3,241 research outputs found

    Secure secret sharing in the cloud

    Get PDF
    In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information about the secrets to the player. The secret messages are obfuscated by encryption and thus give no information to the cloud server. Furthermore, the scheme is compatible with the Paillier cryptosystem and other cryptosystems of the same type. In light of the recent developments in privacy-preserving watermarking technology, we further model the proposed scheme as a variant of reversible watermarking in the encrypted domain

    Reversible data hiding in JPEG images based on adjustable padding

    Get PDF
    In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy. The proposed embedding algorithm only modifies, in a subtle manner, an adjustable number of zero-valued quantised DCT coefficients to embed the message. Hence, compared with a state-of-the-art based on histogram shifting, the proposed scheme has a relatively low distortion to the host images. In addition to this, we found that by representing the message in ternary instead of in binary, we can embed a greater amount of information while the level of distortion remains unchanged. Experimental results support that the proposed scheme can achieve better visual quality of the marked JPEG image than the histogram shifting based scheme. The proposed scheme also outperforms this state-of-the-art in terms of the ease of implementation

    GreedyDual-Join: Locality-Aware Buffer Management for Approximate Join Processing Over Data Streams

    Full text link
    We investigate adaptive buffer management techniques for approximate evaluation of sliding window joins over multiple data streams. In many applications, data stream processing systems have limited memory or have to deal with very high speed data streams. In both cases, computing the exact results of joins between these streams may not be feasible, mainly because the buffers used to compute the joins contain much smaller number of tuples than the tuples contained in the sliding windows. Therefore, a stream buffer management policy is needed in that case. We show that the buffer replacement policy is an important determinant of the quality of the produced results. To that end, we propose GreedyDual-Join (GDJ) an adaptive and locality-aware buffering technique for managing these buffers. GDJ exploits the temporal correlations (at both long and short time scales), which we found to be prevalent in many real data streams. We note that our algorithm is readily applicable to multiple data streams and multiple joins and requires almost no additional system resources. We report results of an experimental study using both synthetic and real-world data sets. Our results demonstrate the superiority and flexibility of our approach when contrasted to other recently proposed techniques

    An Economy-wide Analysis of Impacts of WTO Tiered Formula for Tariff Reduction on Taiwan

    Get PDF
    In this study we use Taiwan as a case study to provide an economy-wide analysis of impacts on Taiwan of WTO tariff reduction schemes with different combinations of thresholds and reduction rates. The model we utilized in this study is Taiwan General Equilibrium Model with a WTO module (TAIGEM-WTO, hereafter) that is a multi-sectoral computable general equilibrium (CGE) model of the Taiwan's economy derived from Australian ORANI model (Dixon, Parmenter, Sutton and Vincent, 1982). Simulation results show that results are more sensitive to the scheme of tariff-reduction (i.e., Category 1, 2, and 3) than the tiered levels (i.e., A, B, C, and D) and as a strategy we should pay more attention to the arguments related to the amounts of tariff-reduction. Moreover, changes in nominal average tariff rates are more sensitive and shocks to the economy are more severe when we change the tariff reduction categories rather than the tiered levels. This conclusion also applies to the tiered reduction case when only sensitive products are considered. Finally, simulations with sector's bound rate calculated using arithmetic means have bigger effects than those using import values as weights. Therefore, sector's bound rate using import values as weights would be preferred.International Relations/Trade,
    • …
    corecore