2,276 research outputs found

    Secure secret sharing in the cloud

    Get PDF
    In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information about the secrets to the player. The secret messages are obfuscated by encryption and thus give no information to the cloud server. Furthermore, the scheme is compatible with the Paillier cryptosystem and other cryptosystems of the same type. In light of the recent developments in privacy-preserving watermarking technology, we further model the proposed scheme as a variant of reversible watermarking in the encrypted domain

    Reversible data hiding in JPEG images based on adjustable padding

    Get PDF
    In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy. The proposed embedding algorithm only modifies, in a subtle manner, an adjustable number of zero-valued quantised DCT coefficients to embed the message. Hence, compared with a state-of-the-art based on histogram shifting, the proposed scheme has a relatively low distortion to the host images. In addition to this, we found that by representing the message in ternary instead of in binary, we can embed a greater amount of information while the level of distortion remains unchanged. Experimental results support that the proposed scheme can achieve better visual quality of the marked JPEG image than the histogram shifting based scheme. The proposed scheme also outperforms this state-of-the-art in terms of the ease of implementation

    Privacy-preserving information hiding and its applications

    Get PDF
    The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc. Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur. Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud. Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function. In summary, this thesis presents novel schemes and algorithms, including: • two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively. • two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively. • four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference. • three privacy-preserving secret sharing algorithms with different levels of generality

    Is Per Capita Real GDP Stationary? Evidence from Selected African Countries Based on More Powerful Nonlinear (Logistic) Unit Root Tests

    Get PDF
    In this study we use a more powerful nonlinear (logistic) unit root test advanced by Leybourne et al. (1998) to investigate the time-series propertities of per capita real GDP for 26 selected African countries for the period 1960-2000. We strongly reject the null of unit root process for over one-third the countries. These empirical results have important policy implications for selected African countries.

    Is Contract Farming More Profitable and Efficient Than Non-Contract Farming-A Survey Study of Rice Farms In Taiwan

    Get PDF
    Trade liberalization and globalization has modernized the food retail sector in Taiwan, affecting consumers, producers and trade patterns. These changes have placed significant pressures on farmers and processors including more stringent quality control and product varieties. The government has launched a rice production-marketing contract program in 2005 to assist rice farmers and the agro-business sector to work together as partners. The minimum scale for each contract is 50 hectares of adjacent rice paddies with 50 participants including rice farmers, seedling providers, millers and marketing agents. In order to evaluate the outcome of this program, a survey is conducted in the summer of 2005 after the first (spring) crop is harvested. Information of price and value of output and major variable and fixed inputs are collected along with characteristics of the farmers and farms. The survey results show that the average revenue of a contract farm is about 11 percent higher than an average non-contract farm. The per hectare cost of production in a contract farm is about 13 percent lower and as a result the average profit margin under contract is more than 50 percent above those without contract. A swtiching regression profit frontier model is adopted to further investigate their efficiency performance. The result indicates that an average contract farms is 20 percent more efficient than an average non-contract farm in a comparable operating environment. The result also suggests that although contract farming has potential to improve the profit of smallholders, it is not a sufficient condition for such improvement.Land Economics/Use,

    Working Hours Reduction and Endogenous Growth

    Get PDF
    This paper formulates an endogenous growth model and uses it to inquire into the long-run impact of work-sharing arrangements on economic growth. We show that the styles of wage contract, namely salary-style and hourly-style contracts, are a key factor in determining the long-run growth effects of working time reduction. If the labor market is overwhelmingly salaried arrangement, then the extent of wage flexibility is relatively low; as a consequence, a policy of reducing working hours will deteriorate economic growth. On the contrary, if hourly pay predominates, then the wage system tends to increase the degree of wage flexibility. Thus, a cut in working time may favor the economy’s growth rate.Working hours reduction, Endogenous growth

    On demand-side sources of service innovation ideas

    Get PDF
    Abstract. Increasing degree of consensus has been made among academics and practitioners, that firms should pay special attention to the demand-side factors just to design and produce products/services that gain most loyalty. This article discusses further the specific demand-side sources of service innovation ideas in a multi-layer direct marketing context. Experience marketing, value perception, and re-purchasing process are proposed and articulated. Implications for research and practices are offered. Keywords. Demand-side drivers, Service innovation, Multi-layer direct marketing.JEL. M10, M11, M14

    Automation of reversible steganographic coding with nonlinear discrete optimisation

    Get PDF
    Authentication mechanisms are at the forefront of defending the world from various types of cybercrime. Steganography can serve as an authentication solution through the use of a digital signature embedded in a carrier object to ensure the integrity of the object and simultaneously lighten the burden of metadata management. Nevertheless, despite being generally imperceptible to human sensory systems, any degree of steganographic distortion might be inadmissible in fidelity-sensitive situations such as forensic science, legal proceedings, medical diagnosis and military reconnaissance. This has led to the development of reversible steganography. A fundamental element of reversible steganography is predictive analytics, for which powerful neural network models have been effectively deployed. Another core element is reversible steganographic coding. Contemporary coding is based primarily on heuristics, which offers a shortcut towards sufficient, but not necessarily optimal, capacity–distortion performance. While attempts have been made to realise automatic coding with neural networks, perfect reversibility is unattainable via such learning machinery. Instead of relying on heuristics and machine learning, we aim to derive optimal coding by means of mathematical optimisation. In this study, we formulate reversible steganographic coding as a nonlinear discrete optimisation problem with a logarithmic capacity constraint and a quadratic distortion objective. Linearisation techniques are developed to enable iterative mixed-integer linear programming. Experimental results validate the near-optimality of the proposed optimisation algorithm when benchmarked against a brute-force method

    The Potential Economic Impact of Avian Flu Pandemic on Taiwan

    Get PDF
    This study analyzes the potential consequences of an outbreak of avian influenza (H5N1) on Taiwan¡¦s macro economy and individual industries. Both the Input-Output (IO) Analysis Model and Computable General Equilibrium (CGE) Model are used to simulate the possible damage brought by lowering domestic consumption, export, and labor supply. The simulation results indicates that if the disease is confined within the poultry sector, then the impact on real GDP is around -0.1%~-0.4%. Once it becomes a human-to-human pandemic, the IO analysis suggests that the potential impacts on real GDP would be as much as -4.2%~-5.9% while labor demand would decrease 4.9%~6.4%. In the CGE analysis, which allows for resource mobility and substitutions through price adjustments, the real GDP and labor demand would contract 2.0%~2.4% and 2.2%~2.4%, respectively, and bringing down consumer prices by 3%. As for the individual sector, the outbreak will not only damage the poultry sector and its upstream and downstream industries, but also affect the service sectors including wholesale, retail, trade, air transportation, restaurants, as well as healthcare services. These results can be used to support public investment in animal disease control measures.Avian Flu Pandemic, Input-output Model, Computable General Equilibrium Model, Livestock Production/Industries,
    • …
    corecore