The data hiding method embeds the data into covers such as video, audio, and images, which are used for integrity authentication, media protection, communication covert, copyright protection etc. In ...this work, several reversible data hiding (RDH) algorithms are analysed. Here, RDH algorithms are classified into six categories. They are histogram shifting centred RDH, code division multiplexing-based RDH, compression-based RDH, contrast enhancement with RDH, and expansion-based RDH, and RDH for encrypted images. In RDH,no information is lost when the message is recovered as the message is embedded into the host image. The embedded message is extracted using an extraction procedure. This study critically reviews the technological advancement for the past decade on the aspects of classification, pre-processing, feature extraction, and analysis technique. The current trend in RDH is to insert confidential data into a video by using RDH in the encoded area that has a wide selection of applications on the confidential communication inside the area of cybersecurity.
Security of confidential data at the physical layer has been analysed in a network where the source sends the confidential data to the destination via multiple energy harvesting decode and forward ...relays in the presence of a single eavesdropper (EAV). In this two-hop communication, the first hop is broadcasting hop when the source sends the information signal to relay and other is the relaying hop when a selected relay forwards the information signal as well as transmits a jamming signal to destination and EAV. Each relay has the two batteries; one for accumulating the harvested energy and the other for power supply to relays for relay operation over a number of frames until the accumulated harvested energy becomes sufficient. In the broadcasting hop, relays harvest energy using a power splitting ratio scheme and accumulate the harvested energy in the battery over a number of communication frames. The performance is analysed in the form of secrecy outage probability (SOP) when the relay uses only the harvested energy to forward the signal. A closed-form analytical expression for the SOP is derived. MATLAB-based simulation results match well with the analytical results.
Abstract
Background
Data reuse is often controlled to protect the privacy of subjects and patients. Data discovery tools need ways to inform researchers about restrictions on data access and re-use.
...Results
We present elements in the Data Tags Suite (DATS) metadata schema describing data access, data use conditions, and consent information. DATS metadata are explained in terms of the administrative, legal, and technical systems used to protect confidential data.
Conclusions
The access and use metadata items in DATS are designed from the perspective of a researcher who wants to find and re-use existing data. We call for standard ways of describing informed consent and data use agreements that will enable automated systems for managing research data.
Understanding the complexity of restricted research data is vitally important in the current new era of Open Science. While the FAIR Guiding Principles have been introduced to help researchers to ...make data Findable, Accessible, Interoperable and Reusable, it is still unclear how the notions of FAIR and Openness can be applied in the context of restricted data. Many methods have been proposed in support of the implementation of the principles, but there is yet no consensus among the scientific community as to the suitable mechanisms of making restricted data FAIR. We present here a systematic literature review to identify the methods applied by scientists when researching restricted data in a FAIR-compliant manner in the context of the FAIR principles. Through the employment of a descriptive and iterative study design, we aim to answer the following three questions: (1) What methods have been proposed to apply the FAIR principles to restricted data?, (2) How can the relevant aspects of the methods proposed be categorized?, (3) What is the maturity of the methods proposed in applying the FAIR principles to restricted data?. After analysis of the 40 included publications, we noticed that the methods found, reflect the stages of the Data Life Cycle, and can be divided into the following Classes: Data Collection, Metadata Representation, Data Processing, Anonymization, Data Publication, Data Usage and Post Data Usage. We observed that a large number of publications used ‘Access Control‘ and ‘Usage and License Terms’ methods, while others such as ‘Embargo on Data Release’ and the use of ‘Synthetic Data’ were used in fewer instances. In conclusion, we are presenting the first extensive literature review on the methods applied to confidential data in the context of FAIR, providing a comprehensive conceptual framework for future research on restricted access data.
In the article, we develop the software for process of confidential data detection based on the knowledge bases technology. The algorithm of detection of confidential data in the electronic documents ...transferred outbound of protected information system, due to application of linguistic technologies of the thorough text analysis is presented. The estimation of computing complexity of the developed algorithm is made up. The developed data structures and algorithm are realized in the programming language C++. Results of the experiments, confirmed workability of the developed algorithm are presented. The performed experimental researches of the developed algorithm have shown its practical applicability. The estimation of quality of confidential data detection is made up. The obtained estimations of detection quality have shown, that the developed structures of data and algorithm provide more effective and qualitative solution of problems of the confidential information detection in electronic documents, at due to application of knowledge bases technology where the subject domain of the analyzed information is considered. Distinctive feature of the developed algorithm of confidential data detection is the use of rapid access to hashed concept ontographs simultaneous implementation of knowledge base rules, which allows raising indicators of completeness and accuracy of detection. A scope of application of the developed software is the protection frames of the information intended for revealing of an information transfer containing data of confidential character in electronic documents outbound of protected information system with violation of security policy
Oral archives collected by professional scholars and ordinary people interested in dialects and ethnology are a precious resource for various fields of study (from linguistics to anthropology, from ...economy to history and politics, etc.) and may contain documents that could be labeled as products of intangible cultural heritage, thus deserving safeguard. Grammo-foni. Le soffitte della voce (Gra.fo), a two-year project jointly conducted by Scuola Normale Superiore and the University of Siena (Regione Toscana PAR FAS 2007-13), discovered, digitized, cataloged and disseminated via a web portal nearly 3000 hours of speech recordings stemming from around 30 oral archives collected by scholars and amateurs in the Tuscan territory. Having preserved such a significant collection of oral documents (e.g. oral biographies, ethno-texts, linguistic questionnaires, oral literature), Gra.fo constitutes a precious repository of Tuscan memory and provides a first-hand documentation of Tuscan language varieties from the early 1960s to the present day 7, 9. In this article, the Gra.fo project will be described in all its stages, which involve: fostering the level of awareness on the importance of preserving this valuable cultural heritage product; contacting the oral recordings’ owners and co-signing legal agreements for the temporary borrowing of the recordings and accompanying materials; collecting and digitizing the recordings and the accompanying materials; cataloging (with the self-developed software Audiografo) and partially transcribing the oral documents; implementing the downloadable online catalog http://grafo.sns.it/, an open-ended repository of oral texts which have hitherto been known to a very limited number of potential users. Some problematic issues related to the treatment of oral archives will also be discussed, together with the proposed solutions. These concern the carrier / document relation, the treatment of confidential information, and the cataloging of documents within other documents.
Lin (2014) developed a framework of the method of the sample-moment-based density approximant, for estimating the probability density function of microdata based on noise multiplied data. ...Theoretically, it provides a promising method for data users in generating the synthetic data of the original data without accessing the original data; however, technical issues can cause problems implementing the method. In this paper, we describe a software package called MaskDensity14, written in the R language, that uses a computational approach to solve the technical issues and makes the method of the sample-moment-based density approximant feasible. MaskDensity14 has applications in many areas, such as sharing clinical trial data and survey data without releasing the original data.