2 resultados para Violation of rights

em Dalarna University College Electronic Archive


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background: Violence against women is associated with serious health problems, including adverse maternal and child health. Antenatal care (ANC) midwives are increasingly expected to implement the routine of identifying exposure to violence. An increase of Somali born refugee women in Sweden, their reported adverse childbearing health and possible links to violence pose a challenge to the Swedish maternity health care system. Thus, the aim was to explore ways ANC midwives in Sweden work with Somali born women and the questions of exposure to violence. Methods: Qualitative individual interviews with 17 midwives working with Somali-born women in nine ANC clinics in Sweden were analyzed using thematic analysis. Results: The midwives strived to focus on the individual woman beyond ethnicity and cultural differences. In relation to the Somali born women, they navigated between different definitions of violence, ways of handling adversities in life and social contexts, guided by experience based knowledge and collegial support. Seldom was ongoing violence encountered. The Somali-born women’s’ strengths and contentment were highlighted, however, language skills were considered central for a Somali-born woman’s access to rights and support in the Swedish society. Shared language, trustful relationships, patience, and networking were important aspects in the work with violence among Somali-born women. Conclusion: Focus on the individual woman and skills in inter-cultural communication increases possibilities of overcoming social distances. This enhances midwives’ ability to identify Somali born woman’s resources and needs regarding violence disclosure and support. Although routine use of professional interpretation is implemented, it might not fully provide nuances and social safety needed for violence disclosure. Thus, patience and trusting relationships are fundamental in work with violence among Somali born women. In collaboration with social networks and other health care and social work professions, the midwife can be a bridge and contribute to increased awareness of rights and support for Somali-born women in a new society.