3,578 research outputs found

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    Authentication with Distortion Criteria

    Full text link
    In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.Comment: 22 pages, 10 figure

    The enablers and implementation model for mobile KMS in Australian healthcare

    Get PDF
    In this research project, the enablers in implementing mobile KMS in Australian regional healthcare will be investigated, and a validated framework and guidelines to assist healthcare in implementing mobile KMS will also be proposed with both qualitative and quantitative approaches. The outcomes for this study are expected to improve the understanding the enabling factors in implementing mobile KMS in Australian healthcare, as well as provide better guidelines for this process

    A review on structured scheme representation on data security application

    Get PDF
    With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application

    Foreword and editorial - May issue

    Full text link

    Copyright Protection for Surveillance System Multimedia Stream with Cellular Automata Watermarking

    Get PDF
    Intelligent Surveillance Systems are attracting extraordinary attention from research and industry. Security and privacy protection are critical issues for public acceptance of security camera networks. Existing approaches, however, only address isolated aspects without considering the integration with established security technologies and the underlying platform. Easy availability of internet, together with relatively inexpensive digital recording and storage peripherals has created an era where duplication, unauthorized use and misdistribution of digital content has become easier. The ease of availability made digital video popular over analog media like film or tape. At the same time it demands a sharp attention regarding the ownership issue. The ownership and integrity can easily be violated using different audio and video editing softwares. To prevent unauthorized use, misappropriation, misrepresentation; authentication of multimedia contents achieved a broad attention in recent days and to achieve secure copyright protection we embedded some information in audio and videos and that audio or video is called copyright protected. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The embedded information can’t be detected by human but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed different techniques. After having a good understanding of these techniques we have proposed a novel algorithm that generates results with high effectiveness, additionally we can use self-extracted watermark technique to increase the security and automate the process of watermarking. Forensic digital watermarking is a promising tool in the fight against piracy of copyrighted motion imagery content, but to be effective it must be (1) imperceptibly embedded in high-definition motion picture source, (2) reliably retrieved, even from degraded copies as might result from camcorder capture and subsequent very-low-bitrate compression and distribution on the Internet, and (3) secure against unauthorized removal. Audio and video watermarking enables the copyright protection with owner or customer authentication and the detection of media manipulations. The available watermarking technology concentrates on single media like audio or video. But the typical multimedia stream consists of both video and audio data. Our goal is to provide a solution with robust and fragile aspects to guarantee authentication and integrity by using watermarks in combination with content information. We show two solutions for the protection of audio and video data with a combined robust and fragile watermarking approach. The first solution is to insert a time code into the data: We embed a signal as a watermark to detect gaps or changes in the flow of time. The second solution is more complex: We use watermarks to embed information in each media about the content of the other media. In our paper we present the problem of copyright protection and integrity checks for combined video and audio data. Both the solutions depend upon cellular automata, cellular automata are a powerful computation model that provides a simple way to simulate and solve many difficult problems in different fields. The most widely known example of Cellular Automata is the Game-of-Life. Cellular automaton growth is controlled by predefined rule or programs .The rule describes how the cell will interact with its neighborhood. Once the automaton is started it will work on its own according to the rule specified.
    • …
    corecore