5,664 research outputs found

    Development of Visual Cryptography Technique for Authentication Using Facial Images

    Get PDF
    Security in the real world is an important issue to be taken care and to be encountered with various aspects and preventive measures. In the present era, whole major security concerns is the protection of this multimedia web is coming closer from text data to multimedia data, one of the data. Image, which covers the highest percentage of the multimedia data, its protection is very important. These might include Military Secrets, Commercial Secrets and Information of individuals. This can be achieved by visual Cryptography. It is one kind of image encryption. Incurrent technology, most of visual cryptography areembedded a secret using multiple shares. Visual is secret sharing technique used in visual cryptography which divides the secret image into multiple shares and by superimposing those shares the original secret image is going to be revealed, but it create a threat when an intruder get shares with which the image is going to be decrypted easily. However in these project work, an extremely useful bitwise operation is perform on every pixel with the help of key. The key is provided by new concept of sterilization algorithm. Initially Red, Green and Blue channels get separated from image and are going to be encrypted on multiple levels using multiple shares, convert an image into unreadable format and by combining all the shares in proper sequence the original secret image revealed

    Reforming state enterprises in socialist economies : guidelines for leasing them to entrepreneurs

    Get PDF
    Since the state has proven to be incompetent in its management of state owned enterprises a new structure must be found that takes into account the incompetence of the state but ensures that the state's economic interests are preserved the best way possible. Two of the most difficult tasks in this process are how to exercise ownership rights to assets and simultaneously delegate decision making to the management of the firm. This paper finds that the solution of these problems is to lease state owned enterprises to entrepreneurs through contracts derived from the principal-agent literature where the state is the principal and the agent is the lessee. Since the state needs to delegate responsibility to the management of state owned enterprises, the process of reform becomes in reality a principal-agent problem. To facilitate the reform process it is necessary to establish a credit market because the lessee may have investment plans that need to be financed. So far no country has yet tried to implement lease schemes based on principal-agent contracts. Future work needs to build a bridge between theory and reality to see whether they both can benefit from the interaction.Health Economics&Finance,International Terrorism&Counterterrorism,Economic Theory&Research,Banks&Banking Reform,Environmental Economics&Policies

    Efficient data intensive secure computation : fictional or real

    Get PDF
    Secure computation has the potential to completely reshape the cybersecruity landscape, but this will happen only if we can make it practical. Despite significant improvements recently, secure computation is still orders of magnitude slower than computation in the clear. Even with the latest technology, running the killer apps, which are often data intensive, in secure computation is still a mission impossible. In this paper, I present two approaches that could lead to practical data intensive secure computation. The first approach is by designing data structures. Traditionally, data structures have been widely used in computer science to improve performance of computation. However, in secure computation they have been largely overlooked in the past. I will show that data structures could be effective performance boosters in secure computation. Another approach is by using fully homomorphic encryption (FHE). A common belief is that FHE is too inefficient to have any practical applications for the time being. Contrary to this common belief, I will show that in some cases FHE can actually lead to very efficient secure computation protocols. This is due to the high degree of internal parallelism in recent FHE schemes. The two approaches are explained with Private Set Intersection (PSI) as an example. I will also show the performance figures measured from prototype implementations

    Oil unions and democracy in post-Saddam Iraq

    Full text link
    Since the invasion of 2003, a complex array of political, religious and ethno-sectarian factions have formed civil society movements; uncensored news has been consumed across the nation; ordinary citizens have taken to the streets to protest key government decisions; and various local councils have been formed, deliberating on key decisions facing their immediate communities. Given this context, this paper focuses on the specific case of the Iraqi Federation of Oil Unions (IFOU), Iraq’s largest and most powerful independent workers union. The IFOU has repeatedly taken the Iraqi government to task over their poor pay and the dangerous nature of their work, as well as the government’s initial kowtowing to US plans to privatise the entire Iraqi oil sector. To do this, the IFOU have utilised a variety of very democratic mechanisms including peaceful strikes and protests, media campaigns and political lobbying. Such moves have met with mixed results in Baghdad – at times the central government has pandered to the requests of IFOU, but it has also gone as far as issuing arrest warrants for its senior members. The IFOU therefore serve as an interesting example of public power in Iraq and may well pose one of the greatest challenges to rising authoritarianism there

    Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review

    Get PDF
    Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images

    Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

    Full text link
    Rapid advances in human genomics are enabling researchers to gain a better understanding of the role of the genome in our health and well-being, stimulating hope for more effective and cost efficient healthcare. However, this also prompts a number of security and privacy concerns stemming from the distinctive characteristics of genomic data. To address them, a new research community has emerged and produced a large number of publications and initiatives. In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic data, using a representative sample of the work published in the past decade. We identify and discuss limitations, technical challenges, and issues faced by the community, focusing in particular on those that are inherently tied to the nature of the problem and are harder for the community alone to address. Finally, we report on the importance and difficulty of the identified challenges based on an online survey of genome data privacy expertsComment: To appear in the Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2019, Issue
    corecore