This paper performs a comparative analysis of different watermarking techniques. Namely, in the last twenty-five years, a large number of algorithms for digital watermarking have been developed. In order to understand how different schemes can be applied it is important to define some criteria for classifying them. The algorithms are classified according to the characteristics of embedded watermarks and based on applications in which the watermark is built in. The robustness of the watermarks with respect to a different kind of attacks is also analyzed.
The RSA cryptographic algorithm is widely used in data protection and electronic business. One of the most important parameter of the achieved level of security is the quality of the generated cryptographic keys with which the algorithm is applied. In this paper a few cases in which poorly generated RSA cryptographic keys caused dis-accreditation of the system are described. The recommendations and checks that must be fulfilled during generation of RSA algorithm cryptographic keys are formulated in order that keys were considered safe for implement on.
Cloud-based applications are becoming an increasingly important component for many enterprises. For customers' data to remain confidential and secure, service organizations must adhere to security and privacy best practices, applicable laws, and regulations. There has been some effort to develop uniform standards for cloud security, but most service organizations need to apply with a combination of security and privacy regulations and standards. For early-stage technology companies, this mission can be even more challenging since they are oriented towards product development and have limited resources to invest in the compliance of security, availability, confidentiality, integrity, and privacy. These risks have led to uncertainty among Software-as-a-Service ('SaaS' customers about what measures they should require from their IT vendors and whether those measures will be in line with their policies and commitments to their customers. The rapidly evolving cloud utilization of corporations migrated to the cloud, or new technology companies (start-ups) has led to a security audit examination report. The report developed from the accounting audit, based on global accounting audit methodology and the COSO framework examined by technology auditors. This paper integrated a study case of a Service Organization's security audit in the field of financial payment. An automated compliance system has been proposed that could assist both Service Organizations and Service Auditors to ease the audit process and make it more efficient and effective, compromise lack of expertise, save employees' time, decrease human errors, and eliminate non-compliance issues by automation, integrations, machine learning, and pre-designed workflows.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.