Penn State Researcher Developing Educational Tools To Help Fight Digital Piracy

Vishal Monga, an assistant professor of electrical engineering at Penn State University, is working on a method of analyzing images, audio files, videos and documents to prevent piracy, and he plans to develop a video game to help his students test piracy methods in an effort to combat the illegal online activity.

Monga received a five-year grant worth $500,000 from the National Science Foundation (NSF) to fund the endeavor. His project, "CAREER: Optimization Based Methods for Robust Pattern Recognition in Time-Series Data," involves using theory and algorithms to analyze images, audio files, video files, financial records and health care records to prevent piracy of those files. More specifically, he will use "convex optimization theory and algorithms in signal and image processing in image classification and recognition, computational imaging and robust signal hashing," according to information from Penn State.

According to Monga, it's difficult to catch digital pirates online. "The proposed research enables them to be caught," he said in a prepared statement. "If Sony or Columbia Pictures suspect their video has been illegally uploaded, this will help them find out who uploaded it and put a stop to it."

Monga will partner with Penn State's Educational Gaming Commons to develop a video game for his students. According to Monga, the game will let his students "see how the algorithms they're working on can be applied to real-world applications." From there, Monga and his students will integrate the ideas in their research to help fight piracy.

Monga's research interests include convex optimization methods in imaging, image processing and signal/image classification. He was granted the award through the NSF's Faculty Early Career Development Program (CAREER), which supports junior faculty who conduct outstanding research and demonstrate excellence in teaching and successfully integrate both.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • row of students using computers in a library

    A Return to Openness: Apereo Examines Sustainability in Open Source

    Surprisingly, on many of our campuses, even the IT leadership responsible for the lion's share of technology deployments doesn't realize the extent to which the institution is dependent on open source. And that lack of awareness can be a threat to campuses.

  • abstract pattern of cybersecurity, ai and cloud imagery

    OpenAI Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    New Cloud Security Auditing Tool Utilizes AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has announced a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • geometric grid of colorful faculty silhouettes using laptops

    Top 3 Faculty Uses of Gen AI

    A new report from Anthropic provides insights into how higher education faculty are using generative AI, both in and out of the classroom.