24 resultados para Hiding


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the lead up to 2014, when the Coalition forces will be leaving Afghanistan, Pakistan will have a crucial role to play, not only in the negotiations but also in its relationship with the Afghan Taliban groups hiding in Pakistan. Indeed, there are historical, ethnic, operational and strategic reasons why Pakistan should have a seat at the negotiating table. Pakistan will want to make sure that its Taliban allies get a fair deal in the final outcome. While this may appear to be a good outcome for Islamabad in the medium term, it may not be good for Pakistan’s long-term stability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research presented improved watermarking methods for mono and stereo audio signals. To enhance the performance, novel methods are developed using echo hiding techniques and patchwork-based algorithms. The superior performances of the proposed methods are demonstrated by theoretical analysis and simulation examples, in comparison with the existing methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, there has been an increasing focus on the study and assessment of animal welfare in captive settings, such as zoological gardens and aquaria. Canada lynx (Lynx canadensis) are a relatively common species in zoos, yet are known to exhibit frequent reproductive problems in captive environments. We provide an exploratory analysis of housing and husbandry factors that are associated with patterns of adrenocortical activity in lynx. Adrenocortical activity was assessed using the non-invasive technique of monitoring faecal glucocorticoid metabolites (FGM). First, we calculated baseline FGM values for each individual and controlled for sex, age class, and reproductive status. The residual values were used to determine how levels of adrenocortical activity correlated with institutional husbandry practices. Second, we compared the occurrence of FGM peaks to events and disturbances recorded by keepers. Our results highlighted that adrenocortical activity is strongly correlated with: (i) the size of the enclosure, (ii) the number of hiding locations available, and (iii) the social environment. Based on our findings, we recommend that lynx should generally be housed alone (unless with dependant offspring or temporarily paired up for mating purposes), in larger enclosures and with the provision of several species-appropriate hiding locations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a patchwork-based audio watermarking method to resist de-synchronization attacks such as pitch-scaling, time-scaling, and jitter attacks. At the embedding stage, the watermarks are embedded into the host audio signal in the discrete cosine transform (DCT) domain. Then, a set of synchronization bits are implanted into the watermarked signal in the logarithmic DCT (LDCT) domain. At the decoding stage, we analyze the received audio signal in the LDCT domain to find the scaling factor imposed by an attack. Then, we modify the received signal to remove the scaling effect, together with the embedded synchronization bits. After that, watermarks are extracted from the modified signal. Simulation results show that at the embedding rate of 10 bps, the proposed method achieves 98.9% detection rate on average under the considered de-synchronization attacks. At the embedding rate of 16 bps, it can still obtain 94.7% detection rate on average. So, the proposed method is much more robust to de-synchronization attacks than other patchwork watermarking methods. Compared with the audio watermarking methods designed for tackling de-synchronization attacks, our method has much higher embedding capacity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is no conclusive evidence of any nonhuman animal using the sun as part of its predation strategy. Here, we show that the world's largest predatory fish-the white shark (Carcharodon carcharias)-exploits the sun when approaching baits by positioning the sun directly behind them. On sunny days, sharks reversed their direction of approach along an east-west axis from morning to afternoon but had uniformly distributed approach directions during overcast conditions. These results show that white sharks have sufficient behavioral flexibility to exploit fluctuating environmental features when predating. This sun-tracking predation strategy has a number of potential functional roles, including improvement of prey detection, avoidance of retinal overstimulation, and predator concealment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: This study explores the possibility that religious fundamentalism (RF) may be linked to deficits in personality structure, which is in contrast to the general assumption that religiosity and spirituality are positively related to mature personality development. SAMPLING AND METHODS: To test this hypothesis, 327 (232 female) college students completed the Multidimensional Inventory for Religious/Spiritual Well-Being together with the Innsbrucker Religious Fundamentalism Scale. In addition, the 'vulnerable dark triad' of personality ('vulnerable narcissism', subscale of the Pathological Narcissism Inventory; 'secondary psychopathy', subscale of Levenson's Self-Report Psychopathy Scale; 'borderline personality', of the Borderline Personality Inventory) was assessed. RESULTS: In general, the relation between spirituality and healthy personality functioning was confirmed. In addition to greatly overlapping with 'general religiosity' (p < 0.001), RF was also relevantly predicted by narcissistic ('hiding the self') and borderline ('primitive defenses') personality facets (p < 0.05 for both). CONCLUSIONS: Based on these preliminary data, we conclude that specific structural deficits in personality might lead to more rigorous variants of religious/spiritual beliefs such as RF. Further research in clinical surroundings as well as in religious extremist groups is recommended.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A robust audio watermarking method based on the time-spread (TS) echo hiding scheme is proposed. Compared with existing TS watermarking methods, the approach is more robust as it exploits the characteristics of host signals in the encoding stage. Theoretical analysis and simulation examples demonstrate the effectiveness and advantages of the method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In echo-based audio watermarking methods, poor robustness and low embedding capacity are the main problems. In this paper, we propose a novel time-spread echo method for audio watermarking, aiming to improve the robustness and the embedding capacity. To improve the robustness, we design an efficient pseudonoise (PN) sequence and a corresponding decoding function. Compared to the conventional PN sequence used in time-spread echo hiding based method, more large peaks are produced during the autocorrelation of the proposed PN sequence. Our decoding function is designed to utilize these peaks to improve the robustness. To enhance the embedding capacity, multiple watermark bits are embedded into one audio segment. This is achieved by varying the delays of added echo signals. Moreover, the security of the proposed method is further improved by scrambling the watermarks at the embedding stage. Compared with the conventional time-spread echo-based method, the proposed method is more robust to conventional attacks and has higher embedding capacity. The effectiveness of our method is illustrated by simulation results.