WorldWideScience

Sample records for digital steganography focusing

  1. Steganography and Steganalysis in Digital Images

    Science.gov (United States)

    2012-01-01

    REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany...Z39.18 - Steganography and Steganalysis in Digital Images Report Title ABSTRACT Steganography (from the Greek for "covered writing") is the secret

  2. Digital watermarking and steganography fundamentals and techniques

    CERN Document Server

    Shih, Frank Y

    2007-01-01

    Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applications Mathematical Preliminaries  Least-Significant-Bit Substitution Discrete Fourier Transform (DFT) Discrete Cosine Transform Discrete Wavelet Transform Random Sequence Generation  The Chaotic M

  3. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

    Directory of Open Access Journals (Sweden)

    S. A. Seyyedi

    2013-01-01

    Full Text Available Steganography is a method of hiding information in other information of different format (container. There are many steganography techniques with various types of container. In the Internet, digital images are the most popular and frequently used containers. We consider main image steganography techniques and their advantages and disadvantages. We also identify the requirements of a good steganography algorithm and compare various such algorithms.

  4. DIGITAL DATA PROTECTION USING STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2016-03-01

    Full Text Available In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.

  5. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  6. Spread spectrum image steganography.

    Science.gov (United States)

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

  7. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  8. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  9. An Analysis of Perturbed Quantization Steganography in the Spatial Domain

    Science.gov (United States)

    2005-03-01

    Transform Domain While LSB steganography hides data in the least significant areas of image pixels, this data is not robust against lossy digital...introduced a technique for detecting least significant bit ( LSB ) steganography in digital images called RS Steganalysis. RS Steganalysis produces a...the function has the effect of additive noise similar to that introduced by pixel based LSB steganography . In clean cover images , the flipping

  10. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  11. Secure Image Steganography Algorithm Based on DCT with OTP Encryption

    Directory of Open Access Journals (Sweden)

    De Rosal Ignatius Moses Setiadi

    2017-04-01

    Full Text Available Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR and ormalize cross Correlation (NCC to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT, One Time Pad, Vernam, Chiper, Image Cryptography

  12. Multi-Class Classification for Identifying JPEG Steganography Embedding Methods

    Science.gov (United States)

    2008-09-01

    digital pictures on Web sites or sending them through email (Astrowsky, 2000). Steganography may also be used to allow communication between affiliates...B.H. (2000). STEGANOGRAPHY: Hidden Images, A New Challenge in the Fight Against Child Porn . UPDATE, Volume 13, Number 2, pp. 1-4, Retrieved June 3

  13. Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses

    Science.gov (United States)

    Kortsarts, Yana; Kempner, Yulia

    2015-01-01

    Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…

  14. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    Full Text Available Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful

  15. Steganography: LSB Methodology

    Science.gov (United States)

    2012-08-02

    of LSB steganography in grayscale and color images . In J. Dittmann, K. Nahrstedt, and P. Wohlmacher, editors, Proceedings of the ACM, Special...Fridrich, M. Gojan and R. Du paper titled “Reliable detection of LSB steganography in grayscale and color images ”. From a general perspective Figure 2...REPORT Steganography : LSB Methodology (Progress Report) 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In computer science, steganography is the science

  16. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  17. A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video

    Directory of Open Access Journals (Sweden)

    Christian Di Laura

    2016-01-01

    Full Text Available Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has foreseen the need for secret communication channels embedded in digital media. In this paper, a novel steganography technique designed for Standard Definition Digital Television (SDTV H.264/AVC encoded video sequences is presented. The algorithm introduced here makes use of the compression properties of the Context Adaptive Variable Length Coding (CAVLC entropy encoder to achieve a low complexity and real-time inserting method. The chosen scheme hides the private message directly in the H.264/AVC bit stream by modifying the AC frequency quantized residual luminance coefficients of intrapredicted I-frames. In order to avoid error propagation in adjacent blocks, an interlaced embedding strategy is applied. Likewise, the steganography technique proposed allows self-detection of the hidden message at the target destination. The code source was implemented by mixing MATLAB 2010 b and Java development environments. Finally, experimental results have been assessed through objective and subjective quality measures and reveal that less visible artifacts are produced with the technique proposed by reaching PSNR values above 40.0 dB and an embedding bit rate average per secret communication channel of 425 bits/sec. This exemplifies that steganography is affordable in digital television.

  18. New methods to improve the pixel domain steganography, steganalysis, and simplify the assessment of steganalysis tools

    OpenAIRE

    Khalind, Omed Saleem

    2015-01-01

    Unlike other security methods, steganography hides the very existence of secret messages rather than their content only. Both steganography and steganalysis are strongly related to each other, the new steganographic methods should be evaluated with current steganalysis methods and vice-versa. Since steganography is considered broken when the stego object is recognised, undetectability would be the most important property of any steganographic system. Digital image files are excellent media fo...

  19. Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

    Directory of Open Access Journals (Sweden)

    Asawaree Kulkarni

    2009-06-01

    Full Text Available Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on the public Internet. The probable reasons included the growth and availability of large number of steganography-producing tools and the limited capacity of the detection tools to cope with them. Thus, a redirection was introduced in the methodology and the detection focus was shifted from the analysis of the ‘product’ of the steganography-producing software; viz. the images, to the 'artifacts’ left by the steganography-producing software while it is being used to generate steganographic images. This approach was based on the concept of ‘Stego-Usage Timeline’. As a proof of concept, a sample set of criminal computers was scanned for the remnants of steganography-producing software. The results demonstrated that the problem of ‘the detection of the usage of steganography’ could be addressed by the approach adopted after the research redirection and that certain steganographic software was popular among the criminals. Thus, the contribution of the research was in demonstrating that the limitations of the tools based on the signature detection of steganographically altered images can be overcome by focusing the detection effort on detecting the artifacts of the steganography-producing tools.

  20. Quantum steganography using prior entanglement

    International Nuclear Information System (INIS)

    Mihara, Takashi

    2015-01-01

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography

  1. Quantum steganography using prior entanglement

    Energy Technology Data Exchange (ETDEWEB)

    Mihara, Takashi, E-mail: mihara@toyo.jp

    2015-06-05

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography.

  2. Quantum red-green-blue image steganography

    Science.gov (United States)

    Heidari, Shahrokh; Pourarian, Mohammad Rasoul; Gheibi, Reza; Naseri, Mosayeb; Houshmand, Monireh

    One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. The performances of the proposed schemes are analyzed by using software simulations in MATLAB environment. The analysis of PSNR, BER and Histogram graphs indicate that the presented schemes exhibit acceptable performances and also theoretical analysis demonstrates that the networks complexity of the approaches scales squarely.

  3. Towards Statistically Undetectable Steganography

    Science.gov (United States)

    2011-06-30

    payload size. Middle, payload proportional to y/N. Right, proportional to N. LSB replacement steganography in never-compressed cover images , detected... Images for Applications in Steganography ," IEEE Trans, on Info. Forensics and Security, vol. 3(2), pp. 247-258, 2008. Conference papers. (1) T. Filler...SPLE, Electronic Imaging , Security, Forensics, Steganography , and Watermarking of Mul- timedia Contents X, San Jose, CA, January 26-31, pp. 11-1-11-13

  4. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  5. Steganography Detection Using Entropy Measures

    Science.gov (United States)

    2012-11-16

    latter leads to the level of compression of the image . 3.3. Least Significant Bit ( LSB ) The object of steganography is to prevent suspicion upon the...6 2.3. Different kinds of steganography . . . . . . . . . . . . . . . . . . . . . 6 II. Steganography 8 3. Images and Significance of...9 3.3. Least Significant Bit ( LSB ) . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4. Significant Bit Image Depiction

  6. Secured Data Transmission Using Wavelet Based Steganography and cryptography

    OpenAIRE

    K.Ravindra Reddy; Ms Shaik Taj Mahaboob

    2014-01-01

    Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL sub band of the wavelet decomposed image using Le...

  7. A Survey on different techniques of steganography

    Directory of Open Access Journals (Sweden)

    Kaur Harpreet

    2016-01-01

    Full Text Available Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting.Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.

  8. PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2015-02-01

    Full Text Available One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography. There are also various existing methods like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm etc that can be used to find out the steganography method used and break it. Another drawback of the existing methods is that it adds noise to the image which makes the image look dull or grainy making it suspicious for a person about existence of a hidden message within the image. To overcome these shortcomings we have come up with a pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values whenever possible at pixel level or with minimum changes. Along with the image a key will also be used to decrypt the message stored at pixel levels. For further protection, both the message stored as well as the key file will be in encrypted format which can have same or different keys or decryption. Hence we call it as a RGB pixel pattern based steganography.

  9. New quantization matrices for JPEG steganography

    Science.gov (United States)

    Yildiz, Yesna O.; Panetta, Karen; Agaian, Sos

    2007-04-01

    Modern steganography is a secure communication of information by embedding a secret-message within a "cover" digital multimedia without any perceptual distortion to the cover media, so the presence of the hidden message is indiscernible. Recently, the Joint Photographic Experts Group (JPEG) format attracted the attention of researchers as the main steganographic format due to the following reasons: It is the most common format for storing images, JPEG images are very abundant on the Internet bulletin boards and public Internet sites, and they are almost solely used for storing natural images. Well-known JPEG steganographic algorithms such as F5 and Model-based Steganography provide high message capacity with reasonable security. In this paper, we present a method to increase security using JPEG images as the cover medium. The key element of the method is using a new parametric key-dependent quantization matrix. This new quantization table has practically the same performance as the JPEG table as far as compression ratio and image statistics. The resulting image is indiscernible from an image that was created using the JPEG compression algorithm. This paper presents the key-dependent quantization table algorithm and then analyzes the new table performance.

  10. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  11. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  12. Survey of the Use of Steganography over the Internet

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela DINCA

    2011-01-01

    Full Text Available This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.

  13. On LSB Spatial Domain Steganography and Channel Capacity

    Science.gov (United States)

    2008-03-21

    reveal the hidden information should not be taken as proof that the image is now clean. The survivability of LSB type spatial domain steganography ...the mindset that JPEG compressing an image is sufficient to destroy the steganography for spatial domain LSB type stego. We agree that JPEGing...modeling of 2 bit LSB steganography shows that theoretically there is non-zero stego payload possible even though the image has been JPEGed. We wish to

  14. Researcher’s Perspective of Substitution Method on Text Steganography

    Science.gov (United States)

    Zamir Mansor, Fawwaz; Mustapha, Aida; Azah Samsudin, Noor

    2017-08-01

    The linguistic steganography studies are still in the stage of development and empowerment practices. This paper will present several text steganography on substitution methods based on the researcher’s perspective, all scholar paper will analyse and compared. The objective of this paper is to give basic information in the substitution method of text domain steganography that has been applied by previous researchers. The typical ways of this method also will be identified in this paper to reveal the most effective method in text domain steganography. Finally, the advantage of the characteristic and drawback on these techniques in generally also presented in this paper.

  15. Implementation of IMAGE STEGANOGRAPHY Based on Random LSB

    OpenAIRE

    Ashish kumari; Shyama Sharma; Navdeep Bohra

    2012-01-01

    Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete communication between the sender and the receiver byreplacing the least significant bits (LSB)of the cover image with the data bits. And in this paper we have shown that how image steganography (random and sequential LSB) works and practical understanding of what image Stegano...

  16. Video steganography based on bit-plane decomposition of wavelet-transformed video

    Science.gov (United States)

    Noda, Hideki; Furuta, Tomofumi; Niimi, Michiharu; Kawaguchi, Eiji

    2004-06-01

    This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.

  17. Secure steganography designed for mobile platforms

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  18. A New Paradigm Hidden in Steganography

    Science.gov (United States)

    2000-01-01

    the n least signi cant bits ( LSB ) of each pixel in the cov- erimage, with the n most signi cant bits (MSB) from the corresponding pixel of the image to...e.g., 2 LSB are (0,0) ) to 3 (e.g., 2 LSB are (1,1) ), it is visually impossible for Eve to detect the steganography . Of course, if Eve has knowl...cryptographic security when the steganography has failed. Simply encrypt the embedded bits so that the 2 LSB in the stegoimage appear as white noise

  19. State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Rafat, Khan Farhan; Sher, Muhammad

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By "Covert" we mean "anything not meant for the purpose for which it is being used". Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  20. Quantum color image watermarking based on Arnold transformation and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping; Luo, Gaofeng

    In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be 2n×2n and 2n‑1×2n‑1, respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with 2n‑1×2n‑1 image size and 24-qubit grayscale is further expanded to an image with size 2n×2n and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with 2n×2n size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.

  1. Steganography and Prospects of Its Application in Protection of Printing Documents

    Directory of Open Access Journals (Sweden)

    M. O. Zhmakin

    2010-09-01

    Full Text Available In the article the principle of steganography reveals. Three modern directions of concealment of the information are presented. Application classical steganography in printing prints is described.

  2. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  3. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  4. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  5. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  6. LSB Based Quantum Image Steganography Algorithm

    Science.gov (United States)

    Jiang, Nan; Zhao, Na; Wang, Luo

    2016-01-01

    Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.

  7. CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

    Directory of Open Access Journals (Sweden)

    Atif Bin Mansoor

    2012-04-01

    Full Text Available Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard and DES (Data Encryption Standard cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages. Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.

  8. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  9. A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

    Directory of Open Access Journals (Sweden)

    Junhui He

    2018-01-01

    Full Text Available Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.

  10. Online Voting System Based on Image Steganography and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Biju Issac

    2017-01-01

    Full Text Available This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the backend. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. Next, the cryptographic and steganography techniques best suited for the requirements of the voting system were chosen, and the software was implemented. We have incorporated in our system techniques like the password hashed based scheme, visual cryptography, F5 image steganography and threshold decryption cryptosystem. The analysis, design and implementation phase of the software development of the voting system is discussed in detail. We have also used a questionnaire survey and did the user acceptance testing of the system.

  11. Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

    Directory of Open Access Journals (Sweden)

    O.V. Kostyrka

    2016-09-01

    Full Text Available At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed steganography message, significant throughput of a steganography communication channel. Aim: The aim of this research is to modify the steganography method, developed by the author earlier, which will allow to increase the throughput of the corresponding covert communication channel when saving resistance to attacks against the built-in message and perception reliability of the created steganography message, inherent to developed method. Materials and Methods: Modifications of a steganography method that is steady against attacks against the built-in message which is carrying out the inclusion and decoding of the sent (additional information in spatial domain of the image allowing to increase the throughput of the organized communication channel are offered. Use of spatial domain of the image allows to avoid accumulation of an additional computational error during the inclusion/decoding of additional information due to “transitions” from spatial domain of the image to the area of conversion and back that positively affects the efficiency of decoding. Such methods are considered as attacks against the built-in message: imposing of different noise on a steganography message, filtering, lossy compression of a ste-ganography message where the JPEG and JPEG2000 formats with different quality coefficients for saving of a steganography message are used. Results: It is shown that algorithmic implementations of the offered methods modifications remain steady against the perturbing influences, including considerable, provide reliability of perception of the created steganography message, increase the throughput of the created steganography communication channel in comparison with the algorithm implementing

  12. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  13. A novel JPEG steganography method based on modulus function with histogram analysis

    Directory of Open Access Journals (Sweden)

    V. Banoci

    2012-06-01

    Full Text Available In this paper, we present a novel steganographic method for embedding of secret data in still grayscale JPEG image. In order to provide large capacity of the proposed method while maintaining good visual quality of stego-image, the embedding process is performed in quantized transform coefficients of Discrete Cosine transform (DCT by modifying coefficients according to modulo function, what gives to the steganography system blind extraction predisposition. After-embedding histogram of proposed Modulo Histogram Fitting (MHF method is analyzed to secure steganography system against steganalysis attacks. In addition, AES ciphering was implemented to increase security and improve histogram after-embedding characteristics of proposed steganography system as experimental results show.

  14. Combination Base64 Algorithm and EOF Technique for Steganography

    Science.gov (United States)

    Rahim, Robbi; Nurdiyanto, Heri; Hidayat, Rahmat; Saleh Ahmar, Ansari; Siregar, Dodi; Putera Utama Siahaan, Andysah; Faisal, Ilham; Rahman, Sayuti; Suita, Diana; Zamsuri, Ahmad; Abdullah, Dahlan; Napitupulu, Darmawan; Ikhsan Setiawan, Muhammad; Sriadhi, S.

    2018-04-01

    The steganography process combines mathematics and computer science. Steganography consists of a set of methods and techniques to embed the data into another media so that the contents are unreadable to anyone who does not have the authority to read these data. The main objective of the use of base64 method is to convert any file in order to achieve privacy. This paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, the EoF technique is used to embed encoding text performed by Base64. As an example, for the mechanisms a file is used to represent the texts, and by using the two methods together will increase the security level for protecting the data, this research aims to secure many types of files in a particular media with a good security and not to damage the stored files and coverage media that used.

  15. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    Science.gov (United States)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  16. Improved chaos-based video steganography using DNA alphabets

    Directory of Open Access Journals (Sweden)

    Nirmalya Kar

    2018-03-01

    Full Text Available DNA based steganography plays a vital role in the field of privacy and secure communication. Here, we propose a DNA properties-based mechanism to send data hidden inside a video file. Initially, the video file is converted into image frames. Random frames are then selected and data is hidden in these at random locations by using the Least Significant Bit substitution method. We analyze the proposed architecture in terms of peak signal-to-noise ratio as well as mean squared error measured between the original and steganographic files averaged over all video frames. The results show minimal degradation of the steganographic video file. Keywords: Chaotic map, DNA, Linear congruential generator, Video steganography, Least significant bit

  17. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography

    Science.gov (United States)

    Pevný, Tomáš; Filler, Tomáš; Bas, Patrick

    This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.

  18. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods

    OpenAIRE

    Qazanfari, Kazem; Safabakhsh, Reza

    2017-01-01

    The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods don't consider inter pixel dependency. Therefore, recently, several steganalysis methods are proposed that by using co-occurrence matrix detec...

  19. Adaptive steganography

    Science.gov (United States)

    Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.

    2002-04-01

    Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.

  20. COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHY FOR COLOR IMAGES

    Directory of Open Access Journals (Sweden)

    A.J. Umbarkar

    2016-02-01

    Full Text Available Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the color as well as gray scale images for the purpose of data hiding and hides secret message first in sharper edge regions and then in smooth regions of the image. Message embedding depends on content of the image and message size. The experimental results illustrate that, for low embedding rate the method hides the message in sharp edges of cover image to get better stego image visualization quality. For high embedding rate, smooth regions and edges of the cover image are used for the purpose of data hiding. In this steganography method, color image and textured kind of image preserves better visual quality of stego image. The novelty of the comparative study is that, it helps to analyze the efficiency and performance of the method as it gives better results because it directly works on color images instead of converting to gray scale image.

  1. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  2. AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Smita Paira

    2016-09-01

    Full Text Available In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets one of the basic limitations of Cryptography. In this paper, a new algorithm has been proposed based on both Symmetric Key Cryptography and Audio Steganography. The combination of a randomly generated Symmetric Key along with LSB technique of Audio Steganography sends a secret message unrecognizable through an insecure medium. The Stego File generated is almost lossless giving a 100 percent recovery of the original message. This paper also presents a detailed experimental analysis of the algorithm with a brief comparison with other existing algorithms and a future scope. The experimental verification and security issues are promising.

  3. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Science.gov (United States)

    Yu, Lifang; Zhao, Yao; Ni, Rongrong; Li, Ting

    2010-12-01

    We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  4. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Yu Lifang

    2010-01-01

    Full Text Available We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  5. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  6. Quantum Steganography via Greenberger-Horne-Zeilinger GHZ4 State

    International Nuclear Information System (INIS)

    El Allati, A.; Hassouni, Y.; Medeni, M.B. Ould

    2012-01-01

    A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information. Moreover, the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information. Then, the scheme consists of sharing the correlation of four particle GHZ 4 states between the legitimate users. After insuring the security of the quantum channel, they begin to hide the secret information in the cover of message. Comparing the scheme with the previous quantum steganographies, capacity and imperceptibility of hidden message are good. The security of the present scheme against many attacks is also discussed. (general)

  7. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

    Directory of Open Access Journals (Sweden)

    Avinash Srinivasan

    2015-08-01

    Full Text Available Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers network restrictions on MMS message size. We have also analyzed the actions the carriers take - such as compression and/or format conversion - on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, We have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

  8. Survey Report – State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Khan Farhan Rafat; Muhammad Sher

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By “Covert” we mean “anything not meant for the purpose for which it is being used”. Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  9. New LSB-based colour image steganography method to enhance ...

    Indian Academy of Sciences (India)

    Mustafa Cem kasapbaşi

    2018-04-27

    Apr 27, 2018 ... evaluate the proposed method, comparative performance tests are carried out against different spatial image ... image steganography applications based on LSB are ..... worst case scenario could occur when having highest.

  10. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network

    Directory of Open Access Journals (Sweden)

    Pin Wu

    2018-06-01

    Full Text Available Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image steganography. It successfully hides the same size images with a decoding rate of 98.2% or bpp (bits per pixel of 23.57 by changing only 0.76% of the cover image on average. Our method directly learns end-to-end mappings between the cover image and the embedded image and between the hidden image and the decoded image. We further show that our embedded image, while with mega payload capacity, is still robust to statistical analysis.

  11. DWT Steganography with Usage of Scrambling

    Directory of Open Access Journals (Sweden)

    Jakub Oravec

    2016-07-01

    Full Text Available This article describes image steganography technique, which uses Discrete Wavelet Transform and Standard map for storage of secret data in form of binary image. Modifications, which are done on cover image depend on its scrambled and decomposed version. To avoid unnecessary amount of changes, proposed approach marks location of altered DWT coefficients. The paper ends with illustration of yielded results and presents some possible topics for future work.

  12. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems

    Directory of Open Access Journals (Sweden)

    Jude Hemanth Duraisamy

    2016-01-01

    Full Text Available Image steganography is one of the ever growing computational approaches which has found its application in many fields. The frequency domain techniques are highly preferred for image steganography applications. However, there are significant drawbacks associated with these techniques. In transform based approaches, the secret data is embedded in random manner in the transform coefficients of the cover image. These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. In this work, the application of Genetic Algorithm (GA and Particle Swarm Optimization (PSO have been explored in the context of determining the optimal coefficients in these transforms. Frequency domain transforms such as Bandelet Transform (BT and Finite Ridgelet Transform (FRIT are used in combination with GA and PSO to improve the efficiency of the image steganography system.

  13. Quantum watermarking scheme through Arnold scrambling and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping

    2017-09-01

    Based on the NEQR of quantum images, a new quantum gray-scale image watermarking scheme is proposed through Arnold scrambling and least significant bit (LSB) steganography. The sizes of the carrier image and the watermark image are assumed to be 2n× 2n and n× n, respectively. Firstly, a classical n× n sized watermark image with 8-bit gray scale is expanded to a 2n× 2n sized image with 2-bit gray scale. Secondly, through the module of PA-MOD N, the expanded watermark image is scrambled to a meaningless image by the Arnold transform. Then, the expanded scrambled image is embedded into the carrier image by the steganography method of LSB. Finally, the time complexity analysis is given. The simulation experiment results show that our quantum circuit has lower time complexity, and the proposed watermarking scheme is superior to others.

  14. Practical steganalysis of digital images: state of the art

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav

    2002-04-01

    Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a great deal of attention both from law enforcement and the media. In our paper, we classify and review current stego-detection algorithms that can be used to trace popular steganographic products. We recognize several qualitatively different approaches to practical steganalysis - visual detection, detection based on first order statistics (histogram analysis), dual statistics methods that use spatial correlations in images and higher-order statistics (RS steganalysis), universal blind detection schemes, and special cases, such as JPEG compatibility steganalysis. We also present some new results regarding our previously proposed detection of LSB embedding using sensitive dual statistics. The recent steganalytic methods indicate that the most common paradigm in image steganography - the bit-replacement or bit substitution - is inherently insecure with safe capacities far smaller than previously thought.

  15. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  16. STEGANOGRAPHY USAGE TO CONTROL MULTIMEDIA STREAM

    Directory of Open Access Journals (Sweden)

    Grzegorz Koziel

    2014-03-01

    Full Text Available In the paper, a proposal of new application for steganography is presented. It is possible to use steganographic techniques to control multimedia stream playback. Special control markers can be included in the sound signal and the player can detect markers and modify the playback parameters according to the hidden instructions. This solution allows for remembering user preferences within the audio track as well as allowing for preparation of various versions of the same content at the production level.

  17. Progressive Exponential Clustering-Based Steganography

    Directory of Open Access Journals (Sweden)

    Li Yue

    2010-01-01

    Full Text Available Cluster indexing-based steganography is an important branch of data-hiding techniques. Such schemes normally achieve good balance between high embedding capacity and low embedding distortion. However, most cluster indexing-based steganographic schemes utilise less efficient clustering algorithms for embedding data, which causes redundancy and leaves room for increasing the embedding capacity further. In this paper, a new clustering algorithm, called progressive exponential clustering (PEC, is applied to increase the embedding capacity by avoiding redundancy. Meanwhile, a cluster expansion algorithm is also developed in order to further increase the capacity without sacrificing imperceptibility.

  18. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  19. Extreme learning machine based optimal embedding location finder for image steganography.

    Directory of Open Access Journals (Sweden)

    Hayfaa Abdulzahra Atee

    Full Text Available In image steganography, determining the optimum location for embedding the secret message precisely with minimum distortion of the host medium remains a challenging issue. Yet, an effective approach for the selection of the best embedding location with least deformation is far from being achieved. To attain this goal, we propose a novel approach for image steganography with high-performance, where extreme learning machine (ELM algorithm is modified to create a supervised mathematical model. This ELM is first trained on a part of an image or any host medium before being tested in the regression mode. This allowed us to choose the optimal location for embedding the message with best values of the predicted evaluation metrics. Contrast, homogeneity, and other texture features are used for training on a new metric. Furthermore, the developed ELM is exploited for counter over-fitting while training. The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM index, fusion matrices, and mean square error (MSE. The modified ELM is found to outperform the existing approaches in terms of imperceptibility. Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image. An improvement in the imperceptibility as much as 28% is achieved compared to the existing state of the art methods.

  20. Digital video steganalysis using motion vector recovery-based features.

    Science.gov (United States)

    Deng, Yu; Wu, Yunjie; Zhou, Linna

    2012-07-10

    As a novel digital video steganography, the motion vector (MV)-based steganographic algorithm leverages the MVs as the information carriers to hide the secret messages. The existing steganalyzers based on the statistical characteristics of the spatial/frequency coefficients of the video frames cannot attack the MV-based steganography. In order to detect the presence of information hidden in the MVs of video streams, we design a novel MV recovery algorithm and propose the calibration distance histogram-based statistical features for steganalysis. The support vector machine (SVM) is trained with the proposed features and used as the steganalyzer. Experimental results demonstrate that the proposed steganalyzer can effectively detect the presence of hidden messages and outperform others by the significant improvements in detection accuracy even with low embedding rates.

  1. General Principles of Integrity Checking of Digital Images and Application for Steganalysis

    Directory of Open Access Journals (Sweden)

    Kobozeva Alla A.

    2016-06-01

    Full Text Available The new common approach for integrity checking of digital images is developed. The new features of formal parameters defining image are revealed, theoretically grounded and practically tested. The characteristics of the mutual arrangement of left and right singular vectors corresponding to the largest singular value of the image’s matrix (block of matrix and the vector composed of singular numbers is obtained. Formal parameters are obtained using normal singular decomposition of matrix (block of matrix which is uniquely determined. It is shown that for most blocks of original image (no matter lossy or lossless the angle between the left (right mentioned singular vector and vector composed of singular numbers is defined by the angle between the n-optimal vector and the vector of standard basis of the range corresponding dimension. It is shown that the determined feature brakes for the mentioned formal parameters in a non-original image. This shows the integrity violation of the image, i.e. the existence of the additional information embedded using steganography algorithms. So this can be used as a basis for development of new universal steganography methods and algorithms, and one example of the realization is proposed. The efficiency of the proposed algorithm won’t depend on the details of steganography method used for embedding. All the obtained results can be easily adapted for the digital video and audio analysis.

  2. A novel hash based least significant bit (2-3-3) image steganography in spatial domain

    OpenAIRE

    Manjula, G. R.; Danti, Ajit

    2015-01-01

    This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show ...

  3. Focus: Digital

    DEFF Research Database (Denmark)

    Technology has been an all-important and defining element within the arts throughout the 20th century, and it has fundamentally changed the ways in which we produce and consume music. With this Focus we investigate the latest developments in the digital domain – and their pervasiveness and rapid...... production and reception of contemporary music and sound art. With ‘Digital’ we present four composers' very different answers to how technology impact their work. To Juliana Hodkinson it has become an integral part of her sonic writing. Rudiger Meyer analyses the relationships between art and design and how...

  4. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  5. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.

    Science.gov (United States)

    Jain, Mamta; Kumar, Anil; Choudhary, Rishabh Charan

    2017-06-01

    In this article, we have proposed an improved diagonal queue medical image steganography for patient secret medical data transmission using chaotic standard map, linear feedback shift register, and Rabin cryptosystem, for improvement of previous technique (Jain and Lenka in Springer Brain Inform 3:39-51, 2016). The proposed algorithm comprises four stages, generation of pseudo-random sequences (pseudo-random sequences are generated by linear feedback shift register and standard chaotic map), permutation and XORing using pseudo-random sequences, encryption using Rabin cryptosystem, and steganography using the improved diagonal queues. Security analysis has been carried out. Performance analysis is observed using MSE, PSNR, maximum embedding capacity, as well as by histogram analysis between various Brain disease stego and cover images.

  6. Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping

    Science.gov (United States)

    Abolghasemi, Mojtaba; Aghaeinia, Hassan; Faez, Karim; Mehrabi, Mohammad Ali

    2010-01-01

    Spatial LSB+/-1 steganography changes smooth characteristics between adjoining pixels of the raw image. We present a novel steganalysis method for LSB+/-1 steganography based on feature vectors derived from the co-occurrence matrix in the spatial domain. We investigate how LSB+/-1 steganography affects the bit planes of an image and show that it changes more least significant bit (LSB) planes of it. The co-occurrence matrix is derived from an image in which some of its most significant bit planes are clipped. By this preprocessing, in addition to reducing the dimensions of the feature vector, the effects of embedding were also preserved. We compute the co-occurrence matrix in different directions and with different dependency and use the elements of the resulting co-occurrence matrix as features. This method is sensitive to the data embedding process. We use a Fisher linear discrimination (FLD) classifier and test our algorithm on different databases and embedding rates. We compare our scheme with the current LSB+/-1 steganalysis methods. It is shown that the proposed scheme outperforms the state-of-the-art methods in detecting the LSB+/-1 steganographic method for grayscale images.

  7. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography

    Science.gov (United States)

    Islam, Muhammad F.; Islam, Mohammed N.

    2012-04-01

    The objective of this paper is to develop a novel approach for encryption and compression of biometric information utilizing orthogonal coding and steganography techniques. Multiple biometric signatures are encrypted individually using orthogonal codes and then multiplexed together to form a single image, which is then embedded in a cover image using the proposed steganography technique. The proposed technique employs three least significant bits for this purpose and a secret key is developed to choose one from among these bits to be replaced by the corresponding bit of the biometric image. The proposed technique offers secure transmission of multiple biometric signatures in an identification document which will be protected from unauthorized steganalysis attempt.

  8. A novel quantum LSB-based steganography method using the Gray code for colored quantum images

    Science.gov (United States)

    Heidari, Shahrokh; Farzadnia, Ehsan

    2017-10-01

    As one of the prevalent data-hiding techniques, steganography is defined as the act of concealing secret information in a cover multimedia encompassing text, image, video and audio, imperceptibly, in order to perform interaction between the sender and the receiver in which nobody except the receiver can figure out the secret data. In this approach a quantum LSB-based steganography method utilizing the Gray code for quantum RGB images is investigated. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Experimental consequences which are analyzed in MATLAB environment, exhibit that the present schema shows good performance and also it is more secure and applicable than the previous one currently found in the literature.

  9. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  10. Forensic Analysis of Digital Image Tampering

    Science.gov (United States)

    2004-12-01

    analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...used to embed the hidden watermark is Steganography Software F5 version 11+ discussed in Section 2.2. Original JPEG Image – 580 x 435 – 17.4

  11. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography

    Directory of Open Access Journals (Sweden)

    Chiung-Wei Huang

    2018-01-01

    Full Text Available We propose a prototype of field programmable gate array (FPGA implementation for optimal pixel adjustment process (OPAP algorithm of image steganography. In the proposed scheme, the cover image and the secret message are transmitted from a personal computer (PC to an FPGA board using RS232 interface for hardware processing. We firstly embed k-bit secret message into each pixel of the cover image by the last-significant-bit (LSB substitution method, followed by executing associated OPAP calculations to construct a stego pixel. After all pixels of the cover image have been embedded, a stego image is created and transmitted from FPGA back to the PC and stored in the PC. Moreover, we have extended the basic pixel-wise structure to a parallel structure which can fully use the hardware devices to speed up the embedding process and embed several bits of secret message at the same time. Through parallel mechanism of the hardware based design, the data hiding process can be completed in few clock cycles to produce steganography outcome. Experimental results show the effectiveness and correctness of the proposed scheme.

  12. Single-mismatch 2LSB embedding method of steganography

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin

    2013-01-01

    This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image’s pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0.375 bits from the 2LSBs of the cover image, and is much less than the 2LSB replacement which is 0.5...

  13. The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Directory of Open Access Journals (Sweden)

    Iain Sutherland

    2009-06-01

    Full Text Available The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.

  14. Steganography based on pixel intensity value decomposition

    Science.gov (United States)

    Abdulla, Alan Anwar; Sellahewa, Harin; Jassim, Sabah A.

    2014-05-01

    This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is proposed to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The proposed decomposition has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the proposed technique offers an effective compromise between payload capacity and stego quality of existing embedding techniques based on pixel intensity value decomposition. Its capacity is equal to that of binary and Lucas, while it offers a higher capacity than Fibonacci, Prime, Natural, and CF when the secret bits are embedded in 1st Least Significant Bit (LSB). When the secret bits are embedded in higher bit-planes, i.e., 2nd LSB to 8th Most Significant Bit (MSB), the proposed scheme has more capacity than Natural numbers based embedding. However, from the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the proposed decomposition scheme has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.

  15. Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

    Directory of Open Access Journals (Sweden)

    Donghui Hu

    2017-01-01

    Full Text Available Digital image steganalysis is the art of detecting the presence of information hiding in carrier images. When detecting recently developed adaptive image steganography methods, state-of-art steganalysis methods cannot achieve satisfactory detection accuracy, because the adaptive steganography methods can adaptively embed information into regions with rich textures via the guidance of distortion function and thus make the effective steganalysis features hard to be extracted. Inspired by the promising success which convolutional neural network (CNN has achieved in the fields of digital image analysis, increasing researchers are devoted to designing CNN based steganalysis methods. But as for detecting adaptive steganography methods, the results achieved by CNN based methods are still far from expected. In this paper, we propose a hybrid approach by designing a region selection method and a new CNN framework. In order to make the CNN focus on the regions with complex textures, we design a region selection method by finding a region with the maximal sum of the embedding probabilities. To evolve more diverse and effective steganalysis features, we design a new CNN framework consisting of three separate subnets with independent structure and configuration parameters and then merge and split the three subnets repeatedly. Experimental results indicate that our approach can lead to performance improvement in detecting adaptive steganography.

  16. Steganalysis and improvement of a quantum steganography protocol via a GHZ4 state

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2013-01-01

    Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using the GHZ 4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ 4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ 4 state, we give another 8 groups of unitary transformations that can change the GHZ 4 state into 8 different quantum states. Due to the symmetry of the GHZ 4 state, all the possible 16 groups of unitary transformations change the GHZ 4 state into 8 different quantum states, so the improved protocol achieves a high efficiency

  17. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  18. Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos

    Directory of Open Access Journals (Sweden)

    Geeta Kasana

    2016-02-01

    Full Text Available In this paper, a Bit Plane Coding (BPC based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image.

  19. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  20. Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital

    Directory of Open Access Journals (Sweden)

    Alim Muadzani

    2016-08-01

    Full Text Available Information has now become an  important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to  hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI. Microsoft Visual Studio used as Integrated Development Environtment (IDE to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into  image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements.

  1. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  2. Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger—Horne—Zeilinger states

    International Nuclear Information System (INIS)

    Ye Tian-Yu; Jiang Li-Zhen

    2013-01-01

    A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger—Horne—Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. (general)

  3. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  4. DEVELOPMENT AND IMPLEMENTATION OF HASH FUNCTION FOR GENERATING HASHED MESSAGE

    Directory of Open Access Journals (Sweden)

    Amir Ghaeedi

    2016-09-01

    Full Text Available Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.

  5. Steganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model

    OpenAIRE

    Souvik Bhattacharyya; Gautam Sanyal

    2011-01-01

    The staggering growth in communication technologyand usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channelshave greater vulnerability to security threats causing unauthorizedin- formation access. Traditionally, encryption is used to realizethen communication security. However, important information is notprotected once decoded. Steganography is the art and science of communicating in a way which hides the existence o...

  6. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  7. Exploring How Usage-Focused Business Models Enable Circular Economy through Digital Technologies

    Directory of Open Access Journals (Sweden)

    Gianmarco Bressanelli

    2018-02-01

    Full Text Available Recent studies advocate that digital technologies are key enabling factors for the introduction of servitized business models. At the same time, these technologies support the implementation of the circular economy (CE paradigm into businesses. Despite this general agreement, the literature still overlooks how digital technologies enable such a CE transition. To fill the gap, this paper develops a conceptual framework, based on the literature and a case study of a company implementing a usage-focused servitized business model in the household appliance industry. This study focuses on the Internet of Things (IoT, Big Data, and analytics, and identifies eight specific functionalities enabled by such technologies (improving product design, attracting target customers, monitoring and tracking product activity, providing technical support, providing preventive and predictive maintenance, optimizing the product usage, upgrading the product, enhancing renovation and end-of-life activities. By investigating how these functionalities affect three CE value drivers (increasing resource efficiency, extending lifespan, and closing the loop, the conceptual framework developed in this paper advances knowledge about the role of digital technologies as an enabler of the CE within usage-focused business models. Finally, this study shows how digital technologies help overcome the drawback of usage-focused business models for the adoption of CE pointed out by previous literature.

  8. Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java

    Science.gov (United States)

    Courtney, Mary F.; Stix, Allen

    2006-01-01

    Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…

  9. On Max-Plus Algebra and Its Application on Image Steganography

    Directory of Open Access Journals (Sweden)

    Kiswara Agung Santoso

    2018-01-01

    Full Text Available We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. This is especially interesting because the matrix used in encoding or information disguises generally has an inverse, whereas matrix multiplication operations in max-plus algebra do not have an inverse. The advantages of this method are the size of the image that can be hidden into the cover image, larger than the previous method. The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.

  10. Generation new MP3 data set after compression

    Science.gov (United States)

    Atoum, Mohammed Salem; Almahameed, Mohammad

    2016-02-01

    The success of audio steganography techniques is to ensure imperceptibility of the embedded secret message in stego file and withstand any form of intentional or un-intentional degradation of secret message (robustness). Crucial to that using digital audio file such as MP3 file, which comes in different compression rate, however research studies have shown that performing steganography in MP3 format after compression is the most suitable one. Unfortunately until now the researchers can not test and implement their algorithm because no standard data set in MP3 file after compression is generated. So this paper focuses to generate standard data set with different compression ratio and different Genre to help researchers to implement their algorithms.

  11. Re-Imagining the Nature of (Student-Focused) Learning through Digital Technology

    Science.gov (United States)

    Hood, Nina

    2018-01-01

    Digital technology is frequently positioned as being central to the establishment of a 'future focused' education system that provides high quality student-focused learning opportunities and re-envisioned educational outcomes. While recognising the potential of technology, this paper explores some of the questions about its role in education and…

  12. A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis

    Science.gov (United States)

    2002-01-01

    itd.nrl.navy.mil Abstract. Steganography and steganalysis of digital images is a cat- and-mouse game. In recent work, Fridrich, Goljan and Du introduced a method...proposed embedding method. 1 Introduction Steganography and steganalysis of digital images is a cat-and-mouse game. Ever since Kurak and McHugh’s seminal...paper on LSB embeddings in images [10], various researchers have published work on either increasing the payload, im- proving the resistance to

  13. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  14. Increasing Security for Cloud Computing By Steganography in Image Edges

    Directory of Open Access Journals (Sweden)

    Hassan Hadi Saleh

    2017-03-01

    Full Text Available The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.

  15. LSB-Based Steganography Using Reflected Gray Code

    Science.gov (United States)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  16. Fast focus estimation using frequency analysis in digital holography.

    Science.gov (United States)

    Oh, Seungtaik; Hwang, Chi-Young; Jeong, Il Kwon; Lee, Sung-Keun; Park, Jae-Hyeung

    2014-11-17

    A novel fast frequency-based method to estimate the focus distance of digital hologram for a single object is proposed. The focus distance is computed by analyzing the distribution of intersections of smoothed-rays. The smoothed-rays are determined by the directions of energy flow which are computed from local spatial frequency spectrum based on the windowed Fourier transform. So our method uses only the intrinsic frequency information of the optical field on the hologram and therefore does not require any sequential numerical reconstructions and focus detection techniques of conventional photography, both of which are the essential parts in previous methods. To show the effectiveness of our method, numerical results and analysis are presented as well.

  17. Quantum steganography with noisy quantum channels

    International Nuclear Information System (INIS)

    Shaw, Bilal A.; Brun, Todd A.

    2011-01-01

    Steganography is the technique of hiding secret information by embedding it in a seemingly ''innocent'' message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.

  18. A Novel Quantum Image Steganography Scheme Based on LSB

    Science.gov (United States)

    Zhou, Ri-Gui; Luo, Jia; Liu, XingAo; Zhu, Changming; Wei, Lai; Zhang, Xiafen

    2018-06-01

    Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4 n × 4 n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K 1 and K 2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.

  19. Automatic focusing in digital holography and its application to stretched holograms.

    Science.gov (United States)

    Memmolo, P; Distante, C; Paturzo, M; Finizio, A; Ferraro, P; Javidi, B

    2011-05-15

    The searching and recovering of the correct reconstruction distance in digital holography (DH) can be a cumbersome and subjective procedure. Here we report on an algorithm for automatically estimating the in-focus image and recovering the correct reconstruction distance for speckle holograms. We have tested the approach in determining the reconstruction distances of stretched digital holograms. Stretching a hologram with a variable elongation parameter makes it possible to change the in-focus distance of the reconstructed image. In this way, the proposed algorithm can be verified at different distances by dispensing the recording of different holograms. Experimental results are shown with the aim of demonstrating the usefulness of the proposed method, and a comparative analysis has been performed with respect to other existing algorithms developed for DH. © 2011 Optical Society of America

  20. SCOPES: steganography with compression using permutation search

    Science.gov (United States)

    Boorboor, Sahar; Zolfaghari, Behrouz; Mozafari, Saadat Pour

    2011-10-01

    LSB (Least Significant Bit) is a widely used method for image steganography, which hides the secret message as a bit stream in LSBs of pixel bytes in the cover image. This paper proposes a variant of LSB named SCOPES that encodes and compresses the secret message while being hidden through storing addresses instead of message bytes. Reducing the length of the stored message improves the storage capacity and makes the stego image visually less suspicious to the third party. The main idea behind the SCOPES approach is dividing the message into 3-character segments, seeking each segment in the cover image and storing the address of the position containing the segment instead of the segment itself. In this approach, every permutation of the 3 bytes (if found) can be stored along with some extra bits indicating the permutation. In some rare cases the segment may not be found in the image and this can cause the message to be expanded by some overhead bits2 instead of being compressed. But experimental results show that SCOPES performs overlay better than traditional LSB even in the worst cases.

  1. A Learning-Based Steganalytic Method against LSB Matching Steganography

    Directory of Open Access Journals (Sweden)

    Z. Xia

    2011-04-01

    Full Text Available This paper considers the detection of spatial domain least significant bit (LSB matching steganography in gray images. Natural images hold some inherent properties, such as histogram, dependence between neighboring pixels, and dependence among pixels that are not adjacent to each other. These properties are likely to be disturbed by LSB matching. Firstly, histogram will become smoother after LSB matching. Secondly, the two kinds of dependence will be weakened by the message embedding. Accordingly, three features, which are respectively based on image histogram, neighborhood degree histogram and run-length histogram, are extracted at first. Then, support vector machine is utilized to learn and discriminate the difference of features between cover and stego images. Experimental results prove that the proposed method possesses reliable detection ability and outperforms the two previous state-of-the-art methods. Further more, the conclusions are drawn by analyzing the individual performance of three features and their fused feature.

  2. Preserving privacy of online digital physiological signals using blind and reversible steganography.

    Science.gov (United States)

    Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung

    2017-11-01

    Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n,  m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. SFM TECHNIQUE AND FOCUS STACKING FOR DIGITAL DOCUMENTATION OF ARCHAEOLOGICAL ARTIFACTS

    Directory of Open Access Journals (Sweden)

    P. Clini

    2016-06-01

    Full Text Available Digital documentation and high-quality 3D representation are always more requested in many disciplines and areas due to the large amount of technologies and data available for fast, detailed and quick documentation. This work aims to investigate the area of medium and small sized artefacts and presents a fast and low cost acquisition system that guarantees the creation of 3D models with an high level of detail, making the digitalization of cultural heritage a simply and fast procedure. The 3D models of the artefacts are created with the photogrammetric technique Structure From Motion that makes it possible to obtain, in addition to three-dimensional models, high-definition images for a deepened study and understanding of the artefacts. For the survey of small objects (only few centimetres it is used a macro lens and the focus stacking, a photographic technique that consists in capturing a stack of images at different focus planes for each camera pose so that is possible to obtain a final image with a higher depth of field. The acquisition with focus stacking technique has been finally validated with an acquisition with laser triangulation scanner Minolta that demonstrates the validity compatible with the allowable error in relation to the expected precision.

  4. "It is always a lot of fun!" : exploring dimensions of digital game experience using focus group methodology

    NARCIS (Netherlands)

    Poels, K.; Kort, de Y.A.W.; IJsselsteijn, W.A.

    2007-01-01

    This paper focuses on digital game experience: the feelings and experiences people have when they play digital games. Digital game experience is not a one-dimensional concept. Great variety exists in game genres and game players, and game experiences will differ accordingly. To date, game experience

  5. Passive auto-focus for digital still cameras and camera phones: Filter-switching and low-light techniques

    Science.gov (United States)

    Gamadia, Mark Noel

    In order to gain valuable market share in the growing consumer digital still camera and camera phone market, camera manufacturers have to continually add and improve existing features to their latest product offerings. Auto-focus (AF) is one such feature, whose aim is to enable consumers to quickly take sharply focused pictures with little or no manual intervention in adjusting the camera's focus lens. While AF has been a standard feature in digital still and cell-phone cameras, consumers often complain about their cameras' slow AF performance, which may lead to missed photographic opportunities, rendering valuable moments and events with undesired out-of-focus pictures. This dissertation addresses this critical issue to advance the state-of-the-art in the digital band-pass filter, passive AF method. This method is widely used to realize AF in the camera industry, where a focus actuator is adjusted via a search algorithm to locate the in-focus position by maximizing a sharpness measure extracted from a particular frequency band of the incoming image of the scene. There are no known systematic methods for automatically deriving the parameters such as the digital pass-bands or the search step-size increments used in existing passive AF schemes. Conventional methods require time consuming experimentation and tuning in order to arrive at a set of parameters which balance AF performance in terms of speed and accuracy ultimately causing a delay in product time-to-market. This dissertation presents a new framework for determining an optimal set of passive AF parameters, named Filter- Switching AF, providing an automatic approach to achieve superior AF performance, both in good and low lighting conditions based on the following performance measures (metrics): speed (total number of iterations), accuracy (offset from truth), power consumption (total distance moved), and user experience (in-focus position overrun). Performance results using three different prototype cameras

  6. Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani

    Directory of Open Access Journals (Sweden)

    Rahmad Hidayat

    2015-04-01

    Full Text Available Bit-Plane Complexity Segmentation (BPCS is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.

  7. Illustration Watermarking for Digital Images: An Investigation of Hierarchical Signal Inheritances for Nested Object-based Embedding

    Science.gov (United States)

    2007-02-23

    approach for signal-level watermark inheritance. 15. SUBJECT TERMS EOARD, Steganography , Image Fusion, Data Mining, Image ...189, Geneva, Switzerland, 2006 [V Block-Luminance and Blue Channel LSB Wet Paper Code Image Watermarking, accepte publication in: Proceedings of...SPIE Electronic Imaging , Security, Steganography , and Wa- termarking of Multimedia Contents IX, 2007 Interaction with a project from German Science

  8. Effective ASCII-HEX steganography for secure cloud

    International Nuclear Information System (INIS)

    Afghan, S.

    2015-01-01

    There are many reasons of cloud computing popularity some of the most important are; backup and rescue, cost effective, nearly limitless storage, automatic software amalgamation, easy access to information and many more. Pay-as-you-go model is followed to provide everything as a service. Data is secured by using standard security policies available at cloud end. In spite of its many benefits, as mentioned above, cloud computing has also some security issues. Provider as well as customer has to provide and collect data in a secure manner. Both of these issues plus efficient transmitting of data over cloud are very critical issues and needed to be resolved. There is need of security during the travel time of sensitive data over the network that can be processed or stored by the customer. Security to the customer's data at the provider end can be provided by using current security algorithms, which are not known by the customer. There is reliability problem due to existence of multiple boundaries in the cloud resource access. ASCII and HEX security with steganography is used to propose an algorithm that stores the encrypted data/cipher text in an image file which will be then sent to the cloud end. This is done by using CDM (Common Deployment Model). In future, an algorithm should be proposed and implemented for the security of virtual images in the cloud computing. (author)

  9. Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

    Directory of Open Access Journals (Sweden)

    Michael J. Pelosi

    2018-04-01

    Full Text Available In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp. Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs. In this extended reprint, we introduce additional application and discussion regarding cold storage of crypto-currency account and password information, as well as applications for secure transfer in hostile or insecure network circumstances.

  10. KONSEP PENYANDIAN FILE JPEG DENGAN MENGGUNAKAN METODE LSB

    Directory of Open Access Journals (Sweden)

    Haikal Nando Winata

    2017-03-01

    Full Text Available Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape

  11. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  12. Steganalysis Techniques for Documents and Images

    Science.gov (United States)

    2005-05-01

    steganography . We then illustrated the efficacy of our model using variations of LSB steganography . For binary images , we have made significant progress in...efforts have focused on two areas. The first area is LSB steganalysis for grayscale images . Here, as we had proposed (as a challenging task), we have...generalized our previous steganalysis technique of sample pair analysis to a theoretical framework for the detection of the LSB steganography . The new

  13. Minimizing embedding impact in steganography using trellis-coded quantization

    Science.gov (United States)

    Filler, Tomáš; Judas, Jan; Fridrich, Jessica

    2010-01-01

    In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

  14. Image Steganography of Multiple File Types with Encryption and Compression Algorithms

    Directory of Open Access Journals (Sweden)

    Ernest Andreigh C. Centina

    2017-05-01

    Full Text Available The goals of this study were to develop a system intended for securing files through the technique of image steganography integrated with cryptography by utilizing ZLIB Algorithm for compressing and decompressing secret files, DES Algorithm for encryption and decryption, and Least Significant Bit Algorithm for file embedding and extraction to avoid compromise on highly confidential files from exploits of unauthorized persons. Ensuing to this, the system is in acc ordance with ISO 9126 international quality standards. Every quality criteria of the system was evaluated by 10 Information Technology professionals, and the arithmetic Mean and Standard Deviation of the survey were computed. The result exhibits that m ost of them strongly agreed that the system is excellently effective based on Functionality, Reliability, Usability, Efficiency, Maintainability and Portability conformance to ISO 9126 standards. The system was found to be a useful tool for both governmen t agencies and private institutions for it could keep not only the message secret but also the existence of that particular message or file et maintaining the privacy of highly confidential and sensitive files from unauthorized access.

  15. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  16. Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA

    Directory of Open Access Journals (Sweden)

    Antonius Erick Handoyo

    2018-02-01

    Full Text Available This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks. Penelitian ini mengusulkan kombinasi teknik steganografi dan kriptografi menggunakan metode LSB – RSA. RSA merupakan teknik kriptografi yang populer dapat diterapkan pada citra digital. Nilai piksel citra digital hanya berkisar 0 sampai 255. Hal ini membuat kunci yang digunakan dalam RSA cukup terbatas sehingga kurang aman. Dalam penelitian ini diusulkan untuk mengkonversi nilai piksel citra menjadi 16 bit sehingga kunci yang digunakan dapat lebih bervariasi. Hasil eksperimen membuktikan adanya peningkatan keamanan serta nilai imperceptibility yang tetap terjaga. Hal ini dibuktikan dengan hasil PSNR 57.2258dB, MSE 0.1232dB. Metode ini juga tahan terhadap serangan salt and pepper.

  17. H. Sapiens Digital: From Digital Immigrants and Digital Natives to Digital Wisdom

    Science.gov (United States)

    Prensky, Marc

    2009-01-01

    As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…

  18. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  19. DigitalHub: A Repository Focused on the Future.

    Science.gov (United States)

    Ilik, Violeta; Hebal, Piotr; Olson, Anton; Wishnetsky, Susan; Pastva, Joelen; Kubilius, Ramune; Shank, Jonathan; Gutzman, Karen; Chung, Margarita; Holmes, Kristi

    2018-01-01

    The DigitalHub scholarly repository was developed and launched at the Galter Health Sciences Library for the Feinberg School of Medicine and the greater Northwestern Medicine community. The repository was designed to allow scholars the ability to create, share, and preserve a range of citable digital outputs. This article traces the evolution of DigitalHub's development and engagement activities, highlighting project challenges, innovations, success stories, and the team-based approach that was employed to successfully achieve project goals.

  20. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  1. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  2. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  3. Focus measure method based on the modulus of the gradient of the color planes for digital microscopy

    Science.gov (United States)

    Hurtado-Pérez, Román; Toxqui-Quitl, Carina; Padilla-Vivanco, Alfonso; Aguilar-Valdez, J. Félix; Ortega-Mendoza, Gabriel

    2018-02-01

    The modulus of the gradient of the color planes (MGC) is implemented to transform multichannel information to a grayscale image. This digital technique is used in two applications: (a) focus measurements during autofocusing (AF) process and (b) extending the depth of field (EDoF) by means of multifocus image fusion. In the first case, the MGC procedure is based on an edge detection technique and is implemented in over 15 focus metrics that are typically handled in digital microscopy. The MGC approach is tested on color images of histological sections for the selection of in-focus images. An appealing attribute of all the AF metrics working in the MGC space is their monotonic behavior even up to a magnification of 100×. An advantage of the MGC method is its computational simplicity and inherent parallelism. In the second application, a multifocus image fusion algorithm based on the MGC approach has been implemented on graphics processing units (GPUs). The resulting fused images are evaluated using a nonreference image quality metric. The proposed fusion method reveals a high-quality image independently of faulty illumination during the image acquisition. Finally, the three-dimensional visualization of the in-focus image is shown.

  4. The use of low cost compact cameras with focus stacking functionality in entomological digitization projects

    Directory of Open Access Journals (Sweden)

    Jan Mertens

    2017-10-01

    Full Text Available Digitization of specimen collections has become a key priority of many natural history museums. The camera systems built for this purpose are expensive, providing a barrier in institutes with limited funding, and therefore hampering progress. An assessment is made on whether a low cost compact camera with image stacking functionality can help expedite the digitization process in large museums or provide smaller institutes and amateur entomologists with the means to digitize their collections. Images of a professional setup were compared with the Olympus Stylus TG-4 Tough, a low-cost compact camera with internal focus stacking functions. Parameters considered include image quality, digitization speed, price, and ease-of-use. The compact camera’s image quality, although inferior to the professional setup, is exceptional considering its fourfold lower price point. Producing the image slices in the compact camera is a matter of seconds and when optimal image quality is less of a priority, the internal stacking function omits the need for dedicated stacking software altogether, further decreasing the cost and speeding up the process. In general, it is found that, aware of its limitations, this compact camera is capable of digitizing entomological collections with sufficient quality. As technology advances, more institutes and amateur entomologists will be able to easily and affordably catalogue their specimens.

  5. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  6. Digital Tectonics

    DEFF Research Database (Denmark)

    Christiansen, Karl; Borup, Ruben; Søndergaard, Asbjørn

    2014-01-01

    Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated.......Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated....

  7. A review on "A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding"

    Science.gov (United States)

    Das, Rig; Tuithung, Themrichon

    2013-03-01

    This paper reviews the embedding and extraction algorithm proposed by "A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar" on "A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding" in "International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010" [3] and shows that the Extraction of Secret Image is Not Possible for the algorithm proposed in [3]. 8 bit Cover Image of size is divided into non joint blocks and a two dimensional Discrete Cosine Transformation (2-D DCT) is performed on each of the blocks. Huffman Encoding is performed on an 8 bit Secret Image of size and each bit of the Huffman Encoded Bit Stream is embedded in the frequency domain by altering the LSB of the DCT coefficients of Cover Image blocks. The Huffman Encoded Bit Stream and Huffman Table

  8. Audre's daughter: Black lesbian steganography in Dee Rees' Pariah and Audre Lorde's Zami: A New Spelling of My Name.

    Science.gov (United States)

    Kang, Nancy

    2016-01-01

    This article argues that African-American director Dee Rees' critically acclaimed debut Pariah (2011) is a rewriting of lesbian poet-activist Audre Lorde's iconic "bio-mythography" Zami: A New Spelling of My Name (1982). The article examines how Rees' work creatively and subtly re-envisions Lorde's Zami by way of deeply rooted and often cleverly camouflaged patterns, resonances, and contrasts. Shared topics include naming, mother-daughter bonds, the role of clothing in identity formation, domestic abuse, queer time, and lesbian, gay, bisexual, and transgender legacy discourse construction. What emerges between the visual and written texts is a hidden language of connection--what may be termed Black lesbian steganography--which proves thought-provoking to viewers and readers alike.

  9. The Design Process and User Focused Digital Spaces

    OpenAIRE

    Keating, Elaine M.

    2004-01-01

    This thesis presents a qualitative inquiry into how the graphic design process is being reconfigured within the new digital media landscape. The literature review looks at the historical relationship between graphic design and technology from the invention of the printing press to the personal computer and reviews how this relationship is again affected by the emergence of the computer as a medium for communication. The products of digital design are no longer static and fixed but are dynamic...

  10. Deformation of digital holograms for full control of focus and for extending the depth of field

    Energy Technology Data Exchange (ETDEWEB)

    Paturzo, M; Memmolo, P; Finizio, A; Ferraro, P, E-mail: pietro.ferraro@inoa.i [CNR-Istituto Nazionale di Ottica Applicata and Istituto di Cibernetica, via Campi Flegrei 34, 80078 Pozzuoli (Italy)

    2010-02-01

    We present a new method to manage the depth of focus in holograms numerical reconstructions through an adaptive deformation of the digital holograms. We demonstrate that this technique can be applied both to Fourier and Fresnel holograms. The experimental results, in agreement with the theoretical model, are shown and commented for both these configurations.

  11. A novel fuzzy logic-based image steganography method to ensure medical data security.

    Science.gov (United States)

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Rate-distortion analysis of steganography for conveying stereovision disparity maps

    Science.gov (United States)

    Umeda, Toshiyuki; Batolomeu, Ana B. D. T.; Francob, Filipe A. L.; Delannay, Damien; Macq, Benoit M. M.

    2004-06-01

    3-D images transmission in a way which is compliant with traditional 2-D representations can be done through the embedding of disparity maps within the 2-D signal. This approach enables the transmission of stereoscopic video sequences or images on traditional analogue TV channels (PAL or NTSC) or printed photographic images. The aim of this work is to study the achievable performances of such a technique. The embedding of disparity maps has to be seen as a global rate-distortion problem. The embedding capacity through steganography is determined by the transmission channel noise and by the bearable distortion on the watermarked image. The distortion of the 3-D image displayed as two stereo views depends on the rate allocated to the complementary information required to build those two views from one reference 2-D image. Results from the works on the scalar Costa scheme are used to optimize the embedding of the disparity map compressed bit stream into the reference image. A method for computing the optimal trade off between the disparity map distortion and embedding distortion as a function of the channel impairments is proposed. The goal is to get a similar distortion on the left (the reference image) and the right (the disparity compensated image) images. We show that in typical situations the embedding of 2 bits/pixels in the left image, while the disparity map is compressed at 1 bit per pixel leads to a good trade-off. The disparity map is encoded with a strong error correcting code, including synchronisation bits.

  13. Digital academia: How higher education is affected by digital technology

    OpenAIRE

    Eriksmo, Anton; Sundberg, Johan

    2016-01-01

    Digital technology in higher education is constantly evolving. Understanding the effects of digital technology is important for higher education institutions in order to make good investments of digital technology. Previous research has focused on learning, teaching or the organization and the relation between one of these aspects and digital technology, thereby missing a broader understanding of how materiality in digital technology affects higher education. In this study themed interviews w...

  14. The digital computer

    CERN Document Server

    Parton, K C

    2014-01-01

    The Digital Computer focuses on the principles, methodologies, and applications of the digital computer. The publication takes a look at the basic concepts involved in using a digital computer, simple autocode examples, and examples of working advanced design programs. Discussions focus on transformer design synthesis program, machine design analysis program, solution of standard quadratic equations, harmonic analysis, elementary wage calculation, and scientific calculations. The manuscript then examines commercial and automatic programming, how computers work, and the components of a computer

  15. Motion-free hybrid design laser beam propagation analyzer using a digital micromirror device and a variable focus liquid lens.

    Science.gov (United States)

    Sheikh, Mumtaz; Riza, Nabeel A

    2010-06-01

    To the best of our knowledge, we propose the first motion-free laser beam propagation analyzer with a hybrid design using a digital micromirror device (DMD) and a liquid electronically controlled variable focus lens (ECVFL). Unlike prior analyzers that require profiling the beam at multiple locations along the light propagation axis, the proposed analyzer profiles the beam at the same plane for multiple values of the ECVFL focal length, thus eliminating beam profiler assembly motion. In addition to measuring standard Gaussian beam parameters, the analyzer can also be used to measure the M(2) beam propagation parameter of a multimode beam. Proof-of-concept beam parameter measurements with the proposed analyzer are successfully conducted for a 633 nm laser beam. Given the all-digital nature of the DMD-based profiling and all-analog motion-free nature of the ECVFL beam focus control, the proposed analyzer versus prior art promises better repeatability, speed, and reliability.

  16. New Encrypted Steganography Approach

    Directory of Open Access Journals (Sweden)

    Saba Mohammed Husain‎

    2017-12-01

    Full Text Available The proposed research Provides an approach for hiding an encrypted text in side a digital image. Where the text is encrypted in a complex manner used method of PlayFair to encrypt clear text and to increase security put lettering ciphertext on the geometric shape clockwise and then we write the ciphertext output in the form of lines, taken new ciphertext and converted to Ascii code and then to binary and hidden text in bits least importance in the picture. The results were good by PNSR scale

  17. Photonic layer security in fiber-optic networks and optical OFDM transmission

    Science.gov (United States)

    Wang, Zhenxing

    Currently the Internet is experiencing an explosive growth in the world. Such growth leads to an increased data transmission rate demand in fiber-optical networks. Optical orthogonal frequency multiplexing (OFDM) is considered as a promising solution to achieve data rate beyond 100Gb/s per wavelength channel. In the meanwhile, because of extensive data transmission and sharing, data security has become an important problem and receives considerable attention in current research literature. This thesis focuses on data security issues at the physical layer of optical networks involving code-division multiple access (CDMA) systems and steganography methods. The thesis also covers several implementation issues in optical OFDM transmission. Optical CDMA is regarded as a good candidate to provide photonic layer security in multi-access channels. In this thesis we provide a systematic analysis of the security performance of incoherent optical CDMA codes. Based on the analysis, we proposed and experimentally demonstrated several methods to improve the security performance of the optical CDMA systems, such as applying all-optical encryption, and code hopping using nonlinear wavelength conversion. Moreover, we demonstrate that the use of wireless CDMA codes in optical systems can enhance the security in one single-user end-to-end optical channel. Optical steganography is another method to provide photonic data security and involves hiding the existence of data transmissions. In the thesis, we demonstrate that an optical steganography channel can exist in phase modulated public channels as well as traditional on-off-keying (OOK) modulated channels, without data synchronization. We also demonstrate an optical steganography system with enhanced security by utilizing temporal phase modulation techniques. Additionally, as one type of an overlay channel, the optical steganography technology can carry the sensor data collected by wireless sensor network on top of public optical

  18. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  19. A Design of Real-time Automatic Focusing System for Digital Still Camera Using the Passive Sensor Error Minimization

    Energy Technology Data Exchange (ETDEWEB)

    Kim, K.S. [Samsung Techwin Co., Ltd., Seoul (Korea); Kim, D.Y. [Bucheon College, Bucheon (Korea); Kim, S.H. [University of Seoul, Seoul (Korea)

    2002-05-01

    In this paper, the implementation of a new AF(Automatic Focusing) system for a digital still camera is introduced. The proposed system operates in real-time while adjusting focus after the measurement of distance to an object using a passive sensor, which is different from a typical method. In addition, measurement errors were minimized by using the data acquired empirically, and the optimal measuring time was obtained using EV(Exposure Value) which is calculated from CCD luminance signal. Moreover, this system adopted an auxiliary light source for focusing in absolute dark conditions, which is very hard for CCD image processing. Since this is an open-loop system adjusting focus immediately after the distance measurement, it guarantees real-time operation. The performance of this new AF system was verified by comparing the focusing value curve obtained from AF experiment with the one from the measurement by MF(Manual-Focusing). In both case, edge detector was used for various objects and backgrounds. (author). 9 refs., 11 figs., 5 tabs.

  20. A Practical Guide for Building a Digital Library: User-Focused Collection

    Science.gov (United States)

    Zhu, Qin; Guevara, Sophia

    2009-01-01

    With changing user expectations, many libraries are moving toward digital content. Accessible from anywhere at any time, digital content provides users with efficient, on-demand information experiences. Accordingly, librarians are presented with challenges and opportunities to build, manage, and implement outreach strategies that promote their…

  1. Digital citizenship and neoliberalization: governing digital citizens in Denmark

    DEFF Research Database (Denmark)

    Schou, Jannick; Hjelholt, Morten

    2018-01-01

    Digital citizenship is becoming increasingly normalized within advanced democratic states. As society and governmental institutions become reliant on digital technologies, citizens are expected to be and act digitally. This article examines the governance of digital citizens through a case study...... this case study, the article contributes to current critical perspectives on the digital citizen as a new political figure. It adds new insights into digital citizenship by connecting this figure to wider processes of neoliberalization and state restructuring, pushing for a more pronounced focus...... of digitalization efforts in Denmark. Drawing on multiple forms of data, the article showcases how digital citizens are governed through a combination of discursive, legal and institutional means. The article highlights the political, but also institutional work that goes into making citizens digital. Providing...

  2. Comparative analysis of the modified enclosed energy metric for self-focusing holograms from digital lensless holographic microscopy.

    Science.gov (United States)

    Trujillo, Carlos; Garcia-Sucerquia, Jorge

    2015-06-01

    A comparative analysis of the performance of the modified enclosed energy (MEE) method for self-focusing holograms recorded with digital lensless holographic microscopy is presented. Notwithstanding the MEE analysis previously published, no extended analysis of its performance has been reported. We have tested the MEE in terms of the minimum axial distance allowed between the set of reconstructed holograms to search for the focal plane and the elapsed time to obtain the focused image. These parameters have been compared with those for some of the already reported methods in the literature. The MEE achieves better results in terms of self-focusing quality but at a higher computational cost. Despite its longer processing time, the method remains within a time frame to be technologically attractive. Modeled and experimental holograms have been utilized in this work to perform the comparative study.

  3. Are "Digital Natives" Really Digitally Competent?--A Study on Chinese Teenagers

    Science.gov (United States)

    Li, Yan; Ranieri, Maria

    2010-01-01

    Literature review has found that despite the considerable attention focused on "digital natives", few studies have carefully investigated the characteristics of this group. The purpose of this study is to contribute to the debate on digital natives by providing a "piece of evidence" on the digital competence status of a group…

  4. One improved LSB steganography algorithm

    Science.gov (United States)

    Song, Bing; Zhang, Zhi-hong

    2013-03-01

    It is easy to be detected by X2 and RS steganalysis with high accuracy that using LSB algorithm to hide information in digital image. We started by selecting information embedded location and modifying the information embedded method, combined with sub-affine transformation and matrix coding method, improved the LSB algorithm and a new LSB algorithm was proposed. Experimental results show that the improved one can resist the X2 and RS steganalysis effectively.

  5. Digitally-Driven Architecture

    Directory of Open Access Journals (Sweden)

    Henriette Bier

    2014-07-01

    Full Text Available The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While standardisation focused on processes of rationalisation of form, mass-customisation as a new paradigm that replaces mass-production, addresses non-standard, complex, and flexible designs. Furthermore, knowledge about the designed object can be encoded in digital data pertaining not just to the geometry of a design but also to its physical or other behaviours within an environment. Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means.In this context, this sixth Footprint issue examines the influence of digital means as pragmatic and conceptual instruments for actuating architecture. The focus is not so much on computer-based systems for the development of architectural designs, but on architecture incorporating digital control, sens­ing, actuating, or other mechanisms that enable buildings to inter­act with their users and surroundings in real time in the real world through physical or sensory change and variation.

  6. digital natives and digital immigrants

    OpenAIRE

    Cardina, Bruno; Francisco, Jerónimo; Reis, Pedro; trad. Silva, Fátima

    2011-01-01

    This article focuses on the generational gaps in school learning. Initially, we have tried to provide the framework in relation to the term digital native in order to understand the key aspects of the generation born after the advent and the global use of the Internet. They were found to be “multitasking” people, linked to technology and connectivity, as opposed to digital immigrants, born in an earlier period and seeking to adapt to the technological world. We also present some r...

  7. Conceptualizing Digital Literacies and Digital Ethics for Sustainability Education

    Science.gov (United States)

    Brown, Susan A.

    2014-01-01

    Purpose: The purpose of this paper is to discuss the need for integrating a focus on digital literacies and digital ethics into sustainability education, proposing a conceptualization of these for sustainability education. Design/methodology/approach: The paper draws on relevant literature in the field of sustainability education and in the field…

  8. Digitally-Driven Architecture

    Directory of Open Access Journals (Sweden)

    Henriette Bier

    2010-06-01

    Full Text Available The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While standardisa­tion focused on processes of rationalisation of form, mass-customisation as a new paradigm that replaces mass-production, addresses non-standard, complex, and flexible designs. Furthermore, knowledge about the designed object can be encoded in digital data pertaining not just to the geometry of a design but also to its physical or other behaviours within an environment. Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means. In this context, this sixth Footprint issue examines the influence of digital means as prag­matic and conceptual instruments for actuating architecture. The focus is not so much on computer-based systems for the development of architectural designs, but on architecture incorporating digital control, sens­ing, actuating, or other mechanisms that enable buildings to inter­act with their users and surroundings in real time in the real world through physical or sensory change and variation.

  9. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  10. IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB

    Directory of Open Access Journals (Sweden)

    M. Miftakul Amin

    2014-02-01

    Full Text Available Security in delivering a secret message is an important factor in the spread of information in cyberspace. Protecting that message to be delivered to the party entitled to, should be made a message concealment mechanism. The purpose of this study was to hide a secret text message into digital images in true color 24 bit RGB format. The method used to insert a secret message using the LSB (Least Significant Bit by replacing the last bit or 8th bit in each RGB color component. RGB image file types option considering that messages can be inserted capacity greater than if use a grayscale image, this is because in one pixel can be inserted 3 bits message. Tests provide results that are hidden messages into a digital image does not reduce significantly the quality of the digital image, and the message has been hidden can be extracted again, so that messages can be delivered to the recipient safely.

  11. Rotational scanning and multiple-spot focusing through a multimode fiber based on digital optical phase conjugation

    Science.gov (United States)

    Ma, Chaojie; Di, Jianglei; Li, Ying; Xiao, Fajun; Zhang, Jiwei; Liu, Kaihui; Bai, Xuedong; Zhao, Jianlin

    2018-06-01

    We demonstrate, for the first time, the rotational memory effect of a multimode fiber (MMF) based on digital optical phase conjugation (DOPC) to achieve multiple-spot focusing. An implementation interferometer is used to address the challenging alignments in DOPC. By rotating the acquired phase conjugate pattern, rotational scanning through a MMF could be achieved by recording a single off-axis hologram. The generation of two focal spots through a MMF is also demonstrated by combining the rotational memory effect with the superposition principle. The results may be useful for ultrafast scanning imaging and optical manipulation of multiple objects through a MMF.

  12. Beyond Digital Citizenship

    Science.gov (United States)

    Mitchell, Lynn

    2016-01-01

    Conversations in middle school about digital citizenship tend to focus on the responsibilities of citizenship and the issues of surveillance, safety, cyberbullying, and internet etiquette. While these are important and essential conversations, digital citizenship education needs to consider youth political identity and democratic participation in…

  13. Digital information culture the individual and society in the digital age

    CERN Document Server

    Tredinnick, Luke

    2008-01-01

    Digital Information Culture is an introduction to the cultural, social and political impact of digital information and digital resources. The book is organised around themes, rather than theories and is arranged into three sections: culture, society and the individual. Each explores key elements of the social, cultural and political impact of digital information. The culture section outlines the origins of cyber culture in fifties pulp-fiction through to the modern day. It explores the issues of information overload, the threat of a digital dark age, and the criminal underbelly of digital culture. Section two, society, explores the economic and social impact of digital information, outlining key theories of the Information Age. Section three explores the impact of digital information and digital resources on the individual, exploring the changing nature of identity in a digital world. Written by a leading author in the field Focuses on digital information and its social, cultural and political impact is uniqu...

  14. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  15. An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

    OpenAIRE

    S. Santhosh Baboo; K. Gokulraj

    2012-01-01

    Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography etc. Among them authentication is playing an important role in networked communications, where the communicating partners are to be identified each other legit...

  16. Digital Textile Printing

    OpenAIRE

    Moltchanova, Julia

    2011-01-01

    Rapidly evolving technology of digital printing opens new opportunities on many markets. One of them is the printed fabric market where printing companies as well as clients benefit from new printing methods. This thesis focuses on the digital textile printing technology and its implementation for fabric-on-demand printing service in Finland. The purpose of this project was to study the technology behind digital textile printing, areas of application of this technology, the requirements ...

  17. Emergent Principles for Digital Documentary

    Directory of Open Access Journals (Sweden)

    Richard Lachman

    2016-12-01

    Full Text Available Digital Documentaries are an area of rapid invention and experimentation at all levels, including creative content, production techniques, and business models.  As with many forms of digital storytelling, a focus on technologies can be distracting; platforms change rapidly, and are dependent on external commercial forces rather than creative potential.  This article presents several design strategies for driving experimentation in digital documentary above and beyond the specific of platform and technology. The core focus is on treating digital docs as experiences, with an expanded range of designable moments, as well as a strategic approach to designing interactions for their unique set of challenges.  The discussion is not intended to fully define digital documentary design factors, but rather, defines a useful subset of methods that can lead emerging practitioners to new innovations in their approach.

  18. Digital Technology Entrepreneurship

    DEFF Research Database (Denmark)

    Giones, Ferran; Brem, Alexander

    2017-01-01

    Technology entrepreneurship is an established concept in academia. However, recent developments in the context of digital entrepreneurship call for revision and advance- ment. The multiple possible combinations of technology and entrepreneurship have res- ulted in a diversity of phenomena...... with significantly different characteristics and socio-economic impact. This article is focused on the identification and description of technology entrepreneurship in times of digitization. Based on current examples, we identify and describe characterizations of technology entrepreneurship, digital techno- logy...... entrepreneurship, and digital entrepreneurship. With this new delineation of terms, we would like to foster discussion between researchers, entrepreneurs, and policy makers on the impact of digitization on entrepreneurship, and set a future research agenda....

  19. Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement

    Directory of Open Access Journals (Sweden)

    Dian Hafidh Zulfikar

    2016-01-01

        Based on test results that have to be got several conclusions that capacity steganographic message on DCT sequential greater than the DCT F5 steganography either before or after application of the application POIE, stego image quality on DCT steganography F5 better than the sequential DCT steganography well before the application POIE and after application of POIE, both F5 and steganography steganography DCT DCT sequential equally resistant to manipulation of stego image.

  20. Digital margins: Social and digital exclusion of Gypsy-Travelers in the Netherlands

    NARCIS (Netherlands)

    Salemink, Koen

    2016-01-01

    Research on digital inclusion increasingly focuses on vulnerable groups, with the prevailing idea that social exclusion leads to digital exclusion. The role of the socio-spatial context is often faded into the background due to user-centric (individual) approaches. This article explores how a

  1. Architectural Optimization of Digital Libraries

    Science.gov (United States)

    Biser, Aileen O.

    1998-01-01

    This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are generally not the focus of much of the current research. In this thesis a model for a Generic Distributed Digital Library (GDDL) and nine cases of typical user activities are defined. This model is used to facilitate some basic analysis of scaling issues. Specifically, the calculation of Internet traffic generated for different configurations of the study parameters and an estimate of the future bandwidth needed for a large scale distributed digital library implementation. This analysis demonstrates the potential impact a future distributed digital library implementation would have on the Internet traffic load and raises questions concerning the architecture decisions being made for future distributed digital library designs.

  2. Introduction to focus issue: intrinsic and designed computation: information processing in dynamical systems--beyond the digital hegemony.

    Science.gov (United States)

    Crutchfield, James P; Ditto, William L; Sinha, Sudeshna

    2010-09-01

    How dynamical systems store and process information is a fundamental question that touches a remarkably wide set of contemporary issues: from the breakdown of Moore's scaling laws--that predicted the inexorable improvement in digital circuitry--to basic philosophical problems of pattern in the natural world. It is a question that also returns one to the earliest days of the foundations of dynamical systems theory, probability theory, mathematical logic, communication theory, and theoretical computer science. We introduce the broad and rather eclectic set of articles in this Focus Issue that highlights a range of current challenges in computing and dynamical systems.

  3. Statistical Characterization of MP3 Encoders for Steganalysis: ’CHAMP3’

    Science.gov (United States)

    2004-04-27

    compression exceeds those of typical stegano- graphic tools (e. g., LSB image embedding), the availability of commented source codes for MP3 encoders...developed by testing the approach on known and unknown reference data. 15. SUBJECT TERMS EOARD, Steganography , Digital Watermarking...Pages kbps Kilobits per Second LGPL Lesser General Public License LSB Least Significant Bit MB Megabyte MDCT Modified Discrete Cosine Transformation MP3

  4. Final focus nomenclature

    International Nuclear Information System (INIS)

    Erickson, R.

    1986-01-01

    The formal names and common names for all devices in the final focus system of the SLC are listed. The formal names consist of a device type designator, microprocessor designator, and a four-digit unit number

  5. Final focus nomenclature

    Energy Technology Data Exchange (ETDEWEB)

    Erickson, R.

    1986-08-08

    The formal names and common names for all devices in the final focus system of the SLC are listed. The formal names consist of a device type designator, microprocessor designator, and a four-digit unit number. (LEW)

  6. Effect of using different cover image quality to obtain robust selective embedding in steganography

    Science.gov (United States)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  7. Digital Humanities: What Can Libraries Offer?

    Science.gov (United States)

    Wong, Shun Han Rebekah

    2016-01-01

    The collaborative aspect of digital humanities is one of the core values of the field. Specialists and organizations involved in digital humanities partnerships may include individual scholars focusing on a particular area, multiple scholars across disciplines, computer scientists, or digital humanities centers. Through a quantitative analysis of…

  8. Preparing Teachers to Teach Digital Citizenship

    NARCIS (Netherlands)

    Searson, Michael; Voogt, Joke; Whittier, David; Plants, Robert; Gibson, David; Sutton, Bonnie; Ochoa, Marilyn; Sutton, Vic; McBride, Ron; Searson, Michael

    2013-01-01

    A team of SITE leaders was awarded a highly competitive “Digital Citizenship Award” from Facebook to explore the role of digital citizenship in teacher education. The focus of the SITE “Preparing Teachers to Teach Digital Citizenship” project is the development of a college based course, available

  9. Fuzzy topological digital space and digital fuzzy spline of electroencephalography during epileptic seizures

    Science.gov (United States)

    Shah, Mazlina Muzafar; Wahab, Abdul Fatah

    2017-08-01

    Epilepsy disease occurs because of there is a temporary electrical disturbance in a group of brain cells (nurons). The recording of electrical signals come from the human brain which can be collected from the scalp of the head is called Electroencephalography (EEG). EEG then considered in digital format and in fuzzy form makes it a fuzzy digital space data form. The purpose of research is to identify the area (curve and surface) in fuzzy digital space affected by inside epilepsy seizure in epileptic patient's brain. The main focus for this research is to generalize fuzzy topological digital space, definition and basic operation also the properties by using digital fuzzy set and the operations. By using fuzzy digital space, the theory of digital fuzzy spline can be introduced to replace grid data that has been use previously to get better result. As a result, the flat of EEG can be fuzzy topological digital space and this type of data can be use to interpolate the digital fuzzy spline.

  10. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  11. Introduction to digital communication systems

    CERN Document Server

    Wesolowski, Krzysztof

    2009-01-01

    Combining theoretical knowledge and practical applications, this advanced-level textbook covers the most important aspects of contemporary digital communication systems. Introduction to Digital Communication Systems focuses on the rules of functioning digital communication system blocks, starting with the performance limits set by the information theory. Drawing on information relating to turbo codes and LDPC codes, the text presents the basic methods of error correction and detection, followed by baseband transmission methods, and single- and multi-carrier digital modulations. The basi

  12. Measurement of residual stress by using focused ion beam and digital image correlation method in thin-sized wires used for steel cords

    International Nuclear Information System (INIS)

    Yang, Y S; Park, C G; Bae, J G

    2008-01-01

    Residual stress in the axial direction of the steel wires has been measured by using a method based on the combination of the focused ion beam (FIB) milling and digital image correlation software. That is, the residual stress was calculated from the measured displacement field before and after the introduction of a slot along the steel wires. The displacement was obtained by the digital correlation analysis of high-resolution scanning electron micrographs, while the slot was introduced by FIB milling with low energy beam. The fitting of the experimental results to an analytical model with the independent Young's modulus determined allows us to find the residual stress. The complete experimental procedures are described and its feasibilities are also evaluated for the thin-sized steel wires

  13. A wavelet domain adaptive image watermarking method based on chaotic encryption

    Science.gov (United States)

    Wei, Fang; Liu, Jian; Cao, Hanqiang; Yang, Jun

    2009-10-01

    A digital watermarking technique is a specific branch of steganography, which can be used in various applications, provides a novel way to solve security problems for multimedia information. In this paper, we proposed a kind of wavelet domain adaptive image digital watermarking method using chaotic stream encrypt and human eye visual property. The secret information that can be seen as a watermarking is hidden into a host image, which can be publicly accessed, so the transportation of the secret information will not attract the attention of illegal receiver. The experimental results show that the method is invisible and robust against some image processing.

  14. Bridging the Digital Divide Creating Digital Dividend - The Investigation in Guizhou Province and the Analysis of GZNW

    Directory of Open Access Journals (Sweden)

    Linbo Jing

    2007-12-01

    Full Text Available This article begins with attention to the digital divide. It gives a brief overview of the digital divide on a global basis and analyzes specific aspects of the digital divide in our country. It also introduces the informationization construction of Guizhou Province and points out problems with the digital divide in that province. Then it focuses on the practice of Guizhou Province to bridge the digital divide ---- the practice and experience of GZNW. The final section gives a series of policy recommendations on how to bridge the digital divide, realize digital dividends, and how to build a new socialist countryside.

  15. On Digital Crossings in Europe

    NARCIS (Netherlands)

    Ponzanesi, S.|info:eu-repo/dai/nl/182984257; Leurs, K.H.A.|info:eu-repo/dai/nl/343295334

    2014-01-01

    ‘On Digital Crossings in Europe’ explores the entanglements of digital media and migration beyond the national and mono-ethnic focus. We argue how borders, identity and affectivity have been destabilized and reconfigured through medium-specific technological affordances, opting for a comparative and

  16. Emergent Principles for Digital Documentary

    NARCIS (Netherlands)

    Lachman, Richard

    2016-01-01

    textabstractDigital Documentaries are an area of rapid invention and experimentation at all levels, including creative content, production techniques, and business models.  As with many forms of digital storytelling, a focus on technologies can be distracting; platforms change rapidly, and are

  17. Digital gaming expertise

    DEFF Research Database (Denmark)

    Toft-Nielsen, Claus

    In a digitally saturated environment digital media users of all kinds, engaged in different areas of activity, are increasingly categorized in terms of their ability to appropriate and use digital media – they are regarded as non-users, experts, natives, or literates for instance. Within communic......In a digitally saturated environment digital media users of all kinds, engaged in different areas of activity, are increasingly categorized in terms of their ability to appropriate and use digital media – they are regarded as non-users, experts, natives, or literates for instance. Within...... communication and game studies there are multiple understandings of how digital expertise is expressed and performed, and subsequently how these expressions and performances can be valued, understood and theorized within the research community. Among other things expertise with and within digital games has......-of-game (Schrøder, 2003) in a three-year-long study of men and women (couples and singles) playing the largest Massively Multiplayer Online Role-Playing Game to date, World of Warcraft. In focusing on how different aspects of gaming expertise are articulated, negotiated, and performed, I aim to illustrate how...

  18. Advanced Digital Preservation

    CERN Document Server

    Giaretta, David

    2011-01-01

    There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages -- objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific da

  19. Black Men and the Digital Divide

    Science.gov (United States)

    Conceição, Simone C. O.; Martin, Larry G.

    2016-01-01

    This chapter focuses on the role adult educators can play in assisting Black men to overcome the challenges faced in accessing and using digital technology and acquiring appropriate skills in a digital society.

  20. The New Frontier of Digital Inequality. The Participatory Divide

    Directory of Open Access Journals (Sweden)

    José M. Robles Morales

    2016-01-01

    Full Text Available This article focuses on the relationship between digital participation and the digital participation divide. The first concept refers to the use of the Internet to produce cultural goods that are subsequently shared on a global scale; the latter, refers to the inequalities generated by the uneven distribution of these creative uses of the Internet in a given population. Empirically, our work focuses on the role of digital skills and sociopolitical attitudes toward the Internet in explaining the digital participation divide, as they are considered precursors of digital participation. Results suggest that the same mechanisms that previously sustained digital divide are now fostering digital participation divide; however, we argue that the negative social consequences of this divide exceed those of its predecessor.

  1. Digital Media Stories for Persuasion

    Science.gov (United States)

    Leopold, Lisa

    2010-01-01

    Digital media story-telling (which enhances traditional oral story-telling with images, music, and text) has been a focus of recent scholarship for its potential to produce numerous educational benefits. Through digital media storytelling, students' imagination, creativity, critical thinking, writing, public speaking, and organizational or…

  2. Digital divide across borders : A cross-national study of adolescents’ use of digital technologies

    NARCIS (Netherlands)

    Notten, N.; Peter, J.; Kraaykamp, G.; Valkenburg, P.M.

    2009-01-01

    In this study, we analyse digital divides in terms of social inequality in digital access and use patterns from a hierarchical perspective. Using data from the Programme for International Student Assessment (PISA) 2003 in 30 nations, we focus on social cleavages in mid-adolescents’ access and use of

  3. Aplikasi Steganografi Menggunakan LSB 4 Bit Sisipan dengan Kombinasi Algoritme Substitusi dan Vigenere Berbasis Android

    Directory of Open Access Journals (Sweden)

    Priyagung Hernawandra

    2018-03-01

    Full Text Available This study aims to implement steganography with 4 bit LSB method combined with Vigenere and substitution encryption algorithms. This combination strengthens the security of text messages that are inserted into the image because the message is already a ciphertext as the result of the Vigenere and substitution encryption process. This steganography is realized as an application that runs on Android devices. This application can insert text messages that contain space characters and a combination of uppercase letters in a digital image. Using this application, insertion of messages into images causes the increase of images size by an average of 12.77% of the original size from 10 sample images. Penelitian ini bertujuan untuk mengaplikasikan steganografi dengan metode LSB 4 bit penyisipan yang digabungkan dengan algoritme enkripsi Vigenere dan substitusi. Penggunaan algoritme enkripsi ini memperkuat keamanan pesan teks yang disisipkan ke gambar karena pesan tersebut sudah berupa ciphertext hasil dari proses enkripsi dengan Vigenere dan substitusi. Pesan yang berisi karakter spasi dan kombinasi huruf besar kecil juga dapat disisipkan dalam citra digital. Steganografi ini diwujudkan sebagai aplikasi yang berjalan di devais Android. Dengan menggunakan aplikasi ini, penyisipan pesan dengan metode LSB 4 bit sisipan ke gambar menyebabkan penambahan besar gambar rata-rata 12,77% dari besar aslinya untuk 10 gambar uji.

  4. Digital Labour in Chinese Internet Industries

    OpenAIRE

    Bingqing Xia

    2014-01-01

    Digital labour has been the subject of considerable research in recent years (Van Dijck 2009, Manzerolle 2010, Dyer-Witheford 2010). But relatively little research has considered professional workers in digital media. This research addresses this gap by focusing on professional workers in the Chinese Internet industries. This paper asks: How are these digital labourers involved in the digital media production? To what extent should we criticise this involvement? Based on detailed empirica...

  5. Digital Creativity

    DEFF Research Database (Denmark)

    Petersson Brooks, Eva; Brooks, Anthony Lewis

    2014-01-01

    This paper reports on a study exploring the outcomes from children’s play with technology in early childhood learning practices. The paper addresses questions related to how digital technology can foster creativity in early childhood learning environments. It consists of an analysis of children......’s interaction with the KidSmart furniture focusing on digital creativity potentials and play values suggested by the technology. The study applied a qualitative approach and included125 children (aged three to five), 10 pedagogues, and two librarians. The results suggests that educators should sensitively...... consider intervening when children are interacting with technology, and rather put emphasize into the integration of the technology into the environment and to the curriculum in order to shape playful structures for children’s digital creativity....

  6. Age differences in associations with digital gaming

    NARCIS (Netherlands)

    Nap, H.H.; IJsselsteijn, W.A.; Kort, de Y.A.W.; Atkins, B.; Kennedy, H.

    2009-01-01

    Seniors are an underrepresented group as digital gamers, but also as a focus of study in digital gaming research. We know relatively little about senior gamers, in particular about their needs and motivations to engage in digital gaming. The current explorative study used a free association

  7. First Year Digital Marketing Plan : Case: Arctos

    OpenAIRE

    Järvelin, Reetta

    2016-01-01

    Digital marketing is becoming increasingly important, as communication through digital chan-nels develops and some aspects of traditional marketing become irrelevant. Digital marketing focuses on current and relevant methods of reaching audiences, making it a valuable marketing asset for businesses. This thesis is a study into the field of digital marketing, including common tools and best practices. The thesis is a project-based thesis, which aims to create a complete digital marketing p...

  8. Digital Marketing and the Pillars of Shopper Experience

    OpenAIRE

    NEGRICEA, Costel Iliuta; PURCAREA, Ioan Matei

    2014-01-01

    We already live in a world of digital empowered intelligent customers, of digital products, of digital business operations and digital competitors. The fierce competition forces firms to exploit digital technologies, to have profound knowledge, to focus on market imperatives and to demonstrate a deep commitment to these digital empowered intelligent customers that disrupts every industry. Advantaged are the companies that master relevant data flow and improve the performance of employees who ...

  9. Steganalysis based on JPEG compatibility

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Du, Rui

    2001-11-01

    In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leave unique fingerprints and serves as a fragile watermark enabling us to detect changes as small as modifying the LSB of one randomly chosen pixel. The detection of changes is based on investigating the compatibility of 8x8 blocks of pixels with JPEG compression with a given quantization matrix. The proposed steganalytic method is applicable to virtually all steganongraphic and watermarking algorithms with the exception of those that embed message bits into the quantized JPEG DCT coefficients. The method can also be used to estimate the size of the secret message and identify the pixels that carry message bits. As a consequence of our steganalysis, we strongly recommend avoiding using images that have been originally stored in the JPEG format as cover-images for spatial-domain steganography.

  10. Space Matters: Physical-Digital and Physical-Virtual Codesign in inSpace

    DEFF Research Database (Denmark)

    Reilly, D.; Voida, S.; McKeon, M.

    2010-01-01

    The physical and social cues on which we rely during collaboration can vanish in the digital realm. inSpace focuses on physical-digital codesign, leveraging an approach grounded in social behavior patterns.......The physical and social cues on which we rely during collaboration can vanish in the digital realm. inSpace focuses on physical-digital codesign, leveraging an approach grounded in social behavior patterns....

  11. Digital filters

    CERN Document Server

    Hamming, Richard W

    1997-01-01

    Digital signals occur in an increasing number of applications: in telephone communications; in radio, television, and stereo sound systems; and in spacecraft transmissions, to name just a few. This introductory text examines digital filtering, the processes of smoothing, predicting, differentiating, integrating, and separating signals, as well as the removal of noise from a signal. The processes bear particular relevance to computer applications, one of the focuses of this book.Readers will find Hamming's analysis accessible and engaging, in recognition of the fact that many people with the s

  12. Digital Social Science Lab

    DEFF Research Database (Denmark)

    Svendsen, Michael; Lauersen, Christian Ulrich

    2015-01-01

    At the Faculty Library of Social Sciences (part of Copenhagen University Library) we are currently working intensely towards the establishment of a Digital Social Science Lab (DSSL). The purpose of the lab is to connect research, education and learning processes with the use of digital tools...... at the Faculty of Social Sciences. DSSL will host and facilitate an 80 m2 large mobile and intelligent study- and learning environment with a focus on academic events, teaching and collaboration. Besides the physical settings DSSL has two primary functions: 1. To implement relevant social scientific software...... and hardware at the disposal for students and staff at The Faculty of Social Sciences along with instruction and teaching in the different types of software, e.g. Stata, Nvivo, Atlas.ti, R Studio, Zotero and GIS-software. 2. To facilitate academic events focusing on use of digital tools and analytic software...

  13. Digital/Commercial (In)visibility

    DEFF Research Database (Denmark)

    Leander, Anna

    2017-01-01

    an argument demonstrating specifically how digital and commercial logics characterize the aesthetic, circulatory, and infrastructuring practices re-producing the regime of (in)visibility. It shows that digital/commercial logics are at the heart of the combinatorial marketing of multiple, contradictory images......This article explores one aspect of digital politics, the politics of videos and more spe- cifically of DAESH recruitment videos. It proposes a practice theoretical approach to the politics of DAESH recruitment videos focused on the re-production of regimes of (in)visibility. The article develops...... on the internet. The theoretical and political cost of overlooking these digital and commercial characteristics of DAESH visibility practices are high. It perpetuates misconceptions of how the videos work and what their politics are and it reinforces the digital Orientalism/Occidentalism in which...

  14. Theory of Digital Automata

    CERN Document Server

    Borowik, Bohdan; Lahno, Valery; Petrov, Oleksandr

    2013-01-01

    This book serves a dual purpose: firstly to combine the treatment of circuits and digital electronics, and secondly, to establish a strong connection with the contemporary world of digital systems. The need for this approach arises from the observation that introducing digital electronics through a course in traditional circuit analysis is fast becoming obsolete. Our world has gone digital. Automata theory helps with the design of digital circuits such as parts of computers, telephone systems and control systems. A complete perspective is emphasized, because even the most elegant computer architecture will not function without adequate supporting circuits. The focus is on explaining the real-world implementation of complete digital systems. In doing so, the reader is prepared to immediately begin design and implementation work. This work serves as a bridge to take readers from the theoretical world to the everyday design world where solutions must be complete to be successful.

  15. Český trh digitálních agentur: Případová studie Nydrle Digital

    OpenAIRE

    Vondráková, Tereza

    2013-01-01

    The master thesis focuses on description of the market of digital advertising agencies that create digital, online and mobile campaigns for their clients. The first part of the thesis addresses the advertising market and its role in the marketing mix. The author gives the summary of the evolution of digital marketing and its tools in the digital and creative procedure of preparing advertising concept. One of the chapters presents changes in media spends towards online and changes of marketing...

  16. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  17. An overview of digital radiography

    International Nuclear Information System (INIS)

    Aweligiba, S. A.

    2013-04-01

    The medical application of radiography has gained wider study since diagnostic radiology plays a very important role in modern medicine for fast diagnosis and therapy. Digital radiography is a relatively new technology that promises greater accuracy, lesser dose and better manipulation of patient radiology images in hospitals. In this study, a general discussion on digital radiography has been presented. The presentation focuses on the optimisation of doses to patients in the medical application of digital radiography, quality control and quality assurance. A brief presentation on performance indicators in digital radiography has also been presented. The advantages of digital radiography over the conventional film/screen system have been elaborated and its limitations are also outlined. (author)

  18. How Digital Are the Digital Humanities? An Analysis of Two Scholarly Blogging Platforms

    Science.gov (United States)

    Puschmann, Cornelius; Bastos, Marco

    2015-01-01

    In this paper we compare two academic networking platforms, HASTAC and Hypotheses, to show the distinct ways in which they serve specific communities in the Digital Humanities (DH) in different national and disciplinary contexts. After providing background information on both platforms, we apply co-word analysis and topic modeling to show thematic similarities and differences between the two sites, focusing particularly on how they frame DH as a new paradigm in humanities research. We encounter a much higher ratio of posts using humanities-related terms compared to their digital counterparts, suggesting a one-way dependency of digital humanities-related terms on the corresponding unprefixed labels. The results also show that the terms digital archive, digital literacy, and digital pedagogy are relatively independent from the respective unprefixed terms, and that digital publishing, digital libraries, and digital media show considerable cross-pollination between the specialization and the general noun. The topic modeling reproduces these findings and reveals further differences between the two platforms. Our findings also indicate local differences in how the emerging field of DH is conceptualized and show dynamic topical shifts inside these respective contexts. PMID:25675441

  19. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  20. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  1. The Future of Digital Music Services in Three Stereotypes; How Focus Groups of End Users See the New Business Models

    OpenAIRE

    Bookholt, Erik; Spil, Antonius A.M.; Katsma, Christiaan

    2013-01-01

    “I am just a stereotype” sang Terry Hall in 1980. Ariola records took them in and made the band The Specials a world success. How will that process go in 2014? Will they put it on You Tube for free? Do they need a record company? Will they have less or more fans, earn less or more money? Focus group interviews with 90 people between the ages of 15 and 25 were successfully employed to create 20 new business models for the digital music industry. Analysis with grounded theory revealed that a ne...

  2. User studies for digital library development

    CERN Document Server

    Dobreva, Milena; Feliciati, Pierluigi

    2012-01-01

    As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. This title provides a clear overview of the user studies domain and user issues in digital libraries.

  3. What is 'Post-digital?' : typewriters vs. imageboard memes

    NARCIS (Netherlands)

    F. Cramer

    2014-01-01

    The term "post-digital" was coined in 2000 for electronic music, but reflecting on larger developments in technology and culture, to describe a perspective on digital information technology that is no longer focused on technical innovation or improvement. In the meantime, "post-digital" has acquired

  4. Handbook of digital forensics of multimedia data and devices

    CERN Document Server

    Li, Shujun

    2015-01-01

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic aut...

  5. Strategies in the digital printing value system

    OpenAIRE

    Mejtoft, Thomas

    2006-01-01

    The research objective of this thesis is to identify corporate strategies and strategic decisions in the digital printing business and to analyze how these have evolved due to the introduction of digital printing. This thesis comprises three separate studies, all based on qualitative case methodology. The first study is focused on digital printing houses and how their business strategies have changed due to their investment in digital printing production equipment. The second study concentrat...

  6. Academic Medical Centers as digital health catalysts.

    Science.gov (United States)

    DePasse, Jacqueline W; Chen, Connie E; Sawyer, Aenor; Jethwani, Kamal; Sim, Ida

    2014-09-01

    Emerging digital technologies offer enormous potential to improve quality, reduce cost, and increase patient-centeredness in healthcare. Academic Medical Centers (AMCs) play a key role in advancing medical care through cutting-edge medical research, yet traditional models for invention, validation and commercialization at AMCs have been designed around biomedical initiatives, and are less well suited for new digital health technologies. Recently, two large bi-coastal Academic Medical Centers, the University of California, San Francisco (UCSF) through the Center for Digital Health Innovation (CDHI) and Partners Healthcare through the Center for Connected Health (CCH) have launched centers focused on digital health innovation. These centers show great promise but are also subject to significant financial, organizational, and visionary challenges. We explore these AMC initiatives, which share the following characteristics: a focus on academic research methodology; integration of digital technology in educational programming; evolving models to support "clinician innovators"; strategic academic-industry collaboration and emergence of novel revenue models. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Digitization in Maritime Industry

    DEFF Research Database (Denmark)

    Constantiou, Ioanna; Shollo, Arisa; Kreiner, Kristian

    2017-01-01

    Digitization in the maritime industry is expected to transform businesses. The recently introduced mobile technologies in inter-organizational processes is an example of digitization in an industry which moves very slowly towards digital transformation. We focus on the influence of mobile...... technologies on control practices in inter-organizational processes related to coping with an engine failure. We collected qualitative data from in depth interviews with representatives of the involved parties. We identify organizational and behavioural challenges hindering information sharing during problem...... technologies increase information sharing and thus the efficiency of inter-organizational processes when coping with an engine failure....

  8. Research note: Digital divide across borders: A cross-national study of adolescents' use of digital technologies

    NARCIS (Netherlands)

    Notten, N.J.W.R.; Peter, J.; Kraaykamp, G.L.M.; Valkenburg, P.M.

    2009-01-01

    In this study, we analyse digital divides in terms of social inequality in digital access and use patterns from a hierarchical perspective. Using data from the Programme for International Student Assessment (PISA) 2003 in 30 nations, we focus on social cleavages in mid-adolescents access and use of

  9. Research note: digital divide across borders: a cross-national study of adolescents’ use of digital technologies

    NARCIS (Netherlands)

    Notten, N.; Peter, J.; Kraaykamp, G.; Valkenburg, P.M.

    2009-01-01

    In this study, we analyse digital divides in terms of social inequality in digital access and use patterns from a hierarchical perspective. Using data from the Programme for International Student Assessment (PISA) 2003 in 30 nations, we focus on social cleavages in mid-adolescents’ access and use of

  10. A situated practice of ethics for participatory visual and digital methods in public health research and practice: a focus on digital storytelling.

    Science.gov (United States)

    Gubrium, Aline C; Hill, Amy L; Flicker, Sarah

    2014-09-01

    This article explores ethical considerations related to participatory visual and digital methods for public health research and practice, through the lens of an approach known as "digital storytelling." We begin by briefly describing the digital storytelling process and its applications to public health research and practice. Next, we explore 6 common challenges: fuzzy boundaries, recruitment and consent to participate, power of shaping, representation and harm, confidentiality, and release of materials. We discuss their complexities and offer some considerations for ethical practice. We hope this article serves as a catalyst for expanded dialogue about the need for high standards of integrity and a situated practice of ethics wherein researchers and practitioners reflexively consider ethical decision-making as part of the ongoing work of public health.

  11. Linguistics and the digital humanities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    2014-01-01

    Corpus linguistics has been closely intertwined with digital technology since the introduction of university computer mainframes in the 1960s. Making use of both digitized data in the form of the language corpus and computational methods of analysis involving concordancers and statistics software......, corpus linguistics arguably has a place in the digital humanities. Still, it remains obscure and figures only sporadically in the literature on the digital humanities. This article provides an overview of the main principles of corpus linguistics and the role of computer technology in relation to data...... and method and also offers a bird's-eye view of the history of corpus linguistics with a focus on its intimate relationship with digital technology and how digital technology has impacted the very core of corpus linguistics and shaped the identity of the corpus linguist. Ultimately, the article is oriented...

  12. Design Thinking for Digital Fabrication in Education

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Iversen, Ole Sejer; Hjorth, Mikkel

    2015-01-01

    In this paper, we argue that digital fabrication in education may benefit from design thinking, to foster a more profound understanding of digital fabrication processes among students. Two related studies of digital fabrication in education are presented in the paper. In an observational study we...... found that students (eleven to fifteen) lacked an understanding of the complexity of the digital fabrication process impeding on the potentials of digital fabrication in education. In a second explorative research through design study, we investigated how a focus on design thinking affected the students...

  13. Online Tribes and Digital Authority: What Can Social Theory Bring to Digital Archaeology?

    Directory of Open Access Journals (Sweden)

    Richardson Lorna-Jane

    2017-01-01

    Full Text Available From early discussions of the disruptive potential of computer technologies for archaeological applications, to the present era of digital archaeology as the technical underpinning of modern archaeological practice, we have continued to debate the potential impacts of digital communication and digital capture and storage on our knowledge, profession and communications. The increased use of digital tools and methods for archaeological research and dissemination, as well as what Roosevelt (2015 has referred to as the shift to the digital paradigm within archaeological practice, leads us to suggest that the impact of this paradigm shift requires careful and critical examination. This article will examine the edges of the disciplines of archaeology and sociology, where we aim to advance our understanding of the relationship between digital technologies and archaeological knowledge from a uniquely social perspective, using the theoretical approaches of both classic and modern sociologists. The application of this lens of sociology to digital archaeology equips us to understand how archaeology and archaeological practice is situated in a social world, which is especially relevant in the Global West, where digital technology is ubiquitous. Through a critical consideration of the complexity of use of digital technologies within digital archaeology, we can begin to shift our focus away from the character and method of tools and workflow, to the background of intellectual power and influence.

  14. Data compression systems for home-use digital video recording

    NARCIS (Netherlands)

    With, de P.H.N.; Breeuwer, M.; van Grinsven, P.A.M.

    1992-01-01

    The authors focus on image data compression techniques for digital recording. Image coding for storage equipment covers a large variety of systems because the applications differ considerably in nature. Video coding systems suitable for digital TV and HDTV recording and digital electronic still

  15. Digital Skills in Perspective: A Critical Reflection on Research and Policy

    Directory of Open Access Journals (Sweden)

    Jos de Haan

    2012-12-01

    Full Text Available In this article we will reflect on the evolving focus of research on digital skills over the past 15 years and discuss the outcomes of this research and their implications for policy. Policy issues regarding digital skills have shifted over time. The present focus on media literacy ties digital skills to the broader theme of citizenship and calls for a wide agenda to improve skills, knowledge of media systems and attitudes towards the media. It reaches into policy domains such as education, work and social participation. We will also reflect on the question as to just how far research is able to feed these policy discussions. The argument is organized in four sections, following more or less chronologically the stages of research on digital skills. We begin with the largely descriptive research on digital skills in the context of the digital divide. The second and third sections follow the theoretical turn in the research agenda with a focus on the causes and consequences of differences in digital skills. In the fourth section we discuss a more recent development, where digital skills are included in a broader research agenda of media literacy.

  16. Inclusão digital via acessibilidade web | Digital inclusion via web accessibility

    Directory of Open Access Journals (Sweden)

    Cesar Augusto Cusin

    2009-03-01

    Full Text Available Resumo A natureza atual da web, que destaca a participação colaborativa dos usuários em diversos ambientes informacionais digitais, conduz ao desenvolvimento de diretrizes que enfocam a arquitetura da informação digital inclusiva para diferentes públicos nas mais diversas ambiências informacionais. A pesquisa propõe e objetiva um ambiente informacional digital inclusivo, visando apontar os elementos de acessibilidade que permitam a promoção da inclusão informacional digital, de forma a destacar os referenciais da Arquitetura da Informação Digital, de recomendações internacionais, com o olhar da Ciência da Informação e das novas tecnologias de informação e comunicação (TIC. Palavras-chave inclusão digital; web; acessibilidade; ciência da informação; arquitetura da informação. Abstract The current nature of the web, which highlights the collaborative participation of users in various digital informational environments, leads to the development of guidelines that focus on the digital inclusive information architecture for different audiences in diverse informational environments. The study proposes an inclusive digital information environment, aiming to establish the elements of accessibility that  enable the promotion of digital inclusion information in order to highlight the references of digital information architecture, the international recommendations, with the perspective of Information Science and the new information and communication technologies (ICT. Keywords digital inclusion; web; accessibility; information science; information architecture.

  17. Digital Amsterdam : Digital Art and Public Space in Amsterdam

    NARCIS (Netherlands)

    Cnossen, Boukje; Franssen, Thomas; De Wilde, Mandy

    2015-01-01

    In this report we explore digital art interventions in public space in Amsterdam as part of the ‘participatory public space’ project lead by the University of Melbourne. We focus specifically on artistic interventions in public space, rather than on the more general ways in which public space is

  18. Legal Deposit of Digital Materials

    Directory of Open Access Journals (Sweden)

    Erik Oltmans

    2003-09-01

    Full Text Available Digital publishing is causing a real paradigm shift for research institutions and publishers, as well as for libraries. As a consequence these institutions have to develop new policies, new business models and new infrastructures and techniques. A major problem is that, at the same rate at which our world is becoming digital, the digital information is threatened. New types of hardware, computer applications and file formats supersede each other, making our recorded digital information inaccessible in the long-term. In the past years libraries and archives have undertaken several actions and studies on digital preservation issues. For instance the Koninklijke Bibliotheek (KB has jointly with IBM developed a standard-based deposit system: Digital Information Archiving System ( DIAS. Using DIAS the KB realised in 2002 an electronic deposit (the e-Depot and signed archiving agreements with major science publishers for permanent keeping of their digital materials. In this paper I will discuss the fully operational e-Depot at the KB. I will focus on the data flow of processing the digital publications, and I will address the issue of digital preservation in detail.

  19. Practical Challenges for Digital Watermarking Applications

    Directory of Open Access Journals (Sweden)

    Sharma Ravi K

    2002-01-01

    Full Text Available The field of digital watermarking has recently seen numerous articles covering novel techniques, theoretical studies, attacks, and analysis. In this paper, we focus on an emerging application to highlight practical challenges for digital watermarking applications. Challenges include design considerations, requirements analysis, choice of watermarking techniques, speed, robustness, and the tradeoffs involved. We describe common attributes of watermarking systems and discuss the challenges in developing real world applications. Our application uses digital watermarking to connect ordinary toys to the digital world. The application captures important aspects of watermarking systems and illustrates some of the design issues faced.

  20. Domesticating Digital Game-based Learning

    Directory of Open Access Journals (Sweden)

    Helga Dís Sigurdardottir

    2016-07-01

    Full Text Available This paper analyses the use of digital game-based learning (DGBL in schools in Norway. It investigates the types of games used in Norwegian schools and how pupils experience that practice. Digital game-based learning is being widely employed throughout Norway as a result of the increased focus on digital skills in Norwegian education. This paper analyses that development by way of focus group interviews with a total of sixty-four pupils at four schools. Drawing upon domestication and actor-network theory, the paper provides a novel approach to the study of DGBL. The broad empirical investigation into DGBL practices furthermore provides a contribution to scholarly literature on the subject. A noteworthy finding of this study is the diversity of games employed in schools—around 30 different titles— indicating that the choice of games lies at the discretion of individual teachers. Findings from this research show that the domestication of digital game-based learning occurs through the construction of complex game-based learning assemblages. This includes the classroom and home as gaming sites, group work and individual assignments as practices, and PCs and iPads as platforms.

  1. Ageing adults and digital games

    DEFF Research Database (Denmark)

    Iversen, Sara Mosberg

    On the basis of Foucauldian notions of power, discipline and discourse it is here examined how ageing adults are constituted in relation to digital games within the existing research. Reviewing the available literature with a focus on justifications for research, aims and the portrayal of the eld......On the basis of Foucauldian notions of power, discipline and discourse it is here examined how ageing adults are constituted in relation to digital games within the existing research. Reviewing the available literature with a focus on justifications for research, aims and the portrayal...... of the elderly, three dominant discourses are identified. These are concerned with a generational digital divide, maintenance of health and general wellbeing as well as the ageing adults as an attractive marked. Notions of economical productivity inform most of the available work, often explicitly and at other...... times more implicitly. On this basis, the analysed research tends to offer digital games as disciplinary means to maintain, correct or tame the aging citizens. Either as technologies of the self, used in the individual’s self shaping, or as ways to contain and maintain the “disobedient” bodies and minds...

  2. Extending the Classroom: Digital Micro-Narratives for Novice Language Learners

    Science.gov (United States)

    Kronenberg, Felix A.

    2014-01-01

    Digital Storytelling offers many advantages for language learning, especially within a project-based framework. In this article, the use of Digital Micro-Narratives is proposed as particularly useful for second language learners at the novice level. As a sub-genre of Digital Storytelling, Digital Micro-Narratives focus more on frequently updated…

  3. Advanced digital optical communications

    CERN Document Server

    Binh, Le Nguyen

    2015-01-01

    This book provides a fundamental understanding of digital communication applications in optical communication technologies. Emphasizing operation principles versus mathematical analysis, the Second Edition includes new coverage of superchannel optical transmission systems, metropolitan and long-haul optical systems and networks, and Nyquist pulse shaping and high spectral efficiency of optical transmission systems, as well as new homework problems and examples. Featuring theoretical foundations as well as practical case studies, the text focuses on enhancements to digital technologies that are

  4. Desk games digitalization using radon transformation and color ...

    African Journals Online (AJOL)

    Desk games digitalization using radon transformation and color segmentation. M Horacek, L Beran, L Rejfek. Abstract. The research is focused on real-time digitalization of board games. ... AJOL African Journals Online. HOW TO USE AJOL.

  5. Using Disruptive Technologies to Make Digital Connections: Stories of Media Use and Digital Literacy in Secondary Classrooms

    Science.gov (United States)

    Nowell, Shanedra D.

    2014-01-01

    This study focused on ways teachers and students in an urban high school used technologies often labeled as disruptive (i.e. social media and mobile phones) as learning and relationship building tools, inside and outside the classroom. In this teacher research study, secondary teachers discussed digital literacies, the digital divide, and digital…

  6. The Apparatus of Digital Archaeology

    Directory of Open Access Journals (Sweden)

    Jeremy Huggett

    2017-06-01

    Full Text Available Digital Archaeology is predicated upon an ever-changing set of apparatuses – technological, methodological, software, hardware, material, immaterial – which in their own ways and to varying degrees shape the nature of Digital Archaeology. Our attention, however, is perhaps inevitably more closely focused on research questions, choice of data, and the kinds of analyses and outputs. In the process we tend to overlook the effects the tools themselves have on the archaeology we do beyond the immediate consequences of the digital. This article introduces cognitive artefacts as a means of addressing the apparatus more directly within the context of the developing archaeological digital ecosystem. It argues that a critical appreciation of our computational cognitive artefacts is key to understanding their effects on both our own cognition and on the creation of archaeological knowledge. In the process, it defines a form of cognitive digital archaeology in terms of four distinct methods for extracting cognition from the digital apparatus layer by layer.

  7. CEA SMAD 2016 Digitizer Evaluation.

    Energy Technology Data Exchange (ETDEWEB)

    Merchant, Bion J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Sandia National Laboratories has tested and evaluated an updated SMAD digitizer, developed by the French Alternative Energies and Atomic Energy Commission (CEA). The SMAD digitizers are intended to record sensor output for seismic and infrasound monitoring applications. The purpose of this digitizer evaluation is to measure the performance characteristics in such areas as power consumption, input impedance, sensitivity, full scale, self-noise, dynamic range, system noise, response, passband, and timing. The SMAD digitizers have been updated since their last evaluation by Sandia to improve their performance when recording at a sample rate of 20 Hz for infrasound applications and 100 Hz for hydro-acoustic seismic stations. This evaluation focuses primarily on the 20 Hz and 100 Hz sample rates. The SMAD digitizers are being evaluated for potential use in the International Monitoring System (IMS) of the Comprehensive Nuclear Test- Ban-Treaty Organization (CTBTO).

  8. From Cards To Digital Games

    DEFF Research Database (Denmark)

    Valente, Andrea; Marchetti, Emanuela

    2017-01-01

    This study is based on an iterative, participatory design investigation that we are conducting in order to create digital games that could be flexibly re-designed by players, without requiring programming knowledge. In particular we focus on digital game development, both design and implementation......, for primary school pupils and their teachers. We propose a scenario where digital game development is mediated by tinkering with paper prototypes similar to board games. We address the problems of making sense and expressing rules of a digital game without programming. Analysis of our latest participatory...... workshop offers evidence that a board game can work as a tangible model of the computation happening in a digital game. Children understand the practice of designing games mainly as manipulation of features and behaviors of the visual elements of a game. We attempt at looking beyond visual programming...

  9. Impediments for Digital Fabrication in Education

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Iversen, Ole Sejer; Veerasawmy, Rune

    2016-01-01

    with eight primary and lower secondary teachers, the findings point to four central impediments for integrating digital fabrication and design into school environments. The findings extend current perceptions of digital technology in education towards exploratory processes of investigation in which......Digital fabrication technologies are increasingly integrated across subjects in primary and secondary education. Focus on the potentials of these technologies has mainly been on the support to STEM oriented learning goals, while emphasis on teachers' roles with the new learning processes...... of technology and design is largely absent. The paper addresses the experiences and challenges that digital fabrication technology present for teachers in educational environments, and the impediments that are linked to the teachers' roles in design processes of digital fabrication. Based on a research study...

  10. Generating 3D and 3D-like animations of strongly uneven surface microareas of bloodstains from small series of partially out-of-focus digital SEM micrographs.

    Science.gov (United States)

    Hortolà, Policarp

    2010-01-01

    When dealing with microscopic still images of some kinds of samples, the out-of-focus problem represents a particularly serious limiting factor for the subsequent generation of fully sharp 3D animations. In order to produce fully-focused 3D animations of strongly uneven surface microareas, a vertical stack of six digital secondary-electron SEM micrographs of a human bloodstain microarea was acquired. Afterwards, single combined images were generated using a macrophotography and light microscope image post-processing software. Subsequently, 3D animations of texture and topography were obtained in different formats using a combination of software tools. Finally, a 3D-like animation of a texture-topography composite was obtained in different formats using another combination of software tools. By one hand, results indicate that the use of image post-processing software not concerned primarily with electron micrographs allows to obtain, in an easy way, fully-focused images of strongly uneven surface microareas of bloodstains from small series of partially out-of-focus digital SEM micrographs. On the other hand, results also indicate that such small series of electron micrographs can be utilized for generating 3D and 3D-like animations that can subsequently be converted into different formats, by using certain user-friendly software facilities not originally designed for use in SEM, that are easily available from Internet. Although the focus of this study was on bloodstains, the methods used in it well probably are also of relevance for studying the surface microstructures of other organic or inorganic materials whose sharp displaying is difficult of obtaining from a single SEM micrograph.

  11. Engaging Elements of Cancer-Related Digital Stories in Alaska

    Science.gov (United States)

    Cueva, Melany; Kuhnley, Regina; Revels, Laura; Schoenberg, Nancy E.; Lanier, Anne; Dignan, Mark

    2015-01-01

    The tradition of storytelling is an integral part of Alaska Native cultures that continues to be a way of passing on knowledge. Using a story-based approach to share cancer education is grounded in Alaska Native traditions and people’s experiences and has the potential to positively impact cancer knowledge, understandings, and wellness choices. Community health workers (CHWs) in Alaska created a personal digital story as part of a 5-day, in-person cancer education course. To identify engaging elements of digital stories among Alaska Native people, one focus group was held in each of three different Alaska communities with a total of 29 adult participants. After viewing CHWs’ digital stories created during CHW cancer education courses, focus group participants commented verbally and in writing about cultural relevance, engaging elements, information learned, and intent to change health behavior. Digital stories were described by Alaska focus group participants as being culturally respectful, informational, inspiring, and motivational. Viewers shared that they liked digital stories because they were short (only 2–3 min); nondirective and not preachy; emotional, told as a personal story and not just facts and figures; and relevant, using photos that showed Alaskan places and people. PMID:25865400

  12. Get the Digital Edge: linking students’ attitudes towards digital literacy and employability at the University of Westminster

    Directory of Open Access Journals (Sweden)

    Emma Woods

    2013-12-01

    Full Text Available The University of Westminster is located in London and is celebrating 175 years as an educational institution this year. A key part of the University's vision is in "building the next generation of highly employable global citizens to shape the future" (University of Westminster, 2013. This vision inspired us to look at the digital literacy skills our students need in order to be highly employable. In Spring 2012, the Information Services department at the University of Westminster secured Jisc funding to run a one year project exploring students' attitudes towards digital literacy and its relationship to employability for our students. The work is being carried out by a project board and a delivery group, which include members of staff from across the University who have an active interest in this area. We named the Project "DigitISE" (Digital Information Skills for Employability and colleagues involved with the project take turns in writing for its blog http://blog.westminster.ac.uk/jisc-employability/blog/ A questionnaire was circulated to find out about students' attitudes towards digital literacy and this was followed up by some focus groups. The headline findings from the survey are that 87.6% of students love digital technology and 81.5% believe themselves to be digitally literate. Attitudes vary significantly between subject areas. For example, with regard to the statement that the digital literacy skills needed in the courses get more complex as students progress through the course, students from the Business School agreed significantly more with this than did students from the School of Law, Social Sciences, Humanities and Languages or Architecture. The focus groups have supported the questionnaire findings and highlighted that students are largely unaware of the training that is already available to them. Ideas of how to market future training more effectively will therefore be an important outcome of this work. A further focus group

  13. Exploration of operator method digital optical computers for application to NASA

    Science.gov (United States)

    1990-01-01

    Digital optical computer design has been focused primarily towards parallel (single point-to-point interconnection) implementation. This architecture is compared to currently developing VHSIC systems. Using demonstrated multichannel acousto-optic devices, a figure of merit can be formulated. The focus is on a figure of merit termed Gate Interconnect Bandwidth Product (GIBP). Conventional parallel optical digital computer architecture demonstrates only marginal competitiveness at best when compared to projected semiconductor implements. Global, analog global, quasi-digital, and full digital interconnects are briefly examined as alternative to parallel digital computer architecture. Digital optical computing is becoming a very tough competitor to semiconductor technology since it can support a very high degree of three dimensional interconnect density and high degrees of Fan-In without capacitive loading effects at very low power consumption levels.

  14. Why Map Issues? On Controversy Analysis as a Digital Method.

    Science.gov (United States)

    Marres, Noortje

    2015-09-01

    This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital "move beyond impartiality." I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter.

  15. Implementation of Digital Watermarking Using MATLAB Software

    OpenAIRE

    Karnpriya Vyas; Kirti Sethiya; Sonu Jain

    2012-01-01

    Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. We w...

  16. Beyond digitization: access and preservation | Gbaje | Information ...

    African Journals Online (AJOL)

    This paper is a desk study that examines issues around and beyond digitization within the context of Nigeria. The paper focuses on access and preservation as some of the main objectives of digitization. It indentifies Institutional Repositories (IR) as panacea to achieving these aims. The enabling technologies and ...

  17. The Physical-Digital Divide: Exploring the Social Gap Between Digital Natives and Physical Natives.

    Science.gov (United States)

    Ball, Christopher; Francis, Jessica; Huang, Kuo-Ting; Kadylak, Travis; Cotten, Shelia R; Rikard, R V

    2017-09-01

    Older adults are the most digitally divided demographic group. The present study explores how older adults perceive the physical use of information and communication technologies (ICTs), particularly across generations and contexts. Data for the present study come from nine focus groups. Seniors acknowledge that ICTs help them connect with geographically distant social ties, but that they lead to feelings of disconnection with geographically close social ties. We label this phenomenon the "physical-digital divide," which exists when a group feels ostracized or offended when those around them engage with ICTs while they themselves are not or cannot engage with ICTs. Younger generations are often referred to as "digital natives" and older generations as "digital immigrants." A more apt label for older adults may be "physical natives," as their preferred method of communication involves physical face-to-face interactions and traditional codes of etiquette. Suggestions are made for reducing the physical-digital divide.

  18. The Digitally Disadvantaged: Access to Digital Communication Technologies among First Year Students at a Rural South African University

    Science.gov (United States)

    Oyedemi, Toks; Mogano, Saki

    2018-01-01

    Considering the importance of digital skills in university education, this article reports on a study which examined access to technology among first year students at a rural South African university. The study focused on the digital readiness of students prior to their admission to the university, since many universities provide access to…

  19. Digital imaging in dentistry.

    Science.gov (United States)

    Essen, S Donovan

    2011-01-01

    Information technology is vital to operations, marketing, accounting, finance and administration. One of the most exciting and quickly evolving technologies in the modern dental office is digital applications. The dentist is often the business manager, information technology officer and strategic planning chief for his small business. The information systems triangle applies directly to this critical manager supported by properly trained ancillary staff and good equipment. With emerging technology driving all medical disciplines and the rapid pace at which it emerges, it is vital for the contemporary practitioner to keep abreast of the newest information technology developments. This article compares the strategic and operational advantages of digital applications, specifically imaging. The focus of this paper will be on digital radiography (DR), 3D computerized tomography, digital photography and digitally-driven CAD/CAM to what are now considered obsolescing modalities and contemplates what may arrive in the future. It is the purpose of this essay to succinctly evaluate the decisions involved in the role, application and implications of employing this tool in the dental environment

  20. Digital nativity’: a definitional framework

    Directory of Open Access Journals (Sweden)

    Timoty Teo

    2013-12-01

    Full Text Available Since the term, ‘Digital Native’ has been coined; a plethora of research has followed. But, researchers have yet to reach a consensus on what the real digital native is like. There are several traits of digital native; such as their age who has born in or after 1980 and technology skills. The notion of age as a defining criterion for digital nativity has come under criticisms in recent years. Some studies found that, despite being born at the time period proposed for digital natives, students were ill- prepared to work with technology. This paper focuses four attributes of digital nativity which alluded to digital natives. These are: grow up with technology, comfortable with multitasking, reliant on graphics for communication, and thrive on instant gratifications and rewards. From the growing volume of research on digital nativity, several implications for teaching and learning could be drawn. Future teachers should be equipped to teach and learn with technologies at their training stage. They should be exposed to and gain mastery in many new and emerging technologies with potentials for instructional purposes.

  1. Development of Youth Digital Citizenship Scale and Implication for Educational Setting

    Science.gov (United States)

    Kim, Minjeong; Choi, Dongyeon

    2018-01-01

    Digital citizens need comprehensive knowledge and technological accessibility to the internet and digital world and teachers have a responsibility to lead them to become digital citizens. However, existing Digital Citizenship Scales contain too broad ranges and do not precisely focus on the target students, so teachers do not have clear criteria…

  2. A digital health innovation ecosystem for South Africa

    CSIR Research Space (South Africa)

    Herselman, Marlien

    2016-05-01

    Full Text Available The purpose of this paper is to provide an overview of how a digital health innovation ecosystem was conceptualised and validated for South Africa. Largely, we focus on defining strategies to build Digital Health Innovation Ecosystems in the context...

  3. Digital Storytelling and Multimodal Literacy in Education

    OpenAIRE

    Gregori-Signes, Carmen

    2014-01-01

    This article argues in favour of using digital storytelling to encourage a critical socio-educational focus in education and include multimodal explicit teaching in the curriculum.The analysis of fifty digital stories indicates that the students developed a certain awareness of the issue chosen for their story (e.g. violence, racism, war) since the final product transmits a critical perspective on the topic itself. Further work, however, needs to be invested in the development of the digital ...

  4. Employer Branding and Talent Management in the Digital Age

    Directory of Open Access Journals (Sweden)

    Alina MIHALCEA

    2017-06-01

    Full Text Available In the digital age, organizations need to reinvent themselves at a structural level and to become agiler. Digital maturity of human resources management implies a shift from traditional paradigm on workplace towards engagement, learning and development of employees and search for talent. This paper focuses on identifying the major trends and strategies concerning talent management programs and development of digital skills for employees and managers. The study reveals that in an open talent economy, employer brand is very important in recruiting and retention of high potential employees and must be focused on learning & leadership development, mobility, rewards and competency systems. At present, in order to obtain a business value, one of the major challenges that HR needs to face is the development of digital skills for managers and employees.

  5. Digital Voting Systems and Communication in Classroom Lectures

    DEFF Research Database (Denmark)

    Mathiasen, Helle

    2015-01-01

    Studies on the use of digital voting systems in large group teaching situations have often focused on the ”non-anonymity” and control and testing functions that the technology provides. There has also been some interest in how students might use their votes tactically to gain “credits”. By focusing...... on an empirical study of students’ experiences with digital voting systems in lectures at two Danish universities, this study considers the premises and the contexts surrounding this technology. It will also aim to show that for both instructors and students, digital voting systems are a much broader resource...... than simply a device for facilitating ”non-anonymity”, test, control and allocation of credits. The case studies showed, for instance, that digital voting systems can be conducive to a more open approach in which the systems are used as communication tools and teaching resources in situations where...

  6. Safety Review related to Commercial Grade Digital Equipment in Safety System

    International Nuclear Information System (INIS)

    Yu, Yeongjin; Park, Hyunshin; Yu, Yeongjin; Lee, Jaeheung

    2013-01-01

    The upgrades or replacement of I and C systems on safety system typically involve digital equipment developed in accordance with non-nuclear standards. However, the use of commercial grade digital equipment could include the vulnerability for software common-mode failure, electromagnetic interference and unanticipated problems. Although guidelines and standards for dedication methods of commercial grade digital equipment are provided, there are some difficulties to apply the methods to commercial grade digital equipment for safety system. This paper focuses on regulatory guidelines and relevant documents for commercial grade digital equipment and presents safety review experiences related to commercial grade digital equipment in safety system. This paper focuses on KINS regulatory guides and relevant documents for dedication of commercial grade digital equipment and presents safety review experiences related to commercial grade digital equipment in safety system. Dedication including critical characteristics is required to use the commercial grade digital equipment on safety system in accordance with KEPIC ENB 6370 and EPRI TR-106439. The dedication process should be controlled in a configuration management process. Appropriate methods, criteria and evaluation result should be provided to verify acceptability of the commercial digital equipment used for safety function

  7. Remediating a Design Tool: Implications of Digitizing Sticky Notes

    DEFF Research Database (Denmark)

    Jensen, Mads Møller; Rädle, Roman; Klokmose, Clemens Nylandsted

    2018-01-01

    digital sticky notes setup. The paper contributes with a nuanced understanding of what happens when remediating a physical design tool into digital space, by emphasizing focus shifts and breakdowns caused by the technology, but also benefits and promises inherent in the digital media. Despite users...... their use and understanding, yielding new concerns regarding cross-device transfer and collaboration....

  8. "There's Not Enough Knowledge Out There": Examining Older Adults' Perceptions of Digital Technology Use and Digital Inclusion Classes.

    Science.gov (United States)

    Betts, Lucy R; Hill, Rowena; Gardner, Sarah E

    2017-10-01

    Older adults' definitions of digital technology, and experiences of digital inclusion sessions, were examined using qualitative approaches. Seventeen older adults (aged between 54 and 85 years) participated in two focus groups that each lasted approximately 90 min to explore how older adults understood technology within their lived experience. Interpretative phenomenological analysis yielded two main themes: thirst for knowledge and a wish list for digital technology sessions. A separate content analysis was performed to identify what technology older adults identified as digital technology. This analysis revealed that the older adults most frequently defined digital technology as computers and telephones. The findings support the conclusions that this group of older adults, some of whom were "successful users," have a wide knowledge of digital technology, are interested in gaining more skills, and desire knowledge acquisition through personalized one-to-one learning sessions.

  9. SUSTAINABILITY OF DIGITAL PUBLIC SPACES

    Directory of Open Access Journals (Sweden)

    Matej Hudák

    2015-07-01

    Full Text Available Purpose: Modern digital public spaces are evolving from being mostly the provider of ICT and internet connection to institutions that provide complex range of services and support for the community. With this shift in their focus new challenges are emerging, among others their sustainability.Methodology/Approach: We build on and extend the methodology of Digital Cooperatives project. Within this project, survey on 59 digital public spaces from 12 EU countries was conducted. These digital public spaces were examined in 21 areas, some of them relating to their sustainability. We further analyse the sustainability issue of these digital public spaces.Findings: We identified three main issues affecting sustainability of digital public spaces – budgeting, services and community. Digital public spaces mostly rely on public funding and have limited diversification of their funds, which increases a risk when one source of funding drops out. They also have to build a strong community of users, supporters, which will make use of their capacities and helps co-create new services and thus strengthen and improve the community itself.Originality/Value of paper: Research in this paper is based on the collection of best practices from various EU countries in the field of digital public spaces. Recommendations based on these practices could help the creation of new, and in current digital public spaces.

  10. Digital Sport Medical Record: Sigh or a blessing?

    NARCIS (Netherlands)

    Stege, J.P.; Fleuren, M.A.H.; van der Knaap, E.T.W.; Stubbe, J.H.

    2013-01-01

    Since 2004, there have been several initiatives regarding the development of a digital Sport Medical Record (SMD). Interviews with the Netherlands Association of Sports Medicine (VSG) show that there are particular problems with commissioning of the digital SMD. During spring 2012, two focus group

  11. Digital Crafting and the Challenge to Material Practices

    DEFF Research Database (Denmark)

    Ramsgaard Thomsen, Mette

    2014-01-01

    Mette Ramsgard Thomsen will examine how architecture is influenced by new digital design—the production tools as well as the digital practices that are informing our societies culturally, socially and technologically. Focusing on the tectonic possibilities of textiles to create lighter and more r...

  12. Collaborative learning model inquiring based on digital game

    Science.gov (United States)

    Yuan, Jiugen; Xing, Ruonan

    2012-04-01

    With the development of computer education software, digital educational game has become an important part in our life, entertainment and education. Therefore how to make full use of digital game's teaching functions and educate through entertainment has become the focus of current research. The thesis make a connection between educational game and collaborative learning, the current popular teaching model, and concludes digital game-based collaborative learning model combined with teaching practice.

  13. Better Steganalysis (BEST) - Reduction of Interfering Influence of Image Content on Steganalysis

    Science.gov (United States)

    2009-10-08

    LSB embedding, let us consider greyscale images with pixel values in the range 0. . . 255 as carrier medium. LSB steganography replaces the least...Detecting LSB steganography in color and grayscale images . IEEE Multimedia, 8(4):22–28, 2001. [9] Jessica Fridrich, Miroslav Goljan, and Dorin Hogea...January, 19–22 2004. [13] Andrew D. Ker. Improved detection of LSB steganography in grayscale images . In Jessica Fridrich, editor, Information Hiding

  14. Predicting Digital Informal Learning: An Empirical Study among Chinese University Students

    Science.gov (United States)

    He, Tao; Zhu, Chang; Questier, Frederik

    2018-01-01

    Although the adoption of digital technology has gained considerable attention in higher education, currently research mainly focuses on implementation in formal learning contexts. Investigating what factors influence students' digital informal learning is still unclear and limited. To understand better university students' digital informal…

  15. Focusing and depth of field in photography: application in dermatology practice.

    Science.gov (United States)

    Taheri, Arash; Yentzer, Brad A; Feldman, Steven R

    2013-11-01

    Conventional photography obtains a sharp image of objects within a given 'depth of field'; objects not within the depth of field are out of focus. In recent years, digital photography revolutionized the way pictures are taken, edited, and stored. However, digital photography does not result in a deeper depth of field or better focusing. In this article, we briefly review the concept of depth of field and focus in photography as well as new technologies in this area. A deep depth of field is used to have more objects in focus; a shallow depth of field can emphasize a subject by blurring the foreground and background objects. The depth of field can be manipulated by adjusting the aperture size of the camera, with smaller apertures increasing the depth of field at the cost of lower levels of light capture. Light-field cameras are a new generation of digital cameras that offer several new features, including the ability to change the focus on any object in the image after taking the photograph. Understanding depth of field and camera technology helps dermatologists to capture their subjects in focus more efficiently. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  16. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  17. Empowering Indonesian women through building digital media literacy

    Directory of Open Access Journals (Sweden)

    Fiona Suwana

    2017-09-01

    Full Text Available There is still a gender digital divide in Indonesia. Indonesian women need digital media literacy skills to effectively use the Internet and to raise their quality of life. Empowering literacy abilities includes the skills of using digital media to access, search, analyze, reflect, share, and create. In this qualitative research study, founders, leaders, and participants from IWITA (Indonesian Women Information Technology Awareness and FemaleDev (Female Developer were interviewed because these organizations focus on developing digital literacy for women. The findings indicated that digital media literacy remains low because of inadequate education, lack of opportunities and the patriarchal system in Indonesia.

  18. Effectiveness of Digital Marketing in the Challenging Age: An Empirical Study

    OpenAIRE

    Afrina Yasmin; Sadia Tasneem; Kaniz Fatema

    2015-01-01

    Marketers are faced with new challenges and opportunities within this digital age. Digital marketing is the utilization of electronic media by the marketers to promote the products or services into the market. The main objective of digital marketing is attracting customers and allowing them to interact with the brand through digital media. This article focuses on the importance of digital marketing for both marketers and consumers. We examine the effect of digital marketing on the firms’ sa...

  19. High-definition television for use in digital endoscopy

    Science.gov (United States)

    Haefliger, Juerg; Lehareinger, Yves; Blessing, Patrick; Niederer, Peter F.; Doswald, Daniel; Felber, Norbert

    2001-01-01

    A novel digital high-definition TV (digital HDTV) system is presented which is adapted to the special characteristics of medical endoscopes. In particular, it has a quadratic image aspect ratio to accommodate round endoscopic images, furthermore, the spatial resolution is 1024 x 1024 pixels thereby approaching the diffraction limit of small endoscopes. It exhibits 24 bits true-color with an adjustable temporal resolution of up to 30 full frames per second in progressive scan. To ensure overall superior performance and high-quality image acquisition and reproduction, complex digital error correction and picture enhancing algorithms are integrated into custom ASICs (Application Specific Integrated Circuit). Additionally, an improved color space transformation is performed in real-time to match the spectral characteristics of the digital camera and the viewing device, allowing for a quantitative judgement of colors. Further features include the conversion of the digital video stream to standard video norms such as Pal or NTSC for recording on analog VCRs, the calculation and evaluation of a focus criterion, which is used to perform passive, stable and reliable auto-focusing and the implementation of an automated illumination control, ensuring proper picture brightness during the whole time of operation.

  20. Searching for Digital Citizenship: Fighting Corruption in Banten, Indonesia

    Directory of Open Access Journals (Sweden)

    Muhammad Zamzam Fauzanafi

    2016-12-01

    Full Text Available The expansion of digital technologies and social media in Indonesia shifts practices of citizenship from a formal institutional level toward a more informal digital space. This paper presents the emerging results of research on digital citizenship in Banten, Indonesia, focusing on how new forms of citizenship are brought into being through digital acts that are defined as speech acts uttered through the use of social media. The paper follows digital acts of citizens in anti-corruption campaigns against the patrimonial and clientelistic regime of Banten’s political dynasty that are predominantly staged on Facebook and other online platforms. These digital acts produce and intensify affective publics through which forms of digital citizenship are enacted in opposition to the corrupt dynasty.

  1. Smart cities, smart lights. Digital signane and the city experience

    OpenAIRE

    Fiori, Giovanni

    2012-01-01

    This article is about the experience of light in the smart and digital city or, in other words, the existing and widening use of visual digital signane in the urban environment, open air and in public places. This research focuses on where in towns this digital "contamination" is more visible and accessible, i.e. in shopping districts.

  2. Digital Technologies In The Early Primary School Classroom

    OpenAIRE

    Sinclair, Nathalie; Baccaglini-Frank, Anna

    2016-01-01

    Papert's (1980) work with Turtle Geometry offered an early and provocative vision of how digital technologies could be used with young learners. Since then, research on digital technology use has focused on the middle and high school levels. Given the increasing diversity of digital technologies, and their varied underlying pedagogical goals and design choices, Clements' (2002) claim that there is no single effect of the computer on mathematics achievement is as true now as it was a decade ag...

  3. MARIAN: Flexible Interoperability for Federated Digital Libraries

    OpenAIRE

    Goncalves, Marcos A.; France, Robert K.; Fox, Edward A.; Hilf, Eberhard R.; Zimmermann, Kerstin; Severiens, Thomas

    2001-01-01

    Federated digital libraries are composed of distributed autonomous (heterogeneous) information services but provide users with a transparent, integrated view of collected information respecting different information sources' autonomy. In this paper we discuss a federated system for the Networked Digital Library of Theses and Dissertations (NDLTD), an international consortium of universities, libraries, and other supporting institutions focused on electronic theses and dissertations (ETDs). Th...

  4. Digital Adults: Beyond the Myth of the Digital Native Generation Gap

    Science.gov (United States)

    Tufts, Debra Roben

    2010-01-01

    The digital native has been the darling of market research and a major focus of education consternation throughout the first decade of the 2000s. These are the children and young adults the literature describes as those born after 1980 and who exhibit high technical savvy, particularly as it pertains to information and communication technology…

  5. Are Malaysian Students Ready to Be Authors of Digital Contents? A Case Study of Digital Library Stakeholders’ Readiness

    Directory of Open Access Journals (Sweden)

    Abrizah Abdullah

    2007-09-01

    Full Text Available The paper reports on a study that ascertains the factors facilitating students to utilize digital libraries for educational purposes. The study investigates students ICT readiness, usage of online resources and information seeking behaviour of secondary school students with the specific goal of applying the results to the design of a collaborative digital library for school projects. The digital library has been conceived to support resource needs of these students as well provide the space for them to publish their school projects, which are currently submitted handwritten. The study uses the case study approach and an urban secondary school in Malaysia is chosen as the case school. Findings from a survey and focus group interviews indicate that the students are ready to collaboratively build the digital library resources as evidenced by students digital library readiness score of 31.4/40.

  6. Focus Section on Design Anthropology in Participatory Design

    DEFF Research Database (Denmark)

    2015-01-01

    This focus section explores the opportunities of design anthropology in participatory design as an approach to research and design in an increasingly global and digital world. Traditionally, ethnography has been used in Participatory design to research real-life contexts and challenges, and as ways...... to involve people in defining user-needs and design opportunities. As the boundaries between diverse – material, digital and networked – spaces and experiences become increasingly blurred, so do the conventional distinctions between research and design. The papers presented in this focus section explore...... opportunities of using design anthropology as a holistic and critical approach to addressing societal challenges and change, and a way for anthropologists and designers to engage in participatory research and design that extend beyond the empirical....

  7. Experimental OAI-Based Digital Library Systems

    Science.gov (United States)

    Nelson, Michael L. (Editor); Maly, Kurt (Editor); Zubair, Mohammad (Editor); Rusch-Feja, Diann (Editor)

    2002-01-01

    The objective of Open Archives Initiative (OAI) is to develop a simple, lightweight framework to facilitate the discovery of content in distributed archives (http://www.openarchives.org). The focus of the workshop held at the 5th European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2001) was to bring researchers in the area of digital libraries who are building OAI based systems so as to share their experiences, problems they are facing, and approaches they are taking to address them. The workshop consisted of invited talks from well-established researchers working in building OAI based digital library system along with short paper presentations.

  8. : Digital Humanities and the Place of Pedagogy

    OpenAIRE

    Hirsch, BD

    2012-01-01

    It is fitting that this collection of essays on “digital humanities” pedagogy should have its roots in discussions that followed the 2009 Digital Humanities Summer Institute at the University of Victoria, British Columbia, where I was then a postdoctoral fellow. In the course of his plenary lecture, “How to Win Friends,” Donald Bruce noted how little focus there was on teaching in the extant critical literature on the digital humanities. To test this observation, after the lecture I turned to...

  9. A Design Study Investigating Augmented Reality and Photograph Annotation in a Digitalized Grossing Workstation.

    Science.gov (United States)

    Chow, Joyce A; Törnros, Martin E; Waltersson, Marie; Richard, Helen; Kusoffsky, Madeleine; Lundström, Claes F; Kurti, Arianit

    2017-01-01

    Within digital pathology, digitalization of the grossing procedure has been relatively underexplored in comparison to digitalization of pathology slides. Our investigation focuses on the interaction design of an augmented reality gross pathology workstation and refining the interface so that information and visualizations are easily recorded and displayed in a thoughtful view. The work in this project occurred in two phases: the first phase focused on implementation of an augmented reality grossing workstation prototype while the second phase focused on the implementation of an incremental prototype in parallel with a deeper design study. Our research institute focused on an experimental and "designerly" approach to create a digital gross pathology prototype as opposed to focusing on developing a system for immediate clinical deployment. Evaluation has not been limited to user tests and interviews, but rather key insights were uncovered through design methods such as " rapid ethnography " and " conversation with materials ". We developed an augmented reality enhanced digital grossing station prototype to assist pathology technicians in capturing data during examination. The prototype uses a magnetically tracked scalpel to annotate planned cuts and dimensions onto photographs taken of the work surface. This article focuses on the use of qualitative design methods to evaluate and refine the prototype. Our aims were to build on the strengths of the prototype's technology, improve the ergonomics of the digital/physical workstation by considering numerous alternative design directions, and to consider the effects of digitalization on personnel and the pathology diagnostics information flow from a wider perspective. A proposed interface design allows the pathology technician to place images in relation to its orientation, annotate directly on the image, and create linked information. The augmented reality magnetically tracked scalpel reduces tool switching though

  10. Teaching children digital literacy through design-based learning with digital toolkits in schools

    NARCIS (Netherlands)

    Bekker, T.; Bakker, S.; Douma, I.; van der Poel, J.E.C.; Scheltenaar, K.J.

    2015-01-01

    The paper presents our work on how to teach digital literacy and design thinking to children at primary and secondary schools, with a particular focus on exploring the tools that may support children’s learning in these domains. We have conducted design explorations with input from diverse

  11. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  12. Broadband direct RF digitization receivers

    CERN Document Server

    Jamin, Olivier

    2014-01-01

    This book discusses the trade-offs involved in designing direct RF digitization receivers for the radio frequency and digital signal processing domains.  A system-level framework is developed, quantifying the relevant impairments of the signal processing chain, through a comprehensive system-level analysis.  Special focus is given to noise analysis (thermal noise, quantization noise, saturation noise, signal-dependent noise), broadband non-linear distortion analysis, including the impact of the sampling strategy (low-pass, band-pass), analysis of time-interleaved ADC channel mismatches, sampling clock purity and digital channel selection. The system-level framework described is applied to the design of a cable multi-channel RF direct digitization receiver. An optimum RF signal conditioning, and some algorithms (automatic gain control loop, RF front-end amplitude equalization control loop) are used to relax the requirements of a 2.7GHz 11-bit ADC. A two-chip implementation is presented, using BiCMOS and 65nm...

  13. Branding Strategies for Digital Tv Channels

    OpenAIRE

    M. Pagani

    2011-01-01

    This chapter analyses the impact of digitalization on TV marketing strategies focusing on the role of brand as a loyalty-based resource, available to digital television networks to create a sustainable competitive advantage. We analyze the cognitive process adopted by a viewer in the selection process of a TV channel and provide managerial implications for branding strategy and the tools that a television network and an iTV portal need to adopt to communicate values connected with their brand...

  14. Play, Creativity and Digital Cultures. Routledge Research in Education

    Science.gov (United States)

    Willett, Rebekah, Ed.; Robinson, Muriel, Ed.; Marsh, Jackie, Ed.

    2011-01-01

    Recent work on children's digital cultures has identified a range of literacies emerging through children's engagement with new media technologies. This edited collection focuses on children's digital cultures, specifically examining the role of play and creativity in learning with these new technologies. The chapters in this book were contributed…

  15. Fourth-order structural steganalysis and analysis of cover assumptions

    Science.gov (United States)

    Ker, Andrew D.

    2006-02-01

    We extend our previous work on structural steganalysis of LSB replacement in digital images, building detectors which analyse the effect of LSB operations on pixel groups as large as four. Some of the method previously applied to triplets of pixels carries over straightforwardly. However we discover new complexities in the specification of a cover image model, a key component of the detector. There are many reasonable symmetry assumptions which we can make about parity and structure in natural images, only some of which provide detection of steganography, and the challenge is to identify the symmetries a) completely, and b) concisely. We give a list of possible symmetries and then reduce them to a complete, non-redundant, and approximately independent set. Some experimental results suggest that all useful symmetries are thus described. A weighting is proposed and its approximate variance stabilisation verified empirically. Finally, we apply symmetries to create a novel quadruples detector for LSB replacement steganography. Experimental results show some improvement, in most cases, over other detectors. However the gain in performance is moderate compared with the increased complexity in the detection algorithm, and we suggest that, without new insight, further extension of structural steganalysis may provide diminishing returns.

  16. FPGA-based implementation for steganalysis: a JPEG-compatibility algorithm

    Science.gov (United States)

    Gutierrez-Fernandez, E.; Portela-García, M.; Lopez-Ongil, C.; Garcia-Valderas, M.

    2013-05-01

    Steganalysis is a process to detect hidden data in cover documents, like digital images, videos, audio files, etc. This is the inverse process of steganography, which is the used method to hide secret messages. The widely use of computers and network technologies make digital files very easy-to-use means for storing secret data or transmitting secret messages through the Internet. Depending on the cover medium used to embed the data, there are different steganalysis methods. In case of images, many of the steganalysis and steganographic methods are focused on JPEG image formats, since JPEG is one of the most common formats. One of the main important handicaps of steganalysis methods is the processing speed, since it is usually necessary to process huge amount of data or it can be necessary to process the on-going internet traffic in real-time. In this paper, a JPEG steganalysis system is implemented in an FPGA in order to speed-up the detection process with respect to software-based implementations and to increase the throughput. In particular, the implemented method is the JPEG-compatibility detection algorithm that is based on the fact that when a JPEG image is modified, the resulting image is incompatible with the JPEG compression process.

  17. A Paradigmatic Analysis of Digital Application Marketplaces

    DEFF Research Database (Denmark)

    Ghazawneh, Ahmad; Henfridsson, Ola

    2015-01-01

    This paper offers a paradigmatic analysis of digital application marketplaces for advancing information systems research on digital platforms and ecosystems. We refer to the notion of digital application marketplace, colloquially called ‘appstores,’ as a platform component that offers a venue...... for exchanging applications between developers and end users belonging to a single or multiple ecosystems. Such marketplaces exhibit diversity in features and assumptions, and we propose that examining this diversity, and its ideal types, will help us to further understand the relationship between application...... marketplaces, platforms, and platform ecosystems. To this end, we generate a typology that distinguishes four kinds of digital application marketplaces: closed, censored, focused, and open marketplaces. The paper also offers implications for actors wishing to make informed decisions about their relationship...

  18. Digital Collections, Digital Libraries & the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…

  19. The Three-dimensional Digital Factory for Shipbuilding Technology Research

    Directory of Open Access Journals (Sweden)

    Xu Wei

    2016-01-01

    Full Text Available The three-dimensional digital factory technology research is the hotspot in shipbuilding recently. The three-dimensional digital factory technology not only focus on design the components of the product, but also discuss on the simulation and analyses of the production process.Based on the three-dimensional model, the basic data layer, application control layer and the presentation layer of hierarchical structure are established in the three-dimensional digital factory of shipbuilding in this paper. And the key technologies of three-dimensional digital factory of shipbuilding are analysed. Finally, a case study is applied and the results show that the three-dimensional digital factory will play an important role in the future.

  20. Digital Collections, Digital Libraries and the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses the development of digital collections and digital libraries. Topics include digitization of cultural heritage information; broadband issues; lack of compelling content; training issues; types of materials being digitized; sustainability; digital preservation; infrastructure; digital images; data mining; and future possibilities for…

  1. Digital amnesia and the future tourist

    Directory of Open Access Journals (Sweden)

    Chris Greenwood

    2017-04-01

    Full Text Available Purpose – The purpose of this paper is to examine the phenomenon of digital amnesia and its influence on the future tourist. Design/methodology/approach – A trend paper based on environmental scanning and speculative future analysis. Findings – The phenomena of digital amnesia are established. The growth of digital platforms and the consumer’s reliance is exponential. The implications for the future tourist in terms of decision making, the influence of marketing messaging and potentially the recall and reimagining of authentic experience will be significant in the future. Practical implications – Subject to the signals of change, should consumer’s reliance on digital platforms for the storing of information and memories continue to grow this has implications on how tourism businesses engage with their customers, influence and inform their marketing and how destinations would be reimagined based on the recall of their visitors. Originality/value – The trend of digital amnesia is an established and well-documented phenomenon. The development of the trend to consider the implications for the future tourism industry based a growing dependence on digital platforms is the focus of this paper.

  2. ’The Mission is to Keep this Industry Intact’: Digital Transition in the Japanese Newspaper Industry

    OpenAIRE

    Villi, Mikko Olavi; Hayashi, Kaori

    2017-01-01

    The focus of this paper is the digital transition in major Japanese newspapers that sell millions of copies per day. By digital transition we refer to the shift to publishing content on digital platforms – in this case the shift from print to online and mobile media. Japan is globally one of the most important newspaper markets with the world’s largest daily newspapers circulation-wise. The research focusing on the digital transition in Japanese newspapers and the implications of this shift h...

  3. "Impossible Is Nothing": Expressing Difficult Knowledge through Digital Storytelling

    Science.gov (United States)

    Johnson, Lauren; Kendrick, Maureen

    2017-01-01

    The study focuses on a digital storytelling project conducted in a school district's transition program, in which adolescent refugee and immigrant English learners were invited to share aspects of their identities and social worlds through a range of modes. In this article, the authors look closely at one student's digital story through a…

  4. The Adoption of Digital Marketing in Financial Services under Crisis

    Directory of Open Access Journals (Sweden)

    Daj A.

    2009-12-01

    Full Text Available Led by social media, online search, consumer generated content, virtual communities, and considering the increased focus on digital technologies, the longer-term prospects for digital marketing and the global online medium continue to be bright. Given the recent decline of the financial markets and the economic fallout, financial institutions have to implement new digital marketing techniques both for cost optimization and for dealing with the crisis of confidence.

  5. A design study investigating augmented reality and photograph annotation in a digitalized grossing workstation

    Directory of Open Access Journals (Sweden)

    Joyce A Chow

    2017-01-01

    Full Text Available Context: Within digital pathology, digitalization of the grossing procedure has been relatively underexplored in comparison to digitalization of pathology slides. Aims: Our investigation focuses on the interaction design of an augmented reality gross pathology workstation and refining the interface so that information and visualizations are easily recorded and displayed in a thoughtful view. Settings and Design: The work in this project occurred in two phases: the first phase focused on implementation of an augmented reality grossing workstation prototype while the second phase focused on the implementation of an incremental prototype in parallel with a deeper design study. Subjects and Methods: Our research institute focused on an experimental and “designerly” approach to create a digital gross pathology prototype as opposed to focusing on developing a system for immediate clinical deployment. Statistical Analysis Used: Evaluation has not been limited to user tests and interviews, but rather key insights were uncovered through design methods such as “rapid ethnography” and “conversation with materials”. Results: We developed an augmented reality enhanced digital grossing station prototype to assist pathology technicians in capturing data during examination. The prototype uses a magnetically tracked scalpel to annotate planned cuts and dimensions onto photographs taken of the work surface. This article focuses on the use of qualitative design methods to evaluate and refine the prototype. Our aims were to build on the strengths of the prototype's technology, improve the ergonomics of the digital/physical workstation by considering numerous alternative design directions, and to consider the effects of digitalization on personnel and the pathology diagnostics information flow from a wider perspective. A proposed interface design allows the pathology technician to place images in relation to its orientation, annotate directly on the

  6. RF applications in digital signal processing

    CERN Document Server

    Schilcher, T

    2008-01-01

    Ever higher demands for stability, accuracy, reproducibility, and monitoring capability are being placed on Low-Level Radio Frequency (LLRF) systems of particle accelerators. Meanwhile, continuing rapid advances in digital signal processing technology are being exploited to meet these demands, thus leading to development of digital LLRF systems. The rst part of this course will begin by focusing on some of the important building-blocks of RF signal processing including mixer theory and down-conversion, I/Q (amplitude and phase) detection, digital down-conversion (DDC) and decimation, concluding with a survey of I/Q modulators. The second part of the course will introduce basic concepts of feedback systems, including examples of digital cavity eld and phase control, followed by radial loop architectures. Adaptive feed-forward systems used for the suppression of repetitive beam disturbances will be examined. Finally, applications and principles of system identi cation approaches will be summarized.

  7. Structured Literature Review of disruptive innovation theory within the digital domain

    DEFF Research Database (Denmark)

    Vesti, Helle; Nielsen, Christian; Rosenstand, Claus Andreas Foss

    2017-01-01

    The area of interest is disruption is the digital domain. The research questions are: How has the disruption and digital disruption literature developed over time? What is the research focus into disruption regarding the digital domain and how has this changed over time? Which methods are being...... utilized in research regarding disruption and digital disruption? Where are the key contributors to disruption in general and in digital disruption? Is there a future for digital disruption research? The method is a Structured Literature Review (SLR). The contribution is the results of an analysis of 95...... publications within the field of disruption in the digital domain and disruptive innovation theory in general. Works of twelve practitioners and 83 academics are investigated....

  8. A handbook of digital library economics operations, collections and services

    CERN Document Server

    Baker, David P

    2013-01-01

    This book provides a companion volume to Digital Library Economics and focuses on the 'how to' of managing digital collections and services (of all types) with regard to their financing and financial management. The emphasis is on case studies and practical examples drawn from a wide variety of contexts. A Handbook of Digital Library Economics is a practical manual for those involved - or expecting to be involved - in the development and management of digital libraries.provides practical approach to the subjectfocuses on the challenges associated with the economic and financial aspects of digi

  9. Negotiating Digital Divides: Perspectives from the New Zealand Schooling System

    Science.gov (United States)

    Starkey, Louise; Sylvester, Allan; Johnstone, David

    2017-01-01

    This article explores digital divides identified in research literature and considers educational policy directions that may mitigate or enhance future inequities. A review of literature identified three categories of digital divides in society; access, capability, and participation. To explore the strategic focus in schooling, data were gathered…

  10. Idea Hubs as Nexus of Collective Creativity in Digital Innovation

    DEFF Research Database (Denmark)

    Ciriello, Raffaele; Richter, Alexander

    2015-01-01

    Digital innovation radically transforms the nature of corporate innovation practices, implying a growing need for deeper understanding its origins and outcomes. In this paper, we conceptualize the focal points of social networking in digital innovation as idea hubs. We focus our analysis...... on instances of idea hubs in two multinational European software companies, where we conducted a case study over a two-year period, and collected data in form of interviews, digital documents, and participant observations. In doing so, we identify a set of social networking practices in which idea hubs serve...... of digital artifacts individuals can choose from, offline interaction still plays a major role in facilitating digital innovation....

  11. Research challenges in digital education.

    Science.gov (United States)

    Norman, Geoff

    2014-09-01

    Simulation and other forms of digital learning will occupy a place of increasing prominence in medical education in the future. However, to maximally use the potential of these media, we must go beyond a research agenda dictated by a 'Does it work?' question to one driven by careful analysis of the nature of the task to be learned and its relation to the characteristics of the technology. Secondly, we must change the focus from the characteristics of individual devices to a broader approach to design of a digital curriculum based on current understanding of the nature of human learning.

  12. Empowering vocational math teachers by using digital learning material (DLM) with workplace assignments

    NARCIS (Netherlands)

    Zwart, D.P.; van Luit, J.E.H.; Goei, S. L.

    2016-01-01

    Digital Learning Material (DLM) are fast becoming a key instrument in teaching. The focus on E-learning systems with Digital Learning Material (DLM) is mostly on the medium and resources, instead of on the role of teachers. But like students, teachers also need to professionalize their digital

  13. Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

    OpenAIRE

    Kamaldeep Joshi; Rajkumar Yadav; Sachin Allwadhi

    2016-01-01

    Image steganography is the best aspect of information hiding. In this, the information is hidden within an image and the image travels openly on the Internet. The Least Significant Bit (LSB) is one of the most popular methods of image steganography. In this method, the information bit is hidden at the LSB of the image pixel. In one bit LSB steganography method, the total numbers of the pixels and the total number of message bits are equal to each other. In this paper, the LSB method of image ...

  14. Digital image envelope: method and evaluation

    Science.gov (United States)

    Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang

    2003-05-01

    Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.

  15. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  16. Implementing digital preservation in repositories: Knowledge and practices

    Directory of Open Access Journals (Sweden)

    Caterina Groposo Pavão

    2016-09-01

    Full Text Available Digital preservation has to be undertaken by institutional repositories, which are responsible for the preservation of the scientific output from academic institutions. However, due to the constant evolution of the field, to gain domain knowledge and recognise best practices is a complex task for people responsible for digital preservation in those institutions. Digital preservation research, practices and solutions address specific problems, such as formats, curation, reference models, authenticity, policies and preservation plans, tools, etc., while stakeholders need an integrated, contextualized and applicable overview. This paper focuses on the implementation of digital preservation in repositories, from the perspective of the team responsible for the project, regarding the necessary knowledge and best practices. Initially, it defines and contextualizes digital preservation repositories. The following section presents a conceptual model of digital preservation, synthesized from conceptual models developed in influential projects in the field, which allows us to identify the domain knowledge in digital preservation. Finally, aspects represented in the model are discussed in the light of the performance of teams implementing digital preservation repositories. It provides recommendations, guides and examples that may be useful for the implementation of digital preservation. It points to the need to strengthen the relationship between domain knowledge in digital preservation repositories with practices developed in numerous projects developed worldwide.

  17. Proposing a Capability Perspective on Digital Business Models

    OpenAIRE

    Bärenfänger, Rieke; Otto, Boris

    2015-01-01

    Business models comprehensively describe the functioning of businesses in contemporary economic, technological, and societal environments. This paper focuses on the characteristics of digital business models from the perspective of capability research and develops a capability model for digital businesses. Following the design science research (DSR) methodology, multiple evaluation and design iterations were performed. Contributions to the design process came from IS/IT practice and the resea...

  18. Digital Preservation of Cultural Heritage

    NARCIS (Netherlands)

    Peters, Nonja; Marinova, Dora; van Faassen, M.; Stasiuk, Glen; Zacher, L.W.

    2017-01-01

    The focus of this chapter is the state of the art of digitisation of cultural heritage in Australian archives and libraries from a comparative perspective. Globalisation, mobility and the new techniques that spin off from the digital age bring about new possibilities that stimulate and enhance our

  19. Repurposing digital methods: The research affordances of platforms and engines

    NARCIS (Netherlands)

    Weltevrede, E.J.T.

    2016-01-01

    Digital research is often understood as data-driven. Yet the ways in which data are already informed by specific analytical assumptions and inscriptions of the media in which they originate, circulate, or are being used is often neglected. The thesis intervenes in such focus on digital research in

  20. Users Behavior in Location-Aware Services: Digital Natives versus Digital Immigrants

    Directory of Open Access Journals (Sweden)

    Marco Furini

    2014-01-01

    Full Text Available Location-aware services may expose users to privacy risks as they usually attach user’s location to the generated contents. Different studies have focused on privacy in location-aware services, but the results are often conflicting. Our hypothesis is that users are not fully aware of the features of the location-aware scenario and this lack of knowledge affects the results. Hence, in this paper we present a different approach: the analysis is conducted on two different groups of users (digital natives and digital immigrants and is divided into two steps: (i understanding users’ knowledge of a location-aware scenario and (ii investigating users’ opinion toward location-aware services after showing them an example of an effective location-aware service able to extract personal and sensitive information from contents publicly available in social media platforms. The analysis reveals that there is relation between users’ knowledge and users’ concerns toward privacy in location-aware services and also reveals that digital natives are more interested in the location-aware scenario than digital immigrants. The analysis also discloses that users’ concerns toward these services may be ameliorated if these services ask for users’ authorization and provide benefits to users. Other interesting findings allow us to draw guidelines that might be helpful in developing effective location-aware services.

  1. Personal Sports Branding in the Digital Age: The Case of Zlatan Ibrahimovic

    OpenAIRE

    Samoylina, Ekaterina

    2015-01-01

    The rise of digital media has caused transformations and new phenomena in different fields. In the digital age such branches as personal sports branding and nation branding has acquired new opportunities for development. The research focuses on representation of the personal sports brand of Zlatan Ibrahimovic on digital media platforms and its connection to the nation brand of Sweden. Previous research deals with existing studies on personal branding, personal sports branding in digital media...

  2. Applying Blooms Digital Taxonomy to Address Creativity and Second Order Digital Divide in Internet Skills

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2016-01-01

    Internet technologies play a significant role to enhance creativity of the students in learning environments. Internet literacy is vital to effectively use the Internet tools to enhance creative learning environments. In the developing countries Internet literacy is still an unfulfilled dream...... for students coming from underprivileged backgrounds thus bringing a digital divide in skills. The chapter draws upon an empirical study done in India on how an intervention comprised of Internet training designed on Bloom’s Digital Taxonomy and action research workshops based on the learning domains...... of the digital taxonomy was an effective approach for empowering women students through learning to use the Internet. The chapter puts forward the argument that an intervention for learning to use the Internet can be effective where focus is on the reflective and conceptual skills in using the Internet than...

  3. The Strategic Role of Digital Libraries: Issues in E-Learning Environments.

    Science.gov (United States)

    Wang, Mei-Yu

    2003-01-01

    Describes research aimed at providing educational organizations with practical strategies for implementing electronic learning (e-learning), based on focus group discussions at an elementary school in Taiwan. Considers the strategic role of digital libraries in electronic learning environments, library collections, digital technology, human…

  4. Digital control of high-frequency switched-mode power converters

    CERN Document Server

    Corradini, Luca; Mattavelli, Paolo; Zane, Regan

    This book is focused on the fundamental aspects of analysis, modeling and design of digital control loops around high-frequency switched-mode power converters in a systematic and rigorous manner Comprehensive treatment of digital control theory for power converters Verilog and VHDL sample codes are provided Enables readers to successfully analyze, model, design, and implement voltage, current, or multi-loop digital feedback loops around switched-mode power converters Practical examples are used throughout the book to illustrate applications of the techniques developed Matlab examples are also

  5. What educators should know about teaching digital storytelling

    Directory of Open Access Journals (Sweden)

    Bernard R. Robin

    2012-12-01

    Full Text Available In this paper, the authors present some of the most important lessons they havelearned from teaching courses, conducting workshops, writing articles, andsupervising graduate student research on the educational uses of digitalstorytelling. The guidelines described here are categorized within the ADDIEinstructional design framework and are presented as starting points thateducators should consider when they begin to integrate digital storytelling in theirclassrooms. The guidelines provide useful information that will help educatorsteach students all phases of the digital storytelling process, including analysis,design, development, implementation and evaluation of digital storytellingprojects that focus on educationally meaningful topics.

  6. Digital Storytelling as Arts-Inspired Inquiry for Engaging, Understanding, and Supporting Indigenous Youth

    Science.gov (United States)

    Eglinton, Kristen Ali; Gubrium, Aline; Wexler, Lisa

    2017-01-01

    In this paper we examine digital storytelling as a mode of arts-inspired inquiry: in particular we consider digital storytelling as a powerful arts-inspired approach that can help researchers, practitioners, and communities understand and support indigenous and marginalized youth. Our two-fold focus is on: (1) a digital storytelling initiative…

  7. Aplikasi Kriptografi dan Steganografi Menggunakan Metode Least Significant Bit (LSB dan One Time Pad (OTP

    Directory of Open Access Journals (Sweden)

    Ali Mahmudi

    2016-05-01

    Full Text Available With the development of technology, especially in the IT field, the more developed also the current exchange of information using internet technology. Security of information transmitted via the Internet network is a must to maintain the confidentiality and originality of the information. Technology to maintain the security of the information used in this paper is a cryptography and steganography. Application cryptography to secure information on the text, then the information is hidden in digital images. So that only users who have a lock / unlock passwords only, can read the message in greeting such information.

  8. Classical Music, liveness and digital technologies

    DEFF Research Database (Denmark)

    Steijn, Arthur

    2014-01-01

    . This article uses the suggestion of Philip Auslander to rethink the relationship between the mediatized and live format in order to use digital technologies to enrich and develop the live performance as a starting position. On the background of an ongoing EU funded interregional project, a series...... of interrelated design experiments are presented which all share the ambition of integration digital technologies in life performances of classical music. A particular focus is put on the ongoing development of a design concept where interactive audio and visual experiences in an underground metro station shall...

  9. Information Seeking Behavior in Digital Image Collections: A Cognitive Approach

    Science.gov (United States)

    Matusiak, Krystyna K.

    2006-01-01

    Presents the results of a qualitative study that focuses on search patterns of college students and community users interacting with a digital image collection. The study finds a distinct difference between the two groups of users and examines the role of mental models in information seeking behavior in digital libraries.

  10. The digital divide among young people in Brussels: Social and cultural influences on ownership and use of digital technologies

    OpenAIRE

    Mertens, Stefan; d'Haenens, Leen

    2010-01-01

    This article reports on a survey of youth in Brussels (N = 1,005) and their ownership and use of digital technologies, focusing specifically on the social and cultural diversity within this group. Socio-cultural diversity includes differences regarding ethnicity and gender, language and educational attainment, as well as social and economic status. The relationship of these socio-cultural differences with the digital divide in terms of ownership and use is investigated. The data show a persis...

  11. Digital Co-production in Archaeology. An editorial

    Directory of Open Access Journals (Sweden)

    Chiara Bonacchi

    2017-12-01

    Full Text Available This special issue focuses on digitally-enabled co-production in archaeology, by bringing together papers that were presented at the session Communication as Collaboration: Digital Methods, Experiences and Values, organised at the 21st Annual Meeting of the European Association of Archaeologists (University of Glasgow, 2015. The session was part of the Communicating Archaeology thematic cluster, which was partly inspired by the first published volume dedicated specifically to the topic of digital public engagement in archaeology (Bonacchi 2012. In that session and in this collection, we have been exploring communication as the collaborative construction of materials and interpretations rather than the dissemination of content at given stages of the archaeological research process (Bonacchi and Moshenska 2015.

  12. Cost Model for Digital Preservation: Cost of Digital Migration

    Directory of Open Access Journals (Sweden)

    Ulla Bøgvad Kejser

    2011-03-01

    Full Text Available The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS Reference Model. Within this framework, which we denote the Cost Model for Digital Preservation (CMDP, the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been supplemented with findings from the literature, and our own knowledge and experience. The identified cost-critical activities have subsequently been deconstructed into measurable components, cost dependencies have been examined, and the resulting equations expressed in a spreadsheet. Currently the model can calculate the cost of different migration scenarios for a series of preservation formats for text, images, sound, video, geodata, and spreadsheets. In order to verify the model it has been tested on cost data from two different migration projects at the Danish National Archives (DNA. The study found that the OAIS model provides a sound overall framework for the cost breakdown, but that some functions need additional detailing in order to cost activities accurately. Running the two sets of empirical data showed among other things that the model underestimates the cost of manpower-intensive migration projects, while it reinstates an often underestimated cost, which is the cost of developing migration software. The model has proven useful for estimating the

  13. Black Feminist Hip-Hop Rhetorics and the Digital Public Sphere

    Science.gov (United States)

    Duthely, Regina

    2017-01-01

    Digital public discourse spaces like Twitter and blogs like The Crunk Feminist Collective allow for Black voices not only to be inserted in the mainstream media, but to transform those media to focus on their needs from their perspective. These digital counterdiscourses challenge the traditional boundaries between the academy and the community,…

  14. Rhizomatic, digital habitat

    DEFF Research Database (Denmark)

    Kjærgaard, Thomas; Sorensen, Elsebeth Korsgaard

    2014-01-01

    are social in a connected rhizomatic network then information sharing, knowledge production and technology embody a strong synergetic entity. The study suggests that technologies used to create ’digital habitats’ are likely to enhance learning and motivation and allow new creative ways of working......’Homo conexus’ is used as a metaphor for the alleged next evolution of homo sapiens, an evolution that prepares us for knowledge production in the technology rich ‘network society’. This paper describes an experiment with network learning utilizing collaborative web technologies in a cooperative...... learning environment in college education. The pedagogic design focuses on the individual learner’s role in the group and on the group as a part of a larger digital, learning cooperative. The authors use the notion of the rhizome as a metaphor for learning in ’the postmodern state’ of information sharing...

  15. Observações sobre o circuito de arte digital no Brasil

    Directory of Open Access Journals (Sweden)

    Gasparetto, Débora Aita

    2015-10-01

    Full Text Available In 2014, O Curto-Circuito da Arte Digital no Brasil [The Short Circuit of Digital Art in Brazil] mapped the spaces for production, distribution, consumption and preservation of digital art in the country. The current text is a selection of that mapping, focusing on artists working at the interface of art-science-technology in projects that involve computability, interactivity, virtuality, immersion and "real time" in research processes related to biotechnology, nanotechnology, physics, computer science, mathematics, engineering, mechanics, robotics, among other areas, interfaced by digital media.

  16. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  17. DigiNotar: Dissecting the First Dutch Digital Disaster

    Directory of Open Access Journals (Sweden)

    Nicole S. van der Meulen

    2013-01-01

    Full Text Available In the middle of the night on September 2, 2011, the Dutch Minister of the Interior and Kingdom Relations held an emergency press conference. DigiNotar, a Certificate Authority (CA, had been electronically ‘broken into’ and as a result intruders had managed to generate falsified certificates. As a CA, DigiNotar issued digital certificates to secure digital communication, but as a result of the breach the authenticity of such certificates could no longer be verified. The Dutch government subsequently revoked its trust in all certificates issued by DigiNotar. This was the beginning of the first digital disaster in the Netherlands. As a pioneering disaster, this article focuses on the implications of DigiNotar as a vital case study for future scenarios of digital disaster management. The main focus of this article is on the underlying ‘weaknesses’ of the DigiNotar incident, which allowed the situation to evolve from a problem into a disaster. These include lack of oversight, lack of security attention and risk awareness and the absence of an effective mitigation strategy. By identifying and subsequently analyzing the underlying problems, this article aims to demonstrate how future situations can be better contained if sufficient attention is granted to these factors and subsequent changes are introduced.

  18. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  19. The Hadia story: digital storytelling in election campaigns

    OpenAIRE

    Bakøy, Eva; Kalnes, Øyvind

    2010-01-01

    Digital storytelling in election campaigns is a relatively recent phenomenon, which needs to be investigated in order to enhance our understanding of changes and developments in modern political communication. This article is an analysis of how the Norwegian-Pakistani Labour politician, Hadia Tajik, has used digital storytelling to construct her political identity, and a discussion of the consequences of her experiments with this genre. The focus is on the five video stories she released duri...

  20. Developments in Publishing: The Potential of Digital Publishing

    OpenAIRE

    X. Tian

    2007-01-01

    This research aims to identify issues associated with the impact of digital technology on the publishing industry with a specific focus on aspects of the sustainability of existing business models in Australia. Based on the case studies, interviews and Australian-wide online surveys, the research presents a review of the traditional business models in book publishing for investigating their effectiveness in a digital environment. It speculates on how and what should be considered for construc...

  1. Tribodynamic Modeling of Digital Fluid Power Motors

    DEFF Research Database (Denmark)

    Johansen, Per

    . In fluid power motoring and pumping units, a significant problem is that loss mechanisms do not scale down with diminishing power throughput. Although machines can reach peak efficiencies above 95%, the actual efficiency during operation, which includes part-load situations, is much lower. The invention...... of digital fluid power displacement units has been able to address this problem. The main idea of the digital fluid power displacement technology is to disable individual chambers, by use of electrical actuated valves. A displacement chamber is disabled by keeping the valve, between the chamber and the low...... design methods and tools are important to the development of digital fluid power machines. The work presented in this dissertation is part of a research program focusing on the development of digital fluid power MW-motors for use in hydraulic drive train in wind turbines. As part of this development...

  2. Measuring Digital Signage ROI : A combination of Digital Signage and Mobile Advertising as a method for measuring Digtal Signage ROI

    OpenAIRE

    Helander, Fredrik

    2010-01-01

    Marketing has changed a lot the past decade. New modern marketing channels have been developed and marketing have become more effective. This has affected the expectations advertisers have on advertising channels. One thing advertisers increasingly expect is to be able to efficiently measure the result of advertising, the ROI. A method for measuring ROI of digital signage is in focus in this study. The measurement is enabled by a combination of digital signage and mobile advertising. First a ...

  3. Panorama 2018 - Digital transformation in the oil and gas industry

    International Nuclear Information System (INIS)

    Martinez-Mere, Adrien; Castagna, Franck

    2018-01-01

    The arrival of digital and related technologies has impacted a number of industries during the past decade. By investing in them one by one, key players in the on-line and digital sectors - led by Google, Apple, Facebook and Amazon - have raised awareness among historical players of potential growth tied to the digital transformation of their activities, along with the risk that their core businesses will face threats. The energy sector is no exception to this trend. Following an earlier note which discussed the involvement of key players in the on-line and digital industry in the energy sector, this second note focuses on the action - and reaction - to digital technology by players within the energy sector, particularly oil and gas companies. (authors)

  4. Panorama 2017 - Digital transformation in the oil and gas industry

    International Nuclear Information System (INIS)

    Martinez-Mere, Adrien; Castagna, Franck

    2017-07-01

    The arrival of digital and related technologies has impacted a number of industries during the past decade. By investing in them one by one, key players in the on-line and digital sectors - led by Google, Apple, Facebook and Amazon - have raised awareness among historical players of potential growth tied to the digital transformation of their activities, along with the risk that their core businesses will face threats. The energy sector is no exception to this trend. Following an earlier note which discussed the involvement of key players in the on-line and digital industry in the energy sector, this second note focuses on the action - and reaction - to digital technology by players within the energy sector, particularly oil and gas companies

  5. Darnton's paradigm. Reflections on the social role of digital library

    Directory of Open Access Journals (Sweden)

    Andrea Capaccioni

    2015-01-01

    Full Text Available The interest in digital libraries began in the early nineties of the last century, particularly in the United States. At first the argument involved a few computer scientists and some librarian. However, after the first terminological uncertainties ("electronic" library, "virtual" library, etc., digital libraries have become an object of interdisciplinary study and today constitute a research field of LIS. Over the years there has been an evolution of topics and approaches. The earlier prevailing interest was in the management and technological aspects of digital libraries and then emerged the need to rediscover the role of digital libraries in society. This paper focuses in particular on the most recent international debate on the social value of the digital library.

  6. Storm Clouds on the Digital Education Horizon.

    Science.gov (United States)

    Reeves, Thomas C.

    2003-01-01

    Focuses on five unresolved challenges of digital education in higher education: faculty workload, continued dominance of traditional pedagogy, the state of assessment, flaws in the accreditation process, and the state of educational research in the area. (EV)

  7. Digital pathology for the primary diagnosis of breast histopathological specimens: an innovative validation and concordance study on digital pathology validation and training.

    Science.gov (United States)

    Williams, Bethany Jill; Hanby, Andrew; Millican-Slater, Rebecca; Nijhawan, Anju; Verghese, Eldo; Treanor, Darren

    2018-03-01

    To train and individually validate a group of breast pathologists in specialty-specific digital primary diagnosis by using a novel protocol endorsed by the Royal College of Pathologists' new guideline for digital pathology. The protocol allows early exposure to live digital reporting, in a risk-mitigated environment, and focuses on patient safety and professional development. Three specialty breast pathologists completed training in the use of a digital microscopy system, and were exposed to a training set of 20 challenging cases, designed to help them identify personal digital diagnostic pitfalls. Following this, the three pathologists viewed a total of 694 live, entire breast cases. All primary diagnoses were made on digital slides, with immediate glass slide review and reconciliation before final case sign-out. There was complete clinical concordance between the glass and digital impression of the case in 98.8% of cases. Only 1.2% of cases had a clinically significant difference in diagnosis/prognosis on glass and digital slide reads. All pathologists elected to continue using the digital microscope as the standard for breast histopathology specimens, with deferral to glass for a limited number of clinical/histological scenarios as a safety net. Individual training and validation for digital primary diagnosis allows pathologists to develop competence and confidence in their digital diagnostic skills, and aids safe and responsible transition from the light microscope to the digital microscope. © 2017 John Wiley & Sons Ltd.

  8. Digital Labour in Chinese Internet Industries

    Directory of Open Access Journals (Sweden)

    Bingqing Xia

    2014-09-01

    Full Text Available Digital labour has been the subject of considerable research in recent years (Van Dijck 2009, Manzerolle 2010, Dyer-Witheford 2010. But relatively little research has considered professional workers in digital media. This research addresses this gap by focusing on professional workers in the Chinese Internet industries. This paper asks: How are these digital labourers involved in the digital media production? To what extent should we criticise this involvement? Based on detailed empirical research in China, I argue that the rapid growth of the Internet industries depends on exploiting these Internet workers, such as the workers in Chinese Internet industries—the new ‘sweatshop’ of the digital era. Chinese Internet workers have been subsumed in the global capitalist system as the new ‘sweatshop workers’. This paper shows that Chinese Internet workers suffer very poor working conditions, and argues that these working conditions are the result of exploitation, a concept explored via using Eric Olin Wright’s schema. This paper also argues that most of the Chinese Internet workers are in the lower middle-class class position, in which they are exploited by the upper classes. Their working conditions have seriously deteriorated and they are victims of inequality and injustice—although they also are able to exercise agency and resistance. This paper therefore calls urgent attention to the working conditions of these digital labourers.

  9. An Investigation of Digital Payment Platform Designs

    DEFF Research Database (Denmark)

    Kazan, Erol; Damsgaard, Jan

    2014-01-01

    This paper focuses on the triumph march of mobile phones that currently are annexing music players, navigation devices, and cameras as separate physical objects. The next target is set on payment. Through synthesizing available literature, we construct a framework for studying digital payment...... platforms that combines platform, technology and business design aspects. The framework is applied to conduct a comparative case study of digital payment platforms. Four types of market actors are considered: banks, mobile network operators, merchants, and startups, which are incumbents and disrupters....... By hosting third-party services, payment instruments are evolving from single-purpose to multi-functional ones. Our research extends existing payment literature from the MSP perspective to emphasize certain digital payment platform components, which impact strategies and complementary products....

  10. Reading in a Digital Age

    Science.gov (United States)

    Baron, Naomi S.

    2017-01-01

    The many advantages of reading digitally also bring with them implications for how we learn differently when we read differently. The author suggests that new contemporary technologies are changing the very notion of what it means to read. Even millennials acknowledge that their attention is more focused when they read print rather than online.…

  11. Stop Calling It "Digital Humanities"

    Science.gov (United States)

    Pannapacker, William

    2013-01-01

    A persistent criticism of the digital-humanities movement is that it is elitist and exclusive because it requires the resources of a major university (faculty, infrastructure, money), and is thus more suited to campuses with a research focus. Academics and administrators at small liberal-arts colleges may read about DH and, however exciting it…

  12. 1st international conference on digital enterprise design and management

    CERN Document Server

    Krob, Daniel; Rowe, Frantz

    2013-01-01

    This book contains all refereed papers that were accepted to the first edition of the « Digital Enterprise Design & Management » (DED&M 2013) international conference that took place in Paris (France) from February 12 to February 13, 2013. (Website: http://www.dedm2013.dedm.fr/) These proceedings cover the most recent trends in the emerging field of Digital Enterprise, both from an academic and a professional perspective. A special focus is put on digital uses, digital strategies, digital infrastructures and digital governance from an Enterprise Architecture point of view. The DED&M 2013 conference is organized under the guidance of the CESAMES non profit organization (http://www.cesames.net/). and benefits from the support of the "Innovation and Regulation of Digital Services" Chair (Orange, Ecole Polytechnique and Telecom ParisTech) and of the "Complex Systems Engineering" Chair (Dassault Aviation - DCNS - DGA - Thales - Ecole Polytechnique - ENSTA ParisTech – Telecom ParisTech).

  13. Collaborative Digital Games as Mediation Tool to Foster Intercultural Integration in Primary Dutch Schools

    NARCIS (Netherlands)

    de la Hera Conde-Pumpido, T.|info:eu-repo/dai/nl/331869063; Paz Aléncar, Amanda

    2015-01-01

    The use of digital games has found to be an effective tool to reinforce teaching/learning practices. Several studies have already shown the benefits of the use of digital games in educational contexts. However, most of these studies are focused on how digital games can be used as a mediation tool in

  14. Web Resources and Tools for Slovenian with a Focus on the Slovenian-English Language Infrastructure: Dictionaries in the Digital Age

    Directory of Open Access Journals (Sweden)

    Mojca Šorli

    2017-12-01

    Full Text Available The article begins with a presentation of a selection of electronic monolingual and bi/multilingual lexicographic resources and corpora available today to contemporary users of Slovene. The focus is on works combined with English and designed for translation purposes which provide information on the meaning of words and wider lexical units, i.e., e-dictionaries, lexical databases, web translation tools and various corpora. In a separate sub-section the most common translation technologies are presented, together with an evaluation of their role in the modern translation process. Sections 2 and 3 provide a brief outline of the changes that have affected classical dictionary planning, compilation and use in the new digital environment, as well as of the relationship between dictionaries and related resources, such as lexical databases. Some stereotypes regarding dictionary use are identified and, in conclusion, the existing corpus-based databases for the Slovenian-English pair are presented, with a view to determining priorities for the future interlingual infrastructure action plans in Slovenia.

  15. Insights of School Head About Marketing Education Services Through Digital Media

    OpenAIRE

    Samer Iqbal

    2016-01-01

    This study mainly focuses on the insights of a private school’s head pertaining to the use of digital media in educational marketing. The qualitative research paradigm was chosen for this study and in depth phenomenological interview was conducted from a head of a private school. Two themes were extracted from the data: Marketing educational services through digital media and its challenges, and digital media tool for marketing education services. The study revealed that the school head perce...

  16. Digital Innovations: Startup Marketing Strategy for Global Growth

    OpenAIRE

    Gröhn, Hanna

    2017-01-01

    This thesis discusses the relatively new phenomena of innovative digital products created by startup companies, who often must scale globally fast, before the volatile trends or the fierce competition of the digital marketspace take over. International entry itself is no longer the issue, but rather standing out in the crowd while balancing resources and flexibility. The focus is on how startups can induce global growth and tackle structural obstacles by means of marketing strategy. The t...

  17. Design Optimization of Moving Magnet Actuated Valves for Digital Displacement Machines

    DEFF Research Database (Denmark)

    Madsen, Esben Lundø; Jørgensen, Janus Martin Thastum; Nørgård, Christian

    2017-01-01

    High-efficiency hydraulic machines using digital valves are presently a topic of great focus. Digital valve performance with respect to pressure loss, closing time as well as electrical power consumption, is key to obtaining high efficiency. A recent digital seat valve design developed at Aalborg...... optimized design closes in 2.1 ms, has a pressure drop of 0.8 bar at 150 l/min and yields a digital displacement machine average chamber efficiency of 98.9%. The design is simple in construction and uses a single coil, positioned outside the pressure chamber, eliminating the need for an electrical interface...

  18. Establishing diagnostic reference levels in digital radiology

    International Nuclear Information System (INIS)

    Bana, Remy Wilson

    2016-04-01

    Medical application of radiation has gained wider study since diagnostic radiology plays a very important role in modern medicine. The need of the service seems to increase since the invention of digital radiology as a new technology that promises greater accuracy while minimizing patient dose. However, it is not exempted in the harmonization of doses delivered to the patient undergoing same radiologic examination in different institutions either regional or nationwide. The objective of this project was to review the establishment of Diagnostic Reference Levels (DRLs) in digital radiology at National level with the aim to reduce patient dose while maintaining appropriate image quality. A general discussion on digital radiology has been presented focusing on the optimization of patient dose as well as dosimetric quantities used for the establishment of DRLs. Recommendations have been provided for Rwanda to initiate steps to establish National Diagnostic Reference Levels for common procedures in digital radiology. (au)

  19. PERSEPSI GURU TENTANG DIGITAL NATIVES, SUMBER BELAJAR DIGITAL DAN MOTIVASI MEMANFAATKAN SUMBER BELAJAR DIGITAL

    Directory of Open Access Journals (Sweden)

    Ferdinandus Bate Dopo

    2016-06-01

    TEACHER’S PERCEPTION OF DIGITAL NATIVES, DIGITAL LEARNING RESOURCES AND MOTIVATION TO UTILIZE DIGITAL LEARNING RESOURCES Abstract This study aims to reveal (1 the influence of teacher's perception of digital natives toward teacher’s motivation to utilize digital learning resources. (2 the influence of teacher's perception of digital learning resources toward teacher’s motivation to utilize digital learning resources and (3 the influence both of teacher's perception of digital natives and digital learning resources toward teacher’s motivation to utilize digital learning resources. This study used the descriptive-correlational quantitative approach. The Population and sample were high school teachers of Regina Pacis Bajawa, SMA Seminari Mataloko and SMA Negeri 1 Golewa. Sampling technique in this research was proportional random sampling. A questionnaire was used to obtain the data. The data were analyzed using the Likert scale. The instrument was developed based on lattice theory of assessment instruments relevant to the study variables. The analysis technique used is a regression followed by statistic technique of t test and F test with the significance level of 0.05. The results are as follows. (1 There is a positive and significant influence of teacher's perception of digital natives toward teacher’s motivation to utilize digital learning resources. (2 There is a positive and significant influence of teacher's perception of digital learning resources and teacher’s motivation to utilize digital learning resources. (3 There is a positive and significant influence both of teacher's perception of digital learning resources and teacher’s motivation to utilize digital learning resources. Keywords: perception, digital natives, digital learning resources, motivation

  20. Interactive digital narrative history, theory and practice

    CERN Document Server

    Koenitz, Hartmut; Haahr, Mads; Sezen, Digdem; Sezen, Tonguç Ibrahim

    2015-01-01

    The book is concerned with narrative in digital media that changes according to user input-Interactive Digital Narrative (IDN). It provides a broad overview of current issues and future directions in this multi-disciplinary field that includes humanities-based and computational perspectives. It assembles the voices of leading researchers and practitioners like Janet Murray, Marie-Laure Ryan, Scott Rettberg and Martin Rieser. In three sections, it covers history, theoretical perspectives and varieties of practice including narrative game design, with a special focus on changes in the power rela

  1. Young Boys Playing Digital Games. From Console to the Playground.

    OpenAIRE

    Pål Aarsand

    2010-01-01

    This article studies how digital games are part of the everyday lives of Swedish 6 to 7-year-old boys. The data consist of video recordings from two schools, two after-school centres and four homes. The focus is on how children engage in, organize and use digital games in face-to-face interaction. It is argued that digital game competence matters not only in front of the screen, but also in the playground. In addition, it is argued that what counts as game competence is negotiated in the peer...

  2. The Necessity of Real-Time: Fact and Fiction in Digital Reference Systems.

    Science.gov (United States)

    Lankes, R. David; Shostack, Pauline

    2002-01-01

    Discussion of digital reference services and the use of real-time versus asynchronous services such as email focuses on data from the AskERIC digital reference service to demonstrate that asynchronous services are not only useful but may have greater utility than real-time systems. (Author/LRW)

  3. Digital Photography--a Question of Ethics.

    Science.gov (United States)

    Meltzer, Bonnie

    1996-01-01

    Discusses reasons for computer manipulation of photographs and the need to educate students about the ethics involving digital scanning. Focuses on ownership, copyrights, reasons for changing a photograph, reader-interpretation, and the context in which the photograph is used. Suggests a photo illustration project to teach students about these…

  4. Older adults and the emerging digital service delivery

    DEFF Research Database (Denmark)

    Siren, Anu; Knudsen, Sine Grønborg

    2017-01-01

    Based on data from a survey (n = 3291) and 14 qualitative interviews among Danish older adults, this study investigated the use of, and attitudes toward, information communications technology (ICT) and the digital delivery of public services. While age, gender, and socioeconomic status were...... associated with use of ICT, these determinants lost their explanatory power when we controlled for attitudes and experiences. We identified three segments that differed in their use of ICT and attitudes toward digital service delivery. As nonuse of ICT often results from the lack of willingness to use...... it rather than from material or cognitive deficiencies, policy measures for bridging the digital divide should focus on skills and confidence rather than on access or ability....

  5. Photojournalink : desenvolupament d'un mitjà de comunicació digital especialitzat en fotoperiodisme

    OpenAIRE

    Artola Riera, Pol

    2016-01-01

    El projecte en qüestió pretén estudiar com desenvolupar una plataforma digital de curació de continguts especialitzada en fotoperiodisme. El proyecto en cuestión pretende estudiar cómo desarrollar una plataforma digital de curación de contenidos especializada en fotoperiodismo. This project aims to study how to develop a digital content curation platform focused in photojournalism.

  6. Digital mapping in extreme and remote environments

    Science.gov (United States)

    Andersson, Joel; Bauer, Tobias; Sarlus, Zimer; Zainy, Maher; Brethes, Anais

    2017-04-01

    During the last few years, Luleå University of Technology has performed a series of research projects in remote areas with extreme climatic conditions using digital mapping technologies. The majority of past and ongoing research projects focus on the arctic regions of the Fennoscandian Shield and Greenland but also on the Zagros fold-and-thrust belt in northern Iraq. Currently, we use the Midland Valley application FieldMove on iPad mini devices with ruggedized casings. As all projects have a strong focus on geological field work, harsh climatic conditions are a challenge not only for the geologists but also for the digital mapping hardware. In the arctic regions especially cold temperatures affect battery lifetime and performance of the screens. But also high temperatures are restricting digital mapping. From experience, a typical temperature range where digital mapping, using iPad tablets, is possible lies between -20 and +40 degrees. Furthermore, the remote character of field areas complicates access but also availability of electricity. By a combination of robust solar chargers and ruggedized batteries we are able to work entirely autarkical. Additionally, we are currently installing a drone system that allows us to map outcrops normally inaccessible because of safety reasons or time deficiency. The produced data will subsequently be taken into our Virtual Reality studio for interpretation and processing. There we will be able to work also with high resolution DEM data from Lidar scanning allowing us to interpret structural features such as post-glacial faults in areas that are otherwise only accessible by helicopter. By combining digital field mapping with drone technique and a Virtual Reality studio we are able to work in hardly accessible areas, improve safety during field work and increase efficiency substantially.

  7. Poverty, Literacy, and Social Transformation: An Interdisciplinary Exploration of the Digital Divide

    Science.gov (United States)

    Bach, Amy J.; Wolfson, Todd; Crowell, Jessica K.

    2018-01-01

    Harnessing scholarship focused on literacy and poverty, in this article we aim to complicate the common understanding of the digital divide. First, we argue that the dominant literature on the digital divide misses broader connections between technological exclusion and broader forms of economic and social exclusion. Accordingly, and following…

  8. Enhanced digital library system that supports sustainable knowledge

    African Journals Online (AJOL)

    Enhanced digital library system that supports sustainable knowledge: A focus ... This research work provides a Web-Based University library, ability to access the ... and generates pins to authorize bonafide students and staff of the University.

  9. Exploring affordances in digital school environments

    DEFF Research Database (Denmark)

    Olesen, Mogens

    The paper presents a media ecological understanding of media education and reports from an empirical study on the use of digital media at Ørestad Gymnasium in Copenhagen. An ecological model for e-learning is formed which serves as a guide for understanding how digital media elicit a new...... educational environment. The model highlights four environmental aspects influenced by media: teachers, students, didactical methods and curriculum. Media ecology also implies studying media as species that are competing for our attention and usage. The paper uses this perspective to ask how the students...... choose between and combine different media in their learning activities. These questions are the focus of the empirical study....

  10. Analysing the role of ICT in bridging the digital divide amongst ...

    African Journals Online (AJOL)

    This digital divide can be seen as an educational divide and thus we examine how ICT is influencing education. We also investigate the nature of this digital divide while focusing on the local perspective. A short pilot study was done at four schools and one adult education centre in South Africa regarding their access to ICT.

  11. Old citizens, new logics: Digital literacy and elderly citizens in Denmark

    DEFF Research Database (Denmark)

    Stald, Gitte Bang

    2016-01-01

    and The Danage Association. Theoretically, the article discusses definitions of digital literacy respectively digital citizenship; and it draws on theories on mediatization, media ecologies, and digital governance. REFERENCES (selected) Borchorst, D.S. et al (2016). ”Digitalisering af ældre menneskers hverdag......Old citizens, new logics: Digital literacy and elderly citizens in Denmark Many my age have problems with IT. We are now reasonably informed and we have had computers for many years but our competences are still not tiptop and that is definitely a problem. This 79-year old man talks about...... the challenges he encounters with mastering IT in general and NemID in particular. NemID is the Danish, digital system for interaction between public institutions and citizens. The system was implemented by law in December 2015. The paper focuses on the relation between age, digitization, and citizen self...

  12. Significant Structuring Resources in the Reading Practices of a Digital Classroom

    Directory of Open Access Journals (Sweden)

    Annika Lantz-Andersson

    2016-06-01

    Full Text Available Since reading and writing digitally demand partially different competencies, there is a change in some of the premises of related educational practices. This study aims to contribute to the knowledge of educational reading practices by scrutinizing how literacy events evolve in a digital classroom where each student has a personal digital device (1:1, iPads in this study. Our study is grounded in sociocultural theories of learning and focuses on the structuring resources utilized by students, namely the notion of multiple ongoing activities and the ways in which specific resources take precedence in shaping these activities. One class of 13–14 year-old students was studied for a week across several subjects through video-recordings and observations. The findings imply that the students moved among vast array of reading practices. However, the main structuring resource is a strong focus on task-solving and the practice of schooling, which mainly builds on principles emanating from traditional text. It is only occasionally that structuring resources that also include the opportunities associated with digital technology are utilized. This indicates the importance of further studies on how educational practices could be organized to scaffold the basis of traditional reading comprehension as well as other approaches required in digital environments.

  13. New content in digital repositories the changing research landscape

    CERN Document Server

    Simons, Natasha

    2013-01-01

    Research institutions are under pressure to make their outputs more accessible in order to meet funding requirements and policy guidelines. Libraries have traditionally played an important role by exposing research output through a predominantly institution-based digital repository, with an emphasis on storing published works. New publishing paradigms are emerging that include research data, huge volumes of which are being generated globally. Repositories are the natural home for managing, storing and describing institutional research content. New Content in Digital Repositories explores the diversity of content types being stored in digital repositories with a focus on research data, creative works, and the interesting challenges they pose.

  14. Determinants of Internet skills, use and outcomes : A systematic review of the second- and third-level digital divide

    NARCIS (Netherlands)

    Scheerder, Anique; van Deursen, Alexander; van Dijk, Jan

    2017-01-01

    Recently, several digital divide scholars suggested that a shift is needed from a focus on binary Internet access (first-level digital divide) and Internet skills and use (second-level digital divide) to a third-level digital divide in which the tangible outcomes of Internet use are highlighted. A

  15. 2nd International Conference on Digital Enterprise Design and Management

    CERN Document Server

    Krob, Daniel; Lonjon, Antoine; Panetto, Hervé

    2014-01-01

    This book contains all refereed papers that were accepted to the second edition of the « Digital Enterprise Design & Management » (DED&M 2014) international conference that took place in Paris (France) from February 4 to February 5, 2014 . These proceedings cover the most recent trends in the emerging field of Digital Enterprise, both from an academic and a professional perspective. A special focus is put on digital uses, digital strategies, digital infrastructures and digital governance from an Enterprise Architecture point of view. The DED&M 2014 conference is organized under the guidance of the Center of Excellence on Systems Architecture, Management, Economy and Strategy  and benefits from the supports of both the Orange – Ecole Polytechnique – Télécom ParisTech “Innovation and Regulation” Chair and the Dassault Aviation – DCNS – DGA – Thales – Ecole Polytechnique – ENSTA ParisTech – Télécom ParisTech  “Complex Systems Engineering” Chair.  .

  16. Digital Natives or Digital Tribes?

    Science.gov (United States)

    Watson, Ian Robert

    2013-01-01

    This research builds upon the discourse surrounding digital natives. A literature review into the digital native phenomena was undertaken and found that researchers are beginning to identify the digital native as not one cohesive group but of individuals influenced by other factors. Primary research by means of questionnaire survey of technologies…

  17. A comparison of digital mammography detectors and emerging technology

    International Nuclear Information System (INIS)

    Diffey, J.L.

    2015-01-01

    The overall diagnostic accuracy of digital mammography in the context of screening has been shown to be similar or slightly better than screen-film mammography. However, digital mammography encompasses both Computed Radiography (CR) and integrated Digital Radiography (DR) and there is increasing evidence to suggest that differences in detector technology are associated with variations in cancer detection rate, dose and image quality. These differences are examined in detail. Although digital mammography offers many advantages compared to screen-film, there are still some limitations with its use as a screening tool and reduced cancer detection in dense breasts remains an issue. Digital mammography detectors have paved the way for emerging technologies which may offer improvements. Taking the definition of mammography to only include X-ray imaging of the breast, this article focuses on tomosynthesis, contrast-enhanced digital mammography, stereoscopic mammography and dedicated breast computed tomography. Advanced software applications such as Computed Aided Detection (CAD) and quantitative breast density assessment are also presented. The benefits and limitations of each technique are discussed. - Highlights: • Digital detector technology affects cancer detection rate, dose and image quality. • Digital detectors have facilitated new technologies such as tomosynthesis. • 3-D techniques reduce superimposition and increase cancer detection in dense breasts. • Contrast-enhanced mammography demonstrates improved sensitivity and specificity.

  18. REVIEW OF NRC APPROVED DIGITAL CONTROL SYSTEMS ANALYSIS

    International Nuclear Information System (INIS)

    Markman, D.W.

    1999-01-01

    systems approved for use in the nuclear power industry by the NRC. (3) Identify and discuss key design issues, features, benefits, and limitations of these NRC approved digital control systems that can be applied as design guidance and correlated to the Monitored Geologic Repository (MGR) design requirements. (4) Identify codes and standards used in the design of these NRC approved digital control systems and discuss their possible applicability to the design of a subsurface nuclear waste repository. (5) Evaluate the NRC approved digital control system's safety, reliability and maintainability features and issues. Apply these to MGR design methodologies and requirements. (6) Provide recommendations for use in developing design criteria in the System Description Documents for the digital control systems of the subsurface nuclear waste repository at Yucca Mountain. (7) Develop recommendations for applying NRC approval methods for digital control systems for the subsurface nuclear waste repository at Yucca Mountain. This analysis will focus on the development of the issues, criteria and methods used and required for identifying the appropriate requirements for digital based control systems. Attention will be placed on development of recommended design criteria for digital controls including interpretation of codes, standards and regulations. Attention will also focus on the use of digital controls and COTS (Commercial Off-the-shelf) technology and equipment in selected NRC approved digital control systems, and as referenced in applicable codes, standards and regulations. The analysis will address design issues related to COTS technology and how they were dealt with in previous NRC approved digital control systems

  19. Digital optical computer II

    Science.gov (United States)

    Guilfoyle, Peter S.; Stone, Richard V.

    1991-12-01

    OptiComp is currently completing a 32-bit, fully programmable digital optical computer (DOC II) that is designed to operate in a UNIX environment running RISC microcode. OptiComp's DOC II architecture is focused toward parallel microcode implementation where data is input in a dual rail format. By exploiting the physical principals inherent to optics (speed and low power consumption), an architectural balance of optical interconnects and software code efficiency can be achieved including high fan-in and fan-out. OptiComp's DOC II program is jointly sponsored by the Office of Naval Research (ONR), the Strategic Defense Initiative Office (SDIO), NASA space station group and Rome Laboratory (USAF). This paper not only describes the motivational basis behind DOC II but also provides an optical overview and architectural summary of the device that allows the emulation of any digital instruction set.

  20. [Application of three-dimensional digital technology in the diagnosis and treatment planning in orthodontics].

    Science.gov (United States)

    Bai, Y X

    2016-06-01

    Three-dimensional(3D)digital technology has been widely used in the field of orthodontics in clinical examination, diagnosis, treatment and curative effect evaluation. 3D digital technology greatly improves the accuracy of diagnosis and treatment, and provides effective means for personalized orthodontic treatment. This review focuses on the application of 3D digital technology in the field of orthodontics.

  1. [Strength and weaknesses of the German digital health economy].

    Science.gov (United States)

    Leppert, Florian; Gerlach, Jan; Ostwald, Dennis A; Greiner, Wolfgang

    2017-07-26

    There are high expectations from digitalization of health care, ehealth and telemedicine. Nevertheless, the diffusion of these services falls short of expectations. This study analyses the strength and weaknesses of the German digital health economy. Thereby, we specially focus on small and medium-sized enterprises (SME). The study is based on a literature review, interviews of experts and a workshop. The digital health economy is influenced by a heterogeneous environment with both promotive and obstructive factors. One of the largest weaknesses results from a lack of business models. There is a lack of possibilities of reimbursement by the Statutory Health Insurance (SHI). In addition, private users only have a small willingness to pay for digital services. The large number of regulations makes the implementation even harder, especially for SMEs. Thus, the current environment hampers fast diffusion of digital services in the German health care market. © Georg Thieme Verlag KG Stuttgart · New York.

  2. Optimization of Moving Coil Actuators for Digital Displacement Machines

    DEFF Research Database (Denmark)

    Nørgård, Christian; Bech, Michael Møller; Roemer, Daniel Beck

    2016-01-01

    This paper focuses on deriving an optimal moving coil actuator design, used as force pro-ducing element in hydraulic on/off valves for Digital Displacement machines. Different moving coil actuator geometry topologies (permanent magnet placement and magnetiza-tion direction) are optimized for actu......This paper focuses on deriving an optimal moving coil actuator design, used as force pro-ducing element in hydraulic on/off valves for Digital Displacement machines. Different moving coil actuator geometry topologies (permanent magnet placement and magnetiza-tion direction) are optimized...... for actuating annular seat valves in a digital displacement machine. The optimization objectives are to the minimize the actuator power, the valve flow losses and the height of the actuator. Evaluation of the objective function involves static finite element simulation and simulation of an entire operation...... designs requires approximately 20 W on average and may be realized in 20 mm × Ø 22.5 mm (height × diameter) for a 20 kW pressure chamber. The optimization is carried out using the multi-objective Generalized Differential Evolu-tion optimization algorithm GDE3 which successfully handles constrained multi-objective...

  3. How to increase reach efficiency and effectiveness of Meo's digital marketing campaigns

    OpenAIRE

    Braga, Carolina

    2016-01-01

    Field lab: Business project This document is based on a master’s thesis work project conducted by Nova SBE students to help the leading Portuguese telecom provider MEO increase its digital campaign’s attractiveness and to take better advantage of the new online trends. Recommendations are given based on primary research in the form of a focus group and a survey questionnaire launched online. Subjects such as digital marketing channels, high-impact digital advertisement formats, campaign co...

  4. High Res at High Speed: Automated Delivery of High-Resolution Images from Digital Library Collections

    Science.gov (United States)

    Westbrook, R. Niccole; Watkins, Sean

    2012-01-01

    As primary source materials in the library are digitized and made available online, the focus of related library services is shifting to include new and innovative methods of digital delivery via social media, digital storytelling, and community-based and consortial image repositories. Most images on the Web are not of sufficient quality for most…

  5. MAS2-8 radar and digital control unit

    Science.gov (United States)

    Oberg, J. M.; Ulaby, F. T.

    1974-01-01

    The design of the MAS 2-8 (2 to 8 GHz microwave-active spectrometer), a ground-based sensor system, is presented. A major modification in 1974 to the MAS 2-8, that of a control subsystem to automate the data-taking operation, is the prime focus. The digital control unit automatically changes all system parameters except FM rate and records the return signal on paper tape. The overall system operation and a detailed discussion of the design and operation of the digital control unit are presented.

  6. Emerging Collaborative Writing Strategies in Digital Environments

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm; Levinsen, Karin Ellen Tweddell

    2015-01-01

    This paper focuses on students’ collaborative writing processes, with technology as a non-human actor. The paper is based on an ongoing research project, Students’ digital production and students as learning designers (2013–2015), fundedby the Danish Ministry of Education. The project concerns...

  7. Digital platforms as enablers for digital transformation

    DEFF Research Database (Denmark)

    Hossain, Mokter; Lassen, Astrid Heidemann

    transformation is crucial. This study aims at exploring how organizations are driven towards transformation in various ways to embrace digital platforms for ideas, technologies, and knowledge. It shows the opportunities and challenges digital platforms bring in organizations. It also highlights underlying......Digital platforms offer new ways for organizations to collaborate with the external environment for ideas, technologies, and knowledge. They provide new possibilities and competence but they also bring new challenges for organizations. Understanding the role of these platforms in digital...... mechanisms and potential outcomes of various digital platforms. The contribution of the submission is valuable for scholars to understand and further explore this area. It provides insight for practitioners to capture value through digital platforms and accelerate the pace of organizations’ digital...

  8. Migration of Older to New Digital Control Systems in Nuclear Power Plant Main Control Rooms

    Energy Technology Data Exchange (ETDEWEB)

    Kovesdi, Casey Robert [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey Clark [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-04-01

    The United States (U.S.) Department of Energy (DOE) Office of Nuclear Energy (NE) has the primary mission to advance nuclear power by resolving socio-technical issues through research and development (R&D). One DOE-NE activity supporting this mission is the Light Water Reactor Sustainability (LWRS) program. LWRS has the overall objective to sustain the operation of existing commercial nuclear power plants (NPPs) through conducting R&D across multiple “pathways,” or R&D focus areas. The Advanced Instrumentation, Information, and Control (II&C) Systems Technologies pathway conducts targeted R&D to address aging and reliability concerns with the legacy instrumentation and control (I&C) and related information systems in operating U.S. NPPs. This work involves (1) ensuring that legacy analog II&C systems are not life-limiting issues for the LWR fleet, and (2) implementing digital II&C technology in a manner that enables broad innovation and business improvement in the NPP operating model. Under the LWRS Advanced II&C pathway, Human Factors experts at Idaho National Laboratory (INL) have been conducting R&D in support of NPP main control room (MCR) modernization activities. Work in prior years has focused on migrating analog I&C systems to new digital I&C systems (). In fiscal year 2016 (FY16), one new focus area for this research is migrating older digital I&C systems to new and advanced digital I&C systems. This report summarizes a plan for conducting a digital-to-digital migration of a legacy digital I&C system to a new digital I&C system in support of control room modernization activities.

  9. Migration of Older to New Digital Control Systems in Nuclear Power Plant Main Control Rooms

    International Nuclear Information System (INIS)

    Kovesdi, Casey Robert; Joe, Jeffrey Clark

    2016-01-01

    The United States (U.S.) Department of Energy (DOE) Office of Nuclear Energy (NE) has the primary mission to advance nuclear power by resolving socio-technical issues through research and development (R&D). One DOE-NE activity supporting this mission is the Light Water Reactor Sustainability (LWRS) program. LWRS has the overall objective to sustain the operation of existing commercial nuclear power plants (NPPs) through conducting R&D across multiple ''pathways,'' or R&D focus areas. The Advanced Instrumentation, Information, and Control (II&C) Systems Technologies pathway conducts targeted R&D to address aging and reliability concerns with the legacy instrumentation and control (I&C) and related information systems in operating U.S. NPPs. This work involves (1) ensuring that legacy analog II&C systems are not life-limiting issues for the LWR fleet, and (2) implementing digital II&C technology in a manner that enables broad innovation and business improvement in the NPP operating model. Under the LWRS Advanced II&C pathway, Human Factors experts at Idaho National Laboratory (INL) have been conducting R&D in support of NPP main control room (MCR) modernization activities. Work in prior years has focused on migrating analog I&C systems to new digital I&C systems (). In fiscal year 2016 (FY16), one new focus area for this research is migrating older digital I&C systems to new and advanced digital I&C systems. This report summarizes a plan for conducting a digital-to-digital migration of a legacy digital I&C system to a new digital I&C system in support of control room modernization activities.

  10. Digital citizens Digital nations: the next agenda

    NARCIS (Netherlands)

    A.W. (Bert) Mulder; M.W. (Martijn) Hartog

    2015-01-01

    DIGITAL CITIZENS CREATE A DIGITAL NATION Citizens will play the lead role as they – in the next phase of the information society – collectively create a digital nation. Personal adoption of information and communication technology will create a digital infrastructure that supports individual and

  11. Stego Keys Performance on Feature Based Coding Method in Text Domain

    Directory of Open Access Journals (Sweden)

    Din Roshidi

    2017-01-01

    Full Text Available A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods.

  12. Digital Geometry Algorithms Theoretical Foundations and Applications to Computational Imaging

    CERN Document Server

    Barneva, Reneta

    2012-01-01

    Digital geometry emerged as an independent discipline in the second half of the last century. It deals with geometric properties of digital objects and is developed with the unambiguous goal to provide rigorous theoretical foundations for devising new advanced approaches and algorithms for various problems of visual computing. Different aspects of digital geometry have been addressed in the literature. This book is the first one that explicitly focuses on the presentation of the most important digital geometry algorithms. Each chapter provides a brief survey on a major research area related to the general volume theme, description and analysis of related fundamental algorithms, as well as new original contributions by the authors. Every chapter contains a section in which interesting open problems are addressed.

  13. Reinventing a health sciences digital library--organizational impact.

    Science.gov (United States)

    Moore, Margaret E; Garrison, Scott; Hayes, Barrie; McLendon, Wallace

    2003-01-01

    What is the organizational impact of becoming a digital library, as well as a physical entity with facilities and collections? Is the digital library an add-on or an integrated component of the overall library package? Librarians see sweeping environmental and technological changes. The staff members feel exhilarated and challenged by the pressures to adapt quickly and effectively. Librarians recognize that a Web presence, like other technology components, must be continuously enhanced and regularly re-engineered. The Health Sciences Library, University of North Carolina at Chapel Hill, is reinventing its digital presence to better meet the needs of the community. This paper provides a case study focusing on major changes in planning processes, organizational structure, staffing, budgeting, training, communications, and operations at the Health Sciences Library.

  14. Towards A Framework of Digital Payment Platform Design

    DEFF Research Database (Denmark)

    Kazan, Erol; Damsgaard, Jan

    This paper focuses on the triumph march of mobile phones that currently are annexing music players, navigation devices, and cameras as separate physical objects. The next target is set on payment. Through synthesizing available literature, we construct a framework for studying digital payment...... platforms that combines platform, technology and business design aspects. The framework is applied to conduct a comparative case study of digital payment platforms. Four types of market actors are considered: banks, mobile network operators, merchants, and startups, which are incumbents and disrupters....... By hosting third-party services, payment instruments are evolving from single-purpose to multi-functional ones. Our research extends existing payment literature from the MSP perspective to emphasize certain digital payment platform components, which impact strategies and complementary products....

  15. A systematic review and meta-analysis of teachers’ development of digital literacy

    DEFF Research Database (Denmark)

    Khalid, Md. Saifuddin; Slættalíð, Tóri; Parveen, Mahmuda

    2015-01-01

    Teachers’ development of digital literacy (DL) is gaining importance with the increase in the integration and adoption of information and communication technologies in educational contexts. The focus has been predominantly on students and not much on teachers, who require greater attention due...... to rapid transformation of both school systems and digital systems’ applications. The goal of this systematic literature review is to draw attention of researchers, policy-makers, and practitioners associated with education systems for considering ‘digital literacy for the professional development...... for the qualitative analysis. This paper reports on three main categories: (a) definition of digital literacy, (b) development of digital literacy of pre-service and in-service teachers and (c) models for the development and evaluation of digital literacy. The general definitions of DL include the elements...

  16. Digital Social Network Mining for Topic Discovery

    Science.gov (United States)

    Moradianzadeh, Pooya; Mohi, Maryam; Sadighi Moshkenani, Mohsen

    Networked computers are expanding more and more around the world, and digital social networks becoming of great importance for many people's work and leisure. This paper mainly focused on discovering the topic of exchanging information in digital social network. In brief, our method is to use a hierarchical dictionary of related topics and words that mapped to a graph. Then, with comparing the extracted keywords from the context of social network with graph nodes, probability of relation between context and desired topics will be computed. This model can be used in many applications such as advertising, viral marketing and high-risk group detection.

  17. Smart Healthcare Digitalization: Using ICT to Effectively Balance Exploration and Exploitation Within Hospitals

    Directory of Open Access Journals (Sweden)

    Luca Gastaldi

    2012-07-01

    Full Text Available Most of the literature on healthcare digitalization is focused on the benefits, the barriers and the determinants of the adoption of ICT‐based solutions within hospitals. Little is understood about how hospital digitalization can be accomplished or how this digitalization fosters an increase in hospital performance — both in terms of quality improvement and cost rationalization — by ambidextrously combining the exploration and exploitation of hospital assets. This paper sheds a preliminary light on the topic, identifying a set of action‐oriented propositions for smart healthcare digitalization within hospitals.

  18. The digital divide among young people in Brussels: Social and cultural influences on ownership and use of digital technologies

    NARCIS (Netherlands)

    Mertens, S.; d'Haenens, L.S.J.

    2010-01-01

    This article reports on a survey of youth in Brussels (N = 1,005) and their ownership and use of digital technologies, focusing specifically on the social and cultural diversity within this group. Socio-cultural diversity includes differences regarding ethnicity and gender, language and educational

  19. A Phenomenological Study: Teachers' Experiences of Using Digital Storytelling in Early Childhood Education

    Science.gov (United States)

    Yuksel-Arslan, Pelin; Yildirim, Soner; Robin, Bernard Ross

    2016-01-01

    This study investigates how early childhood education (ECE) teachers incorporated digital storytelling in their classrooms and the challenges and successes that they faced in the process. After the teachers attended a digital storytelling workshop, in-depth phenomenological interview, observation and focus group interviews were used to collect…

  20. Just Because It's Digital, Doesn't Mean It's Good: Evaluating Digital Picture Books

    Science.gov (United States)

    McGeehan, Catherine; Chambers, Sandra; Nowakowski, Jessica

    2018-01-01

    At the current time, the reviews of digital picture books are not based on the reading comprehension process or framed in the context of how readers achieve critical reading comprehension. Rather these reviews, often completed by technology specialists, focus on features that are "attractive" and "entertaining" to readers…

  1. Achievement report for fiscal 1998 on area consortium research and development business. Area consortium for venture business development by building base for small business (abuse double protected next generation card system based on steganography); 1998 nendo venture kigyo ikuseigata chiiki consortium kenkyu kaihatsu (chusho kigyo sozo kibangata). Steganography gijutsu wo riyoshita jisedaigata fusei shiyo taju boshi guard system no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    A card system is developed using BPCS (Business Planning and Control System) steganography, with electronic data imbedded in the card. Under the system, the visual recognition of the user and the mechanical verification of the card are carried out simultaneously, with the card rejecting any abuse. In fiscal 1998, a system was built by way of trial, constituted of technologies of encoding, decoding, and packaging data into an IC (integrated circuit) card. A photograph of the user's face is attached to the card, the card carries an 8KB IC memory device, and the device stores data of the photograph of the user's face etc. A password has to be inputted before any data may be taken out. A customized key is required to display the imbedded personal data and, for the restoration of the key data, the personal key known only to the owner and the company key that is kept by the card managing company need to be collated with each other. Multiple checking is available for the prevention of abuse, which include the collation of face photographs, collation with display by inputting the password, and request for the customized key to confirm the presence of authority to read the imbedded personal data. (NEDO)

  2. From Blackboard to Blogs: Teaching English Literature in the Digital Age

    Directory of Open Access Journals (Sweden)

    Lisa Botshon

    2014-05-01

    Full Text Available This essay explores the digitization of the English literature classroom and considers its current and future incarnations. What can web-based courses offer students and teachers of English literature? How might the use of blogs, Twitter, hypertexts, and course management systems like Blackboard, among other digital tools, change the structure and very nature of literature pedagogy? These questions are particularly important to consider as our society is transformed by digital technology and during a moment in which the internet has promised inclusivity and the  democratization of culture. Concomitantly, however, the humanities have become vulnerable in our tech-focused era and digital divides among different social groups persist in higher education. Hence, we must deliberate our adoption and adaptation of digital pedagogy with great thoughtfulness and care.

  3. 3D DIGITAL CADASTRE JOURNEY IN VICTORIA, AUSTRALIA

    Directory of Open Access Journals (Sweden)

    D. Shojaei

    2017-10-01

    Full Text Available Land development processes today have an increasing demand to access three-dimensional (3D spatial information. Complex land development may need to have a 3D model and require some functions which are only possible using 3D data. Accordingly, the Intergovernmental Committee on Surveying and Mapping (ICSM, as a national body in Australia provides leadership, coordination and standards for surveying, mapping and national datasets has developed the Cadastre 2034 strategy in 2014. This strategy has a vision to develop a cadastral system that enables people to readily and confidently identify the location and extent of all rights, restrictions and responsibilities related to land and real property. In 2014, the land authority in the state of Victoria, Australia, namely Land Use Victoria (LUV, has entered the challenging area of designing and implementing a 3D digital cadastre focused on providing more efficient and effective services to the land and property industry. LUV has been following the ICSM 2034 strategy which requires developing various policies, standards, infrastructures, and tools. Over the past three years, LUV has mainly focused on investigating the technical aspect of a 3D digital cadastre. This paper provides an overview of the 3D digital cadastre investigation progress in Victoria and discusses the challenges that the team faced during this journey. It also addresses the future path to develop an integrated 3D digital cadastre in Victoria.

  4. Comparison of Failure Analysis and Operating Experiences of Digital Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Eun Chan; Shin, Tae Young [Korea Hydro and Nuclear Power Co., Daejeon (Korea, Republic of)

    2014-08-15

    This study focuses on digital control systems that have the same functions but different designs. Some differences and common points between these two digital control systems are analyzed in terms of vulnerabilities in plant operation. In addition, this study confirms why unexpected outcomes can occur through a comparison of the system failure experiences with the analytic results of FMEA and FTA. This evaluation demonstrates that the digital system may have vulnerable components whose single failures can cause plant transients even if the system has a redundant structure according to its system design.

  5. Digital I and C system pre-tests using plant specific simulators

    International Nuclear Information System (INIS)

    Holl, B.; Probst, H.; Wischert, W.

    2006-01-01

    The paper focuses on strategic aspects of the implementation of modern digital instrumentation and control system (I and C) in nuclear power plant (NPP) training simulators and points out the way to identify the most appropriate implementation method of the digital I and C system in the simulator development environment which fulfils the requirement imposed by the nuclear power plants. This regards mainly training aspects, simulator as a test bed for design verification and validation (V and V), and software maintenance aspects with respect to future evolutions of the digital I and C system. (author)

  6. A new digital land mobile satellite system

    Science.gov (United States)

    Schneider, Philip

    A description is given of the different digital services planned to be carried over existing and planned mobile satellite systems. These systems are then compared with analog services in terms of bandwidth and power efficiency. This comparison provides the rationale for the establishment of a digital land mobile satellite service (DLMSS) to use frequencies that are currently available but not yet assigned to a domestic mobile satellite system in the United States. The focus here is on the expected advantages of digital transmission techniques in accommodating additional mobile satellite systems in this portion of the spectrum, and how such techniques can fully satisfy voice, data and facsimile mobile communications requirements in a cost effective manner. A description is given of the system architecture of the DMLSS service proposed by the Geostar Messaging Corporation (GMC) and the market potential of DLMSS.

  7. Design and Testing of Digital Microfluidic Biochips

    CERN Document Server

    Zhao, Yang

    2013-01-01

    This book provides a comprehensive methodology for automated design, test and diagnosis, and use of robust, low-cost, and manufacturable digital microfluidic systems. It focuses on the development of a comprehensive CAD optimization framework for digital microfluidic biochips that unifies different design problems. With the increase in system complexity and integration levels, biochip designers can utilize the design methods described in this book to evaluate different design alternatives, and carry out design-space exploration to obtain the best design point. Describes practical design automation tools that address different design problems (e.g., synthesis, droplet routing, control-pin mapping, testing and diagnosis, and error recovery) in a unified manner; Applies test pattern generation and error-recovery techniques for digital microfluidics-based biochips; Uses real bioassays as evaluation examples, e.g., multiplexed in vitro human physiological fluids diagnostics, PCR, protein crystallization.  

  8. Systematic, digital student feedback for differentiated teaching

    DEFF Research Database (Denmark)

    Graf, Stefan Ting; Carlsen, Dorthe

    2017-01-01

    The article reports results from a qualitative study of Elevbaro, a prototype of a digital tool for student feedback developed in connection with the demonstration school project, inclusion, and differentiated teaching in digital learning environments. At the same time the study represents...... the first step of validating Elevbaro as a systematic feedback tool. There is general consensus that feedback is central to the quality of teaching, but the focus on and the exploration of systematic student feedback is an overlooked topic. Especially as regards differentiated teaching and complex teaching...... patterns, there is a need for supplementary and digital monitoring of a group of students and of individual students. The article examines how students and teachers understand and use Elevbaro, which is built on frequent ratings of five set statements in connection with teaching over a certain period...

  9. Building 21st. Century literacies through digital animated storytelling

    DEFF Research Database (Denmark)

    Gjedde, Lisa

    2016-01-01

    , auditory and verbal with a fluency with digital tools. There is an interest to teach multimodal literacy in open schooling, while bridging informal and formal learning in hybrid environments, that is involving collaboration with libraries and museums. Designs for multimodal learning with animation may have......This paper will present the preliminary findings from a R&D project on developing 21st. Century literacies in a digital Storylab at a public library, doing digital animated storytelling, in collaboration with municipal schools. It will explore the implications for the approach to digital story......-based learning for learner’s engagement, motivation and multimodal learning in a mixed methods study based on surveys, interviews and observations. The key literacy skills needed for 21st. Century learners have shifted from a predominant focus on verbal text towards multimodal literacies, that combine the visual...

  10. Demonetization to Digitalization: A Step Toward Progress

    Directory of Open Access Journals (Sweden)

    Harshita Bhatnagar

    2017-05-01

    Full Text Available Journey from demonetization to digitalization is very hard hitting but not impossible. Recent demonetization in India on November 8, 2016, created lot of panic in the economy but also paved the way to digitalization. Cash crunch and availability of e-sources of transactions compelled many people to use electronic modes of payment. Credit cards, debit cards/RuPay card, USSD/UPI, Internet banking, mobile wallets like Oxigen, Paytm, Mobiwik, aadhar-enabled payment system, POS, and so on are few popular modes of electronic transaction, which are commonly used by the citizen. Digitalization will embrace higher transparency in monetary terms; low-cost maintenance; more convenience in use; and help in financial inclusion and weeding out black money and counterfeit money from the economy. But journey to a destination is always full of roadblocks, and similarly the journey of India toward a digital India is also full of hurdles like a huge illiteracy rate; low bandwidth; more unbanked areas; late adoption of technology; lack of full-time electricity; security concerns like hacking, cybercrime, and safety of personal details; and need for high investments. So, to defend the dream of a digital India, we have to develop well-defined strategies to coach people in using technology like focusing on customer education as well as employee education in technology by conducting workshops, presentations, enforcing strict cyber laws, use of local language, and developing user-friendly websites that leverage technology using the development of simple and smart digital tools, such as the use of a one-time password (OTP. The government has started Vittiya Sakharata Abhiyaan (VISAKA and outreach campaigns like DigiDhan Abhiyan and so on to encourage people to adopt digital tools. Overall demonetization is greasing the wheels of digitalization and transforming India into Digital India.

  11. Interoperability of Web Archives and Digital Libraries

    DEFF Research Database (Denmark)

    Kalb, Hendrik; Lazaridou, Paraskevi; Pinsent, Edward

    2013-01-01

    The interoperability of web archives and digital libraries is crucial to avoid silos of preserved data and content. While various researches focus on specfic facets of the challenge to interoperate, there is a lack of empirical work about the overall situation of actual challenges. We conduct...

  12. Digital repeat analysis; setup and operation.

    Science.gov (United States)

    Nol, J; Isouard, G; Mirecki, J

    2006-06-01

    Since the emergence of digital imaging, there have been questions about the necessity of continuing reject analysis programs in imaging departments to evaluate performance and quality. As a marketing strategy, most suppliers of digital technology focus on the supremacy of the technology and its ability to reduce the number of repeats, resulting in less radiation doses given to patients and increased productivity in the department. On the other hand, quality assurance radiographers and radiologists believe that repeats are mainly related to positioning skills, and repeat analysis is the main tool to plan training needs to up-skill radiographers. A comparative study between conventional and digital imaging was undertaken to compare outcomes and evaluate the need for reject analysis. However, digital technology still being at its early development stages, setting a credible reject analysis program became the major task of the study. It took the department, with the help of the suppliers of the computed radiography reader and the picture archiving and communication system, over 2 years of software enhancement to build a reliable digital repeat analysis system. The results were supportive of both philosophies; the number of repeats as a result of exposure factors was reduced dramatically; however, the percentage of repeats as a result of positioning skills was slightly on the increase for the simple reason that some rejects in the conventional system qualifying for both exposure and positioning errors were classified as exposure error. The ability of digitally adjusting dark or light images reclassified some of those images as positioning errors.

  13. Smart Aarhus: Participatory Digital City Development in Scandinavia

    DEFF Research Database (Denmark)

    Brynskov, Martin

    of approximately one million people. Aarhus has recently announced a digital agenda, the Smart Aarhus Initiative. It will be formulated and implemented alongside unprecedented urban developments over the coming decade, the largest, relatively speaking, in the region, encompassing new constructions in central urban...... areas, the waterfront, an entire hospital city, large housing areas, as well as suburban areas. Aarhus has a dual purpose for its digital agenda: First, ICT (Information & Communication Technologies) will be a cornerstone in the coming transformation of the city and the region, with a focus on serving...

  14. Learner-Controlled Scaffolding Linked to Open-Ended Problems in a Digital Learning Environment

    Science.gov (United States)

    Edson, Alden Jack

    2017-01-01

    This exploratory study reports on how students activated learner-controlled scaffolding and navigated through sequences of connected problems in a digital learning environment. A design experiment was completed to (re)design, iteratively develop, test, and evaluate a digital version of an instructional unit focusing on binomial distributions and…

  15. Smartphone adapters for digital photomicrography.

    Science.gov (United States)

    Roy, Somak; Pantanowitz, Liron; Amin, Milon; Seethala, Raja R; Ishtiaque, Ahmed; Yousem, Samuel A; Parwani, Anil V; Cucoranu, Ioan; Hartman, Douglas J

    2014-01-01

    Photomicrographs in Anatomic Pathology provide a means of quickly sharing information from a glass slide for consultation, education, documentation and publication. While static image acquisition historically involved the use of a permanently mounted camera unit on a microscope, such cameras may be expensive, need to be connected to a computer, and often require proprietary software to acquire and process images. Another novel approach for capturing digital microscopic images is to use smartphones coupled with the eyepiece of a microscope. Recently, several smartphone adapters have emerged that allow users to attach mobile phones to the microscope. The aim of this study was to test the utility of these various smartphone adapters. We surveyed the market for adapters to attach smartphones to the ocular lens of a conventional light microscope. Three adapters (Magnifi, Skylight and Snapzoom) were tested. We assessed the designs of these adapters and their effectiveness at acquiring static microscopic digital images. All adapters facilitated the acquisition of digital microscopic images with a smartphone. The optimal adapter was dependent on the type of phone used. The Magnifi adapters for iPhone were incompatible when using a protective case. The Snapzoom adapter was easiest to use with iPhones and other smartphones even with protective cases. Smartphone adapters are inexpensive and easy to use for acquiring digital microscopic images. However, they require some adjustment by the user in order to optimize focus and obtain good quality images. Smartphone microscope adapters provide an economically feasible method of acquiring and sharing digital pathology photomicrographs.

  16. Pre-Service Teachers in Second Life: Are Digital Natives Prepared for a Web 2.0 Experience?

    Science.gov (United States)

    Inman, Christopher T.

    2010-01-01

    Today's college students, "digital natives," have had digital technology at their fingertips (Rushkoff, 1996; Prensky, 2001a). Technology habits and expectations of young people are changing; the educational and business worlds have placed a focus on skills called "21st century skills," to prepare students for the digital age (Lemke, 2002). Skills…

  17. Digitization, globalization, and hypermobile financial capital

    Directory of Open Access Journals (Sweden)

    Barney Warf

    2017-10-01

    Full Text Available Since the late 20th century and the microelectronics revolution, capital has become thoroughly digitized, moving effortlessly around the world through electronic funds transfer systems (EFTS. This paper charts the rise of electronic money since the collapse of the Bretton-Woods regulatory system in the 1970s and the shift into extremely mobile funds that circulate through ber optics lines. Second, it examines some of the world’s largest EFTS systems and their impacts on capital markets of different types. The third part focuses on how digital money has undermined na- tional nancial regulations imposed by nation-states. In the fourth section, the role of EFTS in the growth of offshore banking centers is explored.

  18. Software usage in unsupervised digital doorway computing environments in disadvantaged South African communities: Focusing on youthful users

    CSIR Research Space (South Africa)

    Gush, K

    2011-01-01

    Full Text Available Digital Doorways provide computing infrastructure in low-income communities in South Africa. The unsupervised DD terminals offer various software applications, from entertainment through educational resources to research material, encouraging...

  19. A New Development in Online Marketing: Introducing Digital Inbound Marketing

    Directory of Open Access Journals (Sweden)

    Alin OPREANA

    2015-08-01

    Full Text Available Particularly in online settings, marketing is undergoing a transformation. Online business can no longer rely on traditional marketing tactics and campaigns to attract, retain and expand consumers because there is a transformation in how people interact with brands and companies, how they shop and buy in online and offline settings. Traditional marketing is no longer a viable option because it focuses on pushing a message out. In online business framework, a new marketing development has arisen, namely digital inbound marketing. This new marketing type is focused on attracting valuable consumers (potential, existing, or aspirational that choose to interact with a particular company that provides them with something useful. In this paper, we propose a definition for digital inbound marketing and examine the online strategies associated with this concept: brand-focused marketing communications, content marketing, social media marketing, and search engine optimization.

  20. Digitizing Patterns of Power - Cartographic Communication for Digital Humanities

    Science.gov (United States)

    Kriz, Karel; Pucher, Alexander; Breier, Markus

    2018-05-01

    The representation of space in medieval texts, the appropriation of land and the subsequent installation of new structures of power are central research topics of the project "Digitizing Patterns of Power" (DPP). The project focuses on three regional case studies: the Eastern Alps and the Morava-Thaya region, the historical region of Macedonia, and historical Southern Armenia. DPP is a multidisciplinary project, conducted by the Austrian Academy of Sciences the Institute for Medieval Research (IMAFO) in cooperation with the University of Vienna, Department of Geography and Regional Research. It is part of an initiative to promote digital humanities research in Austria. DPP brings together expertise from historical and archaeological research as well as cartography and geocommunication to explore medieval geographies. The communication of space, time and spatial interconnectivity is an essential aspect of DPP. By incorporating digital cartographic expertise, relevant facts can be depicted in a more effective visual form. Optimal cartographic visualization of base data as well as the historical and archaeological information in an interactive map-based online platform are important features. However, the multidisciplinary of the project presents the participants with various challenges. The different involved disciplines, among them cartography, archaeology and history each have their own approaches to relevant aspects of geography and geocommunication. This paper treats geocommunication characteristics and approaches to interactive mapping in a historical and archaeological context within a multidisciplinary project environment. The fundamental challenges of cartographic communication within DPP will be presented. Furthermore, recent results on the communication of historical topographic, as well as uncertain thematic content will be demonstrated.

  1. Steganalysis of recorded speech

    Science.gov (United States)

    Johnson, Micah K.; Lyu, Siwei; Farid, Hany

    2005-03-01

    Digital audio provides a suitable cover for high-throughput steganography. At 16 bits per sample and sampled at a rate of 44,100 Hz, digital audio has the bit-rate to support large messages. In addition, audio is often transient and unpredictable, facilitating the hiding of messages. Using an approach similar to our universal image steganalysis, we show that hidden messages alter the underlying statistics of audio signals. Our statistical model begins by building a linear basis that captures certain statistical properties of audio signals. A low-dimensional statistical feature vector is extracted from this basis representation and used by a non-linear support vector machine for classification. We show the efficacy of this approach on LSB embedding and Hide4PGP. While no explicit assumptions about the content of the audio are made, our technique has been developed and tested on high-quality recorded speech.

  2. Optimally weighted least-squares steganalysis

    Science.gov (United States)

    Ker, Andrew D.

    2007-02-01

    Quantitative steganalysis aims to estimate the amount of payload in a stego object, and such estimators seem to arise naturally in steganalysis of Least Significant Bit (LSB) replacement in digital images. However, as with all steganalysis, the estimators are subject to errors, and their magnitude seems heavily dependent on properties of the cover. In very recent work we have given the first derivation of estimation error, for a certain method of steganalysis (the Least-Squares variant of Sample Pairs Analysis) of LSB replacement steganography in digital images. In this paper we make use of our theoretical results to find an improved estimator and detector. We also extend the theoretical analysis to another (more accurate) steganalysis estimator (Triples Analysis) and hence derive an improved version of that estimator too. Experimental results show that the new steganalyzers have improved accuracy, particularly in the difficult case of never-compressed covers.

  3. Fractal Image Coding with Digital Watermarks

    Directory of Open Access Journals (Sweden)

    Z. Klenovicova

    2000-12-01

    Full Text Available In this paper are presented some results of implementation of digitalwatermarking methods into image coding based on fractal principles. Thepaper focuses on two possible approaches of embedding digitalwatermarks into fractal code of images - embedding digital watermarksinto parameters for position of similar blocks and coefficients ofblock similarity. Both algorithms were analyzed and verified on grayscale static images.

  4. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  5. Digital Position Encoding Of Galvanometer Scanner In A Laser Microscope

    Science.gov (United States)

    Liljeborg, Anders

    1988-09-01

    An account is given of a realization of a feedback method to digitize the analog position signal from a moving iron galvanometer. It is employed in a confocal scanning laser microscope for generating digital images. The photometric sampling has to be closely coupled to the position of a mirror that scans a focused laser beam across a microscope specimen. Pictures with low geometric distortion are obtained up to the size 1024 x 1024 pixels.

  6. the impact of digital technology revolution on surveying curriculum ...

    African Journals Online (AJOL)

    the impact of digital technology revolution on surveying curriculum review in ... Global Journal of Environmental Sciences ... Also, it focuses on the need to review the current surveying curriculum to meet the technological advancement. Finally ...

  7. The never-ending digital journey creating new consumer experiences through technology

    CERN Document Server

    Angelani, Andres; Migoya, Martin

    2016-01-01

    The Never-Ending Digital Journey provides readers with the concepts and steps needed to create successful user experiences. The authors look ahead and explore digital scenarios of the future. They probe how technology is changing the way users interact with brands, and they address today's digital challenges with new ways of surprising consumers, integrating design and engineering. The authors leverage knowledge gleaned from working with renowned global companies to describe the recipe needed to build a Digital Journey. With a strong focus on Agile Pods, they dive into technolo- gies, processes, team building, motivation, and met- rics that enable businesses to construct and nurture the dynamic ecosystems necessary in this digital era to foster success. Over the last several years, customers, employees, and partners have become tech-savvy users whose expectations of “Give me more and deliver it faster" require manageable solutions. The desire to interact with digital ecosystems anywhere, anytime demands that...

  8. Digital pathology: A systematic evaluation of the patent landscape.

    Science.gov (United States)

    Cucoranu, Ioan C; Parwani, Anil V; Vepa, Suryanarayana; Weinstein, Ronald S; Pantanowitz, Liron

    2014-01-01

    Digital pathology is a relatively new field. Inventors of technology in this field typically file for patents to protect their intellectual property. An understanding of the patent landscape is crucial for companies wishing to secure patent protection and market dominance for their products. To our knowledge, there has been no prior systematic review of patents related to digital pathology. Therefore, the aim of this study was to systematically identify and evaluate United States patents and patent applications related to digital pathology. Issued patents and patent applications related to digital pathology published in the United States Patent and Trademark Office (USPTO) database (www.uspto.gov) (through January 2014) were searched using the Google Patents search engine (Google Inc., Mountain View, California, USA). Keywords and phrases related to digital pathology, whole-slide imaging (WSI), image analysis, and telepathology were used to query the USPTO database. Data were downloaded and analyzed using the Papers application (Mekentosj BV, Aalsmeer, Netherlands). A total of 588 United States patents that pertain to digital pathology were identified. In addition, 228 patent applications were identified, including 155 that were pending, 65 abandoned, and eight rejected. Of the 588 patents granted, 348 (59.18%) were specific to pathology, while 240 (40.82%) included more general patents also usable outside of pathology. There were 70 (21.12%) patents specific to pathology and 57 (23.75%) more general patents that had expired. Over 120 unique entities (individual inventors, academic institutions, and private companies) applied for pathology specific patents. Patents dealt largely with telepathology and image analysis. WSI related patents addressed image acquisition (scanning and focus), quality (z-stacks), management (storage, retrieval, and transmission of WSI files), and viewing (graphical user interface (GUI), workflow, slide navigation and remote control). An

  9. Digital pathology: A systematic evaluation of the patent landscape

    Directory of Open Access Journals (Sweden)

    Ioan C. Cucoranu

    2014-01-01

    Full Text Available Introduction: Digital pathology is a relatively new field. Inventors of technology in this field typically file for patents to protect their intellectual property. An understanding of the patent landscape is crucial for companies wishing to secure patent protection and market dominance for their products. To our knowledge, there has been no prior systematic review of patents related to digital pathology. Therefore, the aim of this study was to systematically identify and evaluate United States patents and patent applications related to digital pathology. Materials and Methods: Issued patents and patent applications related to digital pathology published in the United States Patent and Trademark Office (USPTO database (www.uspto.gov (through January 2014 were searched using the Google Patents search engine (Google Inc., Mountain View, California, USA. Keywords and phrases related to digital pathology, whole-slide imaging (WSI, image analysis, and telepathology were used to query the USPTO database. Data were downloaded and analyzed using the Papers application (Mekentosj BV, Aalsmeer, Netherlands. Results: A total of 588 United States patents that pertain to digital pathology were identified. In addition, 228 patent applications were identified, including 155 that were pending, 65 abandoned, and eight rejected. Of the 588 patents granted, 348 (59.18% were specific to pathology, while 240 (40.82% included more general patents also usable outside of pathology. There were 70 (21.12% patents specific to pathology and 57 (23.75% more general patents that had expired. Over 120 unique entities (individual inventors, academic institutions, and private companies applied for pathology specific patents. Patents dealt largely with telepathology and image analysis. WSI related patents addressed image acquisition (scanning and focus, quality (z-stacks, management (storage, retrieval, and transmission of WSI files, and viewing (graphical user interface (GUI

  10. Digital radiology and digitally formatted image management systems

    International Nuclear Information System (INIS)

    Cox, G.G.; Dwyer, S.J. III; Templeton, A.W.

    1987-01-01

    The number of diagnostic examinations performed with digitally formatted imaging equipment is increasing. Digital general-purpose and fluoroscopic radiology systems are being clinically evaluated. Digitizing conventional x-ray films, such as mammograms, frequently improves the diagnostic quality of the images. The digitizing process with laser has also afforded the opportunity to document required spatial resolution for digital imaging and network systems. The use of digitally formatted image instrumentation imposes new requirements on the acquisition, display and manipulation, transmission, hard copy image recording, and archiving of diagnostic data. Networking of digitally formatted image data offers many advantages for managing digital information. This paper identifies and describes digital radiographic systems. Parameters required for designing and implementing a digital image management system are outlined. Spatial and contrast resolution requirements are identified. The key parameters include the amount of image data generated each working day, the retrieval rate of the generated data, the display hardware and software needed for interactive diagnosis display stations, the requirements for analog hard copy generation, and on-line and long-term archiving requirements. These image management systems are often called PACS (Picture Archiving and Communication Systems)

  11. Architectural Decision Management for Digital Transformation of Products and Services

    Directory of Open Access Journals (Sweden)

    Alfred Zimmermann

    2016-04-01

    Full Text Available The digitization of our society changes the way we live, work, learn, communicate, and collaborate. The Internet of Things, Enterprise Social Networks, Adaptive Case Management, Mobility systems, Analytics for Big Data, and Cloud services environments are emerging to support smart connected products and services and the digital transformation. Biological metaphors of living and adaptable ecosystems provide the logical foundation for self-optimizing and resilient run-time environments for intelligent business services and service-oriented enterprise architectures. Our aim is to support flexibility and agile transformations for both business domains and related information technology. The present research paper investigates mechanisms for decision analytics in the context of multi-perspective explorations of enterprise services and their digital enterprise architectures by extending original architecture reference models with state of art elements for agile architectural engineering for the digitization and collaborative architectural decision support. The paper’s context focuses on digital transformations of business and IT and integrates fundamental mappings between adaptable digital enterprise architectures and service-oriented information systems. We are putting a spotlight on the example domain – Internet of Things.

  12. DIGITAL BOOKS RELY ON SOCIAL READING TO FIND NEW SUCCESS PROPOSALS AND FORMATS

    Directory of Open Access Journals (Sweden)

    Berta García Orosa

    2016-07-01

    Full Text Available Digital reading development has reached turning point. In view of the recent data, the edition of electronic books has dropped for the second consecutive year in 2014, while paper books production has increased (MECD, 2015. The last report from the Fundación Telefónica (2015 points out that six out ten Spanish people prefer printed books instead of the digital ones. This article presents the symptoms of a possible change of tendency in digital books. There is a need for a new digital ecosystem of digital texts production and reception. Its major focus should be the social reading, understood as a space for reception, interpretation, and creation.

  13. Online customer experience: Implications for digital banking

    Directory of Open Access Journals (Sweden)

    Štavljanin Velimir

    2017-01-01

    Full Text Available Banks will be facing great challenges in the coming period. Some of these challenges are a lack of differentiation, disloyal customers, new non-traditional competitors, increased interaction and expectations from digital channels. Many consulting firms, but also the academic community, propose a solution in the form of implementing the concept of customer experience management. As research shows that a large number of challenges come from the online environment, it is necessary for banks to ensure excellence in the online environment by applying the concept of online customer experience. In order to create this experience, it is up to the banks to meet all the necessary antecedents, which can involve the elements in terms of control, processes and content. This can be a very difficult job if one is unfamiliar with the basics, but it could also be a rewarding job which will reflect on the business performance. Although the focus of the paper is online customer experience, even in the developed countries 'digital' customers are rare. Most of them are multichannel oriented and an important aspect is the multichannel integration and the strategy focused on customer experience. This paper presents an overview of the literature in the field of online customer experience, with the aim of introducing the public with the concept as well as presenting the implications which this concept has for digital banking.

  14. Strengthening Inclusion of Learners With Attention Difficulties Through Interventions With Digital Technology In Processes of Production

    DEFF Research Database (Denmark)

    Sorensen, Elsebeth Korsgaard; Voldborg, Hanne

    2017-01-01

    This paper investigates the potential of digital technologies for strengthening the participation and inclusion of learners with developmental and attention deficits (focus learners) into the mainstream classroom. The paper describes the authors’ approach to the challenge of researching the extent......, to which digital technologies may support the learning process of focus learners – in particular in those aspects of the learning process that deal with the construction of learning products and the communication and dissemination of knowledge to peers, teachers or others. On the basis of the actual...... analysis and a succeeding discussion, the paper concludes that in order to create ownership, pedagogic strategies and interventions with digital technologies (whether viewed from the perspective of teaching or the perspective of learning) should incorporate opportunities for developing digital multimodal...

  15. Digital Economy: Development Prospects in the European Union and the Republic of Moldova

    Directory of Open Access Journals (Sweden)

    Alexandru LEAHOVCENCO

    2018-03-01

    Full Text Available This article focuses on issues related to digital economy. The European Union adopted and implements „Digital Agenda for Europe” constantly adjusting its priorities to the new circumstances. The government of the Republic of Moldova approved the National Strategy for Information Society Development “Digital Moldova 2020” which aim is to create conditions through minimum state intervention but with maximum effect for information society development. National Strategy for Information Society Development will lead to the following measurable results: ranking the Republic of Moldova among top 50 countries in the international rankings in digital technologies.

  16. Insights of School Head About Marketing Education Services Through Digital Media

    Directory of Open Access Journals (Sweden)

    Samer Iqbal

    2016-06-01

    Full Text Available This study mainly focuses on the insights of a private school’s head pertaining to the use of digital media in educational marketing. The qualitative research paradigm was chosen for this study and in depth phenomenological interview was conducted from a head of a private school. Two themes were extracted from the data: Marketing educational services through digital media and its challenges, and digital media tool for marketing education services. The study revealed that the school head perceived the digital media to be cost-effective marketing strategy that was multidimensional and value-driven, but due to lack of awareness, skills, attitude, and sense of maturity among stakeholders, digital media was ignored and was not much used as a cost-effective marketing tool. Nevertheless, it is proposed that by hiring marketing personnel to promote services professionally, by aligning their strategies according to the demands of their customers, and by inviting customers’ voice on digital platforms, digital media can become a cost-effective and a valuable tool for mercerization of education.

  17. The ethics in the photo journalism of the digital ageA ética no fotojornalismo da era digital

    Directory of Open Access Journals (Sweden)

    Paulo Cesar Boni

    2006-12-01

    Full Text Available This article focuses the ethics in photojournalism. With the rise of digital technology and its capacity to enable to treat and manipulate images, a controversy came about over the ethics of professionals and information vehicles. The difference between treatment and manipulation of images is also covered in this study. A historical overview shows that photographic manipulation is not a newness or invention of digital technology. Ethics is within the professional, not in the tool.Este artigo aborda a ética no fotojornalismo. Com o advento da tecnologia digital – e conseqüente facilidade de tratamento e manipulação da imagem – criou-se uma polêmica em torno da ética de profissionais e de veículos de informação. A diferença entre tratamento e manipulação de imagens também faz parte do estudo. Um resgate histórico revela que a manipulação fotográfica não é uma novidade ou invenção da tecnologia digital. A ética está no profissional e não na ferramenta.

  18. Three-dimensional motion measurements of free-swimming microorganisms using digital holographic microscopy

    International Nuclear Information System (INIS)

    Lee, Sang Joon; Seo, Kyung Won; Choi, Yong Seok; Sohn, Myong Hwan

    2011-01-01

    A digital holographic microscope is employed to measure the 3D motion of free-swimming microorganisms. The focus function used to quantify image sharpness provides a better depth-directional accuracy with a smaller depth-of-focus compared with the intensity method in determining the depth-directional position of spherical particles of various diameters. The focus function is then applied to measure the 3D positions of free-swimming microorganisms, namely dinoflagellates C. polykrikoides and P. minimum. Both automatic segmentation and proper selection of a focus function for a selected segment are important processes in measuring the positional information of two free-swimming microorganisms of different shapes with various width-to-length ratios. The digital holographic microscopy technique improved in this work is useful for measuring 3D swimming trajectories, velocities and attitudes of hundreds of microorganisms simultaneously. It also exhibits exceptional depth-directional accuracy

  19. Uncovering Young Children's Transformative Digital Game Play through the Exploration of Three-Year-Old Children's Cases

    Science.gov (United States)

    Huh, Youn Jung

    2017-01-01

    In contrast to studies focusing on digital games as learning tools, this study shows how young children use digital games as a means of facilitating spontaneous play in their everyday lives. This article highlights how 4 three-year-old children's play with digital games revealed their ability to create new forms of play by mixing their digital…

  20. Descriptive markup languages and the development of digital humanities

    Directory of Open Access Journals (Sweden)

    Boris Bosančić

    2012-11-01

    Full Text Available The paper discusses the role of descriptive markup languages in the development of digital humanities, a new research discipline that is part of social sciences and humanities, which focuses on the use of computers in research. A chronological review of the development of digital humanities, and then descriptive markup languages is exposed, through several developmental stages. It is shown that the development of digital humanities since the mid-1980s and the appearance of SGML, markup language that was the foundation of TEI, a key standard for the encoding and exchange of humanities texts in the digital environment, is inseparable from the development of markup languages. Special attention is dedicated to the presentation of the Text Encoding Initiative – TEI development, a key organization that developed the titled standard, both from organizational and markup perspectives. By this time, TEI standard is published in five versions, and during 2000s SGML is replaced by XML markup language. Key words: markup languages, digital humanities, text encoding, TEI, SGML, XML

  1. Developing Digital Technologies for Undergraduate University Mathematics

    DEFF Research Database (Denmark)

    Triantafyllou, Eva; Timcenko, Olga

    2013-01-01

    Our research effort presented in this paper relates with developing digital tools for mathematics education at undergraduate university level. It focuses specifically on studies where mathematics is not a core subject but it is very important in order to cope with core subjects. For our design, we...... requirements for the development of digital tools that support mathematics teaching and learning at university level....... during lectures and exercise time. During these observations we were able to investigate how the applets were used in practice but also to get insight in the challenges that the students face during mathematics learning. These findings together with student feedback inspire the next round of design...

  2. Digital-Gaming Trajectories and Second Language Development

    Science.gov (United States)

    Scholz, Kyle W.; Schulze, Mathias

    2017-01-01

    Recent research in digital game-based language learning has been encouraging, yet it would benefit from research methods that focus on the gaming processes and second-language development (Larsen-Freeman, 2015) rather than learner/player reflection or individuals' beliefs about the validity of gameplay. This has proven challenging as research…

  3. Teacher Professional Development through Digital Content Evaluation

    Science.gov (United States)

    Xie, Kui; Kim, Min Kyu; Cheng, Sheng-Lun; Luthy, Nicole C.

    2017-01-01

    In this study, researchers designed and implemented a 1-year professional development (PD) program that focused on supporting teachers in evaluating and selecting digital learning contents. Participants in this investigation included 109 teachers who consented to the study amongst a total of 171 teachers from five school districts across central…

  4. Dynamics of Cavitation Clouds within a High-Intensity Focused Ultrasonic Beam

    Science.gov (United States)

    2012-03-01

    the cloud size. I. INTRODUCTION High-intensity focused ultrasound (HIFU), along with the associated cavitation , is used in a variety of fields. The...Article 3. DATES COVERED (From - To) March 2012- May 2012 4. TITLE AND SUBTITLE Dynamics of Cavitation Clouds within a High-Intensity Focused...in initially quiescent water. The resulting pressure field and behavior of the cavitation bubbles are measured using high-speed digital in-line

  5. Digital radiography

    International Nuclear Information System (INIS)

    Brody, W.R.

    1984-01-01

    Digital Radiography begins with an orderly introduction to the fundamental concepts of digital imaging. The entire X-ray digital imagining system is described, from an overall characterization of image quality to specific components required for a digital radiographic system. Because subtraction is central to digital radiographic systems, the author details the use of various subtraction methods for image enhancement. Complex concepts are illustrated with numerous examples and presented in terms that can readily be understood by physicians without an advanced mathematics background. The second part of the book discusses implementations and applications of digital imagining systems based on area and scanned detector technologies. This section includes thorough coverage of digital fluoroscopy, scanned projection radiography, and film-based digital imaging systems, and features a state-of-the-art synopsis of the applications of digital subtraction angiography. The book concludes with a timely assessment of anticipated technological advances

  6. Zero Feet Away: The Digital Geography of Gay Social Media.

    Science.gov (United States)

    Roth, Yoel

    2016-01-01

    For this contribution to the "Cartographies" section of the special issue on "Mapping Queer Bioethics," the author focuses on the terrains of digital media, geosocial networking, and sexually based social media in LGBT communities. Addressing the communal potentials and ethical complications of geosocial connections made possible by such sexually based social media, the author asks whether digital forms of cartography via applications such as Grindr and Scruff simplify, complicate, or merely expose historically longstanding notions of queer interconnectivity.

  7. Dynamic imaging through turbid media based on digital holography.

    Science.gov (United States)

    Li, Shiping; Zhong, Jingang

    2014-03-01

    Imaging through turbid media using visible or IR light instead of harmful x ray is still a challenging problem, especially in dynamic imaging. A method of dynamic imaging through turbid media using digital holography is presented. In order to match the coherence length between the dynamic object wave and the reference wave, a cw laser is used. To solve the problem of difficult focusing in imaging through turbid media, an autofocus technology is applied. To further enhance the image contrast, a spatial filtering technique is used. A description of digital holography and experiments of imaging the objects hidden in turbid media are presented. The experimental result shows that dynamic images of the objects can be achieved by the use of digital holography.

  8. Post No Photos, Leave No Trace: Children's Digital Footprint Management Strategies

    Science.gov (United States)

    Buchanan, Rachel; Southgate, Erica; Smith, Shamus P.; Murray, Tiana; Noble, Brittany

    2017-01-01

    Given that today's children are prolific users of the internet, concern has been raised about the future impact of the digital footprints they are currently generating. Here, we report on the "Best Footprint Forward" project which utilised focus groups to investigate the digital footprint awareness of 33 children (ranging in age from 10…

  9. Agriscience Teachers' Implementation of Digital Game-Based Learning in an Introductory Animal Science Course

    Science.gov (United States)

    Webb, Angela W.; Bunch, J. C.; Wallace, Maria F.

    2015-01-01

    In today's technological age, visions for technology integration in the classroom continue to be explored and examined. Digital game-based learning is one way to purposefully integrate technology while maintaining a focus on learning objectives. This case study sought to understand agriscience teachers' experiences implementing digital game-based…

  10. Digital Multiculturalism in the Netherlands: Religious, Ethnic, and Gender Positioning by Moroccan-Dutch Youth

    NARCIS (Netherlands)

    Leurs, Koen; Midden, Eva; Ponzanesi, S.

    2011-01-01

    This article focuses on digital practices of Moroccan-Dutch adolescents in the Netherlands. The digital sphere is still rather understudied in the Netherlands. However, it offers a unique, entry to intersecting issues of religiosity, ethnicity and gender as well as to their implications for thinking

  11. Analog-to-digital conversion

    CERN Document Server

    Pelgrom, Marcel

    2017-01-01

    This textbook is appropriate for use in graduate-level curricula in analog-to-digital conversion, as well as for practicing engineers in need of a state-of-the-art reference on data converters. It discusses various analog-to-digital conversion principles, including sampling, quantization, reference generation, nyquist architectures and sigma-delta modulation. This book presents an overview of the state of the art in this field and focuses on issues of optimizing accuracy and speed, while reducing the power level. This new, third edition emphasizes novel calibration concepts, the specific requirements of new systems, the consequences of 22-nm technology and the need for a more statistical approach to accuracy. Pedagogical enhancements to this edition include additional, new exercises, solved examples to introduce all key, new concepts and warnings, remarks and hints, from a practitioner’s perspective, wherever appropriate. Considerable background information and practical tips, from designing a PCB, to lay-o...

  12. Analog-to-digital conversion

    CERN Document Server

    Pelgrom, Marcel J. M

    2013-01-01

    This textbook is appropriate for use in graduate-level curricula in analog to digital conversion, as well as for practicing engineers in need of a state-of-the-art reference on data converters.  It discusses various analog-to-digital conversion principles, including sampling, quantization, reference generation, nyquist architectures and sigma-delta modulation.  This book presents an overview of the state-of-the-art in this field and focuses on issues of optimizing accuracy and speed, while reducing the power level. This new, second edition emphasizes novel calibration concepts, the specific requirements of new systems, the consequences of 45-nm technology and the need for a more statistical approach to accuracy.  Pedagogical enhancements to this edition include more than twice the exercises available in the first edition, solved examples to introduce all key, new concepts and warnings, remarks and hints, from a practitioner’s perspective, wherever appropriate.  Considerable background information and pr...

  13. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  14. CONTEMPORARY DIGITAL TECHNOLOGIES AND INNOVATIONS IN HUMAN INTELLIGENCE

    Directory of Open Access Journals (Sweden)

    Riabtseva, N.K.

    2017-09-01

    Full Text Available New digital technologies not only “change language” (David Cristal, but also “upgrade” human intelligence making it perform new and uncommon operations. The present paper is an analysis and a survey of most prominent innovations in human intelligence, which are instigated by the latest digital information technologies. These innovations include, according to the point of view of outstanding specialists in contemporary digital technologies, such operations as multitasking, serendipity, connectivity, hypermodality, visuality, and cybersemiotic convergence of objective and virtual reality. The paper is based on the data presented in the publications of such outstanding “digital” specialists as Larry Rosen, Jay David Bolter, Steven Downes, Jay Lemke, Gunther Kress, Soren Brier, etc. In their works they particularly stress the impact of digital technologies and internet communication on all spheres of human activities, their role in the inner psychological and mental states, in professional and educational domain, as well as the importance of their investigation and a gap between the intensive development of digital technologies and their insufficient usage in scientific, didactic, social and cultural life. Special attention in the paper focuses on the tendency towards visualization in the global information flows and its role in information processing and knowledge transfer. The paper particularly stresses the fact that the impact of contemporary digital technologies on all spheres of human activities, including the intellectual one, needs further and profound investigation.

  15. Digitální marketing: případová studie užití digitálních technologií v marketingu

    OpenAIRE

    Vildová, Tereza

    2017-01-01

    In this bachelor thesis I work with the use of digital technologies in marketing. The goal of the thesis is to describe and evaluate tools used in 2016 Christmas marketing campaign by the Sephora company. In the theoretic-methodical part I present 21st century marketing overview focused on digital marketing and its trends, attributes, goals and tools. Moreover, the thesis defines terms like social networks, websites and mobile marketing and characterize its communication instruments. In the a...

  16. Is there a correlation between organizational features and digital communication usage?

    Directory of Open Access Journals (Sweden)

    Veselinović Tamara

    2016-01-01

    Full Text Available Digitalization, networking and information sharing have brought to the paradigm shifts in both business and marketing communication. Extant scholarly and practical studies emphasize the importance of digital communication tools and activities, and explore new opportunities for organizations. Unlike previous studies, this study is not solely focused on the usage, but rather on the examination and determination of differences in the usage of digital communication in organizations of various characteristics such as size, industry, business maturity and geographical coverage. A transversal empirical study was conducted in the Republic of Serbia, on a randomly selected sample of 231 private and publicly owned organizations - companies, institutions and banks. The results indicate that the statistical difference in the usage of digital communication tools and activities by organization types exists, whereby the intensity of correlation differs depending on the organizational feature and digital communication tool or activity.

  17. Transforming students into digital academics

    DEFF Research Database (Denmark)

    Thorell, Maria; Fridorff-Jens, Peter Kindt; Lassen, Pia

    2015-01-01

    BACKGROUND: Little is known of students' Information and Communication Technology (ICT) readiness in a learning context. Information about students' capabilities and resources is an important prerequisite for designing meaningful teaching and learning activities that engage and motivate students....... To learn about health science students' usage of digital equipment, familiarity with software, online behavior and communication with the university, we have conducted a survey focusing on these areas. METHODS: A digital questionnaire was sent to 9134 health science students, of whom 1165 responded (12...... of chat users was 23.8 (Standard deviation 3.7) years, SMS users, 25 (Standard deviation 4.2) years and email users, 27.9 (Standard deviation 6.5) years. Over half of the students (53.4%) found that the degree of ICT incorporated in the teaching and learning activities was insufficient to provide them...

  18. Curriculum-based neurosurgery digital library.

    Science.gov (United States)

    Langevin, Jean-Philippe; Dang, Thai; Kon, David; Sapo, Monica; Batzdorf, Ulrich; Martin, Neil

    2010-11-01

    Recent work-hour restrictions and the constantly evolving body of knowledge are challenging the current ways of teaching neurosurgery residents. To develop a curriculum-based digital library of multimedia content to face the challenges in neurosurgery education. We used the residency program curriculum developed by the Congress of Neurological Surgeons to structure the library and Microsoft Sharepoint as the user interface. This project led to the creation of a user-friendly and searchable digital library that could be accessed remotely and throughout the hospital, including the operating rooms. The electronic format allows standardization of the content and transformation of the operating room into a classroom. This in turn facilitates the implementation of a curriculum within the training program and improves teaching efficiency. Future work will focus on evaluating the efficacy of the library as a teaching tool for residents.

  19. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  20. A multilevel analysis of Swedish and Norwegian students’ overall and digital reading performance with a focus on equity aspects of education

    Directory of Open Access Journals (Sweden)

    Maria A. Rasmusson

    2016-02-01

    Full Text Available Abstract Background Influence of external factors in general, and socioeconomic background factors in particular, on traditional reading performance has been extensively researched and debated. While traditional reading is well investigated in this respect, there is a lack of studies on equity aspects related to digital reading achievement, in spite of the fact that time spent on reading from digital devices such as computers, tablets, and smart phones without doubt is increasing all over the world. In the hope of contributing to an area that up until now to a great extent has been left unresearched, the present study aims at investigating to what degree external factors, such as cultural and economic capital, parental pressure, and school choice, are related to 15-year-old students’ achievement in digital reading and in overall reading on both the student level and the school level in Norway and Sweden. Methods To conduct the analysis, multilevel structural modeling techniques have been used on PISA data from the two countries. Results The results for the Norwegian as well as for the Swedish sample showed that overall reading achievement was related to cultural capital in both countries, as expected, and in line with previous research. An identified digital reading factor, representing the unique aspects of digital reading achievement when overall reading was controlled for, was less influenced by the external factors of cultural and economic capital, and by parental pressure and school type, compared to performance in overall reading. Interestingly, on the school level, it was found that the external factors, school choice, and parental pressure related to overall reading achievement differently in the Norwegian and Swedish samples. School choice influenced overall reading in the Swedish data but not in the Norwegian data, and the opposite pattern was found for parental pressure. Conclusion In conclusion, it is suggested that the results

  1. Digitization

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    what a concept of digital media might add to the understanding of processes of mediatization and what the concept of mediatization might add to the understanding of digital media. It is argued that digital media open an array of new trajectories in human communication, trajectories which were...

  2. The New Digital Divide For Digital BioMarkers.

    Science.gov (United States)

    Torous, John; Rodriguez, Jorge; Powell, Adam

    2017-09-01

    As smartphone and sensors continue to become more ubiquitous across the world, digital biomarkers have emerged as a scalable and practical tool to explore disease states and advance health. But as the digital divide of access and ownership begins to fade, a new digital divide is emerging. Who are the types of people that own smartphones or smart watches, who are the types of people that download health apps or partake in digital biomarker studies, and who are the types of people that are actually active with digital biomarkers apps and sensors - the people providing the high quality and longitudinal data that this field is being founded upon? Understanding the people behind digital biomarkers, the very people this emerging field aims to help, may actually be the real challenge as well as opportunity for digital biomarkers.

  3. A Survey of Complex Object Technologies for Digital Libraries

    Science.gov (United States)

    Nelson, Michael L.; Argue, Brad; Efron, Miles; Denn, Sheila; Pattuelli, Maria Cristina

    2001-01-01

    Many early web-based digital libraries (DLs) had implicit assumptions reflected in their architecture that the unit of focus in the DL (frequently "reports" or "e-prints") would only be manifested in a single, or at most a few, common file formats such as PDF or PostScript. DLs have now matured to the point where their contents are commonly no longer simple files. Complex objects in DLs have emerged from in response to various requirements, including: simple aggregation of formats and supporting files, bundling additional information to aid digital preservation, creating opaque digital objects for e-commerce applications, and the incorporation of dynamic services with the traditional data files. We examine a representative (but not necessarily exhaustive) number of current and recent historical web-based complex object technologies and projects that are applicable to DLs: Aurora, Buckets, ComMentor, Cryptolopes, Digibox, Document Management Alliance, FEDORA, Kahn-Wilensky Framework Digital Objects, Metadata Encoding & Transmission Standard, Multivalent Documents, Open eBooks, VERS Encapsulated Objects, and the Warwick Framework.

  4. Continuous-time digital front-ends for multistandard wireless transmission

    CERN Document Server

    Nuyts, Pieter A J; Dehaene, Wim

    2014-01-01

    This book describes the design of fully digital multistandard transmitter front-ends which can directly drive one or more switching power amplifiers, thus eliminating all other analog components.  After reviewing different architectures, the authors focus on polar architectures using pulse width modulation (PWM), which are entirely based on unclocked delay lines and other continuous-time digital hardware.  As a result, readers are enabled to shift accuracy concerns from the voltage domain to the time domain, to coincide with submicron CMOS technology scaling.  The authors present different architectural options and compare them, based on their effect on the signal and spectrum quality.  Next, a high-level theoretical analysis of two different PWM-based architectures – baseband PWM and RF PWM – is made.  On the circuit level, traditional digital components and design techniques are revisited from the point of view of continuous-time digital circuits.  Important design criteria are identified and diff...

  5. Digital literacy and problem solving in technology-rich environments

    Directory of Open Access Journals (Sweden)

    Vesna Dolničar

    2015-07-01

    Full Text Available Rapid development and progress, as well as the growing presence of information and communications technologies dictate the need for more highly developed digital skills in individuals. The paper focuses on the concepts of digital skills and problem solving in technology-rich environments. It examines these on the basis of empirical data obtained in the international study PIAAC. The introductory part presents an overview of the literature and the results of previous research in the field of measurement of digital skills, and data on the use of information society services among the EU Member States. The second part of the article refers to the results obtained in the study PIAAC. The results, confirmed by the results of other studies, showed the impact of age and education level on the problem solving in technology-rich environments. Article concludes with suggestions for improving the current state of integration of all population groups in training programs in the field of digital skills.

  6. Digitization errors using digital charge division positionsensitive detectors

    International Nuclear Information System (INIS)

    Berliner, R.; Mildner, D.F.R.; Pringle, O.A.

    1981-01-01

    The data acquisition speed and electronic stability of a charge division position-sensitive detector may be improved by using digital signal processing with a table look-up high speed multiply to form the charge division quotient. This digitization process introduces a positional quantization difficulty which reduces the detector position sensitivity. The degree of the digitization error is dependent on the pulse height spectrum of the detector and on the resolution or dynamic range of the system analog-to-digital converters. The effects have been investigated analytically and by computer simulation. The optimum algorithm for position sensing determination using 8-bit digitization and arithmetic has a digitization error of less than 1%. (orig.)

  7. Streaming and digital media understanding the business and technology

    CERN Document Server

    Rayburn, Dan

    2007-01-01

    Steaming and Digital Media gives you a concise and direct analysis to understand a scalable, profitable venture, as well as the common and hidden pitfalls to avoid in your business. By focusing on both the business implications and technical differences between online video and traditional broadcast distribution, you will learn how to gain significant time-to-market and cost-saving advantages by effectively using streaming and digital media technologies. As part of the NAB Executive Technology Briefing series, the book is geared towards the manager or executive and no technical prerequisite is

  8. Exploring education for digital librarians meaning, modes and models

    CERN Document Server

    Myburgh, Sue

    2013-01-01

    Exploring Education for Digital Librarians provides a refreshing perspective on the discipline and profession of Library and Information Science (LIS), with a focus on preparing students for careers as librarians who can deal with present and future digital information environments. A re-examination of the knowledge base of the field, combined with a proposed theoretical structure for LIS, provide the basis for this work, which also examines competencies for practice as well as some of the international changes in the nature of higher education. The authors finally suggest a model that could b

  9. Education for Managing Digital Transformation: A Feedback Systems Approach

    Directory of Open Access Journals (Sweden)

    Michael Von Kutzschenbach

    2017-04-01

    Full Text Available "Digital transformation" is becoming the newest mantra of business leaders. It is clear that there are tremendous business opportunities resulting from this revolution, but there is also a price to be paid. Most management literature focuses on the benefits of digitalization, reflecting the desire to increase performance and efficiency in selected business activities. However, digital transformations may lead to the disruption of established ways of doing the work of the firm, stakeholder power may be fundamentally changed, and there is the potential for redefining the nature of the firm itself. Consequently, the decision to "go digital" requires managers to develop perspectives that have the requisite variety to cope with these challenges. Feedback systems thinking is a powerful means for managers to develop and communicate business models that include those aspects of digitalization that affects their firm's theory of success. The Uber case illustrates the principles of applying feedback systems thinking to the radical changes that it has presented the public transportation sector. This paper analyzes Uber's platform business by presenting an endogenous explanation of the drivers and eventual constraints to growth of the theory of success upon which the firm is based. This type of analysis has implications for all firms considering implementing a significant digital transformation process.

  10. Digital Multiculturalism in the Netherlands: Religious, Ethnic, and Gender Positioning by Moroccan-Dutch Youth

    OpenAIRE

    Leurs, Koen; Midden, Eva; Ponzanesi, S.

    2011-01-01

    This article focuses on digital practices of Moroccan-Dutch adolescents in the Netherlands. The digital sphere is still rather understudied in the Netherlands. However, it offers a unique, entry to intersecting issues of religiosity, ethnicity and gender as well as to their implications for thinking about multiculturalism from new vantage points. What do digital practices such as online discussion board participation tell us about identity and multiculturalism? The three forms of position acq...

  11. Data Compression of Fingerprint Minutiae

    OpenAIRE

    VISHAL SHRIVASTAVA; SUMIT SHARMA

    2012-01-01

    Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created byfriction ridges of the skin in the fingers and thumbs. Steganography usually used in smart card is a safe technique for authenticating a person. In steganography, biometric ch...

  12. Research on Digital Product Modeling Key Technologies of Digital Manufacturing

    Institute of Scientific and Technical Information of China (English)

    DING Guoping; ZHOU Zude; HU Yefa; ZHAO Liang

    2006-01-01

    With the globalization and diversification of the market and the rapid development of Information Technology (IT) and Artificial Intelligence (AI), the digital revolution of manufacturing is coming. One of the key technologies in digital manufacturing is product digital modeling. This paper firstly analyzes the information and features of the product digital model during each stage in the product whole lifecycle, then researches on the three critical technologies of digital modeling in digital manufacturing-product modeling, standard for the exchange of product model data and digital product data management. And the potential signification of the product digital model during the process of digital manufacturing is concluded-product digital model integrates primary features of each stage during the product whole lifecycle based on graphic features, applies STEP as data exchange mechanism, and establishes PDM system to manage the large amount, complicated and dynamic product data to implement the product digital model data exchange, sharing and integration.

  13. Digital architecture, wearable computers and providing affinity

    DEFF Research Database (Denmark)

    Guglielmi, Michel; Johannesen, Hanne Louise

    2005-01-01

    as the setting for the events of experience. Contemporary architecture is a meta-space residing almost any thinkable field, striving to blur boundaries between art, architecture, design and urbanity and break down the distinction between the material and the user or inhabitant. The presentation for this paper...... will, through research, a workshop and participation in a cumulus competition, focus on the exploration of boundaries between digital architecture, performative space and wearable computers. Our design method in general focuses on the interplay between the performing body and the environment – between...

  14. From Indymedia to Anonymous: rethinking action and identity in digital cultures

    OpenAIRE

    McDonald, Kevin

    2015-01-01

    The period following the social mobilizations of 2011 has seen a renewed focus on the place of communication in collective action, linked to the increasing importance of digital communications. Framed in terms of personalized ‘connective action’ or the social morphology of networks, these analyses have criticized previously dominant models of ‘collective identity’, arguing that collective action needs to be understood as ‘digital networking’. These influential approaches have been significant...

  15. Slumdog romance: Facebook love and digital privacy at the margins

    Science.gov (United States)

    Arora, Payal; Scheiber, Laura

    2017-01-01

    Facebook has consolidated its position as the one-stop-shop for social activity among the poor in the global South. Sex, romance, and love are key motivations for mobile and Internet technology usage among this demographic, much like the West. Digital romance is a critical context through which we gain fresh perspectives on Internet governance for an emerging digital and globalizing public. Revenge porn, slut-shaming, and Internet romance scams are a common and growing malady worldwide. Focusing on how it manifests in diverse digital cultures will aid in the shaping of new Internet laws for a more inclusive cross-cultural public. In specific, this article examines how low-income youth in two of the BRICS (Brazil, Russia, India, China and South Africa) nations – Brazil and India – exercise and express their notions on digital privacy, surveillance, and trust through the lens of romance. This allows for a more thorough investigation of the relationship between sexuality, morality, and governance within the larger Facebook ecology. As Facebook becomes the dominant virtual public sphere for the world’s poor, we are compelled to ask whether inclusivity of the digital users comes at the price of diversity of digital platforms.

  16. Slumdog romance: Facebook love and digital privacy at the margins.

    Science.gov (United States)

    Arora, Payal; Scheiber, Laura

    2017-04-01

    Facebook has consolidated its position as the one-stop-shop for social activity among the poor in the global South. Sex, romance, and love are key motivations for mobile and Internet technology usage among this demographic, much like the West. Digital romance is a critical context through which we gain fresh perspectives on Internet governance for an emerging digital and globalizing public. Revenge porn, slut-shaming, and Internet romance scams are a common and growing malady worldwide. Focusing on how it manifests in diverse digital cultures will aid in the shaping of new Internet laws for a more inclusive cross-cultural public. In specific, this article examines how low-income youth in two of the BRICS (Brazil, Russia, India, China and South Africa) nations - Brazil and India - exercise and express their notions on digital privacy, surveillance, and trust through the lens of romance. This allows for a more thorough investigation of the relationship between sexuality, morality, and governance within the larger Facebook ecology. As Facebook becomes the dominant virtual public sphere for the world's poor, we are compelled to ask whether inclusivity of the digital users comes at the price of diversity of digital platforms.

  17. Digital Pulser for Characterization and Diagnostic of Digital Spectrometers

    International Nuclear Information System (INIS)

    Jordanov, V.T.

    2013-01-01

    The concept and the realization of the digital pulser are presented. The digital pulser is implemented as a functional block of a digital spectrometer. The digital pulser provides noise free and distortion free measurement of the inherent electronic noise of the entire spectroscopy system. The digital pulser is introduced at the end of the signal processing chain and allows separate evaluation of the individual spectroscopy blocks. It offers the ability to characterize and diagnose problems of the digital pulse height analysers by grounding their inputs. The digital pulser does not interfere with the processing of the detector signals and does not contribute to the dead time and the pulse pile-up of the system. The digital pulser peaks are not affected by the presence of detector pulses and are stored in a separate histogram memory leaving the detector spectrum undistorted. (author)

  18. Digital Ethics/Going Digital.

    Science.gov (United States)

    Wilson, Bradley

    1996-01-01

    Finds that the recent National Press Photographers Association code of ethics can serve as a model for any photography staff. Discusses how digital imaging is becoming commonplace in classrooms, due to decreasing costs and easier software. Explains digital terminology. Concludes that time saved in the darkroom and at the printer is now spent on…

  19. Can We Teach Digital Natives Digital Literacy?

    Science.gov (United States)

    Ng, Wan

    2012-01-01

    In recent years, there has been much debate about the concept of digital natives, in particular the differences between the digital natives' knowledge and adoption of digital technologies in informal versus formal educational contexts. This paper investigates the knowledge about educational technologies of a group of undergraduate students…

  20. Panning artifacts in digital pathology images

    Science.gov (United States)

    Avanaki, Ali R. N.; Lanciault, Christian; Espig, Kathryn S.; Xthona, Albert; Kimpe, Tom R. L.

    2017-03-01

    In making a pathologic diagnosis, a pathologist uses cognitive processes: perception, attention, memory, and search (Pena and Andrade-Filho, 2009). Typically, this involves focus while panning from one region of a slide to another, using either a microscope in a traditional workflow or software program and display in a digital pathology workflow (DICOM Standard Committee, 2010). We theorize that during panning operation, the pathologist receives information important to diagnosis efficiency and/or correctness. As compared to an optical microscope, panning in a digital pathology image involves some visual artifacts due to the following: (i) the frame rate is finite; (ii) time varying visual signals are reconstructed using imperfect zero-order hold. Specifically, after pixel's digital drive is changed, it takes time for a pixel to emit the expected amount of light. Previous work suggests that 49% of navigation is conducted in low-power/overview with digital pathology (Molin et al., 2015), but the influence of display factors has not been measured. We conducted a reader study to establish a relationship between display frame rate, panel response time, and threshold panning speed (above which the artifacts become noticeable). Our results suggest visual tasks that involve tissue structure are more impacted by the simulated panning artifacts than those that only involve color (e.g., staining intensity estimation), and that the panning artifacts versus normalized panning speed has a peak behavior which is surprising and may change for a diagnostic task. This is work in progress and our final findings should be considered in designing future digital pathology systems.

  1. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

    Science.gov (United States)

    Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi

    2018-01-01

    Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.

  2. Digital control in LLRF system for CYCIAE-100 cyclotron

    Energy Technology Data Exchange (ETDEWEB)

    Yin, Zhiguo, E-mail: bitbearAT@hotmail.com; Fu, Xiaoliang; Ji, Bin; Zhang, Tianjue; Wang, Chuan

    2016-05-21

    As a driven accelerator, the CYCIAE-100 cyclotron is designed by China Institute of Atomic Energy for the Beijing Radio Ion-beam Facility project. The cyclotron RF system is designed to use two RF power sources of 100 kW to drive two half-wavelength cavities respectively. Two Dee accelerating electrodes are kept separately from each other inside the cyclotron, while their accelerating voltages are maintained in phase by the efforts of LLRF control. An analog–digital hybrid LLRF system has been developed to achieve cavity tuning control, dee voltage amplitude and phase stabilization etc. The analog subsystems designs are focused on RF signal up/down conversion, tuning control, and dee voltage regulation. The digital system provides an RF signal source, aligns the cavity phases and maintains a Finite State Machine. The digital parts combine with the analog functions to provide the LLRF control. A brief system hardware introduction will be given in this paper, followed by the review of several major characteristics of the digital control in the 100 MeV cyclotron LLRF system. The commissioning is also introduced, and most of the optimization during the process was done by changing the digital parts.

  3. Digital Museum Collections and Social Media: Ethical Considerations of Ownership and Use

    Directory of Open Access Journals (Sweden)

    Kalliopi Fouseki

    2013-12-01

    Full Text Available This paper examines the role of digital collections and digital information in the democratisation process of museums. The paper focuses on ethical and ownership issues regarding Wikipedia’s online encyclopaedia initiative to widen access to digital images and knowledge through digital media, for the wider public. The paper draws on three cases of national museums in the UK, namely the Victoria and Albert Museum, the British Museum and the National Portrait Gallery. The paper argues that notions of governmentality, power, authority, and control - which traditionally characterise national museums - are still dominant in digital collections. This occasionally results in tensions that revolve around the issue of ownership of digital images and digital museum objects as well as their commercial and non-commercial uses. The paper shows that recent disputes and discourse related to the use of digital images by Wikipedians (active users of Wikipedia have raised issues of authority and control not only of physical objects but also of the information and knowledge related to these objects. The paper demonstrates that the level of collaboration with Wikipedia reflects to some extent the participatory nature, philosophy, and ideology of each museum institution.

  4. [Managing digital medical imaging projects in healthcare services: lessons learned].

    Science.gov (United States)

    Rojas de la Escalera, D

    2013-01-01

    Medical imaging is one of the most important diagnostic instruments in clinical practice. The technological development of digital medical imaging has enabled healthcare services to undertake large scale projects that require the participation and collaboration of many professionals of varied backgrounds and interests as well as substantial investments in infrastructures. Rather than focusing on systems for dealing with digital medical images, this article deals with the management of projects for implementing these systems, reviewing various organizational, technological, and human factors that are critical to ensure the success of these projects and to guarantee the compatibility and integration of digital medical imaging systems with other health information systems. To this end, the author relates several lessons learned from a review of the literature and the author's own experience in the technical coordination of digital medical imaging projects. Copyright © 2012 SERAM. Published by Elsevier Espana. All rights reserved.

  5. Twin-image reduction in inline digital holography using an object segmentation heuristic

    International Nuclear Information System (INIS)

    McElhinney, Conor P; Hennelly, Bryan M; Naughton, Thomas J

    2008-01-01

    We present a digital image processing heuristic for the removal of the twin-image in inline digital holograms. Typically, the unwanted twin manifests itself as visible corruptive noise in the reconstruction plane. We reconstruct the unwanted twin-image at its in-focus plane and suppress it by first finding the boundary of the object, and then removing the optical energy within this boundary. In this plane, the wanted twin-image optical energy is largely dispersed outside this boundary and so it is retained. The heuristic's effectiveness is demonstrated using a digital hologram of a real-world object.

  6. Twin-image reduction in inline digital holography using an object segmentation heuristic

    Energy Technology Data Exchange (ETDEWEB)

    McElhinney, Conor P; Hennelly, Bryan M [Department of Computer Science, National University of Ireland, Maynooth, County Kildare (Ireland); Naughton, Thomas J [University of Oulu, RFMedia Laboratory, Oulu Southern Institute, Vierimaantie 5, 84100 Ylivieska (Finland)], E-mail: conormce@cs.nuim.ie, E-mail: tomn@cs.nuim.ie

    2008-11-01

    We present a digital image processing heuristic for the removal of the twin-image in inline digital holograms. Typically, the unwanted twin manifests itself as visible corruptive noise in the reconstruction plane. We reconstruct the unwanted twin-image at its in-focus plane and suppress it by first finding the boundary of the object, and then removing the optical energy within this boundary. In this plane, the wanted twin-image optical energy is largely dispersed outside this boundary and so it is retained. The heuristic's effectiveness is demonstrated using a digital hologram of a real-world object.

  7. Aircraft digital flight control technical review

    Science.gov (United States)

    Davenport, Otha B.; Leggett, David B.

    1993-01-01

    The Aircraft Digital Flight Control Technical Review was initiated by two pilot induced oscillation (PIO) incidents in the spring and summer of 1992. Maj. Gen. Franklin (PEO) wondered why the Air Force development process for digital flight control systems was not preventing PIO problems. Consequently, a technical review team was formed to examine the development process and determine why PIO problems continued to occur. The team was also to identify the 'best practices' used in the various programs. The charter of the team was to focus on the PIO problem, assess the current development process, and document the 'best practices.' The team reviewed all major USAF aircraft programs with digital flight controls, specifically, the F-15E, F-16C/D, F-22, F-111, C-17, and B-2. The team interviewed contractor, System Program Office (SPO), and Combined Test Force (CTF) personnel on these programs. The team also went to NAS Patuxent River to interview USN personnel about the F/A-18 program. The team also reviewed experimental USAF and NASA systems with digital flight control systems: X-29, X-31, F-15 STOL and Maneuver Technology Demonstrator (SMTD), and the Variable In-Flight Stability Test Aircraft (VISTA). The team also discussed the problem with other experts in the field including Ralph Smith and personnel from Calspan. The major conclusions and recommendations from the review are presented.

  8. Comparative Study between Digital Tomosynthesis and Endoscopic Retrograde Cholangio pancreatography for the Evaluation of Common Bile Duct Stones: Focus on Detection and Stone Conspicuity

    International Nuclear Information System (INIS)

    Huh, Ji Mi; Baek, Seung Yon; Hwang, Yun Mi; Lee, Jeong Kyong; Kim, Yoo Kyung; Yi, Sun Young

    2011-01-01

    To compare digital tomosynthesis with endoscopic retrograde cholangiopancreatography (ERCP) for the evaluation of common bile duct (CBD) stones as a complementary diagnostic tool. Ninety six consecutive patients clinically suspected of having CBD stones underwent ERCP and digital tomosynthesis over 22 months, from December, 2008 to May, 2010. Fourteen patients were excluded. Therefore 82 patients were included in this study. The images were retrospectively reviewed to compare the results with the final analysis based on the consensus of two abdominal radiologists. An evaluation of the presence of CBD stones was followed by a determination of the margins for the stones, scored with a five-point conspicuity scale. Among the 82 patients, 54 collectively had 89 CBD stones and 28 had no stones. The sensitivity and specificity for the detection of CBD stones were 91.0% and 80.6% for ERCP, 92.1% and 93.5% for digital tomosynthesis, respectively. The average score was 3.29 for ERCP and 3.89 for digital tomosynthesis in 77 similar detected stones. Digital tomosynthesis demonstrated significantly better conspicuity than ERCP (p = 0.001). Digital tomosynthesis is an effective and complementary diagnostic method for the evaluation of CBD stones.

  9. Spectral colors capture and reproduction based on digital camera

    Science.gov (United States)

    Chen, Defen; Huang, Qingmei; Li, Wei; Lu, Yang

    2018-01-01

    The purpose of this work is to develop a method for the accurate reproduction of the spectral colors captured by digital camera. The spectral colors being the purest color in any hue, are difficult to reproduce without distortion on digital devices. In this paper, we attempt to achieve accurate hue reproduction of the spectral colors by focusing on two steps of color correction: the capture of the spectral colors and the color characterization of digital camera. Hence it determines the relationship among the spectral color wavelength, the RGB color space of the digital camera device and the CIEXYZ color space. This study also provides a basis for further studies related to the color spectral reproduction on digital devices. In this paper, methods such as wavelength calibration of the spectral colors and digital camera characterization were utilized. The spectrum was obtained through the grating spectroscopy system. A photo of a clear and reliable primary spectrum was taken by adjusting the relative parameters of the digital camera, from which the RGB values of color spectrum was extracted in 1040 equally-divided locations. Calculated using grating equation and measured by the spectrophotometer, two wavelength values were obtained from each location. The polynomial fitting method for the camera characterization was used to achieve color correction. After wavelength calibration, the maximum error between the two sets of wavelengths is 4.38nm. According to the polynomial fitting method, the average color difference of test samples is 3.76. This has satisfied the application needs of the spectral colors in digital devices such as display and transmission.

  10. A Search method for Scientific Data in Digital Libraries, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Unlike the world wide web or general libraries, digital libraries typically serve a specialized community of experts sharing a relatively narrow focus, such as some...

  11. Children as digital rights agents

    DEFF Research Database (Denmark)

    Stald, Gitte Bang

    2016-01-01

    This paper looks at children’s involvement and contribution to internet safety policy. In many respects, the research perspective on children and young people has also seen a shift towards the child as agent, as citizen (Livingstone 2002, 2009; Dahlgren 2007). With increasing attention given...... to children’s communication rights there is an acknowledgement that children’s voices should be heard in all matters that affect them (Hamelink 2008). We still, however, primarily discuss how adults could and should take responsibility in guarding children and young people from risk and harm, and what...... the role of the “adult world” is. We need to focus more on the active role that children and adolescents play, according to age, skills and various capacities, in identifying, reflecting upon and acting according to opportunities and challenges in relation to digital media and digital rights (Hartman et al...

  12. Adaptation and Feasibility Study of a Digital Health Program to Prevent Diabetes among Low-Income Patients: Results from a Partnership between a Digital Health Company and an Academic Research Team

    Directory of Open Access Journals (Sweden)

    Valy Fontil

    2016-01-01

    Full Text Available Background. The feasibility of digital health programs to prevent and manage diabetes in low-income patients has not been adequately explored. Methods. Researchers collaborated with a digital health company to adapt a diabetes prevention program for low-income prediabetes patients at a large safety net clinic. We conducted focus groups to assess patient perspectives, revised lessons for improved readability and cultural relevance to low-income and Hispanic patients, conducted a feasibility study of the adapted program in English and Spanish speaking cohorts, and implemented real-time adaptations to the program for commercial use and for a larger trial of in multiple safety net clinics. Results. The majority of focus group participants were receptive to the program. We modified the curriculum to a 5th-grade reading level and adapted content based on patient feedback. In the feasibility study, 54% of eligible contacted patients expressed interest in enrolling (n=23. Although some participants’ computer access and literacy made registration challenging, they were highly satisfied and engaged (80% logged in at least once/week. Conclusions. Underserved prediabetic patients displayed high engagement and satisfaction with a digital diabetes prevention program despite lower digital literacy skills. The collaboration between researchers and a digital health company enabled iterative improvements in technology implementation to address challenges in low-income populations.

  13. Digital Kildebeskyttelse. Udfordringer. Idealer. Dilemmaer.

    OpenAIRE

    Eggers, Camilla Høj

    2015-01-01

    In journalism, the challenges concerning the protection of confidential sources have grown alongside the increase in surveillance. Almost every individual lays out a digital track by using a cell phone, browsing the Internet and sending e-mails, and this track can be used to hunt down and expose sources. Through qualitative interviews with a focus on everyday practices this thesis examines how ten investigative journalists from five of the largest national media outlets attempt to protect the...

  14. From Image Processing to Classification: 1. Modelling Disturbances of Isoelectric Focusing Patterns

    DEFF Research Database (Denmark)

    Jensen, Karsten; Søndergaard, I.; Skovgaard, I. M.

    1995-01-01

    In order to optimize the conditions for evaluation of isoelectric focusing (IEF) patterns by digital image processing, the sources of error in determination of the pi values were analyzed together with the influence of a varying background. The effects of band distortions, in the spectra...... of the individual lanes, were examined. In order to minimize the effect of these distortions, optimal conditions for handling IEF patterns by digital image processing were elucidated. The systematic part of the global deformation on the gels was investigated and an algorithm was developed by which it was possible...

  15. Digitization and digital archiving a practical guide for librarians

    CERN Document Server

    Leggett, Elizabeth R

    2014-01-01

    Modern library patrons are embracing the ease with which information can be accessed digitally, and so many librarians are currently working toward making information available electronically. Digitization and Digital Archiving: A Practical Guide for Librarians is a comprehensive guide with step-by-step instructions for forming digital archives.

  16. Digital disruption ?syndromes.

    Science.gov (United States)

    Sullivan, Clair; Staib, Andrew

    2017-05-18

    The digital transformation of hospitals in Australia is occurring rapidly in order to facilitate innovation and improve efficiency. Rapid transformation can cause temporary disruption of hospital workflows and staff as processes are adapted to the new digital workflows. The aim of this paper is to outline various types of digital disruption and some strategies for effective management. A large tertiary university hospital recently underwent a rapid, successful roll-out of an integrated electronic medical record (EMR). We observed this transformation and propose several digital disruption "syndromes" to assist with understanding and management during digital transformation: digital deceleration, digital transparency, digital hypervigilance, data discordance, digital churn and post-digital 'depression'. These 'syndromes' are defined and discussed in detail. Successful management of this temporary digital disruption is important to ensure a successful transition to a digital platform. What is known about this topic? Digital disruption is defined as the changes facilitated by digital technologies that occur at a pace and magnitude that disrupt established ways of value creation, social interactions, doing business and more generally our thinking. Increasing numbers of Australian hospitals are implementing digital solutions to replace traditional paper-based systems for patient care in order to create opportunities for improved care and efficiencies. Such large scale change has the potential to create transient disruption to workflows and staff. Managing this temporary disruption effectively is an important factor in the successful implementation of an EMR. What does this paper add? A large tertiary university hospital recently underwent a successful rapid roll-out of an integrated electronic medical record (EMR) to become Australia's largest digital hospital over a 3-week period. We observed and assisted with the management of several cultural, behavioural and

  17. Going digital: a checklist in preparing for hospital-wide electronic medical record implementation and digital transformation.

    Science.gov (United States)

    Scott, Ian A; Sullivan, Clair; Staib, Andrew

    2018-05-24

    Objective In an era of rapid digitisation of Australian hospitals, practical guidance is needed in how to successfully implement electronic medical records (EMRs) as both a technical innovation and a major transformative change in clinical care. The aim of the present study was to develop a checklist that clearly and comprehensively defines the steps that best prepare hospitals for EMR implementation and digital transformation. Methods The checklist was developed using a formal methodological framework comprised of: literature reviews of relevant issues; an interactive workshop involving a multidisciplinary group of digital leads from Queensland hospitals; a draft document based on literature and workshop proceedings; and a review and feedback from senior clinical leads. Results The final checklist comprised 19 questions, 13 related to EMR implementation and six to digital transformation. Questions related to the former included organisational considerations (leadership, governance, change leaders, implementation plan), technical considerations (vendor choice, information technology and project management teams, system and hardware alignment with clinician workflows, interoperability with legacy systems) and training (user training, post-go-live contingency plans, roll-out sequence, staff support at point of care). Questions related to digital transformation included cultural considerations (clinically focused vision statement and communication strategy, readiness for change surveys), management of digital disruption syndromes and plans for further improvement in patient care (post-go-live optimisation of digital system, quality and benefit evaluation, ongoing digital innovation). Conclusion This evidence-based, field-tested checklist provides guidance to hospitals planning EMR implementation and separates readiness for EMR from readiness for digital transformation. What is known about the topic? Many hospitals throughout Australia have implemented, or are planning

  18. The impact of digitalization on Property Operations and Maintenance (O&M)

    OpenAIRE

    Garcia, Resty Gonzales

    2017-01-01

    The research topic of this master thesis is; “How can digitalization help increase productivity in property Operations and Maintenance (O&M)?” The research topic focuses on the challenges and opportunities in utilizing Computer Aided Facilities Management (CAFM) system regarding the operative function in Operations and Maintenance (O&M). The purpose of this research work is to analyze relevant literature and empirical data on how digitalization affects the O&M process and how the O&M ...

  19. Evaluating digital libraries in the health sector. Part 2: measuring impacts and outcomes.

    Science.gov (United States)

    Cullen, Rowena

    2004-03-01

    This is the second part of a two-part paper which explores methods that can be used to evaluate digital libraries in the health sector. Part 1 focuses on approaches to evaluation that have been proposed for mainstream digital information services. This paper investigates evaluative models developed for some innovative digital library projects, and some major national and international electronic health information projects. The value of ethnographic methods to provide qualitative data to explore outcomes, adding to quantitative approaches based on inputs and outputs is discussed. The paper concludes that new 'post-positivist' models of evaluation are needed to cover all the dimensions of the digital library in the health sector, and some ways of doing this are outlined.

  20. Digital Natives and Digital Divide: Analysing Perspective for Emerging Pedagogy

    Science.gov (United States)

    Onye, Uriel U.; Du, Yunfei

    2016-01-01

    This paper addresses the concepts of digital natives and digital divide from the perspective of the digital outsiders (part of digital natives). It takes a critical look at the implications of available ICT in both developed and underdeveloped countries in the fight against digital divide. The major contribution to literature is by drawing…