3,775 research outputs found

    Models and Algorithms for Graph Watermarking

    Full text link
    We introduce models and algorithmic foundations for graph watermarking. Our frameworks include security definitions and proofs, as well as characterizations when graph watermarking is algorithmically feasible, in spite of the fact that the general problem is NP-complete by simple reductions from the subgraph isomorphism or graph edit distance problems. In the digital watermarking of many types of files, an implicit step in the recovery of a watermark is the mapping of individual pieces of data, such as image pixels or movie frames, from one object to another. In graphs, this step corresponds to approximately matching vertices of one graph to another based on graph invariants such as vertex degree. Our approach is based on characterizing the feasibility of graph watermarking in terms of keygen, marking, and identification functions defined over graph families with known distributions. We demonstrate the strength of this approach with exemplary watermarking schemes for two random graph models, the classic Erd\H{o}s-R\'{e}nyi model and a random power-law graph model, both of which are used to model real-world networks

    Orbital imagery for planetary exploration. Volume 3 - Orbit selection and definition

    Get PDF
    Orbital imagery for planetary exploration - orbital selections for Mars, Venus, Mercury, and Jupite

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    BALLET DANCER INJURIES DURING PERFORMANCE AND REHEARSAL ON VARIED DANCE SURFACES

    Get PDF
    Three dance surfaces regularly used by a professional touring ballet company (n=60) were quantified using standard sports surface testing apparatus. Surface sub-structure construction varied between surfaces and a range of surface force reduction values were reported. Injuries and associated variables occurring within the ballet company were recorded by the company medical staff. An injury was recorded if a dancer experienced an incident that restricted the dancer from performing all activities that were required of them for the period 24hrs after the incident. Injuries were delimited to those occurring in the lower limbs or trunk during reported non-lifting dance activity. Analysis of statistical significance was restricted due to a low injury data sample size. However certain trends in the injury data warrant future research. The surface with the highest variability in intra-surface force reduction was associated with the highest injury rates per week, lower limb injuries per week, mean days lost dancing per injury and likelihood of injury per performance day. Variability in intra-surface force reduction may have a stronger association with injury risk than mean surface force reduction magnitudes

    Self-esteem depends on beliefs about the rate of change of social approval

    Get PDF
    A major challenge in understanding the neurobiological basis of psychiatric disorders is rigorously quantifying subjective metrics that lie at the core of mental illness, such as low self-esteem. Self-esteem can be conceptualized as a ‘gauge of social approval’ that increases in response to approval and decreases in response to disapproval. Computational studies have shown that learning signals that represent the difference between received and expected social approval drive changes in self-esteem. However, it is unclear whether self-esteem based on social approval should be understood as a value updated through associative learning, or as a belief about approval, updated by new evidence depending on how strongly it is held. Our results show that belief-based models explain self-esteem dynamics in response to social evaluation better than associative learning models. Importantly, they suggest that in the short term, self-esteem signals the direction and rate of change of one’s beliefs about approval within a group, rather than one’s social position

    Chimpanzees demonstrate individual differences in social information use

    Get PDF
    Studies of transmission biases in social learning have greatly informed our understanding of how behaviour patterns may diffuse through animal populations, yet within-species inter-individual variation in social information use has received little attention and remains poorly understood. We have addressed this question by examining individual performances across multiple experiments with the same population of primates. We compiled a dataset spanning 16 social learning studies (26 experimental conditions) carried out at the same study site over a 12-year period, incorporating a total of 167 chimpanzees. We applied a binary scoring system to code each participant’s performance in each study according to whether they demonstrated evidence of using social information from conspecifics to solve the experimental task or not (Social Information Score—‘SIS’). Bayesian binomial mixed effects models were then used to estimate the extent to which individual differences influenced SIS, together with any effects of sex, rearing history, age, prior involvement in research and task type on SIS. An estimate of repeatability found that approximately half of the variance in SIS was accounted for by individual identity, indicating that individual differences play a critical role in the social learning behaviour of chimpanzees. According to the model that best fit the data, females were, depending on their rearing history, 15–24% more likely to use social information to solve experimental tasks than males. However, there was no strong evidence of an effect of age or research experience, and pedigree records indicated that SIS was not a strongly heritable trait. Our study offers a novel, transferable method for the study of individual differences in social learning

    Naturally Rehearsing Passwords

    Full text link
    We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and validated through empirical studies. Given rehearsal requirements and a user's visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues--- a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals

    Hardly habitual: chimpanzees and gorillas show flexibility in their motor responses when presented with a causally-clear task

    Get PDF
    In contrast to reports of wild primates, studies of captive primates’ flexibility often reveal conservatism: individuals are unable to switch to new and more efficient strategies when task demands change. We propose that such conservatism might be a result of task design and hypothesize that conservatism might be linked to primates’ lack of causal understanding in relation to experimental apparatuses. We investigated if chimpanzees (Pan troglodytes) and western lowland gorillas (Gorilla gorilla gorilla) would show greater flexibility when presented with a causally-clear task. We presented six chimpanzees and seven gorillas with a clear tube from which they had to remove straws to release a reward. To first evaluate the apes’ causal understanding, we recorded the efficiency with which the apes solved the task (i.e., whether they only removed straws below the reward, ignoring redundant ones above it). To further explore how they solved the task, we also recorded the order in which they removed the straws, which allowed us to determine if habitual action sequences emerged. All apes spontaneously solved the task in their first trial and across repeated trials the majority of their solutions were efficient (median = 90.9%), demonstrating their understanding of the puzzle. There was individual variation in the consistency of straw removal patterns exhibited by the apes, but no ape developed an exclusive habit in the order with which they removed the straws, further indicating their causal understanding of the task. Next, we presented the apes with a new configuration of the same task that required the apes to remove fewer straws to obtain the reward. All apes switched to a more efficient straw removal sequence even though their previously-successful, but now less-efficient, solution remained available. We theorize that because the apes understood the causality of the task, they did not form habits and were not conservative

    A primer on provenance

    Get PDF
    Better understanding data requires tracking its history and context.</jats:p
    • …
    corecore