991 research outputs found

    AN APPROACH TOWARDS EFFICIENT VIDEO DATA HIDING USING PROHIBITED ZONE

    Get PDF
    The process of embedding information into a host medium is a data hiding. In general, due to their wide presence and the tolerance of human perceptual systems involved visual and arual media are preferred. The methods vary depending on the nature of such media and the general structure of data hiding process does not depend on the host media type. Due to the design complexities involved video data hiding is still an important research topic. A new video data hiding method that makes use of removal correction capabilities of replicate accumulate codes and advantage of prohibited zone data hiding is proposed in this paper. To determine host signal samples suitable for data hiding selective embedding is utilized in the proposed method. In order to withstand frame drop and insert attacks a temporal synchronization scheme is contained in this method. By typical broadcast material against MPEG- 2, H.264 compression, frame-rate renovation attacks, as well as other renowned video data hiding methods the proposed framework is tested here. For typical system parameters the decoding error values are reported. The imitation results specify that the frame can be effectively utilized in video data hiding applications

    Block Based Video Data Hiding Using Repeat Accumulate Codes and Forbidden Zone Data Hiding

    No full text
    Video data hiding is still an important research topic due to the design complexities in We propose a new video data hi cling method that makes use of erasure correction capability of Repeat Accumulate codes and superiority of a novel scheme, namely Forbidden Zone Data Hiding Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks The proposed framework is tested by typical broadcast material against MPEG-2. H 264 compression and some frame-rate conversion attacks The decoding en or values are reponed On typical system parameters The simulation results Indicate that the framework can be successfully utilized in video data hiding application

    Big Data Security (Volume 3)

    Get PDF
    After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    Thinking FORTH: a language and philosophy for solving problems

    Get PDF
    XIV, 313 p. ; 24 cmLibro ElectrónicoThinking Forth is a book about the philosophy of problem solving and programming style, applied to the unique programming language Forth. Published first in 1984, it could be among the timeless classics of computer books, such as Fred Brooks' The Mythical Man-Month and Donald Knuth's The Art of Computer Programming. Many software engineering principles discussed here have been rediscovered in eXtreme Programming, including (re)factoring, modularity, bottom-up and incremental design. Here you'll find all of those and more - such as the value of analysis and design - described in Leo Brodie's down-to-earth, humorous style, with illustrations, code examples, practical real life applications, illustrative cartoons, and interviews with Forth's inventor, Charles H. Moore as well as other Forth thinkers. If you program in Forth, this is a must-read book. If you don't, the fundamental concepts are universal: Thinking Forth is meant for anyone interested in writing software to solve problems. The concepts go beyond Forth, but the simple beauty of Forth throws those concepts into stark relief. So flip open the book, and read all about the philosophy of Forth, analysis, decomposition, problem solving, style and conventions, factoring, handling data, and minimizing control structures. But be prepared: you may not be able to put it down. This book has been scanned, OCR'd, typeset in LaTeX, and brought back to print (and your monitor) by a collaborative effort under a Creative Commons license. http://thinking-forth.sourceforge.net/The Philosophy of Forth An Armchair History of Software Elegance; The Superficiality of Structure; Looking Back, and Forth; Component Programming; Hide From Whom?; Hiding the Construction of Data Structures; But Is It a High-Level Language?; The Language of Design; The Language of Performance; Summary; References Analysis The Nine Phases of the Programming Cycle; The Iterative Approach; The Value of Planning; The Limitations of Planning; The Analysis Phase; Defining the Interfaces; Defining the Rules; Defining the Data Structures; Achieving Simplicity; Budgeting and Scheduling; Reviewing the Conceptual Model; References Preliminary Design/Decomposition Decomposition by Component; Example: A Tiny Editor; Maintaining a Component-based Application; Designing and Maintaining a Traditional Application; The Interface Component; Decomposition by Sequential Complexity; The Limits of Level Thinking; Summary; For Further Thinking; Detailed Design/Problem Solving Problem-Solving Techniques; Interview with a Software Inventor; Detailed Design; Forth Syntax; Algorithms and Data Structures; Calculations vs. Data Structures vs. Logic; Solving a Problem: Computing Roman Numerals; Summary; References; For Further Thinking Implementation: Elements of Forth Style Listing Organization; Screen Layout; Comment Conventions; Vertical Format vs. Horizontal Format; Choosing Names: The Art; Naming Standards: The Science; More Tips for Readability; Summary; References Factoring Factoring Techniques; Factoring Criteria; Compile-Time Factoring; The Iterative Approach in Implementation; References Handling Data: Stacks and States The Stylish Stack; The Stylish Return Stack; The Problem With Variables; Local and Global Variables/Initialization; Saving and Restoring a State; Application Stacks; Sharing Components; The State Table; Vectored Execution; Using DOER/MAKE; Summary; References Minimizing Control Structures What’s So Bad about Control Structures?; How to Eliminate Control Structures; A Note on Tricks; Summary; References; For Further Thinking Forth’s Effect on Thinking Appendix A Overview of Forth (For Newcomers); Appendix B Defining DOER/MAKE; Appendix C Other Utilities Described in This Book; Appendix D Answers to “Further Thinking” Problems; Appendix E Summary of Style Conventions; Inde

    Европейский и национальный контексты в научных исследованиях

    Get PDF
    В настоящем электронном сборнике «Европейский и национальный контексты в научных исследованиях. Технология» представлены работы молодых ученых по геодезии и картографии, химической технологии и машиностроению, информационным технологиям, строительству и радиотехнике. Предназначены для работников образования, науки и производства. Будут полезны студентам, магистрантам и аспирантам университетов.=In this Electronic collected materials “National and European dimension in research. Technology” works in the fields of geodesy, chemical technology, mechanical engineering, information technology, civil engineering, and radio-engineering are presented. It is intended for trainers, researchers and professionals. It can be useful for university graduate and post-graduate students

    Suspicion, control and desire - a criminological analysis of secretive conduct and smart devices

    Get PDF
    The topic of this thesis is the connection between secrecy and the onlife reality, a blurring line between being online and offline. Specifically, it offers a novel criminological perspective on how the smart technological devices integrated in the onlife ecology (with its technologies, features, design, instant online access, and messaging) aid specific instances of 'secretive conduct', involving regular and mundane episodes of suspicion, control and desire towards our kin, partners, co-worker, and perfect strangers. While most studies on smart technology (phones, pc, homes, watches, cars) concern privacy and security, as well as the elements of isolation and social disintegration - this thesis offers an innovative contribution in the field of criminology. The elements which protect our devices, such as touch ID and face recognition have created an un-accessible wall against other users, both online and offline; the character of such elements and their effects is a central concern of this thesis, revolving around suspicion, control and desire such a condition induces. Using a cultural criminology perspective, this work will theorize the ecology of onlife reality, the secretive conduct that characterises its environment; interpreting how tools of monitoring and control appear to have taken over any 'space' - from public to private. It appears that not only is anything observable - but it is done in a covert and discreet manner - the Goffmanian front & back stage result constantly under scrutiny. In this context, the users become increasingly effected by this covert scrutiny. The smartphone functions as a quintessential tool that allows such a blur - leading into the onlife question of crime and cybercrime. Advancing an experimental 'hybrid' methodology that attempts to unite both digital and 'in-person' ethnographic considerations, the research makes use of informal and incidental 'confessions' of smart technology users, such as their personal or witnessed secretive conducts. The analysis concentrates on specific abusive episodes in which the use of onlife devices allow all sorts of secretive conducts, with direct or indirect elements of harm: these are treated as social 'vignettes', and include parents secretly monitoring their children, partners making assumptions on the other's whereabouts, perpetuating elements of stalking, blackmailing, monitoring, all in a remote and apparently 'secured' environment. This work contributes to cultural criminology with analysis of the blasé approach to such elements of secretive conduct becoming integral in the onlife habitus of smartphone users. Secrecy is becoming a central element of onlife ecology, taking place unwillingly, and mostly unknowingly. To act in secret, to monitor in secret - wanting to see, control, and observe all become central elements of the onlife

    Under the Hood: An (Auto) Ethnographic Study of How White Adolescent Males Critically Engage with Race in Grand Theft Auto V

    Get PDF
    Grand Theft Auto V (GTA V) is emblematic of the public controversies that associate video games with violence, misogyny, and damaging depictions of race and gender. However, it is also a layered referential and self-reflexive text that roundly critiques US culture, including the pernicious complicity of media on issues of identity. GTA V is the third best selling video game in history, and primarily targets white adolescent males, but its effects on the attitudes and behaviors of its chief consumers are virtually unstudied. Furthermore, the tendency for schools to keep controversial games at a distance may neglect a need to better equip adolescent boys with the tools to critically consume the complex media in which they are immersed. This doctoral dissertation employs a postcolonial lens and documents a month-long qualitative study where a high school class of ten white adolescent boys played GTA V while in a formal instructional context that encouraged them to critically reflect on their gameplay. Although they viewed the game through the lenses of gender, masculinities, violence, and hegemony, my research specifically reports on how they engaged with representations of race and racialized places in the elaborate urban simulation. The participants were positioned as co-researchers and trained in basic ethnographic methods, and the fieldnotes and filmed videos of their play were synthesized in autoethnographic accounts of their experiences. Data was also gathered from pre- and post-surveys, filmed classroom sessions, a private Facebook group, the counter-hegemonic media they produced, and their notes and videos. The investigation revealed that participants naturalized racial stereotypes and problematic connections of race and place. And, the instructional approach was found to provoke a greater awareness about discriminatory depictions of race in the game and, in some cases, media at large. Some also become aware of their own tendencies to appropriate commodified forms of blackness. Finally, their discourse and views were found to be largely shaped by media, highlighting the need for a greater emphasis on media literacy in schools

    The Internet as recommendation engine : implications of online behavioral targeting

    Get PDF
    Thesis (S.M. in Technology and Policy)--Massachusetts Institute of Technology, Engineering Systems Division, 2010.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from student submitted PDF version of thesis.Includes bibliographical references (p. 70-72).This thesis discusses the economic implications of Internet behavioral advertising, which targets ads to individuals based on extensive detailed data about the specific websites users have visited. Previous literature on behavioral advertising has focused almost exclusively on privacy issues; there has been less study of how it might affect industry structure. This thesis examines which parties in the online advertising value chain would benefit the most from the demand for detailed behavioral data; in particular, it examines whether aggregators (such as advertising networks) that track behavior across a large number of websites would derive the greatest benefit. Qualitative stakeholder analysis is used to identify the strengths and weaknesses of several categories of actors: advertisers, advertising agencies, publishers, advertising networks, advertising exchanges, Internet service providers, and users. Advertising agencies might attempt to bypass networks and work directly with publishers, becoming aggregators in their own right. Publishers might need to become interactive "information experiences" in order to collect valuable behavioral data. Users might demand more transparency about what is happening with their data, or even more control over the data collection process. Overall, agencies, networks, and advertising exchanges appear to be in the best position; publishers are faced with a harder task. Furthermore, behavioral targeting may not result in a dramatic increase in overall online advertising spending.by Anthony N. Smith-Grieco.S.M.in Technology and Polic
    corecore