1,688 research outputs found

    Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Get PDF
    Abstract Image and video processing in the encrypted domain has recently emerged as a promising research area to tackle privacy-related data processing issues. In particular, reversible data hiding in the encrypted domain has been suggested as a solution to store and manage digital images securely in the cloud while preserving their confidentiality. However, although efficiency has been claimed with reversible data hiding techniques in encrypted images (RDHEI), reported results show that the cloud service provider cannot add more than 1 bit per pixel (bpp) of additional data to manage stored images. This paper highlights the weakness of RDHEI as a suggested approach for secure and privacy-preserving cloud computing. In particular, we propose a new, simple, and efficient approach that offers the same level of data security and confidentiality in the cloud without the process of reversible data hiding. The proposed idea is to compress the image via a lossless image coder in order to create space before encryption. This space is then filled with a randomly generated sequence and combined with an encrypted version of the compressed bit stream to form a full resolution encrypted image in the pixel domain. The cloud service provider uses the created room in the encrypted image to add additional data and produces an encrypted image containing additional data in a similar fashion. Assessed with the lossless Embedded Block Coding with Optimized Truncation (EBCOT) algorithm on natural images, the proposed scheme has been shown to exceed the capacity of 3 bpp of additional data while maintaining data security and confidentiality

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms

    Get PDF
    Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the security of e-books, data shows that information security issues can cause significant economic losses after three years Although cryptographic methods have been proposed as a solution in of these challenges Focusing on speed and efficiency The shortcomings of traditional encryption methods have been thoroughly examined Although a number of network management techniques assure retention privacy and integrity though, when it comes to encryption. Digital signature algorithms, although effective in detecting unauthorized changes and limiting the scope for copyright protection, do not ensure the confidentiality of shared electronic documents When addressing research gaps addressing this issue, the paper proposes a security framework for electronic documents that combines three important security mechanisms: encryption, digital signatures, and watermark algorithms Dhishu By matching their strengths, constraints are overcome. The combination of encryption and digital signatures is explored as a promising approach to protecting electronic documents, ensuring authenticity and confidentiality Importantly, the need to explore security mechanisms such as digital is highlighted emphasis on handwriting, encryption, and watermarking systems in depth

    Incorporating Quality Improvement and Problem-solving Into a Unit Safety Huddle

    Get PDF
    The complex nature of healthcare creates significant risks of harm to patients. Safety huddles are a mechanism some hospitals utilize to raise awareness of safety concerns and minimize risks. Typically occurring at the start of each shift, safety huddles generally take the form of a brief, structured discussion with visual management for information sharing. In addition, safety huddles create a safe space for nursing staff to escalate concerns, supporting a culture of safety. This quality improvement project describes the expansion of a safety huddle process that has become a mere ritual at the start of each shift on a 25-bed medicine unit at a large urban hospital in the Midwest to improve nursing staff engagement. Through a formal quality improvement and problem-solving approach, there is a clear plan of action to elevate issues and a process to engage and empower nursing staff in identifying, achieving, and hardwiring improvements. Margaret Newman\u27s Theory of Health as Expanding Consciousness concepts of pattern recognition, increased awareness, and higher consciousness serves as this project\u27s theoretical foundation. The success of this project will be measured using pre and post- employee engagement scores for questions related to safety, patient experience, and empowerment. In addition, the number of completed projects that meet target conditions and scorecard metrics for falls with harm and patient satisfaction will serve as secondary measures of success of the expanded safety huddle process. Engaging and empowering nursing staff in quality improvement and problem-solving supports a culture of safety, leading to improved patient safety and positive health outcomes

    History without Chronology

    Get PDF
    Although numerous disciplines recognize multiple ways of conceptualizing time, Stefan Tanaka argues that scholars still overwhelmingly operate on chronological and linear Newtonian or classical time that emerged during the Enlightenment. This short, approachable book implores the humanities and humanistic social sciences to actively embrace the richness of different times that are evident in non-modern societies and have become common in several scientific fields throughout the twentieth century. Tanaka first offers a history of chronology by showing how the social structures built on clocks and calendars gained material expression. Tanaka then proposes that we can move away from this chronology by considering how contemporary scientific understandings of time might be adapted to reconceive the present and pasts. This opens up a conversation that allows for the possibility of other ways to know about and re-present pasts. A multiplicity of times will help us broaden the historical horizon by embracing the heterogeneity of our lives and world via rethinking the complex interaction between stability, repetition, and change. This history without chronology also allows for incorporating the affordances of digital media

    Teacher 2020. On the Road to Entrepreneurial Fluency in Teacher Education

    Get PDF
    No abstract available

    'Unfinished Business': Public History in a Postcolonial Nation

    Full text link
    An examination of Public History in Australia from the nineteenth century in terms of memory, race and nationalism drawing on museums, memorials, rituals, celebrations and the 'history wars'

    HEBE, a novel positive regulator of senescence in Solanum lycopersicum

    Get PDF
    Leaf senescence and plant aging are traits of great interest for breeders. Senescing cells undergo important physiological and biochemical changes, while cellular structures such as chloroplasts are degraded with dramatic metabolic consequences for the whole plant. The possibility of prolonging the photosynthetic ability of leaves could positively impact the plant\u2019s life span with benefits for biomass production and metabolite accumulation; plants with these characteristics display a stay-green phenotype. A group of plant transcription factors known as NAC play a pivotal role in controlling senescence: here we describe the involvement of the tomato NAC transcription factor Solyc12g036480, which transcript is present in leaves and floral buds. Since its silencing delays leaf senescence and prevents plants from ageing, we renamed Solyc12g0364 H\u1e16B\u112, for the Greek goddess of youth. In this manuscript we describe how HEB downregulation negatively affects the progression of senescence, resulting in changes in transcription of senescence-promoting genes, as well as the activity of enzymes involved in chlorophyll degradation, thereby explaining the stay-green phenotype

    Social Media in Southeast Turkey

    Get PDF
    This book presents an ethnographic study of social media in Mardin, a medium-sized town located in the Kurdish region of Turkey. The town is inhabited mainly by Sunni Muslim Arabs and Kurds, and has been transformed in recent years by urbanisation, neoliberalism and political events. Elisabetta Costa uses her 15 months of ethnographic research to explain why public-facing social media is more conservative than offline life. Yet, at the same time, social media has opened up unprecedented possibilities for private communications between genders and in relationships among young people – Costa reveals new worlds of intimacy, love and romance. She also discovers that, when viewed from the perspective of people’s everyday lives, political participation on social media looks very different to how it is portrayed in studies of political postings separated from their original complex, and highly socialised, context
    • …
    corecore