Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Digital Age Of Consent And Age Verification: Can They Protect Children?, Liliana Pasquale, Paola Zippo, Cliona Curley, Brian O'Neill, Marina Mongiello Jan 2020

Digital Age Of Consent And Age Verification: Can They Protect Children?, Liliana Pasquale, Paola Zippo, Cliona Curley, Brian O'Neill, Marina Mongiello

Articles

Children are increasingly accessing social media content through mobile devices. Existing data protection regulations have focused on defining the digital age of consent, in order to limit collection of children’s personal data by organizations. However, children can easily bypass the mechanisms adopted by apps to verify their age, and thereby be exposed to privacy and safety threats. We conducted a study to identify how the top 10 social and communication apps among underage users apply age limits in their Terms of Use. We also assess the robustness of the mechanisms these apps put in place to verify the age of …


Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq Jan 2008

Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq

Articles

An approach to watermarking digital signals using frequency modulation - ‘Chirp Coding’ - is considered. The principles underlying this approach are based on the use of a matched filter to reconstruct a ‘chirp stream’ code that is uniquely robust. The method is generic in the sense that it can, in principle, be used for a variety of different signal (the authentication of speech and biomedical signals, for example). Further, by generating a bit stream that is signal dependent, chirp coding provides a method of self-authentication, which has a wide range of applications including copyright protection and digital rights management. However, …