291,768 research outputs found
Graffiti Networks: A Subversive, Internet-Scale File Sharing Model
The proliferation of peer-to-peer (P2P) file sharing protocols is due to
their efficient and scalable methods for data dissemination to numerous users.
But many of these networks have no provisions to provide users with long term
access to files after the initial interest has diminished, nor are they able to
guarantee protection for users from malicious clients that wish to implicate
them in incriminating activities. As such, users may turn to supplementary
measures for storing and transferring data in P2P systems. We present a new
file sharing paradigm, called a Graffiti Network, which allows peers to harness
the potentially unlimited storage of the Internet as a third-party
intermediary. Our key contributions in this paper are (1) an overview of a
distributed system based on this new threat model and (2) a measurement of its
viability through a one-year deployment study using a popular web-publishing
platform. The results of this experiment motivate a discussion about the
challenges of mitigating this type of file sharing in a hostile network
environment and how web site operators can protect their resources
Watermarking techniques for mobile application: A review
This paper reviewed mobile applications schemes for image watermarking techniques used to secure user media files. Due to the increase in number of smartphones and Internet usage especially in today’s life, cybercrime rate seems to be increasing too. Thus, an efficient and suitable watermarking scheme for mobile devices needs to be studied and developed. Digital watermarking is an example of a data hiding technique used by researchers. From the analysis, almost all schemes implement Android Operating System for different techniques and media file types. This paper provides an overview and comparison of various mobile applications for image watermarking techniques
Recommended from our members
Multimedia broadcast and internet satellite system design and user trial results
The EU funded project, System for Advanced Multimedia Broadcast
and IT Services (SAMBITS), has created an enhanced and synchronised,
multimedia terminal for merging satellite broadcast and internet
telecommunication services in a way that efficiently combines the large
bandwidth of the broadcast channel and the interactivity of the internet.
This paper proposes a novel broadcast and internet service concept, illustrates
this concept with two service scenarios and develops a system architecture to
demonstrate the range of key benefits provided by these new technologies.
It then describes the interactive multimedia terminal that was used for
consuming this new service concept. Finally, the results of the user trials on the
terminal are presented and discussed
Peer to Peer Information Retrieval: An Overview
Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is still dominated by centralised solutions. In this paper we provide an overview of the key challenges for peer-to-peer information retrieval and the work done so far. We want to stimulate and inspire further research to overcome these challenges. This will open the door to the development and large-scale deployment of real-world peer-to-peer information retrieval systems that rival existing centralised client-server solutions in terms of scalability, performance, user satisfaction and freedom
The effectiveness of the creativity trigger module in achieving higher levels of creative thinking among prospective teachers
The unoptimised level of creative thinking is seen as an issue among Semester 8 prospective teachers in Malaysian Teacher-Education Institutes (IPG). This could impede their teaching of creative thinking as one of the four components of 21st century skills in schools. In relation to this, this study sets out to investigate prior creativity levels of IPG prospective teachers and develop the Creativity Trigger Module (CTM) as a training module for enhancing their creativity. The Torrance Tests of Creative Thinking (TTCT) was used to compare the prior creativity levels of four respondent groups and test the effectiveness of the CTM on five dimensions of figural creativity, namely fluency, originality, elaboration, resistance to premature closure, abstractness of titles, and their overall creativity. A two-stage cluster sampling technique identified two IPGs with 68 respondents in the state of Johor namely, IPG-Kampus Tun Hussein Onn, Batu Pahat (IPGKTHO) as the control group site (34 respondents), and IPG- Kampus Temenggong Ibrahim, Johor Bahru (IPGKTI) as the treatment group site (34 respondents). Mathematics (MT) and Design and Technology (RBT) are the only two specialist subject combinations that provided enough sample size at both test sites. A quasi-experimental research design was used and this involved intact classes. Data analysis was carried out as follows: ANOVA, ANCOVA, and Wilcoxon Signed Rank Test analysis for TTCT scores while data analysis based on the NVivo software was used for the focus group interviews. Findings on prior creativity levels showed average or low creativity levels among all 4 test groups with IPGKTHO and RBT options having significantly higher posttest marks as compared to IPGKTI and MT option respectively. The CTM was found to improve significantly respondents’ posttest marks for the treatment group in all the five dimensions of figural creativity and, their overall creativity. Feedback from respondents revealed positive support for the CTM. In conclusion, the prior creativity of IPG prospective teachers was at an unoptimised level before treatment but the CTM has been successfully developed as an effective resource for enhancing the creative thinking levels among IPG prospective teachers
Quality of Service over Specific Link Layers: state of the art report
The Integrated Services concept is proposed as an enhancement to the current Internet architecture, to provide a better Quality of Service (QoS) than that provided by the traditional Best-Effort service. The features of the Integrated Services are explained in this report. To support Integrated Services, certain requirements are posed on the underlying link layer. These requirements are studied by the Integrated Services over Specific Link Layers (ISSLL) IETF working group. The status of this ongoing research is reported in this document. To be more specific, the solutions to provide Integrated Services over ATM, IEEE 802 LAN technologies and low-bitrate links are evaluated in detail. The ISSLL working group has not yet studied the requirements, that are posed on the underlying link layer, when this link layer is wireless. Therefore, this state of the art report is extended with an identification of the requirements that are posed on the underlying wireless link, to provide differentiated Quality of Service
Stealthy Plaintext
Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text. With confidential data being easily sharable through this method most companies monitor the emails, thus invading the privacy of employees. To avoid secret information from being disclosed it can be encrypted. Encryption hides the data effectively but this makes the data look important and hence prone to attacks to decrypt the information. It also makes it obvious that there is secret information being transferred. The most effective way would be to make the information seem harmless by concealing the information in the email but not encrypting it. We would like the information to pass through the analyzer without being detected. This project aims to achieve this by “encrypting” plain text by replacing suspicious keywords with non-suspicious English words, trying to keep the grammatical syntax of the sentences intact
Honey Sheets: What Happens to Leaked Google Spreadsheets?
Cloud-based documents are inherently valuable, due to the volume and nature
of sensitive personal and business content stored in them. Despite the
importance of such documents to Internet users, there are still large gaps in
the understanding of what cybercriminals do when they illicitly get access to
them by for example compromising the account credentials they are associated
with. In this paper, we present a system able to monitor user activity on
Google spreadsheets. We populated 5 Google spreadsheets with fake bank account
details and fake funds transfer links. Each spreadsheet was configured to
report details of accesses and clicks on links back to us. To study how people
interact with these spreadsheets in case they are leaked, we posted unique
links pointing to the spreadsheets on a popular paste site. We then monitored
activity in the accounts for 72 days, and observed 165 accesses in total. We
were able to observe interesting modifications to these spreadsheets performed
by illicit accesses. For instance, we observed deletion of some fake bank
account information, in addition to insults and warnings that some visitors
entered in some of the spreadsheets. Our preliminary results show that our
system can be used to shed light on cybercriminal behavior with regards to
leaked online documents
- …