distorted version
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 8)

H-INDEX

4
(FIVE YEARS 0)

Entropy ◽  
2022 ◽  
Vol 24 (1) ◽  
pp. 110
Author(s):  
Onur Günlü

The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated as an example scenario.


Author(s):  
Onur Günlü

The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; 2) the information leakage to a fusion center with respect to the remote source is considered as a new privacy leakage metric; 3) the function computed is allowed to be a distorted version of the target function, which allows to reduce the storage rate as compared to a reliable function computation scenario in addition to reducing secrecy and privacy leakages; 4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases that include invertible and partially-invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated for an example scenario.


2021 ◽  
pp. 096366252110381
Author(s):  
Esmat Babaii ◽  
Fatemeh Asadnia

Science fiction movies could play a pivotal role in making scientific discoveries available to the public. In this study, we explored the dialogue-based strategies these movies employ to appealingly communicate science. To investigate the discursive resources these movies use to represent science, we analyzed the content of 10 award-winning science fiction movies over the last decade (2010–2019). The findings demonstrated that although these movies deploy certain discursive features such as pseudoscientific hints, question markers, probability signals, statistical estimates, science boosters, paradox clues, comparison markers, exemplification, and figurative language that may influence audience thought patterns and a critical-reflective attitude toward science, they predominantly represent a partial distorted version of science characterized by inconsistency, inaccuracy, and skepticism. The study posits implications for science communicators to safeguard the legitimacy of science.


2020 ◽  
Vol 15 (3) ◽  
pp. 34-43
Author(s):  
A. Okandeji ◽  
M.B. Olajide ◽  
A.A. Okubanjo ◽  
F. Onaifo

The election process adopted in Nigeria is mostly paper based or manual. This manually handled process can be time-consuming, and prone to security breaches and electoral fraud. Consequently, this work proposes a biometrically authenticated voting system to provide inexpensive solution to the electoral process in Nigeria. In particular, the biometric database is constructed by filling it with the audio fingerprints and the associated metadata of many audio clips, and then the fingerprint of an unknown clip (or the distorted version of the clip brought by compression or standard audio processing) is extracted and compared to that of the clip in the database. If the fingerprint of the unknown clip is in the database, it will be correctly identified by the matching procedures. The project is implemented with biometric system i.e. fingerprint scanning and facial recognition. Accordingly, this is used to ensure enhanced security, and to avoid fake, repeated voting. Results obtained showed that the proposed system is fast, accurate, reliable, and cost effective, thus a viable option to replace the manual voting process. Keywords: Biometrics, electoral process, facial recognition, finger print scanning


Algorithms ◽  
2020 ◽  
Vol 13 (9) ◽  
pp. 227
Author(s):  
Ling Du ◽  
Zehong He ◽  
Yijing Wang ◽  
Xiaochao Wang ◽  
Anthony T. S. Ho

Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original images and corresponding distorted version, are important but less considered by most of existing models. In this paper, we propose an image hashing method based on multi-attack reference generation and adaptive thresholding for image authentication. We propose to build the prior information set based on the help of multiple virtual prior attacks, and present a multi-attack reference generation method based on hashing clusters. The perceptual hashing algorithm was applied to the reference/queried image to obtain the hashing codes for authentication. Furthermore, we introduce the concept of adaptive thresholding to account for variations in hashing distance. Extensive experiments on benchmark datasets have validated the effectiveness of our proposed method.


2020 ◽  
pp. 15-23
Author(s):  
Ian Coller

This prologue offers a snapshot of what Islam and Muslims meant for the France of the late ancien régime and observes the shifts that were already emerging as 1789 approached. From the end of the fifteenth century until the last quarter of the eighteenth, Islam remained on the fringe of a French consciousness. Islam was principally understood by the ancien régime as a heresy, a distorted version of Christianity. With the global geopolitical shifts of the later eighteenth century, however, these matrices of religious understanding were fundamentally changed. From the mid-sixteenth century onward, France joined a loose alliance with the Ottoman Empire, fostering ongoing contacts in diplomacy, military training, and trade with a Muslim power. Beginning in the 1720s, philosophers began to investigate the life and teachings of the Prophet Muhammad in new ways that undermined older theological understandings. Trade and diplomacy produced travelers' accounts that shaped the ideas of Enlightenment thinkers. Radical philosophical ideas about Islam came together with diplomatic and commercial knowledge of Muslim societies to produce a sea change in conceptions about Muslims and Islam that would become entangled with the revolutionary transformation.


Graphic News ◽  
2020 ◽  
pp. 47-84
Author(s):  
Amanda Frisken

This chapter explores how, in the late 1870s and early 1880s, the NationalPolice Gazette adapted its racialization of rape to characterize Chinese laborers as sexual predators. While family-based illustrated papers – such as Frank Leslie’s Illustrated Newspaper, Harper’s Weekly, and the Daily Graphic – Orientalized the Chinese, The Police Gazette amplified rhetoric from anti-Chinese agitators, such as Denis Kearney, about Chinese sexual predators, a new rationale for federal exclusion legislation. Journalist Wong Chin Foo’s efforts to interject a more positive iconography of Chinese workers, in his paper The Chinese-American and other venues, had limited power to challenge the anti-Chinese movement’s pervasive stereotypes. Wong’s positive representations were no match for the mystique of the more sensational – and distorted – version of Chinatown.


Author(s):  
Bintang Handayani ◽  
Hugues Seraphin ◽  
Maximiliano Korstanje

The chapter theorizes the rise of dark tourism in Southeast destinations. This represents an unexplored segment for the specialized literature that devotes its efforts in studying Western study cases. There were two important findings. Firstly, and most importantly, dark tourism gives an ideological explanation to the Cold War that sometimes singles out the history of colonialism, the rise of the US as a superpower, and the interests of the Soviet Union. Essentially in consonance with Tzanelli, Sather Wagstaff, and Guidotti Hernandez, the authors hold the thesis that the heritage of dark tourism serves an ideological instrument of power, which is orchestrated by a ruling elite to promote a distorted version of history.


2018 ◽  
Vol 74 (10) ◽  
pp. 1079-1087
Author(s):  
Kevin M. Knowles ◽  
Anjan Sil ◽  
Berthold Stöger ◽  
Matthias Weil

The determination of the crystal structure of theMphase, (MnxZn1–x)2V2O7(0.75 <x< 0.913), in the pseudobinary Mn2V2O7–Zn2V2O7system forx≃ 0.8 shows that the previously published triclinic unit-cell parameters for this thortveitite-related phase do not describe a true lattice for this phase. Instead, single-crystal X-ray data and Rietveld refinement of synchrotron X-ray powder data show that theMphase has a different triclinic structure in the space groupP-1 withZ= 2. As prior work has suggested, the crystal structure can be described as a distorted version of the thortveitite crystal structure of β-Mn2V2O7. A twofold superstructure in diffraction patterns of crystals of theMphase used for single-crystal X-ray diffraction work arises from twinning by reticular pseudomerohedry. This superstructure can be described as a commensurate modulation of a pseudo-monoclinic basis structure closely related to the crystal structure of β-Mn2V2O7. In comparison with the distortions introduced when β-Mn2V2O7transforms at low temperature to α-Mn2V2O7, the distortions which give rise to theMphase from the β-Mn2V2O7prototype are noticeably less pronounced.


2018 ◽  
Vol 18 (01) ◽  
pp. 1850006 ◽  
Author(s):  
Bismita Choudhury ◽  
Patrick Then ◽  
Biju Issac ◽  
Valliappan Raman ◽  
Manas Kumar Haldar

Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results.


Sign in / Sign up

Export Citation Format

Share Document