8 resultados para broadcast encryption
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
A phase-only encryption/decryption scheme with the readout based on the zeroth-order phase-contrast technique (ZOPCT), without the use of a phase-changing plate on the Fourier plane of an optical system based on the 4f optical correlator, is proposed. The encryption of a gray-level image is achieved by multiplying the phase distribution obtained directly from the gray-level image by a random phase distribution. The robustness of the encoding is assured by the nonlinearity intrinsic to the proposed phase-contrast method and the random phase distribution used in the encryption process. The experimental system has been implemented with liquid-crystal spatial modulators to generate phase-encrypted masks and a decrypting key. The advantage of this method is the easy scheme to recover the gray-level information from the decrypted phase-only mask applying the ZOPCT. An analysis of this decryption method was performed against brute force attacks. (C) 2009 Society of Photo-Optical Instrumentation Engineers. [DOI: 10.1117/1.3223629]
Resumo:
During the first half of 2006 the city of Sao Paulo suffered three series of violent attacks against the security forces, civilians, and the government. The violent campaign also included a massive rebellion in prisons and culminated in the kidnapping of a journalist and the broadcast of a manifesto from the criminal organization PCC threatening the police and the government. Right after, the main device used to contain organized crime in the prisons was declared unconstitutional. This episode represents a prototypical example of the use of media-focused terrorism by organized crime for projection into the political communication arena.
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.
Resumo:
No-till (NT) system with crop rotation is one of the most effective strategies to improve agricultural sustainability in tropical and subtropical regions. To control soil acidity in NT, lime is broadcast on the surface without incorporation. The increase in soil pH due to surface liming may decrease zinc (Zn) availability and its uptake by crops. A field experiment was performed in Parana State, Brazil, on a loamy, kaolinitic, thermic Typic Hapludox to evaluate Zn bioavailability in a NT system after surface liming and re-liming. Dolomitic lime was surface applied on the main plots in July 1993 at the rates of 0, 2, 4, and 6 Mg ha-1. In June 2000, the main plots were divided in two subplots to study of the effect of surface re-liming at the rates of 0 and 3 Mg ha-1. The cropping sequence was soybean [Glycine max (L.) Merrill] (2001-2 and 2002-3), wheat (Triticum aestivum L.) (2003), soybean (2003-4), corn (Zea mays L.) (2004-5), and soybean (2005-6). Soil samples were collected at the following depths: 0-0.05, 0.05-0.10, and 0.10-0.20m, 10 years after surface liming and 3 years after surface re-liming. Soil Zn levels were extracted by four extractants: (i) 0.005molL-1 diethylenetriaminepentaacetic acid (DTPA) + 0.1molL-1 triethanolamine (TEA) + 0.01molL-1 calcium chloride (CaCl2) solution at pH7.3 (DTPA-TEA), (ii) 0.1molL-1 hydrochloric acid (HCl) solution, (iii) Mehlich 1 solution, and (iv) Mehlich 3 solution. Zinc concentrations in leaves and grains of soybean, wheat, and corn were also determined. Soil pH (0.01molL-1 CaCl2 suspension) varied from 4.4 to 6.1, at the 0- to 0.05-m depth, from 4.2 to 5.3 at the 0.05- to 0.10-m depth, and from 4.2 to 4.8 at the 0.10- to 0.20-m depth, after liming and re-liming. Zinc concentrations evaluated by DTPA-TEA, 0.1molL-1 HCl, Mehlich 1, and Mehlich 3 solutions were not changed as a result of lime rate application. Re-liming increased Zn concentrations extracted by 0.1molL-1 HCl at 0-0.05m deep and by DTPA-TEA at 0.05-0.10m deep. Surface-applied lime promoted a decrease in Zn concentrations of the crops, mainly in grains, because of increased soil pH at the surface layers. Regardless of the liming treatments, levels of Zn were sufficient to soybean, wheat, and corn nutrition under NT.
Resumo:
Potassium (K) plays an important role in many physiological and biochemical processes in plants and its adequate use is an important issue for sustainable economic crop production. Soil test-based K fertilizer recommendations are very limited for lowland rice (Oryza sativa L.) grown on Inceptisols. The objective of this study was to calibrate K soil testing for the response of lowland rice (cv. Ipagri 109) to added K. A field experiment was conducted in the farmers` field in the municipality of Lagoa da Confusao, State of Tocantins, central Brazil. The K rates used were 0, 125, 250, 375, 500, and 625 kg K ha-1 applied as broadcast and incorporated during sowing of the first rice crop. Rice responded significantly to K fertilization during 2 years of experimentation. Maximum grain yield of about 6,000 kg ha-1 was obtained with 57 mg K kg-1 soil in the first year and with 30 mg K kg-1 in the second year. This indicated that at low levels of K in the soil, nonexchangeable K was available for plant growth. Potassium use efficiency designated as agronomic efficiency (kg grain produced/kg K applied) decreased significantly in a quadratic fashion with increasing K level in the soil. Agronomic efficiency had a significantly linear association with grain yield. Hence, improving agronomic efficiency with management practices can improve rice yield.
Resumo:
Sampling owls in a reliable and standardized way is not easy given their nocturnal habits. Playback is a widely employed technique to survey owls. We assessed the influence of wind speed, temperature, air humidity, and moon phase on the response rate of the Tropical Screech Owl Megascops choliba and the Burrowing Owl Athene cunicularia in southeast Brazil. Tropical Screech Owl occurs in scrubland and wooded habitats, whereas the Burrowing Owl inhabits open grasslands to grassland savannah. Sixteen survey points were systematically distributed in four different landscape types, ranging from open grassland to woodland savannah. Field work was conducted in 2004 from June to December, the reproductive season of the two owl species. Our study design consisted of eight field expeditions of five nights each; four expeditions occurred under full moon and four under new moon conditions. At each survey station, we performed a broadcast/listening sequence involving several calls and vocalizations from each species, starting with Tropical Screech Owl (the smaller species). From 112 sample periods for each species within their respective preferred habitats, we obtained 54 responses from Tropical Screech Owl (48% response rate) and 30 responses (27% response rate) from Burrowing Owl. We found that the response rate of Tropical Screech Owl increased under conditions of higher temperature and air humidity, while the response rate of Burrowing Owl was higher during full moon nights.
Resumo:
While watching TV, viewers use the remote control to turn the TV set on and off, change channel and volume, to adjust the image and audio settings, etc. Worldwide, research institutes collect information about audience measurement, which can also be used to provide personalization and recommendation services, among others. The interactive digital TV offers viewers the opportunity to interact with interactive applications associated with the broadcast program. Interactive TV infrastructure supports the capture of the user-TV interaction at fine-grained levels. In this paper we propose the capture of all the user interaction with a TV remote control-including short term and instant interactions: we argue that the corresponding captured information can be used to create content pervasively and automatically, and that this content can be used by a wide variety of services, such as audience measurement, personalization and recommendation services. The capture of fine grained data about instant and interval-based interactions also allows the underlying infrastructure to offer services at the same scale, such as annotation services and adaptative applications. We present the main modules of an infrastructure for TV-based services, along with a detailed example of a document used to record the user-remote control interaction. Our approach is evaluated by means of a proof-of-concept prototype which uses the Brazilian Digital TV System, the Ginga-NCL middleware.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.