The Digital Chameleon Principle : Computing Invisibility

نویسنده

  • Miguel Encarnação
چکیده

H ow many of us have had a dream of being invisible? But is that really that far-fetched, impossible, or improbable? As a child I used to daydream of magical powers that let me pursue exciting adventures in magical wonderlands. These great magical powers exhibited technology far beyond the current state of the art. I still clearly remember today those fantastic dreams. Indeed, dreaming that kind of fantasy let me feel good and relaxed, and they certainly colored my childhood. I personally think that daydreaming is also a kind of healing therapy of our day-to-day busy life to satisfy our curiosity. However, nowadays I also feel somewhat more conservative (and do not dream unfortunately anymore of Harry Potter worlds), partly because of my science background gained over the last 20 years or so of school education. School taught me the way to reasonably and rationally think without leaving much space for extravagance. That phenomenon is what Sir Arthur C. Clarke called the failure of the nerves in his book Profiles of the Future: An Inquiry into the Limits of the Possible. A good example cited by Clarke are excerpts of scholarly articles written by experts claiming the then impossibility of heavier-thanair flying machines. Nowadays, we all take airplanes, so why do children still dream of magical worlds? Maybe, a simple answer is that children use and look at technology without fully understanding their underlying mechanisms making it possible. It’s easier for them to naturally extend the scope of those technologies according to their will. In this article, I will examine the concept of invisibility in detail with a good flavor of computer graphics. But first, let me quickly review its historical background.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Sanitizable signatures are a variant of digital signatures where a designated party (the sanitizer) can update admissible parts of a signed message. At PKC ’17, Camenisch et al. introduced the notion of invisible sanitizable signatures that hides from an outsider which parts of a message are admissible. Their security definition of invisibility, however, does not consider dishonest signers. Alo...

متن کامل

Document watermarking based on digital holographic principle

A new method for document watermarking based on the digital Fourier hologram is proposed. It applies the methods of digital image watermarking based on holographic principle presented previously in several papers into printed documents. Experimental results show that the proposed method can not only meet the demand on invisibility, robustness and non-reproducibility of the document watermark, a...

متن کامل

Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack

Fine-grained Address Space Randomization has been considered as an effective protection against code reuse attacks such as ROP/JOP. However, it only employs a one-time randomization, and such a limitation has been exploited by recent just-in-time ROP and side channel ROP, which collect gadgets on-the-fly and dynamically compile them for malicious purposes. To defeat these advanced code reuse at...

متن کامل

Chameleon Hashing and Signatures

We introduce chameleon signatures that provide with an undeniable commitment of the signer to the contents of the signed document (as regular digital signatures do) but, at the same time, do not allow the recipient of the signature to disclose the contents of the signed information to any third party without the signer's consent. These signatures are closely related to \undeniable signatures", ...

متن کامل

Computing of the Burnt Forest Regions Area Using Digital Image Processing

At present, there is no conventional scientific method to evaluate the area of the burnt regions of forests and in this field, the related organizations use different methods and variables. Also, the speed in performing the processes of area computing and damage evaluation, especially in the extensive damaged forest regions is very slow; consequently, the expression of results takes more ti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994