11 research outputs found

    Security issues in watermarking applications - a deeper look

    Full text link
    Although it is clear that security is an important issue in digital watermarking applications, the main concerns ad-dressed by the current literature are robustness, capacity and imperceptibility. The inadequacy of the prevailing de-sign paradigm in tackling security issues is mainly due to an incomplete assessment of the threat model. The goal of this paper is to take a detailed and rigorous look at the threat model for a variety of watermarking applications. In this extended abstract, we outline the security requirements for a few common watermarking applications and explore in more detail the threat model for a specific application that involves establishing ownership of multimedia content

    Cyber Law and Espionage Law as Communicating Vessels

    Get PDF
    Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225. Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp

    A Legal Analysis

    Get PDF
    The study of counterfeiting and falsification of medicinal products, from a legal perspective, is a relatively new area in the EU. Specific regulations that focus on falsification of medicines came as recently as 2011. Therefore, this discipline is also new for research. There are two primary objectives of the thesis. The first is to analyse how EU law addresses counterfeiting and falsification of medicinal products, (Directive 2011/62/EU, Directive 2004/48/EC, and Regulation 608/2013) – de lege lata. The second is to analyse whether the law containing tools to combat counterfeiting and falsification of medicinal products meets the social objectives of public health (Articles 9 and 168) and consumer protection (Articles 12 and 169), as envisaged by the Treaty on the Function of the European Union. The thesis establishes that the problem of counterfeiting and falsification of medicinal products lies at the intersection of three spheres of law - IP law, Medicine law, and Criminal law. This insight provides the foundation for the understanding of the weaknesses in the legal regime that contains tools for combatting counterfeiting and falsification of medicines in the EU

    Applied Metaheuristic Computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC

    Tematski zbornik radova međunarodnog značaja. Tom 3 / Međunarodni naučni skup “Dani Arčibalda Rajsa”, Beograd, 10-11. mart 2016.

    Get PDF
    In front of you is the Thematic Collection of Papers presented at the International Scientific Conference “Archibald Reiss Days”, which was organized by the Academy of Criminalistic and Police Studies in Belgrade, in co-operation with the Ministry of Interior and the Ministry of Education, Science and Technological Development of the Republic of Serbia, National Police University of China, Lviv State University of Internal Affairs, Volgograd Academy of the Russian Internal Affairs Ministry, Faculty of Security in Skopje, Faculty of Criminal Justice and Security in Ljubljana, Police Academy “Alexandru Ioan Cuza“ in Bucharest, Academy of Police Force in Bratislava and Police College in Banjaluka, and held at the Academy of Criminalistic and Police Studies, on 10 and 11 March 2016. The International Scientific Conference “Archibald Reiss Days” is organized for the sixth time in a row, in memory of the founder and director of the first modern higher police school in Serbia, Rodolphe Archibald Reiss, PhD, after whom the Conference was named. The Thematic Collection of Papers contains 165 papers written by eminent scholars in the field of law, security, criminalistics, police studies, forensics, informatics, as well as by members of national security system participating in education of the police, army and other security services from Belarus, Bosnia and Herzegovina, Bulgaria, China, Croatia, Greece, Hungary, Macedonia, Montenegro, Romania, Russian Federation, Serbia, Slovakia, Slovenia, Spain, Switzerland, Turkey, Ukraine and United Kingdom. Each paper has been double-blind peer reviewed by two reviewers, international experts competent for the field to which the paper is related, and the Thematic Conference Proceedings in whole has been reviewed by five competent international reviewers. The papers published in the Thematic Collection of Papers contain the overview of contemporary trends in the development of police education system, development of the police and contemporary security, criminalistic and forensic concepts. Furthermore, they provide us with the analysis of the rule of law activities in crime suppression, situation and trends in the above-mentioned fields, as well as suggestions on how to systematically deal with these issues. The Collection of Papers represents a significant contribution to the existing fund of scientific and expert knowledge in the field of criminalistic, security, penal and legal theory and practice. Publication of this Collection contributes to improving of mutual cooperation betw

    Applied Methuerstic computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC

    Code: Version 2.0

    Get PDF
    Discusses the regulation of cyberspace via code, as well as possible trends to expect in this regulation. Additional topics discussed in this context include intellectual property, privacy, and free speech

    The Informal Screen Media Economy of Ukraine

    Get PDF
    This research explores informal film translation (voice over and subtitling) and distribution (pirate streaming and torrenting) practices in Ukraine, which together comprise what I call the informal screen media economy of Ukraine. This study addresses wider issues of debate around the distinct reasons media piracy exists in non-Western economies. There is already a considerable body of research on piracy outside of the traditional anti-piracy discourse, one that recognises that informal media are not all unequivocally destructive nor that they are necessarily marginal, particularly in non-Western countries. Yet, there remain gaps in the range of geographies and specific types of pirate practices being studied. Furthermore, academics often insufficiently address the intricate conditions of the context within which a given pirate activity is undertaken. Finally, whereas many researchers talk about pirates, considerably fewer talk to them. This project sets out to address these gaps. Specifically, I examine the distinct practicalities of the informal screen media practices in Ukraine through netnographic observations of pirate sites and in-depth interviews with the Ukrainian informal screen media practitioners. I explore their notably diverse motivations for engaging in these activities and how they negotiate their practices with the complex economic, cultural, and regulatory context of Ukraine. I find that, contrary to common perceptions, the Ukrainian pirates do not oppose the copyright law but operate largely within and around it. A more important factor in piracy in Ukraine instead is the economics of the Ukrainian language. This is reflected in the language exclusivity inherent to most Ukrainian pirate distribution platforms as well as in the motives of some informal translators, for whom their practice is a form of language activism. Overall, I argue for a more holistic approach to researching the informal space of the media economy, especially in non-Western contexts, one that recognises the heterogeneity of this space and explores accordingly intricate factors behind its existence. In addition, this project offers a methodological contribution by providing a detailed reflection on the use of ethnographic methods to study a pirate economy in a non-Western, non-anglophone country
    corecore