6,531 research outputs found

    Accommodation in post-primary schools for teaching and learning in the creative and expressive area of study : executive summary

    Get PDF

    Personal rights management (PRM) : enabling privacy rights in digital online media content

    Get PDF
    With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who now have the means to take and distribute pictures of one’s face at no risk and little cost in any situation in public and private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual’s private life to the public in unpreceeded ways. Social and legal measures are increasingly taken to deal with this problem. In practice however, they lack efficiency, as they are hard to enforce in practice. In this paper, we discuss a supportive infrastructure aiming for the distribution channel; as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action.Wir stellen ein System zur Wahrnehmung des Rechts am eigenen Bild bei der Veröffentlichung digitaler Fotos, zum Beispiel von Handykameras, im Internet vor. Zur Entdeckung der Veröffentlichung schlagen wir ein Watermarking-Verfahren vor, welches das Auffinden der Bilder durch die potentiell abgebildeten Personen ermöglicht, ohne die Rechte des Fotografen einzuschränken

    Regulating Access to Adult Content (with Privacy Preservation)

    Get PDF
    In the physical world we have well-established mechanisms for keeping children out of adult-only areas. In the virtual world this is generally replaced by self declaration. Some service providers resort to using heavy-weight identification mechanisms, judging adulthood as a side effect thereof. Collection of identification data arguably constitutes an unwarranted privacy invasion in this context, if carried out merely to perform adulthood estimation. This paper presents a mechanism that exploits the adult's more extensive exposure to public media, relying on the likelihood that they will be able to recall details if cued by a carefully chosen picture. We conducted an online study to gauge the viability of this scheme. With our prototype we were able to predict that the user was a child 99% of the time. Unfortunately the scheme also misclassified too many adults. We discuss our results and suggest directions for future research

    Looking towards the future: the changing nature of intrusive surveillance and technical attacks against high-profile targets

    Get PDF
    In this thesis a novel Bayesian model is developed that is capable of predicting the probability of a range of eavesdropping techniques deployed, given an attacker's capability, opportunity and intent. Whilst limited attention by academia has focused on the cold war activities of Soviet bloc and Western allies' bugging of embassies, even less attention has been paid to the changing nature of the technology used for these eavesdropping events. This thesis makes four contributions: through the analysis of technical eavesdropping events over the last century, technological innovation is shown to have enriched the eavesdropping opportunities for a range of capabilities. The entry barrier for effective eavesdropping is lowered, while for the well resourced eavesdropper, the requirement for close access has been replaced by remote access opportunities. A new way to consider eavesdropping methods is presented through the expert elicitation of capability and opportunity requirements for a range of present-day eavesdropping techniques. Eavesdropping technology is shown to have life-cycle stages with the technology exploited by different capabilities at different times. Three case studies illustrate that yesterday’s secretive government method becomes today’s commodity. The significance of the egress transmission path is considered too. Finally, by using the expert elicitation information derived for capability, opportunity and life-cycle position, for a range of eavesdropping techniques, it is shown that it is possible to predict the probability of particular eavesdropping techniques being deployed. This novel Bayesian inferencing model enables scenarios with incomplete, uncertain or missing detail to be considered. The model is validated against the previously collated historic eavesdropping events. The development of this concept may be scaled with additional eavesdropping techniques to form the basis of a tool for security professionals or risk managers wishing to define eavesdropping threat advice or create eavesdropping policies based on the rigour of this technological study.Open Acces

    Analysis of Flood Patterns in Adams County, Pennsylvania Utilizing Drone Technology and Computer Simulations

    Full text link
    Drone imagery and photogrammetry models of the Gettysburg College campus and the terrain at Boyer Nurseries and Orchards were utilized to study flood patterns in Adams County, Pennsylvania. Gettysburg College has lower-sloped land and moderately built infrastructure while Boyer Orchards has drastically sloped land with many patches of abundant vegetation. The two locations were selected due to the fact that they have starkly different surface features, while the bedrock geology of the areas are very similar. The terrain of the models was isolated before a 3D carver and 3D printer were used to construct physical models to further analyze potential water flow and speed through virtual, modeled flood simulations. The models were used to compare real world rainfall data and flood events in the investigated areas from the months of June to August in 2018. I hypothesized that the Gettysburg College campus would experience more severe flooding that would take longer to subside in comparison to Boyer Orchards due to the steeper slope of the orchards’ terrain. The research revealed that Boyer Orchards experienced more extreme flooding and rainfall than Gettysburg College but was able to neutralize the effects due to plentiful vegetation and physio-graphic differences. Modeled flood simulations demonstrated less rainfall in comparison to actual rainfall values: there were differences of 0.78 cm and 1.32 cm between the actual and simulated rainfall amounts for Gettysburg and the Boyer Orchards area, respectively

    “We, the Paparazzi”: Developing a Privacy Paradigm for Digital Video

    Get PDF
    In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation – the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming widespread in the hands of the public, the regulatory focus must shift. Once a small percentage of online content, digital video is now appearing at an exponential rate. This is largely due to the growth of online social networking platforms such as YouTube and Facebook. Sharing video online has become a global phenomenon, while the lack of effective privacy protection for these images has become a global problem. Digital video poses four distinct problems for privacy, arising from: de-contextualization, dissemination, aggregation, and permanency of video information. While video shares some of these attributes with text, its unique qualities necessitate a separate study of video privacy regulation. This article identifies a rationale for, and critiques suggested approaches to, digital video privacy. It argues that legal regulation, without more, is unlikely to provide necessary solutions. Instead, it advocates a new multi-modal approach consisting of a matrix of legal rules, social norms, system architecture, market forces, public education, and non-profit institutions

    Color-decoupled photo response non-uniformity for digital image forensics

    Get PDF
    The last few years have seen the use of photo response non-uniformity noise (PRNU), a unique fingerprint of imaging sensors, in various digital forensic applications such as source device identification, content integrity verification and authentication. However, the use of a colour filter array for capturing only one of the three colour components per pixel introduces colour interpolation noise, while the existing methods for extracting PRNU provide no effective means for addressing this issue. Because the artificial colours obtained through the colour interpolation process is not directly acquired from the scene by physical hardware, we expect that the PRNU extracted from the physical components, which are free from interpolation noise, should be more reliable than that from the artificial channels, which carry interpolation noise. Based on this assumption we propose a Couple-Decoupled PRNU (CD-PRNU) extraction method, which first decomposes each colour channel into 4 sub-images and then extracts the PRNU noise from each sub-image. The PRNU noise patterns of the sub-images are then assembled to get the CD-PRNU. This new method can prevent the interpolation noise from propagating into the physical components, thus improving the accuracy of device identification and image content integrity verification

    The Status of Laser Diagnostics Supporting Ion Thruster Development at NASA GRC

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/76321/1/AIAA-2002-3960-677.pd
    corecore