5 resultados para Forgery attacks

em Dalarna University College Electronic Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainable methods are required to protect newly planted tree seedlings from insect herbivore attack. To this end, here Norway spruce (Picea abies (L.) Karst.) seeds were treated with 2.5 mM nicotinamide (NIC), 2.5 mM nicotinic acid (NIA), 3 mM jasmonic acid (JA) or 0.2 mM 5-azacytidine (5-Aza), and 6-month-old seedlings grown from these seeds were planted at a reforestation area in central Sweden. Attack by pine weevils (Hylobius abietis) was reduced by 50 per cent by NIC treatment, 62.5 per cent by JA treatment and 25 per cent by 5-Aza treatment, when compared with seedlings grown from untreated seeds. Watering 18-month-old spruce seedlings with 2 mM NIC or 2 mM NIA did reduce attack during the first season in the field by 40 and 53 per cent, respectively, compared with untreated plants. Girdling was also reduced by the different treatments. Analysis of conifer seedlings treated with 5-Aza points at a possible involvement of epigenetic mechanisms in this defensive capacity. This is supported by a reduced level of DNA methylation in the needles of young spruce seedlings grown in a greenhouse from NIC-treated seeds. Seed treatment for seedling defense potentiation is simple, inexpensive and also a new approach for forestry with many potential applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This Master’s Thesis examines transnational conflicts and Christian-Muslim relations in Nigeria between the years 2001 and 2006. It focuses on two major transnational conflicts: The September 11, 2001 attacks in the United States and the Danish cartoon controversy of 2005/2006. It discusses the impact of these transnational conflicts on Christian-Muslim relations in Nigeria in the light of the implementation of the Sharia Law in some northern Nigerian states and the improved access to the broadcast media and mobile telephone communication in Nigeria. By underscoring the relationship between transnational conflicts and the local context, this study provides a new perspective for understanding Christian-Muslim relations in Nigeria

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vilhelm Ekelund och den fransk-italienska kultursfären: Några nedslag i de tidiga prosaverken – från Antikt ideal (1909) till Attiskt i fågelperspektiv (1919). (Vilhelm Ekelund and the French and Italian cultural heritage: A study of his early prose – from Antikt ideal (1909) to Attiskt i fågelperspektiv (1919)). The Swedish poet, essayist and aphorist Vilhelm Ekelund was not only influenced by German literature and philosophy, he also wrote extensive literary criticism on the subject of Romance language authors. This article discusses Ekelund’s relationship to some of the most influential French and Italian writers – as it can be seen in his work during the period 1909-1919. This relationship was ambiguous: he paid homage to French authors such as Montaigne, Montesquieu, Stendhal and Comte – as well as to the Italian poet and philosopher Leopardi – but he also severely criticized such distinguished writers as Baudelaire, Rousseau and Maupassant. One conclusion of this article is that the authors praised by Ekelund all venerate the Greek and Roman cultural heritage, whereas the despised novelists and poets were, in his opinion, either too “modern” or too “feminine” – both highly pejorative adjectives in the author’s terminology. It is also noted that Ekelund’s most ferocious attacks date from the first part of the decade, before he entered a more harmonic period with the works Metron (1918) and Attiskt i fågelperspektiv (1919).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.