The Falkland Islands contain extensive and poorly-understood peatlands. Peatlands are notably old with many pre-Holocene in age. Long-term carbon accumulation rate is very variable between sites. One site has the highest recorded carbon accumulation rate for any global peatland. These unusual peatlands deserve further study.
Background Over 25% of the UK land area is covered by uplands, the bulk of which are comprised of blanket bog. This not only contains most of the UK’s terrestrial carbon stocks, but also represents 15% of this globally rare habitat. About 30% of UK blanket bog is managed for red grouse by encouraging ling heather (Calluna vulgaris) with rotational burning, which has been linked to habitat degradation, with reduced carbon storage and negative impacts on water storage and quality. Alternative cutting is currently being pursued as a potential restoration management. However, the often used heavy cutting machinery could cause considerable compaction and damage to the peat surface. Two particular issues are (i) a potential increase in bulk density reducing water storage capacity (i.e., less pore volume and peat depth), and (ii) a possible reduction of the micro-topography due to cutting off the tops of hummocks (i.e., protruding clumps or tussocks of sedges). Methods We set up a fully replicated field experiment assessing cutting versus burn management impacts on peat physical and surface properties. Both managements reflected commonly used grouse moor management practice with cutting using heavy tractors fitted with load distributing double wheel and tracks (lowering ground pressure), whilst burning was done manually (setting heather areas alight with flame torches). We assessed management impacts on peat depth, bulk density and peat surface micro-topography which either included pre-management measurements or plot-level data for uncut plots. Total peat depth and bulk density in four 5 cm sections within the top 50 cm was assessed. Micro-topography was determined as the standard deviation of the height offsets measured over several plot transects in relation to the plot peat surface level at the start and end points of each transect. Results Despite an anticipated compaction from the heavy machinery used for cutting, the peat showed resilience and there was no lasting plot-level impact on either peat depth or bulk density. Notably, bulk density showed differences prior to, and thus unrelated to, management, and an overall increasing bulk density, even in uncut plots. However, cutting did reduce the plot micro-topography by about 2 cm, mostly due to removing the tops of hummocks, whereas burnt plots did not differ from uncut plots. Discussion Cutting is suggested as a suitable alternative to burning on grouse moors, although compaction issues might be site specific, depending on the nature of the peat, the machinery used and impacts at resting and turning points (which were not assessed). However, any observed bulk density differences could reflect natural changes in relation to changes in peat moisture, requiring adequate experimental comparisons. Moreover, where micro-topography is a priority, cutting equipment might need to consider the specific ground conditions, which could involve adjusting cutting height and the type of cutting machinery used.
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities.In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.