Interim Stabilisation in Fragile Security Situations
نویسندگان
چکیده
منابع مشابه
Protecting rights in conflict situations and fragile states -
The concept of human rights has a range of potential applications in conflict situations and weak institutional environments. In conflict situations, wherever civilians are at risk, there is by definition an infringement of the individual’s right to personal security, and in most cases infringements of a number of other rights. Post-conflict situations and weak institutional environments are al...
متن کاملSecurity on Fragile and Semi-fragile Watermarks Authentication
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of some possibl...
متن کاملWhole-of-Government Approaches to Fragile States and Situations
Price: DKK 50.00 (VAT included) DIIS publications can be downloaded free of charge from www.diis.dk Hardcopies can be ordered at www.diis.dk This report is part of the Research and Communication Programme (ReCom) on international development cooperation, funded by Danida (Danish Development Agency) and Sida (Swedish Development Agency), and undertaken by a number of institutions including UNU-W...
متن کاملOn the Security of a Revised Fragile Watermarking Scheme
This paper analyzes a revised fragile watermarking scheme proposed by Botta et al. which was developed as a revision of the watermarking scheme previously proposed by Rawat et al. A new attack is presented that allows an attacker to apply a valid watermark on tampered images, therefore circumventing the protection that the watermarking scheme under study was supposed to offer. Furthermore, the ...
متن کاملA Fragile Watermark Method for Improving Medical Images Security
Aiming at the medical images security problem during storage and transmission, the author provides a fragile watermark method to protect it. And this method can be able to achieve integrity detection and accurate tampering localization. This method adopts image block, chaotic modulation in watermark information and encryption to set password. The watermark information will be embedded to the le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Stability: International Journal of Security and Development
سال: 2012
ISSN: 2165-2627
DOI: 10.5334/sta.aa