The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Specific small amounts of amino acids caused agglomeration of L‐valine (L‐Val) crystals during evaporative crystallization from aqueous solutions. The agglomeration of L‐Val occurred only under acidic condition when guest amino acids satisfied several conditions. Only L‐form amino acids that have carboxylic acid groups and sufficiently long alkyl chain in the side‐chains could induce agglomeration...
Online social networks are being used by more and more people. While they enable rich communication, they cause privacy problems. One problem that has not been previously researched is the revelation of private information on blogs and comment parts of online social networks. This paper describes a new disclosure control system for natural language information that automatically checks blogs and comments...
Online social networks are used by more and more people. While they enable rich communication, posting information on such networks can degrade one's privacy and anonymity. A metric based on probability and entropy has been developed for measuring the degree of information revelation caused by posting to social networks. It can be used to measure the loss of privacy as well as the loss of anonymity.
Content-based phishing detection extracts keywords from a target Web page, uses these keywords to retrieve the corresponding legitimate site, and detects phishing when the domain of the target page does not match that of the retrieved site. It often misidentifies a legitimate target site as a phishing site, however, because the extracted keywords do not charecterize the legitimate site with sufficient...
We have extended a previously reported method immune to random distortion to make it immune to affine transformation as well. Although affine transformation consists of four geometric transformations (scaling, rotation, translation, and shearing), the proposed method requires only scale and rotation searching. Experimental evaluation showed that it can detect each geometric transformation. It can...
Loss of anonymity, bribery, and coercion are more serious in small-scale voting than in large-scale voting. This paper shows that the entropy of each vote can be decreased, i.e., the anonymity of voting can be compromised, if the number of votes for each candidate is disclosed. It gives two strict definitions of anonymity instead of the previous definition and, based on the new definitions, proposes...
This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where...
Although digital signatures are the basic elements of security-sensitive systems, the host computers that generate them are usually connected to the Internet and are constantly at risk of intrusion. The worst possible situation is when an intruder generates a user's legitimate signature against the user's intension. Therefore, unintended digital signatures must never be generated, even when the host...
An improved system is described for embedding watermarks into video frames in real time using software on an ordinary personal computer. It uses standard video I/O and is separate from the encoding process, so it can be incorporated into various encoding and distributing systems, which makes it well suited for distributing live content. Real-time processing is achieved by making a watermark-pattern...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.