3,001 research outputs found

    Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Get PDF
    [[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.[[incitationindex]]SCI[[booktype]]紙本[[booktype]]電子

    XOR-Based Progressively Secret Image Sharing

    Get PDF
    [[abstract]]Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily. However, how to recover secret images with progressive steps is not addressed. In this study, we proposed an XOR-based (m, t, Ti) multi-secret image sharing scheme that shares m secret images among m participants and recovers m shared images progressively with t thresholds. The proposed secret images partition strategy (SIPS) partitions m secret images to generate intermediate images for different thresholds in the sharing procedure. Based on progressive recovery property, the proposed recovery method recovers parts of the secret images by gathering consecutive shared images. Moreover, gathering all shared images can perfectly recover all secret images. The experimental results show that the proposed XOR-based multi-secret image sharing method has high security and efficiency.[[notice]]補正完

    Refining Child Pornography Law

    Get PDF
    The legal definition of child pornography is, at best, unclear. In part because of this ambiguity and in part because of the nature of the crime itself, the prosecution and sentencing of perpetrators, the protection of and restitution for victims, and the means for preventing repeat offenses are deeply controversial. In Refining Child Pornography Law, experts in law, sociology, and social work examine child pornography law and its consequences in an effort to clarify the questions and begin to formulate answers. Focusing on the roles of language and crime definition, the contributors discuss the increasing visibility child pornography plays in the national conversation about child safety, and present a range of views regarding the punishment of those who produce, distribute, and possess materials that may be considered child pornography

    Online Multimedia Learning: Predicting Learner Media Selections in the Visual and Verbal Domains

    Get PDF
    The purpose of this study was to investigate visualizer-verbalizer tendencies through the prediction of learner selection of online, multimedia learning options based on the characteristics of cognitive ability, spatial ability, cognitive style, and learning preference. These characteristics were used to predict the selection of text only, labeled image, and image and narration learning options in two, multimedia learning behavior tests via multinomial logistic regression analysis. Results of this study found that the factor of spatial ability influenced multimedia learning options such that as spatial ability increases, the likelihood of choosing labeled image learning option increases while the likelihood of choosing the image and narration learning option decreases. Cognitive style was found to be influential such that, as cognitive style moves towards a visualizer tendency, the likelihood of selecting an image inclusive multimedia learning option (labeled image or image and narration) increases. Learning preference was also found to be influential, as individuals expressing a learning preference for labeled images are likely to maintain this preference through selections of labeled image multimedia learning options. Gender was also investigated as a potential covariate influencing selections with no significant findings. The overall results from this study indicate that certain learner characteristics and inherent traits do influence how learners select different multimedia learning formats for their own learning and the relevance of visualizer-verbalizer tendencies in these choices. The different influence of spatial ability supports research suggesting that the visualizer characteristic may be further sub-divided into a spatial visualizer category describing those who view imagery as distinct parts to be mentally combined into a whole, and object visualizers who view best imagery as a whole, not requiring further dissection or manipulation. The findings of this study may further guide instructors, instructional designers, and instructional material publishers in the creation of online or technology enhanced learning materials to suit not only the overall goals of learning but also the individual learners. Online or technology enhanced learning materials may thus take advantage of the appeal of multimedia by incorporating a variety of media designed to guide learners through instructional materials which optimally take advantage of the concepts behind multimedia learning in an effort to create engaging learning opportunities to support learner interest and potentially enhance learning outcomes

    Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy

    Get PDF
    Technological advances have created a new existence, providing an unforeseen level of interaction and transaction between parties that have never physically met. Preliminary thinking was that these advances would create a previously unimaginable level of privacy and anonymity. While a surface examination suggests an abundance of privacy in modern society, a more thorough examination reveals different results. Advances in technology and changes in public policy have produced a world in which a startling amount of information is available regarding a given individual. Rather than experiencing an increase in individual privacy, modern societies suffer from rapidly decreasing individual privacy

    Balancing Privacy and Free Speech

    Get PDF
    In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society’s interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a ‘right to be forgotten’, Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general

    Balancing Privacy and Free Speech

    Get PDF
    In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society’s interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a ‘right to be forgotten’, Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general

    Creating Effective Broadband Network Regulation

    Get PDF
    The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for network neutrality or nondiscrimination assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article\u27s chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates. The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the agency on a host of industry decisions where technology plays a pivotal role tilts decidedly against counting on successful regulation. Second, the technology here is unlike anything the FCC has successfully regulated before. Judging networks, which are constructed and operated for maximum private gain and not based on a government-approved rate of return model, isn\u27t among them. Finally, the agency itself has yet to demonstrate that it is the best locus of power for deciding the fate of the Internet. The political economy of the FCC makes it less successful as an expert agency. This Article focuses on two somewhat interrelated solutions: reliance on the shame/Wiki/blog culture of the Internet and disclosure of management practices by network providers, enforceable under contract. These approaches are congenial with the most basic Internet values of information transparency and sharing

    Sharing Numerous Images Secretly with Reduced Possessing Load

    No full text
    [[notice]]本書目待補正[[incitationindex]]SC
    corecore