scholarly journals Verifiable image revision from chameleon hashes

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Junpeng Xu ◽  
Haixia Chen ◽  
Xu Yang ◽  
Wei Wu ◽  
Yongcheng Song

AbstractIn a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.

2020 ◽  
Vol 10 (513) ◽  
pp. 420-434
Author(s):  
M. S. Pasmor ◽  
◽  
S. V. Demchenko ◽  
D. V. Zaitseva ◽  
◽  
...  

The topic of development and involvement of marketing instruments in business is relevant nowadays. In the era of the Internet, social networks and open information space, it is extremely important for companies and organizations to learn and implement new marketing instruments in order to utilize and fill the communication channels used by modern human in everyday life. Most marketing instruments, applied by the business environment before 2014–2016, are already becoming irrelevant due to the lack of feedback from the younger generation. From the off-line format, the interaction of business – buyer is increasingly moving to the on-line format. Thanks to the rapid development of digitalization in recent years, enterprises have received new channels of communication with their target audience, and, accordingly, new channels of communication and marketing instruments, which are covered in the publication. The article is aimed at theoretical studying the latest marketing instruments and analyzing their introduction into the creative industries of the city of Kharkiv. The latest marketing instruments are analyzed, examples of their use in the modern business environment of Ukraine are provided. Their adaptability is considered and recommendations for their use in commercial structures are made. Systematized and allocated are purely new marketing instruments used by business in the 21st century. The efficiency of their introduction into the activities of companies and organizations is substantiated and proved on specific examples. In addition, special attention is paid to the extended presentation of their use and disclosure of the essence on the example of the public organization «Kharkiv IT Cluster».


2021 ◽  
Vol 29 (1) ◽  
pp. 99-121
Author(s):  
Natasha Kravchuk

Abstract Legal regulations codifying the privacy rights of children in digital contexts, both at national and international levels, are fragmentary. Existing norms primarily address issues related to child safety as well as data processing, but not the protection of his/her dignity and reputation. At the same time, the Internet Communications and Technology-related (ict) activities of parents, who are traditionally considered to be the primary defenders of their children’s rights but presently are the main contributors to the public image of their child, may endanger child privacy. To address the threat that “sharenting” creates, the privacy of the child should be considered not only as a right, but also in “the best interests of the child”. This conceptualisation of rights as argued, would allow for a greater degree of privacy protection as it requires authorities to take it into consideration, ‘in all actions concerning children’, and will guarantee that they allocate to it the proper weight, while balancing it with the rights of others.


Author(s):  
Joseph R. Bumblis

As the number of telecommuters grows, so does the data traffic on the Public Switched Telephone Network (PSTN) and its adjunct infrastructures. This chapter analyzes the impact of increased telecommuter-networking traffic on the PSTN and the adjunct infrastructures such as the Internet. This analysis will give readers the tools to understand the public network infrastructures and to gain insight into the networking requirements of virtual offices/work groups. By understanding the interconnection issues, decision-makers will be better able to analyze business needs related to telecommuter remote offices. In addition to understanding telecommunications technology, corporate management also will gain insight into the language of the service provider. This will help management and key decision-makers evaluate benefits of a telecommuting workforce, and negotiate with service providers for the necessary technology to support of their telecommuters.


2013 ◽  
Vol 380-384 ◽  
pp. 3934-3937
Author(s):  
Jian Long Huang ◽  
Zhong Feng Wang ◽  
Li Gang Li ◽  
Ying Nan Wang ◽  
Wei Chun Ge

Based on the rapid development of communication technology and a large area of the base station of the public network being laid, which prompting the data transmission device development that base on the GPRS wireless network. This paper describes the hardware design of a data transmission device which based on GPRS mobile communication technology. Extended remote data transmission via GPRS mobile communication technology applications, and has broad application prospects.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3902
Author(s):  
Muhammad Adnan ◽  
Jawaid Iqbal ◽  
Abdul Waheed ◽  
Noor Ul Amin ◽  
Mahdi Zareei ◽  
...  

Recently, by the rapid development of Vehicular Ad Hoc Networks (VANETs) and the advancement of Software Defined Networking (SDN) as an emerging technology, the Software-Defined Vehicular Network (SDVN) has a tremendous attraction in the academia and research community. SDN’s unique properties and features, such as its flexibility, programmability, and centralized control, make the network scalable and straightforward. In VANETs, traffic management and secure communication of vehicle information using the public network are the main research dimensions in the current era for the researchers to be considered while designing an efficient and secure VANETs architecture. This paper highlights the possible identified threat vectors and efficiently resolves the network vulnerabilities to design a novel and secure hierarchic architecture for SDVN. To solve the above problem, we proposed a Public Key Infrastructure-based digital signature model for efficient and secure communication from Vehicle to Vehicle. We also used the public key authority infrastructure for Vehicle to Infrastructure and the three-way handshake method for secure session creation and secure data communication in the SDN controller. The proposed security is validated through the well-known simulation tool AVISPA. Additionally, a formal security model is applied to validate the design hierarchic architecture’s fundamental security properties for SDVN in an efficient and desirable way. In a comparative analysis, we prove that our proposed scheme fulfills all the essential security properties compared to other states of the art schemes.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Weiping Ouyang ◽  
Chunguang Ma ◽  
Guoyin Zhang ◽  
Keming Diao

The rapid development of the Internet of Things has made the issue of privacy protection even more concerning. Privacy protection has affected the large-scale application of the Internet of Things. Fully Homomorphic Encryption (FHE) is a newly emerging public key encryption scheme, which can be used to prevent information leakage. It allows performing arbitrary algebraic operations on data which are encrypted, such that the operation performed on the ciphertext is directly transformed into the corresponding plaintext. Recently, overwhelming majority of FHE schemes are confined to single-bit encryption, whereas how to achieve a multibit FHE scheme is still an open problem. This problem is partially (rather than fully) solved by Hiromasa-Abe-Okamoto (PKC′15), who proposed a packed message FHE scheme which only supports decryption in a bit-by-bit manner. Followed by that, Li-Ma-Morais-Du (Inscrypt′16) proposed a multibit FHE scheme which can decrypt the ciphertext at one time, but their scheme is based on dual LWE assumption. Armed with the abovementioned two schemes, in this paper, we propose an efficient packed message FHE that supports the decryption in two ways: single-bit decryption and one-time decryption.


2019 ◽  
Vol 1 (2) ◽  
Author(s):  
Yichu Wang

In the rapid development of science and technology, the Internet has been widely used in the daily life and work of people, which has greatly changed the way people live and work. At this stage, people regard the Internet as the main way to obtain news information, and they have supervised the news contents [1]. Based on this, the article expounds the relevant content of network public opinion, analyzes the role of network public opinion in the public management of Chinese government, and studies the influence of public opinion on the public management of Chinese government.


2021 ◽  
Vol 2062 (1) ◽  
pp. 012014
Author(s):  
Abha Kiran Rajpoot ◽  
Parma Nand ◽  
Ali Imam Abidi

Abstract Rapid development in Internet and the increase in online information, the technology demanded for intelligently classifying the textual data has become significant role in Information Retrieval Process. Based on given query in the search box, the response from the internet has made open to the public. Thus, the scope of text mining is being explored by several researchers. Sentiment Analysis is one of the most popular process for analysing user opinions and feelings, and since, online communication has become the fast ever growing medium for expressing thoughts, therefore, there have been development in text classification to improve sentiment analysis. In this paper, some of the prior works on sentiment analysis and the advancements in text classification have been discussed.


2021 ◽  
Vol 5 (2) ◽  
pp. 134
Author(s):  
Carina Mutiara Putri ◽  
Sofiatiningsih Sofiatiningsih

The rapid development of technology in the digital age has a very big impact in changing the way work from manual to computerized, one of the perceived changes in electronic mail. Aplikasi Manajemen Surat Korporat is one application that can speed up the process of handling incoming and outgoing mail. The purpose of this research is to study the process of managing incoming and outgoing mail using Aplikasi Manajemen Surat Korporat to facilitate the administrative process at PT PLN (Persero) UID West Java. This study used qualitative research methods. Data collection techniques carried out by interviewing, observing, documenting with branches of the Secretariat unit, and studying literature from books, journals, and documents relating to research discussions. The results showed that the management of incoming and outgoing mail using Aplikasi Manajemen Surat Korporat in PT PLN (Persero) UID West Java was good, the application used was digital by the times, the system was easy to work on, easy to learn, saving costs, fast, guaranteed security, could distributing information quickly so that every incoming and outgoing mail can be processed quickly, ultimately the service to the public can be improved. Some obstacles are common in nature is the occurrence of disruptions on the internet network that can be overcome when the network improves again


Sign in / Sign up

Export Citation Format

Share Document