59 resultados para Repudiation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presently different audio watermarking methods are available; most of them inclined towards copyright protection and copy protection. This is the key motive for the notion to develop a speaker verification scheme that guar- antees non-repudiation services and the thesis is its outcome. The research presented in this thesis scrutinizes the field of audio water- marking and the outcome is a speaker verification scheme that is proficient in addressing issues allied to non-repudiation to a great extent. This work aimed in developing novel audio watermarking schemes utilizing the fun- damental ideas of Fast-Fourier Transform (FFT) or Fast Walsh-Hadamard Transform (FWHT). The Mel-Frequency Cepstral Coefficients (MFCC) the best parametric representation of the acoustic signals along with few other key acoustic characteristics is employed in crafting of new schemes. The au- dio watermark created is entirely dependent to the acoustic features, hence named as FeatureMark and is crucial in this work. In any watermarking scheme, the quality of the extracted watermark de- pends exclusively on the pre-processing action and in this work framing and windowing techniques are involved. The theme non-repudiation provides immense significance in the audio watermarking schemes proposed in this work. Modification of the signal spectrum is achieved in a variety of ways by selecting appropriate FFT/FWHT coefficients and the watermarking schemes were evaluated for imperceptibility, robustness and capacity char- acteristics. The proposed schemes are unequivocally effective in terms of maintaining the sound quality, retrieving the embedded FeatureMark and in terms of the capacity to hold the mark bits. Robust nature of these marking schemes is achieved with the help of syn- chronization codes such as Barker Code with FFT based FeatureMarking scheme and Walsh Code with FWHT based FeatureMarking scheme. An- other important feature associated with this scheme is the employment of an encryption scheme towards the preparation of its FeatureMark that scrambles the signal features that helps to keep the signal features unreve- laed. A comparative study with the existing watermarking schemes and the ex- periments to evaluate imperceptibility, robustness and capacity tests guar- antee that the proposed schemes can be baselined as efficient audio water- marking schemes. The four new digital audio watermarking algorithms in terms of their performance are remarkable thereby opening more opportu- nities for further research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

 Security provisioning is an essential part in the design of any communication systems, which becomes more critical for wireless systems. The consideration and comparisons of security algorithms in various Open Systems Interconnection layers is a difficult task, because there are many performance metrics involved. The aim of this novel research article is to present research results for the design of a wireless system revolving around the practical and low-cost implementation of Suite-B algorithms in different layers. Suite-B, promulgated by the National Security Agency, is a set of cryptographic algorithms, including non-repudiation. The end results include the deployment of Suite-B algorithms at the application, transport, and network layers and the protocol flow at each layer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Apriaden Pty Ltd v Seacrest Pty Ltd the Victorian Court of Appeal decided that termination of a lease under common law contractual principles following repudiation is an alternative to reliance upon an express forfeiture provision in the lease and that it is outside the sphere of statutory protections given against the enforcing of a forfeiture. The balance of authority supports the first aspect of the decision. This article focuses on the second aspect of it, which is a significant development in the law of leases. The article considers the implications of this decision for essential terms of clauses in leases, argues that common law termination for breach of essential terms should be subject to compliance with these statutory requirements and, as an alternative, suggests a way forward through appropriate law reform, considering whether the recent Victorian reform goes far enough.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Based on empirical research in a number of rural communities in north-western NSW, this article explores the dynamics of rural crisis as it is manifested in and through popular attitudes and campaigns around law and order. There is no denying that crime rates in many rural communities are high, often very high by national standards, or that local crime disproportionately involves Indigenous offenders (and Indigenous victims). However, the views expressed in interviews with established White residents, in local media and in organised campaigns around law and order are suggestive of a much deeper sense of threat and crisis. This, it is argued, can be explained in relation not simply to crime rates but the way in which crime is experienced at the local level and the manner in which it is connected to other unwanted change that is seen to threaten the integrity of these communities. In order to understand these anxieties it is necessary to explore historical patterns of settlement, the economic structure and the culture of rural communities. Indigenous Australians have, at best, occupied an ambiguous and fragile position in relation to membership of these communities, a form of ‘passive’ belonging, ‘conditional’ on deference to dominant White norms governing civic and domestic life. Local Indigenous crime can be a source of deep anxiety not only because it causes harm to person and property but because it is interpreted by many Whites as a repudiation of the local social order, a signifier of larger threats to the community and on occasions as a harbinger of social breakdown. The article explores some of the key themes emerging from interview material that characterise this sense of crisis and relates them to the larger pattern of change affecting many communities: economic decline, changing government policies and priorities, the growing relative economic and political power of Indigenous people, debates about native title and so on.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and complex certificate validation procedures while still maintaining security. It is also believed that this study will create a new dimension to the provision of security for the protection of health information in a national e-health environment.