In this Paper, we present a new imperceptible digital watermarking system for images. This system... more In this Paper, we present a new imperceptible digital watermarking system for images. This system is used for copyright protection, and is compared with base watermarking method (BWM) proposed by Koch et. al. The developed system is called ¿Digital Image Copyright Protector¿ (DIGICOP). It automatically generates the content owner's unique Identification Mark from a supplied text string and a secret
Healthcare data can be created, copied and modified faster than ever before. Data is the fuel beh... more Healthcare data can be created, copied and modified faster than ever before. Data is the fuel behind more efficient care. Unfortunately, healthcare today suffers from compartmentalized and fragmented data, delayed communications, and disparate workflow tools caused by the lack of interoperability. Blockchain technology maybe the vehicle to solve these problems, as besides it possesses key properties, such as immutability, decentralization, and transparency, which potentially address pressing issues in healthcare, such as incomplete records at point of care and difficult access to patients’ own health information. An efficient and effective healthcare system should be interoperable, allowing software apps and technology platforms to communicate securely and seamlessly, exchange data, and use the exchanged data across health organizations and app vendors. In this paper, we address the aspect of storage of Electronic Medical Records using smart contracts. The implementation is done using Ethereum’s blockchain network to solve problems faced by centralized platforms. The results were encouraging, and the implementation was also successful in reducing storage costs by storing large files off-chain (IPFS).
A method of treating a person for sickle cell anemia including administering to the person a ther... more A method of treating a person for sickle cell anemia including administering to the person a therapeutically effective dosage of the compound wherein at least one R=Cl, BR, CH3 or OCH3 and each other R=H, R'=H or CH3 and n=1, 2, 3, 4 or 5. The compound is preferably selected from the group consisting of clofibrate, clofibric acid, p-chlorophenoxyacetic acid and phenoxyacetic acid. It is preferably administered in solid dosage form and may advantageously be employed in prophylactic treatment to resist sickle cell crises.
Web browser extensions are popularly used to add extra functionality to web-browsers such as Safa... more Web browser extensions are popularly used to add extra functionality to web-browsers such as Safari, Chrome, Firefox, and Edge. These functionalities may include activity, entertainment, and security. However, many of these web exten- sions are not coded by security experts and thus they are targets for hackers when conducting cyber-attacks. This paper is based on a security review of 50 chrome extensions, 25 popular and 25 random. A study is done on their vulnerabilities through privilege granting and escalation, and suggestions are given on how to ameliorate the development and use of extensions, while reducing the risk-factors.
HOW TO PROTECT PERSONAL INFORMATION AGAINST KEYLOGGERS Ming Xu,Behzad Salami, and Charlie Obimbo ... more HOW TO PROTECT PERSONAL INFORMATION AGAINST KEYLOGGERS Ming Xu,Behzad Salami, and Charlie Obimbo Dept. of Computing and Information Science University of Guelph Ontario, Canada N1G 2W1 mxu@uoguelph ...
In this Paper, we present a new imperceptible digital watermarking system for images. This system... more In this Paper, we present a new imperceptible digital watermarking system for images. This system is used for copyright protection, and is compared with base watermarking method (BWM) proposed by Koch et. al. The developed system is called ¿Digital Image Copyright Protector¿ (DIGICOP). It automatically generates the content owner's unique Identification Mark from a supplied text string and a secret
Healthcare data can be created, copied and modified faster than ever before. Data is the fuel beh... more Healthcare data can be created, copied and modified faster than ever before. Data is the fuel behind more efficient care. Unfortunately, healthcare today suffers from compartmentalized and fragmented data, delayed communications, and disparate workflow tools caused by the lack of interoperability. Blockchain technology maybe the vehicle to solve these problems, as besides it possesses key properties, such as immutability, decentralization, and transparency, which potentially address pressing issues in healthcare, such as incomplete records at point of care and difficult access to patients’ own health information. An efficient and effective healthcare system should be interoperable, allowing software apps and technology platforms to communicate securely and seamlessly, exchange data, and use the exchanged data across health organizations and app vendors. In this paper, we address the aspect of storage of Electronic Medical Records using smart contracts. The implementation is done using Ethereum’s blockchain network to solve problems faced by centralized platforms. The results were encouraging, and the implementation was also successful in reducing storage costs by storing large files off-chain (IPFS).
A method of treating a person for sickle cell anemia including administering to the person a ther... more A method of treating a person for sickle cell anemia including administering to the person a therapeutically effective dosage of the compound wherein at least one R=Cl, BR, CH3 or OCH3 and each other R=H, R'=H or CH3 and n=1, 2, 3, 4 or 5. The compound is preferably selected from the group consisting of clofibrate, clofibric acid, p-chlorophenoxyacetic acid and phenoxyacetic acid. It is preferably administered in solid dosage form and may advantageously be employed in prophylactic treatment to resist sickle cell crises.
Web browser extensions are popularly used to add extra functionality to web-browsers such as Safa... more Web browser extensions are popularly used to add extra functionality to web-browsers such as Safari, Chrome, Firefox, and Edge. These functionalities may include activity, entertainment, and security. However, many of these web exten- sions are not coded by security experts and thus they are targets for hackers when conducting cyber-attacks. This paper is based on a security review of 50 chrome extensions, 25 popular and 25 random. A study is done on their vulnerabilities through privilege granting and escalation, and suggestions are given on how to ameliorate the development and use of extensions, while reducing the risk-factors.
HOW TO PROTECT PERSONAL INFORMATION AGAINST KEYLOGGERS Ming Xu,Behzad Salami, and Charlie Obimbo ... more HOW TO PROTECT PERSONAL INFORMATION AGAINST KEYLOGGERS Ming Xu,Behzad Salami, and Charlie Obimbo Dept. of Computing and Information Science University of Guelph Ontario, Canada N1G 2W1 mxu@uoguelph ...
Uploads
Papers by Charlie Obimbo