Tag Archives: Technology

Ciphers Thwart Generative AI Plagiarism

Watermarks in Plaintext

Combined with massive compute cycles, multiple ciphers can be embedded in Generative AI text output without the recipient’s knowledge of which ciphers are applied. One or more ciphers can be used. The more text the AI generates, the more ciphers are applied.

If a person attempts to use an AI-generated text fraudulently, such as submitting a research paper to a professor, the professor could electronically upload/scan the submitted research paper to ChatGPT, assuming ChatGPT, based on current popular opinion. This new interface will then scan their massive library of Book Cipher keys looking to detect one or more ciphers that may have been used when the text was generated. The larger number of cipher algorithms and the amount of generative AI text output becomes more secure.

Generative AI embeds multiple text watermarks that can be identified. It’s not bullet proof whereby the person using the generative AI output can attempt to move the words around, use different words, synonymous for words, and even move paragraphs around.

The output from a ChatGPT scan to search for ciphers can be used to determine the probability (%) that generative AI was used to produce the document.

The AI community, at large, can produce a centralized hub for all documents to be searched regardless of the Generative AI bot used. All the Generative AI company participants using the same hub would close the possible gap to increase the identification of Generative AI output.

Application of a Book Cipher

In the 2004 film National Treasure, a book cipher (called an “Ottendorf cipher”) is discovered on the back of the U.S. Declaration of Independence, using the “Silence Dogood” letters as the key text.

How a “Book Cipher” Works

book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key. A simple version of such a cipher would use a specific book as the key, and would replace each word of the plaintext by a number that gives the position where that word occurs in that book. For example, if the chosen key is H. G. Wells‘s novel The War of the Worlds, the plaintext “all plans failed, coming back tomorrow” could be encoded as “335 219 881, 5600 853 9315” — since the 335th word of the novel is “all“, the 219th is “plans“, etc. This method obviously requires that the sender and receiver have the exact same key book.

The Book Cipher can also be applied using letters instead of words, requiring fewer words to apply ciphers.

Solution Security

Increase the Number of Book Ciphers

The increased number of ciphers in one Generative AI “product” decreases the ability to “reverse engineer” / solve Book Ciphers. The goal is to embed ciphers in Generative AI “products”, as many as technically possible.

Increase the Complexity of Inserted Book Ciphers

Leveraging a “Word Search” like approach, the path to identify the words or letters in the Generative AI “Product” may not need to be read/scanned like English, from left to right. It may be read/scanned for cipher components from top to bottom or right to left.

How to Keep “Book Ciphers” for Generative AI Publically Secret

Email Composer: Persona Point of View (POV) Reviews

First, there was Spell Check, next Thesaurus, Synonyms, contextual grammar suggestions, and now Persona, Point of View Reviews. Between the immensely accurate and omnipresent #Grammarly and #Google’s #Gmail Predictive Text, I starting thinking about the next step in the AI and Human partnership on crafting communications.

Google Gmail Predictive Text

Google gMail predictive text had me thinking about AI possibilities within an email, and it occurred to me, I understand what I’m trying to communicate to my email recipients but do I really know how my message is being interpreted?

Google gMail has this eerily accurate auto suggestive capability, as you type out your email sentence gMail suggests the next word or words that you plan on typing. As you type auto suggestive sentence fragments appear to the right of the cursor. It’s like reading your mind. The most common word or words that are predicted to come next in the composer’s eMail.

Personas

In the software development world, it’s a categorization or grouping of people that may play a similar role, behave in a consistent fashion. For example, we may have a lifecycle of parking meters, where the primary goal is the collection of parking fees. In this case, personas may include “meter attendant”, and “the consumer”. These two personas have different goals, and how they behave can be categorized. There are many such roles within and outside a business context.

In many software development tools that enable people to collect and track user stories or requirements, the tools also allow you to define and correlate personas with user stories.

As in the case of email composition, once the email has been written, the composer may choose to select a category of people they would like to “view from their perspective”. Can the email application define categories of recipients, and then preview these emails from their perspective viewpoints?

What will the selected persona derive from the words arranged in a particular order? What meaning will they attribute to the email?

Use Personas in the formulation of user stories/requirements; understand how Personas will react to “the system”, and changes to the system.

Finally the use of the [email composer] solution based on “actors” or “personas”. What personas’ are “out of the box”? What personas will need to be derived by the email composer’s setup of these categories of people? Wizard-based Persona definitions?

There are already software development tools like Azure DevOps (ADO), which empower teams to manage product backlogs and correlate “User Stories”, or “Product Backlog Items” with Personas. These are static personas, that are completely user-defined, and no intelligence to correlate “user stories” with personas”. Users of ADO must create these links.

Now, technology can assist us to consider the intended audience, a systematic, biased perspective using Artificial Intelligence to inspect your email based on selected “point of view” (a Persons) of the intended email. Maybe your email will be misconstrued as abrasive, and not the intended response.

Deep Learning vs Machine Learning – Overview & Differences – Morioh

Machine learning and deep learning are two subsets of artificial intelligence which have garnered a lot of attention over the past two years. If you’re here looking to understand both the terms in the simplest way possible, there’s no better place to be..
— Read on morioh.com/p/78e1357f65b0

Free Nights and Weekends Makes a Comeback

Remember when you could make free mobile calls after 9:30 PM weeknights, and all weekend? For awhile the mobile carriers competed on the time when “off-peak” started, from 10 PM to 8:30 PM. A whole hour and a half! These days we have unlimited domestic calling all the time.

So, now we have varying degrees of data plans, such as AT&T Wireless 3 GB, 9 GB, or unlimited per month, but there are caps where after 22 GB data transfer speeds are slowed down.  22 gigs seem like a lot until you have kids using Snapchat and TikTok.

When you think about it, data peak is when you may not be in a hot spot. At night, you’re at home using your own WiFi, or at an establishment with their complimentary WiFi. Weekends and weekdays are a bit scattered. Your work may have WiFi, but weekdays “on peak” are mostly commuting times, the “rush hour(s)”,

Can wireless carriers bring back on and off-peak for data?  The simplest approach:  “turn off the meter” during off-peak data periods.  Maybe on-peak the consumer can elect 5G, when available, and off-peak at 4G LTE? Our Smartphones can identify low consuming bandwidth opportunities, e.g. when the phone is locked, text messages without graphics and email are semi-passive states. Maybe users are able to prioritize their apps data usage? What about those “chatty” apps that you rarely use? Smartphone settings may show you those apps bandwidth consumption as opportunities to prioritize them lower than your priority apps.

Skeptic, and think there are no Peak or Off-Peak periods with data?  Check the business analytics.  I’m sure wireless carriers have a depth of understanding for their own business intelligence (BI).

As your Digital Assistant, Siri Will Answer Incoming Calls

Voice mail is so LAST Century. It’s a static communications interface to address your incoming phone calls. It’s a dinosaur in terms of communications protocol. Yes, a digital assistant, or chat bots should “field” your incoming calls, providing your callers a higher level of service.

Business or Personal?

Why not both? There are use cases which highlight the value of a Digital Assistant answering your phone calls when you’re unavailable.

Trusted Friends and Business Pins

Level of available services may change based upon the level of trusted access, such as:

  • Friends Seeking Your Availability for a Hockey Game Next Week
  • Business Partners Sharing Information access such as invoices

Untrusted Caller Access

  • The Vetting of Unsolicited Calls, such as robocalls

Defining and Default Dialogs

Users can define dialogs through drop and drag workflow diagram tools making it easy to “build” conversations / dialogs flows. In addition, out of the box flows can provide administrators with opportunities and discover the ways in which AI digital assistant may be leveraged.

Canned / Default dialog templates to handle the most common dialogs / workflows will empower users to the implement rapidly.

Any Acquisitions in the Pipeline?

Are the big names in the Digital Assistant space looking to partner or acquire tools that can easily transform workflows to be leveraged by digital assistant?

  • IBM’s Conversations – chatbot dialog definition tool
  • Interactive Voice Response (IVR) solutions

APIs available on Mobile OS SDKs?

Are the components available for third party product companies to extend the Mobile OS capabilities as of now? Or are the mobile OS companies the only ones in a possession of performing these upgrades?

Cryptocurrency + Quantum Computing := Encryption Fail, The Next Y2K

Over the last several months I’ve been researching Quantum Computing (QC) and trying to determine how far we’ve come from the theoretical to the practical implementation.  It seems we are in the early commercial prototypical phase.

Practical Application of QC

The most discussed application of Quantum Computing has been to crack encryption.  Encrypted data that may take months or years to decipher given our current supercomputing capabilities, may take hours or minutes when the full potential of Quantum Computing has been realized.

Bitcoin and Ethereum Go Boom

One source paraphrased: Once quantum computing is actualized, encryption will be in lockstep progress, and a new cryptology paradigm will be implemented to secure our data. This kind of optimism has no place in the “Real World”. and most certainly not in the world financial markets.   Are there hedge funds which rightfully hedge against the cryptocurrency / QC risk paradigm?

Where is the Skepticism?

Is there anyone researching next steps in the evolution of cryptography/encryption, hedging the risk that marketplace encryption will be ready? The lack of fervor in the development of “Quantum Computing Ready” encryption has me speechless. Government organizations like DARPA / SBIR should already be at a conceptual level if not at the prototypical phase with next-generation cryptology.

Too Many Secrets

Sneakers“, a classic fictional action movie with a fantastic cast, and its plot, a mathematician in secret develops the ultimate code-breaking device, and everyone is out to possess the device.  An excellent movie soon to be non-fictional..?

References:

 

Building AI Is Hard—So Facebook Is Building AI That Builds AI

“…companies like Google and Facebook pay top dollar for some really smart people. Only a few hundred souls on Earth have the talent and the training needed to really push the state-of-the-art [AI] forward, and paying for these top minds is a lot like paying for an NFL quarterback. That’s a bottleneck in the continued progress of artificial intelligence. And it’s not the only one. Even the top researchers can’t build these services without trial and error on an enormous scale. To build a deep neural network that cracks the next big AI problem, researchers must first try countless options that don’t work, running each one across dozens and potentially hundreds of machines.”


This article represents a true picture of where we are today for the average consumer and producer of information, and the companies that repurpose information, e.g. in the form of advertisements.  
The advancement and current progress of Artificial Intelligence, Machine Learning, analogously paints a picture akin to the 1970s with computers that fill rooms, and accept punch cards as input.
Today’s consumers have mobile computing power that is on par to the whole rooms of the 1970s; however, “more compute power” in a tinier package may not be the path to AI sentience.  How AI algorithm models are computed might need to take an alternate approach.  
In a classical computation system, a bit would have to be in one state or the other. However quantum mechanics allows the qubit to be in a superposition of both states at the same time, a property which is fundamental to quantum computing.
The construction, and validation of Artificial Intelligence, Machine Learning, algorithm models should be engineered on a Quantum Computing framework.

Financial Technology – Categories of FinTech Solutions

FinTech refers to new solutions which demonstrate an incremental or radical / disruptive innovation development of applications, processes, products or business models in the financial services industry. These solutions can be differentiated in at least five areas.

  1. First, the banking or insurance sector are distinguished as potential business sectors. Solutions for the insurance industry are often more specifically named “InsurTech”.
  2. Second, the solutions differ with regard to their supported business processes such as financial information, payments, investments, financing, advisory and cross-process support.[4] An example is mobile payment solutions.
  3. Third, the targeted customer segment distinguishes between retail, private and corporate banking as well as life and non-life insurance. An example are telematics-based insurances that calculate the fees based on customer behaviour in the area of non-life insurances.
  4. Fourth, the interaction form can either be business-to-business (B2B), business-to-consumer (B2C) or consumer-to-consumer (C2C). An example are social trading solutions for C2C.
  5. Fifth, the solutions vary with regard to their market position. Some for example provide complementary services such as personal finance management systems, others focus on competitive solutions such as e.g. peer-to-peer lending.

Global investment in financial technology increased more than twelvefold from $930 million in 2008 to more than $12 billion in 2014

Source: Financial technology – Wikipedia, the free encyclopedia