Search results for "Encryption"

showing 10 items of 94 documents

Roadmap on 3D integral imaging: Sensing, processing, and display

2020

This Roadmap article on three-dimensional integral imaging provides an overview of some of the research activities in the field of integral imaging. The article discusses various aspects of the field including sensing of 3D scenes, processing of captured information, and 3D display and visualization of information. The paper consists of a series of 15 sections from the experts presenting various aspects of the field on sensing, processing, displays, augmented reality, microscopy, object recognition, and other applications. Each section represents the vision of its author to describe the progress, potential, vision, and challenging issues in this field.

Image qualityComputer scienceReconeixement òptic de formesComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologySeguretat informàticaStereo display01 natural sciencesXifratge (Informàtica)Field (computer science)010309 opticsOpticsHuman–computer interactionComputer security0103 physical sciencesMicroscopyComunicacions òptiquesData encryption (Computer science)Integral imagingOptical pattern recognitionbusiness.industryOptical communicationsCognitive neuroscience of visual object recognitionÒptica021001 nanoscience & nanotechnologyAtomic and Molecular Physics and OpticsProcessament òptic de dadesVisualizationHolographic displayAugmented realityOptical data processing0210 nano-technologybusinessImatges Processament Tècniques digitals
researchProduct

Multiplexing of encrypted data using fractal masks

2012

In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.

ImaginationImage EncryptionSystemComputer sciencemedia_common.quotation_subjectComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTransformPhysics::OpticsStorageEncryptionMultiplexingCrosstalkSearch engineOpticsFractalElectronic engineeringDomainComputer Science::Information TheoryComputer Science::Cryptography and Securitymedia_commonbusiness.industryAtomic and Molecular Physics and OpticsOptical encryptionFISICA APLICADAPhotorefractive crystalOptical EncryptionbusinessTelecommunications
researchProduct

Privacy violations in Riga open data public transport system

2016

Over the recent years public transportation systems around the world have been migrating to digital ticketing solutions. This paper investigates security and privacy aspects of the one such system implemented by Riga municipality called e-talons by analysing published open data containing ride registrations.

Information privacyEngineeringPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreEncryptionOpen dataPublic transportAlgorithm designbusinesscomputer2016 IEEE 4th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Privacy handling for critical information infrastructures

2013

This paper proposes an architecture and a methodology for privacy handling in Critical Information Infrastructures. Privacy is in this respect considered as both the risk of revealing person-sensitive information, for example from critical infrastructures in health institutions, but also to identify and avoid leakage of confidential information from the critical information infrastructures themselves. The architecture integrates privacy enhancing technologies into an enterprise service bus, which allows for policy-controlled authorisation, anonymisation and encryption of information in XML elements or attributes in messages on the service bus. The proposed methodology can be used to identif…

Information privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareComputer securitycomputer.software_genreEncryptionInformation sensitivityEnterprise service busPrivacy-enhancing technologiesbusinessResilience (network)computer2013 11th IEEE International Conference on Industrial Informatics (INDIN)
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

Frequency Determined Homomorphic Unsharp Masking Algorithm on Knee MR Images

2005

A very important artifact corrupting Magnetic Resonance (MR) Images is the RF inhomogeneity, also called Bias artifact. The visual effect produced by this kind of artifact is an illumination variation which afflicts this kind of medical images. In literature a lot of works oriented to the suppression of this artifact can be found. The approaches based on homomorphic filtering offer an easy way to perform bias correction but none of them can automatically determine the cut-off frequency. In this work we present a measure based on information theory in order to find the frequency mentioned above and this technique is applied to MR images of the knee which are hardly bias corrupted.

Masking (art)Artifact (error)medicine.diagnostic_testbusiness.industryComputer scienceHomomorphic encryptionMagnetic resonance imagingLuminanceHomomorphic filteringmedicinemedical images magnetic resonanceComputer visionArtificial intelligencebusinessUnsharp masking
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct

Feasibility of FPGA accelerated IPsec on cloud

2018

Abstract Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurre…

Network securityComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolPacket processingCloud computing02 engineering and technologycomputer.software_genreEncryptionGeneralLiterature_MISCELLANEOUSArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringField-programmable gate arrayVirtual network0505 lawbusiness.industryNetwork packet05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringByteVirtualization020202 computer hardware & architectureHardware and ArchitectureEmbedded systemIPsec050501 criminologyHardware accelerationbusinesscomputerSoftwareMicroprocessors and Microsystems
researchProduct

Mobile agents principles of operation

2004

Publisher Summary This chapter discusses the mobile agent technology and summarizes their features, principles of operation and implementation elements. Some development tools are also discussed. The chapter provides general description of mobile agents as an advanced software paradigm, which extends object oriented programming. Then it discusses principles of operation starting from agent intelligent behavior and continuing with mobility, communication, coordination, and fault tolerance. Finally, as for related topics, monitoring, performances, and security issues are discussed in the chapter. Agent monitoring techniques are very useful because they allow users to know which agents are run…

Object-oriented programmingComputer sciencebusiness.industryAccess controlFault toleranceEncryptionInternet securityCommunications securityComputer securitycomputer.software_genreSoftwareMobile agentbusinessHost (network)computer
researchProduct

Random bit generation through polarization chaos in nonlinear optical fibers

2017

Nowadays, cryptographic applications are becoming of paramount importance in order to guarantee ultimately secure communications. Performances of classical and quantum key distribution and encryption algorithms are strongly dependent on the used Random Number Generator (RNG). A good RNG must produce unpredictable, unreproducible and unbiased sequences of numbers. For this reason, many true random number generators relying on chaotic physical phenomena, such as chaotic oscillations of high-bandwidth lasers [1, 2] or polarization chaos from a VCSEL diode [3], have been developed. In this work, we propose a RNG implementation based on a different physical mechanism than the ones previously use…

Optical fiberbusiness.industryComputer scienceRandom number generationChaotic02 engineering and technologyQuantum key distributionTopologyEncryptionlaw.inventionNonlinear system020210 optoelectronics & photonicsOpticslawAttractor0202 electrical engineering electronic engineering information engineeringbusinessBeam splitter2017 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC)
researchProduct