The Digital Chameleon Principle : Computing Invisibility
نویسنده
چکیده
H ow many of us have had a dream of being invisible? But is that really that far-fetched, impossible, or improbable? As a child I used to daydream of magical powers that let me pursue exciting adventures in magical wonderlands. These great magical powers exhibited technology far beyond the current state of the art. I still clearly remember today those fantastic dreams. Indeed, dreaming that kind of fantasy let me feel good and relaxed, and they certainly colored my childhood. I personally think that daydreaming is also a kind of healing therapy of our day-to-day busy life to satisfy our curiosity. However, nowadays I also feel somewhat more conservative (and do not dream unfortunately anymore of Harry Potter worlds), partly because of my science background gained over the last 20 years or so of school education. School taught me the way to reasonably and rationally think without leaving much space for extravagance. That phenomenon is what Sir Arthur C. Clarke called the failure of the nerves in his book Profiles of the Future: An Inquiry into the Limits of the Possible. A good example cited by Clarke are excerpts of scholarly articles written by experts claiming the then impossibility of heavier-thanair flying machines. Nowadays, we all take airplanes, so why do children still dream of magical worlds? Maybe, a simple answer is that children use and look at technology without fully understanding their underlying mechanisms making it possible. It’s easier for them to naturally extend the scope of those technologies according to their will. In this article, I will examine the concept of invisibility in detail with a good flavor of computer graphics. But first, let me quickly review its historical background.
منابع مشابه
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Sanitizable signatures are a variant of digital signatures where a designated party (the sanitizer) can update admissible parts of a signed message. At PKC ’17, Camenisch et al. introduced the notion of invisible sanitizable signatures that hides from an outsider which parts of a message are admissible. Their security definition of invisibility, however, does not consider dishonest signers. Alo...
متن کاملDocument watermarking based on digital holographic principle
A new method for document watermarking based on the digital Fourier hologram is proposed. It applies the methods of digital image watermarking based on holographic principle presented previously in several papers into printed documents. Experimental results show that the proposed method can not only meet the demand on invisibility, robustness and non-reproducibility of the document watermark, a...
متن کاملInstantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack
Fine-grained Address Space Randomization has been considered as an effective protection against code reuse attacks such as ROP/JOP. However, it only employs a one-time randomization, and such a limitation has been exploited by recent just-in-time ROP and side channel ROP, which collect gadgets on-the-fly and dynamically compile them for malicious purposes. To defeat these advanced code reuse at...
متن کاملChameleon Hashing and Signatures
We introduce chameleon signatures that provide with an undeniable commitment of the signer to the contents of the signed document (as regular digital signatures do) but, at the same time, do not allow the recipient of the signature to disclose the contents of the signed information to any third party without the signer's consent. These signatures are closely related to \undeniable signatures", ...
متن کاملComputing of the Burnt Forest Regions Area Using Digital Image Processing
At present, there is no conventional scientific method to evaluate the area of the burnt regions of forests and in this field, the related organizations use different methods and variables. Also, the speed in performing the processes of area computing and damage evaluation, especially in the extensive damaged forest regions is very slow; consequently, the expression of results takes more ti...
متن کامل