50 resultados para Repudiation.
Resumo:
Presently different audio watermarking methods are available; most of them inclined towards copyright protection and copy protection. This is the key motive for the notion to develop a speaker verification scheme that guar- antees non-repudiation services and the thesis is its outcome. The research presented in this thesis scrutinizes the field of audio water- marking and the outcome is a speaker verification scheme that is proficient in addressing issues allied to non-repudiation to a great extent. This work aimed in developing novel audio watermarking schemes utilizing the fun- damental ideas of Fast-Fourier Transform (FFT) or Fast Walsh-Hadamard Transform (FWHT). The Mel-Frequency Cepstral Coefficients (MFCC) the best parametric representation of the acoustic signals along with few other key acoustic characteristics is employed in crafting of new schemes. The au- dio watermark created is entirely dependent to the acoustic features, hence named as FeatureMark and is crucial in this work. In any watermarking scheme, the quality of the extracted watermark de- pends exclusively on the pre-processing action and in this work framing and windowing techniques are involved. The theme non-repudiation provides immense significance in the audio watermarking schemes proposed in this work. Modification of the signal spectrum is achieved in a variety of ways by selecting appropriate FFT/FWHT coefficients and the watermarking schemes were evaluated for imperceptibility, robustness and capacity char- acteristics. The proposed schemes are unequivocally effective in terms of maintaining the sound quality, retrieving the embedded FeatureMark and in terms of the capacity to hold the mark bits. Robust nature of these marking schemes is achieved with the help of syn- chronization codes such as Barker Code with FFT based FeatureMarking scheme and Walsh Code with FWHT based FeatureMarking scheme. An- other important feature associated with this scheme is the employment of an encryption scheme towards the preparation of its FeatureMark that scrambles the signal features that helps to keep the signal features unreve- laed. A comparative study with the existing watermarking schemes and the ex- periments to evaluate imperceptibility, robustness and capacity tests guar- antee that the proposed schemes can be baselined as efficient audio water- marking schemes. The four new digital audio watermarking algorithms in terms of their performance are remarkable thereby opening more opportu- nities for further research.
Resumo:
Podeschi, J.B. Dickens,
Resumo:
"Reprinted from the Law reporter for March MDCCCXLII."
Resumo:
Cover title: Letter ... in answer to enquiries concerning the late imputations of dishonor upon the United States.
Resumo:
Mode of access: Internet.
Resumo:
In Apriaden Pty Ltd v Seacrest Pty Ltd the Victorian Court of Appeal decided that termination of a lease under common law contractual principles following repudiation is an alternative to reliance upon an express forfeiture provision in the lease and that it is outside the sphere of statutory protections given against the enforcing of a forfeiture. The balance of authority supports the first aspect of the decision. This article focuses on the second aspect of it, which is a significant development in the law of leases. The article considers the implications of this decision for essential terms of clauses in leases, argues that common law termination for breach of essential terms should be subject to compliance with these statutory requirements and, as an alternative, suggests a way forward through appropriate law reform, considering whether the recent Victorian reform goes far enough.
Resumo:
Based on empirical research in a number of rural communities in north-western NSW, this article explores the dynamics of rural crisis as it is manifested in and through popular attitudes and campaigns around law and order. There is no denying that crime rates in many rural communities are high, often very high by national standards, or that local crime disproportionately involves Indigenous offenders (and Indigenous victims). However, the views expressed in interviews with established White residents, in local media and in organised campaigns around law and order are suggestive of a much deeper sense of threat and crisis. This, it is argued, can be explained in relation not simply to crime rates but the way in which crime is experienced at the local level and the manner in which it is connected to other unwanted change that is seen to threaten the integrity of these communities. In order to understand these anxieties it is necessary to explore historical patterns of settlement, the economic structure and the culture of rural communities. Indigenous Australians have, at best, occupied an ambiguous and fragile position in relation to membership of these communities, a form of ‘passive’ belonging, ‘conditional’ on deference to dominant White norms governing civic and domestic life. Local Indigenous crime can be a source of deep anxiety not only because it causes harm to person and property but because it is interpreted by many Whites as a repudiation of the local social order, a signifier of larger threats to the community and on occasions as a harbinger of social breakdown. The article explores some of the key themes emerging from interview material that characterise this sense of crisis and relates them to the larger pattern of change affecting many communities: economic decline, changing government policies and priorities, the growing relative economic and political power of Indigenous people, debates about native title and so on.
Resumo:
To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and complex certificate validation procedures while still maintaining security. It is also believed that this study will create a new dimension to the provision of security for the protection of health information in a national e-health environment.
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.