469 research outputs found

    A Simple Scheme for Visual Cryptography

    Get PDF
    Here an algorithm is proposed to implement (2, 2) secret sharing problem which reduces the size (resolution) of the generated shares. Instead of considering one pixel at a time to generate the share, two consecutive pixels of the original image are considered row wise. Finally a pixel share having six pixels is generated for the considered two consecutive pixels. Thus we get six pixels instead of eight pixels in the shares corresponding to two pixels in the original image. As a result two pixels (8-6 = 2) in the share are reduced corresponding to two pixels of original image

    Acknowledgement based Intrusion-Detection System for MANETS

    Get PDF
    In the next generation of wireless communication systems, there will be a need for the quick deployment of independent mobile users. notable examples include establishing survivable, efficient, flush communication for emergency/ recover operations, defeat relief efforts, and Army networks. Such network scenarios cannot count on centralized and organized connectivity, and can be make up as applications of Ā Mobile Ad Hoc Networks. Ā The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of ā€œflavorsā€ and approach the goal of detecting suspicious traffic in different ways. The self configuring ability of nodes in MANET made it popular among critical mission applications like army use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is decisive to develop efficient intrusion-detection mechanisms to protect MANET from attacks. By using technology supportĀ  we are cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security problem. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially made for MANETs. Compared to contemporary approaches, Enhanced Adaptive ACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performance

    Embedded Extended Visual Cryptography Schemes

    Get PDF
    Visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into n shares that distributed to n participants. The beauty of such scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. Extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS). In this paper, we propose a construction of EVCS which is realized by embedding random shares into meaningful covering shares, and we call it the embedded extended visual cryptography scheme (embedded EVCS). Experimental results compare some of the well-known EVCS\u27s proposed in recent years systematically, and show that the proposed embedded EVCS has competitive visual quality compared with many of the well-known EVCS\u27s in the literature. Besides, it has many specific advantages against these well-known EVCS\u27s respectively

    Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012

    Full text link

    Embedded Extended Visual Cryptography Schemes

    Full text link

    Interactive Security: The Rhetorical Constitution Of Algorithmic Citizenship In War On Terror Discourse

    Get PDF
    This dissertation traces algorithmic citizenship as it is constituted through war on terror discourse. Utilizing Ron Greeneā€™s rhetorical materialism, this project analyzes corporate discourse along with presidential address and policy to map how they interpellate citizensā€™ subjectivity. Specifically, the dissertation follows George Bushā€™s presidential rhetoric as he defines the war on terror and invites the public to participate. Then the dissertation examines how the political discourse associated with government 2.0 is also an economic discourse that works to articulate citizenship alongside consumerism. The next chapter follows the presidential rhetoric of Barack Obama as he intensifies the surveillance and war fighting rhetoric identified with George Bush and IBM. Finally, the dissertation maps the communicative function and role played by whistleblowers and theorizes how the interactive values of government 2.0 and algorithmic citizenship offer the potential for rhetorical agency

    Strategies of Narrative Disclosure in the Rhetoric of Anti-Corporate Campaigns

    Get PDF
    In the years following World War II social activists learned to refine rhetorical techniques for gaining the attention of the new global mass media and developed anti-corporate campaigns to convince some of the worldā€™s largest companies to concede to their demands. Despite these developments, rhetorical critics have tended to overlook anti-corporate campaigns as objects of study in their own right. One can account for the remarkable success of anti-corporate campaigns by understanding how activists have practiced prospective narrative disclosure, a calculated rhetorical wager that, through the public circulation of stories and texts disclosing problematic practices and answerable decision makers, activists can influence the policies and practices of prominent corporations. In support of this thesis, I provide case studies of two anti-corporate campaigns: the Amalgamated Clothing and Textile Workers Union vs. J. P. Stevens (1976 ā€“ 1980) and the Coalition of Immokalee Workers vs. Taco Bell (2001ā€”2005). Each campaign represents a typology of practice within prospective narrative disclosure: martial (instrumental emphasis) and confrontation/alliance (popular, constitutive emphasis) respectively. The former is more likely to spark defensive responses and public backlash, and the latter is more likely to sway entire market sectors and produce lasting changes in the de facto corporate social responsibility standards of global markets
    • ā€¦
    corecore