Creating an immune system of IoT| From Enigma to IoT Ep #7

Creating an immune system of IoT| From Enigma to IoT Ep #7

In this episode, we find out about Jack Wolosewicz’s, CEO & CTO, Co-Founder, first foray into cybersecurity. It dates back to the late 90s while working on protecting rights to the music files on the web. Initially, it was all about tracking music on the web and developing a system which is known as ‘digital rights management.’

Audio watermarking

One of his pioneering ideas was how to create a code which is hidden in music – a sonic code. That was the first time a sound was used to protect something or somebody in the cyberspace – in our case it regarded music recording. It was dubbed as audio watermarking and has been a standard ever since for Audio Recording Association of America.

Although not a new issue, music piracy has acquired a new status in the digital era, as recordings can be easily copied and distributed. Watermarking has been proposed as a solution to this problem. It consists in embedding into the audio signal an inaudible mark containing copyright information. A different approach, called fingerprinting, consists in extracting a “fingerprint” from the audio signal. In association with a database, this fingerprint can be used to identify a recording, which is useful, for example, to monitor audio excerpts played by broadcasters and webcasters. There are far more applications to watermarking and fingerprinting. After a brief technical review, this article describes potential applications of both methodologies, showing which one is more suitable for each application.

More on audio watermarking you can read in Audio Watermarking and Fingerprinting: For Which Applications? article by Leandro de C.T. Gomes1, Pedro Cano2, Emilia Gómez2, Madeleine Bonnet1, Eloi Batlle2 representing Universitat Pompeu Fabra, Barcelona, Spain And Université René Descartes, Paris, France, published in Journal of New Music Research. 

Steganography in Cyberus Labs’s solutions

In the late 90s Jack was studying at Cambridge University various cryptographic techniques including steganography, which literally meant hiding information into other piece of information.

Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique.

More on steganography you can read in International Journal of Computer Applications, in the article „Steganography- A Data Hiding Technique” by Arvind Kumar, Assistant Professor, Vidya College of engineering, Meerut, India and Km. Pooja from Vankateshwara institute of computer Science and technology, Meerut, India.

We use the same in IoT, because when we transmit a sound it is not just a sound but includes a piece of information which is specifically designed to be very secure” – Jacek Wolosiewicz says in this episode.

In the movie you will find out also, how Jacek’s visit to Cambridge University and seeing Enigma influenced his way of thinking about cybersecurity.

Watch the video and check out how we transferred above to elaborate our solutions ELIoT Pro and Cyberus Key, and bringing cybersecurity to the next level.