685 resultados para broadcast encryption


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Uppdragsgivare för detta examensarbete är Länsstyrelsen Dalarna. Målet är att undersöka hur lämplig tekniken med CBS (Cell Broadcast Service) baserade textmeddelande är vid viktigt meddelande till allmänheten (VMA-larm). En tjänst som utnyttjar CBS-tekniken kan rädda liv om allmänheten i ett tidigt skede får reda på vad som hänt och vart de ska bege sig.Rapporten visar på hur man kan använda SMS då en krissituation uppstår. Med hjälp av CBS-tekniken skickas meddelandet till specifikt valda basstationer och alla mobiltelefoner som är uppkopplade mot den. Det positiva är att bara de som behöver få veta vad som hänt får meddelandet.Enligt specifikationerna (ETSI) på GSM och 3G-näten i Sverige finns det stöd för utskick av CBS-meddelanden inbyggt i de befintliga näten. Det finns dock vissa problem vid införandet av CBS-tekniken i operatörsnäten. Operatörerna måste implementera en Cell Broadcast Center (CBC) i näten, denna del av infrastrukturen kommunicerar med basstationerna och sköter utskicken av CBS-meddelanden. Ett ytterligare problem med CBS-tekniken är att användarna måste aktivera mobiltelefonen för att ta emot CBS-meddelanden.Enligt Telia och Vodafone används CBS inte i Sverige idag men vi bedömer att tjänsten för att varna allmänheten kan använda sig av CBS-tekniken om den implementeras i operatörsnäten. Vi har i detta arbete använt oss av en generell kvalitativ metod kompletterat med Siegels metod. Med den kvalitativa metoden har vi intervjuat Telia och Vodafone på ingående fakta om CBS-tekniken. Vid design av teknisk lösning har vi använt oss av Siegels två första faser.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Farmers are interested in producing popcorn under organic production systems and propane flaming could be a significant component of an integrated weed management program. The objective of this study was to collect baseline information on popcorn tolerance to broadcast flaming as influenced by propane dose and crop growth stage at the time of flaming. Field experiments were conducted at the Haskell Agricultural Laboratory of the University of Nebraska, Concord, NE in 2008 and 2009 using five propane doses (0, 13, 24, 44 and 85 kg ha(-1)) applied at the 2-leaf, 5-leaf and 7-leaf growth stages. Propane was applied using a custom-built research flamer driven at a constant speed of 6.4 km h(-1). Crop response to propane dose was described by log-logistic models on the basis of visual estimates of crop injury, yield components (plants m(-2), ears plant(-1), kernels cob(-1) and 100-kernel weight) and grain yield. Popcorn response to flaming was influenced by the crop growth stage and propane dose. Based on various parameters evaluated, popcorn flamed at the 5-leaf showed the highest tolerance while the 2-leaf was the most susceptible stage. The maximum yield reductions were 45%, 9% and 16% for the 2-leaf, 5-leaf and 7-leaf stages, respectively. In addition, propane doses that resulted in a 5% yield loss were 23 kg ha(-1) for the 2-leaf and 7-leaf and 30 kg ha(-1) for the 5-leaf stage. Flaming has a potential to be used effectively in organic popcorn production if properly used. (C) 2010 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which acts as a pseudo-random generator (PRNG). The paper main focus is to use chaos theory to cryptography. Thus, CA was explored to look for this "chaos" property. This way, the manuscript is more concerning on tests like: Lyapunov exponent, Entropy and Hamming distance to measure the chaos in CA, as well as statistic analysis like DIEHARD and ENT suites. Our results achieved higher randomness quality than others ciphers in literature. These results reinforce the supposition of a strong relationship between chaos and the randomness quality. Thus, the "chaos" property of CA is a good reason to be employed in cryptography, furthermore, for its simplicity, low cost of implementation and respectable encryption power. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Descrizione dell'algoritmo crittografico AES, criteri adottati dal NIST per la scelta di AES e considerazioni sulla sua sicurezza.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While sound and video may capture viewers' attention, interaction can captivate them. This has not been available prior to the advent of Digital Television. In fact, what lies at the heart of the Digital Television revolution is this new type of interactive content, offered in the form of interactive Television (iTV) services. On top of that, the new world of converged networks has created a demand for a new type of converged services on a range of mobile terminals (Tablet PCs, PDAs and mobile phones). This paper aims at presenting a new approach to service creation that allows for the semi-automatic translation of simulations and rapid prototypes created in the accessible desktop multimedia authoring package Macromedia Director into services ready for broadcast. This is achieved by a series of tools that de-skill and speed-up the process of creating digital TV user interfaces (UI) and applications for mobile terminals. The benefits of rapid prototyping are essential for the production of these new types of services, and are therefore discussed in the first section of this paper. In the following sections, an overview of the operation of content, service, creation and management sub-systems is presented, which illustrates why these tools compose an important and integral part of a system responsible of creating, delivering and managing converged broadcast and telecommunications services. The next section examines a number of metadata languages candidates for describing the iTV services user interface and the schema language adopted in this project. A detailed description of the operation of the two tools is provided to offer an insight of how they can be used to de-skill and speed-up the process of creating digital TV user interfaces and applications for mobile terminals. Finally, representative broadcast oriented and telecommunication oriented converged service components are also introduced, demonstrating how these tools have been used to generate different types of services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This contribution discusses the effects of camera aperture correction in broadcast video on colour-based keying. The aperture correction is used to ’sharpen’ an image and is one element that distinguishes the ’TV-look’ from ’film-look’. ’If a very high level of sharpening is applied, as is the case in many TV productions then this significantly shifts the colours around object boundaries with hight contrast. This paper discusses these effects and their impact on keying and describes a simple low-pass filter to compensate for them. Tests with colour-based segmentation algorithms show that the proposed compensation is an effective way of decreasing the keying artefacts on object boundaries.