1,532 research outputs found

    Chaotic Sequence based Steganography for Pair-Wise Communication

    Get PDF
    Steganography is the art and science of hiding sensitive data inside an image. There are so many cryptosystems that use Steganography as a major tool. Also in recent years there is a rising trend towards chaotic sequence based cryptosystems. This paper attempts to combine the two with a new algorithm for data hiding. Here key images required for Steganography are generated using chaotic sequence. Also an attempt is made to overcome the limitations of Steganography on the file size ratio and the security offered by Steganography

    The XBOX 360 and Steganography: How Criminals and Terrorists Could Be Going Dark

    Get PDF
    Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today\u27s gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, may be utilized to hide or alter evidence. This paper will explore how criminals and terrorists might be using the Xbox 360 to convey messages and files using steganographic techniques. Specific attention will be paid to the going dark problem and the disjoint between forensic capabilities for analyzing traditional computers and forensic capabilities for analyzing video game consoles. Forensic approaches for examining Microsoft\u27s Xbox 360 will be detailed and the resulting evidentiary capabilities will be discussed. Keywords: Digital Forensics, Xbox Gaming Console, Steganography, Terrorism, Cyber Crim

    A Descriptive Study on Digital Innovations and Technologies in Libraries

    Get PDF
    Libraries are social institutions that adopt new innovations for enhancing service and quality. This paper is about the descriptive study of three major technologies such as Artificial Intelligence, Big Data, BlockChain and their application in libraries and information centers. This paper also investigates, Libtech, an innovative open platform in Iran by merging these technologies. The adoption of new technologies will help the libraries to be up to date in quality and it also improves the user experience

    A review and open issues of diverse text watermarking techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetches more attention due to the fast growth of using the internet; it is applied for sending secret information by using different techniques. Watermarking is one of major important technique in information hiding. Watermarking is of hiding secret data into a carrier media to provide the privacy and integrity of information so that no one can recognize and detect it's accepted the sender and receiver. In watermarking, many various carrier formats can be used such as an image, video, audio, and text. The text is most popular used as a carrier files due to its frequency on the internet. There are many techniques variables for the text watermarking; each one has its own robust and susceptible points. In this study, we conducted a review of text watermarking in the spatial domain to explore the term text watermarking by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2013 to 2018. The aims of this paper are to provide an overview of text watermarking and comparison between approved studies as discussed according to the Arabic text characters, payload capacity, Imperceptibility, authentication, and embedding technique to open important research issues in the future work to obtain a robust method

    Selected Computing Research Papers Volume 7 June 2018

    Get PDF
    Contents Critical Evaluation of Arabic Sentimental Analysis and Their Accuracy on Microblogs (Maha Al-Sakran) Evaluating Current Research on Psychometric Factors Affecting Teachers in ICT Integration (Daniel Otieno Aoko) A Critical Analysis of Current Measures for Preventing Use of Fraudulent Resources in Cloud Computing (Grant Bulman) An Analytical Assessment of Modern Human Robot Interaction Systems (Dominic Button) Critical Evaluation of Current Power Management Methods Used in Mobile Devices (One Lekula) A Critical Evaluation of Current Face Recognition Systems Research Aimed at Improving Accuracy for Class Attendance (Gladys B. Mogotsi) Usability of E-commerce Website Based on Perceived Homepage Visual Aesthetics (Mercy Ochiel) An Overview Investigation of Reducing the Impact of DDOS Attacks on Cloud Computing within Organisations (Jabed Rahman) Critical Analysis of Online Verification Techniques in Internet Banking Transactions (Fredrick Tshane

    Nothing to Hide, Nothing to Fear? Tools and Suggestions for Digital Data Protection

    Get PDF
    The developing cyber-infrastructure has provided new tools, methods, and opportunities to conduct research. However, the Snowden leaks and subsequent developments proved that the same infrastructure has made all-encompassing surveillance possible – posing new challenges for researchers when engaging with those they are obligated to protect. As the cyber-infrastructure simultaneously opens up new possibility-spaces for circumventing structures of surveillance, while drawing on the authors’ own experiences, this article presents a number of tools and suggestions that will aid the researcher to engage more responsibly and safely with the research subject digitally

    Proceedings of the tenth international conference Models in developing mathematics education: September 11 - 17, 2009, Dresden, Saxony, Germany

    Get PDF
    This volume contains the papers presented at the International Conference on “Models in Developing Mathematics Education” held from September 11-17, 2009 at The University of Applied Sciences, Dresden, Germany. The Conference was organized jointly by The University of Applied Sciences and The Mathematics Education into the 21st Century Project - a non-commercial international educational project founded in 1986. The Mathematics Education into the 21st Century Project is dedicated to the improvement of mathematics education world-wide through the publication and dissemination of innovative ideas. Many prominent mathematics educators have supported and contributed to the project, including the late Hans Freudental, Andrejs Dunkels and Hilary Shuard, as well as Bruce Meserve and Marilyn Suydam, Alan Osborne and Margaret Kasten, Mogens Niss, Tibor Nemetz, Ubi D’Ambrosio, Brian Wilson, Tatsuro Miwa, Henry Pollack, Werner Blum, Roberto Baldino, Waclaw Zawadowski, and many others throughout the world. Information on our project and its future work can be found on Our Project Home Page http://math.unipa.it/~grim/21project.htm It has been our pleasure to edit all of the papers for these Proceedings. Not all papers are about research in mathematics education, a number of them report on innovative experiences in the classroom and on new technology. We believe that “mathematics education” is fundamentally a “practicum” and in order to be “successful” all new materials, new ideas and new research must be tested and implemented in the classroom, the real “chalk face” of our discipline, and of our profession as mathematics educators. These Proceedings begin with a Plenary Paper and then the contributions of the Principal Authors in alphabetical name order. We sincerely thank all of the contributors for their time and creative effort. It is clear from the variety and quality of the papers that the conference has attracted many innovative mathematics educators from around the world. These Proceedings will therefore be useful in reviewing past work and looking ahead to the future

    Undergraduate and Graduate Course Descriptions, 2016 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2016
    • …
    corecore