Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle Sep 2009

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle

Conference papers

This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …


Evolution Versus Revolution As A Strategy For Thin Client Acceptance: Case Study, Paul Doyle, Mark Deegan, Ciaran O'Driscoll Jul 2009

Evolution Versus Revolution As A Strategy For Thin Client Acceptance: Case Study, Paul Doyle, Mark Deegan, Ciaran O'Driscoll

Conference papers

Thin Clients have evolved from simple text based CRT dumb terminal devices in the 1960s, into a sophisticated architecture encompassing hardware, software, networks and protocols. However despite this recent evolution the Thin Client model has yet to re-emerge as a relevant design in an IT industry where Fat Clients (desktops and laptops) thrive. This paper describes two case studies performed within the Technological University Dublin School of Computing, focused on the issue of student acceptance of this technology. The first case study provides a dedicated single service Thin Client implementation, while the second case study adopts a process of coexistence …


A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2009

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.

In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …