane from the data plane. In this paper, a new anonymous communication tracking model SDN-based Anonymous Communication Tracking (SACT) is proposed, which introduces network watermarking into SDN and combines IP time hidden channel and symbol expansion technology. In addition, we introduce a hopping protection mechanism to improve the anti detection ability of the watermark as well. The experimental results show that in a variety of simulated network environments, SACT achieves excellent detection rate and bit error rate, thus it is sufficient to determine the communication relationship between the two parties. Meanwhile, SACT solves the deployment problem of anonymous tracking and improves the availability and scalability of covert communication. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

4 pages, 165 KiB  
Editorial
Symmetry-Adapted Machine Learning for Information Security
by Jong Hyuk Park
Symmetry 2020, 12(6), 1044; https://doi.org/10.3390/sym12061044 - 22 Jun 2020
Cited by 6 | Viewed by 2762
Abstract
Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from industries and academic fields have presented their methodologies for [...] Read more.
Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from industries and academic fields have presented their methodologies for supporting defense against security threats. However, these existing approaches have failed to deal with security challenges in next-generation ICT systems due to the changing behaviors of security threats and zero-day attacks, including advanced persistent threat (APT), ransomware, and supply chain attacks. The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis of data to identify hidden patterns of data. It offers the identification of unknown and new attack patterns by extracting hidden data patterns in next-generation ICT systems. Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas. These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis. Full article
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
21 pages, 6376 KiB  
Article
SLA-Based Adaptation Schemes in Distributed Stream Processing Engines
by Muhammad Hanif, Eunsam Kim, Sumi Helal and Choonhwa Lee
Appl. Sci. 2019, 9(6), 1045; https://doi.org/10.3390/app9061045 - 13 Mar 2019
Cited by 3 | Viewed by 4234
Abstract
With the upswing in the volume of data, information online, and magnanimous cloud applications, big data analytics becomes mainstream in the research communities in the industry as well as in the scholarly world. This prompted the emergence and development of real-time distributed stream [...] Read more.
With the upswing in the volume of data, information online, and magnanimous cloud applications, big data analytics becomes mainstream in the research communities in the industry as well as in the scholarly world. This prompted the emergence and development of real-time distributed stream processing frameworks, such as Flink, Storm, Spark, and Samza. These frameworks endorse complex queries on streaming data to be distributed across multiple worker nodes in a cluster. Few of these stream processing frameworks provides fundamental support for controlling the latency and throughput of the system as well as the correctness of the results. However, none has the ability to handle them on the fly at runtime. We present a well-informed and efficient adaptive watermarking and dynamic buffering timeout mechanism for the distributed streaming frameworks. It is designed to increase the overall throughput of the system by making the watermarks adaptive towards the stream of incoming workload, and scale the buffering timeout dynamically for each task tracker on the fly while maintaining the Service Level Agreement (SLA)-based end-to-end latency of the system. This work focuses on tuning the parameters of the system (such as window correctness, buffering timeout, and so on) based on the prediction of incoming workloads and assesses whether a given workload will breach an SLA using output metrics including latency, throughput, and correctness of both intermediate and final results. We used Apache Flink as our testbed distributed processing engine for this work. However, the proposed mechanism can be applied to other streaming frameworks as well. Our results on the testbed model indicate that the proposed system outperforms the status quo of stream processing. With the inclusion of learning models like naïve Bayes, multilayer perceptron (MLP), and sequential minimal optimization (SMO)., the system shows more progress in terms of keeping the SLA intact as well as quality of service (QoS). Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Back to TopTop