22 research outputs found

    Image Tamper Detection and Recovery by Intersecting Signatures

    Get PDF
    In this paper, we propose an exact image authentication scheme that can, in the best case, detect image tampering with the accuracy of one pixel. This method is based on constructing blocks in the image in such a manner that they intersect with one another in different directions. Such a technique is very useful to identify whether an individual image pixel has been tampered with. Moreover, the tampered region can be well recovered with the embedded recover data

    Using BDH for the Message Authentication in VANET

    Get PDF
    The transport message security provided by vehicles in VANETs is quite important; vehicle message should be real-time and it will be not complicated to validate message calculation. The method proposed in the essay is mainly to validate the identity by means of Bilinear Diffie-Hellman method, and make vehicles validate the authenticity of RSU and TA’s identity and the effectiveness of key. RSU and TA only need to validate vehicle identity, without helping vehicles produce any key. When vehicle identity validation is completed, vehicles will produce public value and transmit it to other RSU and vehicles, while other vehicles could validate the identity through the message from the sender and public value from RSU. The advantages of the method proposed in this essay are listed as follows. (1) Vehicles, RSU, and TA can validate mutual identities and the effectiveness of keys. (2) Vehicles can produce public value functions automatically, thus reducing key control risks. (3) Vehicles do not need to show certificates to validate their identities, preventing the certificates from attacking because of long-term exposure. (4) Vehicles adopt a pseudonym ID challenge to validate their own identities during the process of handoff. (5) Vehicle messages can be validated using the Bilinear Diffie-Hellman (BDH) method without waiting for the RSU to validate messages, thus improving the instantaneity of messaging. The method proposed in the essay can satisfy source authentication, message integrity, nonrepudiation, privacy, and conditional untraceability requirements

    Taiwanese Version of the EQ-5D: Validation in a Representative Sample of the Taiwanese Population

    Get PDF
    Background/PurposeWe know of no validated Taiwanese-language instrument to measure a utility of the patient's health. Our aim was to evaluate the reliability and validity of a Taiwanese version of the EuroQol instrument (EQ-5D) in a Taiwanese population.MethodsQuestionnaires containing the Taiwanese versions of the EQ-5D and the Short-Form 12 Health Survey (SF-12) were sent to 12,923 people in Taiwan in December 2002. Concurrent validity of the EQ-5D was analyzed by assuming that subjects with problems in any EQ-5D dimensions had decreased SF-12 scores. Discriminant validity of the EQ-5D was analyzed by assuming that subjects with the following characteristics had lowered EQ-5D indexes and scores on the EQ-5D visual analog scale (VAS): more chronic diseases than others, serious illness, more hospitalizations in the past year than others, poor general health, and more outpatient visits than others. Test—retest reliability was analyzed in a subgroup of respondents who were evaluated twice within a month by using the intraclass correlation coefficient and the k method.ResultsThe general survey response rate was 12.7% (1644 of 12,923). SF-12 scores were lower in subjects reporting problems on EQ-5D dimensions than in others without such problems (p < 0.01). Subjects with more health problems than others had lower EQ-5D indexes and VAS scores (p < 0.01). The physical dimension of the EQ-5D was more strongly correlated with the SF-12 Physical Component Summary than with the Mental Component Summary; this finding satisfied the a priori hypothesis. For test—retest reliability of items on the EQ-5D, k values ranged from 0.49 to 1 (p < 0.001).ConclusionThe Taiwanese EQ-5D instrument appears to be a moderately valid and reliable tool for measuring the health status of the general population in Taiwan

    The trans-ancestral genomic architecture of glycemic traits

    Get PDF
    Glycemic traits are used to diagnose and monitor type 2 diabetes and cardiometabolic health. To date, most genetic studies of glycemic traits have focused on individuals of European ancestry. Here we aggregated genome-wide association studies comprising up to 281,416 individuals without diabetes (30% non-European ancestry) for whom fasting glucose, 2-h glucose after an oral glucose challenge, glycated hemoglobin and fasting insulin data were available. Trans-ancestry and single-ancestry meta-analyses identified 242 loci (99 novel; P < 5 x 10(-8)), 80% of which had no significant evidence of between-ancestry heterogeneity. Analyses restricted to individuals of European ancestry with equivalent sample size would have led to 24 fewer new loci. Compared with single-ancestry analyses, equivalent-sized trans-ancestry fine-mapping reduced the number of estimated variants in 99% credible sets by a median of 37.5%. Genomic-feature, gene-expression and gene-set analyses revealed distinct biological signatures for each trait, highlighting different underlying biological pathways. Our results increase our understanding of diabetes pathophysiology by using trans-ancestry studies for improved power and resolution. A trans-ancestry meta-analysis of GWAS of glycemic traits in up to 281,416 individuals identifies 99 novel loci, of which one quarter was found due to the multi-ancestry approach, which also improves fine-mapping of credible variant sets.Peer reviewe

    Color Image Authentication and Recovery via Adaptive Encoding

    No full text
    We describe an authentication and recovery scheme for color image protection based on adaptive encoding. The image blocks are categorized based on their contents and different encoding schemes are applied according to their types. Such adaptive encoding results in better image quality and more robust image authentication. The approximations of the luminance and chromatic channels are carefully calculated, and for the purpose of reducing the data size, differential coding is used to encode the channels with variable size according to the characteristic of the block. The recovery data which represents the approximation and the detail of the image is embedded for data protection. The necessary data is well protected by using error correcting coding and duplication. The experimental results demonstrate that our technique is able to identify and localize image tampering, while preserving high quality for both watermarked and recovered images

    Message Authentication Mechanism and Privacy Protection in the Context of Vehicular Ad Hoc Networks

    No full text
    Vehicular ad hoc networks (VANETs) have been widely researched in recent years. VANETs are used mostly for road safety and traffic efficiency; therefore, it is imperative that the communication between vehicles is rapid and secure in a VANET environment. In the present study, bilinear pairings were used to construct a complete message authentication scheme. This scheme provided the following features: (1) vehicle or roadside unit (RSU) parameters were determined via a hierarchical protocol, which prevented potentially a large computational overhead for a single node; (2) message broadcasts and private communications between vehicles in the transmission range of the same RSU were enabled; (3) message broadcasts and private communications between vehicles in the transmission ranges of different RSUs were enabled; (4) a fast handoff mechanism was established for vehicles in the transmission ranges of different RSUs; and (5) mechanisms for message broadcasts and private communication were established for vehicles in areas where RSUs were sparsely located. Based on the experimental results, our scheme was confirmed to be superior to previous schemes. In terms of security, our scheme offered the following features: confidentiality, message integrity, nonrepudiation, conditional anonymity, and conditional untraceability

    A Novel Adaptive Congestion Avoidance Protocol for Wireless Sensor Networks

    No full text
    Most researches on wireless sensor networks (WSNs) are focused on how to save the energy of the sensor nodes. However, in some applications of WSNs, such as in the monitoring of an earthquake or a forest fire, it is much more important to transmit emergency data packets to the sink node as soon as possible than to save power. This paper proposes a novel Adaptive Congestion Avoidance Protocol (ACAP) model to provide a feasible WSNs architecture that will save the energy of the sensor nodes in the normal situation, but will transmit emergency data packets in an efficient manner to the sink node. The simulation analysis shows that the ACAP provides superior performance during both normal and emergency conditions. DOI: http://dx.doi.org/10.11591/telkomnika.v11i12.371

    Image Protection by Intersecting Signatures

    No full text
    In this paper, we propose an exact image authentication scheme that can, in the best case, detect image tampering with the accuracy of one pixel. This method is based on constructing blocks in the image in such a manner that they intersect with one another in different directions. Such a technique is very useful to identify whether an individual image pixel has been tampered with
    corecore