Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Multi-Algorithmic Cryptography Using Deterministic Chaos With Applications To Mobile Communications, Jonathan Blackledge Jan 2008

Multi-Algorithmic Cryptography Using Deterministic Chaos With Applications To Mobile Communications, Jonathan Blackledge

Articles

In this extended paper, we present an overview of the principal issues associated with cryptography, providing historically significant examples for illustrative purposes as part of a short tutorial for readers that are not familiar with the subject matter. This is used to introduce the role that nonlinear dynamics and chaos play in the design of encryption engines which utilize different types of Iteration Function Systems (IFS). The design of such encryption engines requires that they conform to the principles associated with diffusion and confusion for generating ciphers that are of a maximum entropy type. For this reason, the role of …


Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry Jan 2008

Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry

Articles

Provisions for citizen involvement in the assessment of potential environmental effects of certain plans, programmes and projects are present in current legislation. An international survey revealed that public participation is common practice in European and some other countries worldwide. However, a number of issues are observed to affect public involvement in EIA/SEA processes and expert opinion differs when evaluating the effectiveness of existing participative methods. Results suggest that technology-aided methods can improve traditional participation processes. In particular, GIS has the potential to increase community knowledge and enhance involvement by communicating information more effectively. Variable accessibility to technology and data quality …


Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq Jan 2008

Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq

Articles

An approach to watermarking digital signals using frequency modulation - ‘Chirp Coding’ - is considered. The principles underlying this approach are based on the use of a matched filter to reconstruct a ‘chirp stream’ code that is uniquely robust. The method is generic in the sense that it can, in principle, be used for a variety of different signal (the authentication of speech and biomedical signals, for example). Further, by generating a bit stream that is signal dependent, chirp coding provides a method of self-authentication, which has a wide range of applications including copyright protection and digital rights management. However, …