11 research outputs found

    Smart e-Learning Systems with Big Data

    Get PDF
    Nowadays, the Internet connects people, multimedia and physical objects leading to a new-wave of services. This includes learning applications, which require to manage huge and mixed volumes of information coming from Web and social media, smart-cities and Internet of Things nodes. Unfortunately, designing smart e-learning systems able to take advantage of such a complex technological space raises different challenges. In this perspective, this paper introduces a reference architecture for the development of future and big-data-capable e-learning platforms. Also, it showcases how data can be used to enrich the learning process

    Network Information Hiding and Science 2.0: Can it be a Match?

    Get PDF
    Science 2.0 aims at using the information sharingand collaborative features of the Internet to offer new featuresto the research community. Science 2.0 has been already appliedto computer sciences, especially bioinformatics. For networkinformation hiding, a field studying the possibility of concealing acommunication in networks, the application of Science 2.0 is stilla rather uncovered territory. To foster the discussion of potentialbenefits for network information hiding, we provide a disquisitionfor six different Science 2.0 aspects when applied to this domain

    Smart techniques and tools to detect Steganography - a viable practice to Security Office Department

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementInternet is today a commodity and a way for being connect to the world. It is through Internet is where most of the information is shared and where people run their businesses. However, there are some people that make a malicious use of it. Cyberattacks have been increasing all over the recent years, targeting people and organizations, looking to perform illegal actions. Cyber criminals are always looking for new ways to deliver malware to victims to launch an attack. Millions of users share images and photos on their social networks and generally users find them safe to use. Contrary to what most people think, images can contain a malicious payload and perform harmful actions. Steganography is the technique of hiding data, which, combined with media files, can be used to place malicious code. This problem, leveraged by the continuous media file sharing through massive use of digital platforms, may become a worldwide threat in malicious content sharing. Like phishing, people and organizations must be trained to suspect about inappropriate content and implement the proper set of actions to reduce probability of infections when accessing files supposed to be inoffensive. The aim of this study will try to help people and organizations by trying to set a toolbox where it can be possible to get some tools and techniques to assist in dealing with this kind of situations. A theoretical overview will be performed over other concepts such as Steganalysis, touching also Deep Learning and in Machine Learning to assess which is the range of its applicability in find solutions in detection and facing these situations. In addition, understanding the current main technologies, architectures and users’ hurdles will play an important role in designing and developing the proposed toolbox artifact

    Método para la detección de exfiltración de información sobre los datos transmitidos por ultrasonido entre dispositivos computacionales a través de la captura, identificación y clasificación de la información

    Get PDF
    En proyecto se entregan los resultados concernientes a la exfiltración de información a través de ultrasonido entre equipos computacionales, esto es, lograr enviar información (de un equipo A a un equipo B) que puede ser sensible a través de un medio no convencional como lo es el ultrasonido. La información y los datos pueden ser vulnerados por diferentes medios, este proyecto analiza cómo es posible transmitir información con ultrasonido, a través del uso de los sistemas periféricos de estaciones de trabajo, con lo cual, el principio de confidencialidad se ve vulnerado. Para lograr el objetivo se usaron 2 escenarios, uno libre de ruido y el otro, un ambiente de oficina, así mismo, se contó el uso del software GNU Radio, QuietNet y un desarrollo propio, el cual permitió a través de la definición de unos niveles de clasificación, visualizar el proceso de exfiltración de información. Con la ejecución de las diferentes pruebas, se logró la trasmisión, recepción y visualización de datos, éstos una vez recepcionados, se les aplicó un proceso de clasificación de información, que, aunque es un ambiente de prueba, puede ser aplicada a cualquier elemento informático que pueda transmitir por ultrasonido. Las pruebas realizadas se enfocaron en el uso de hardware básico no modificado (equipos portátiles sin modificaciones), para simular condiciones de los escenarios respectivosIn this project, the results concerning the exfiltration of information through ultrasound between computer equipment are delivered, that is, to be able to send information (from equipment A to equipment B) that can be sensitive through an unconventional means such as It is the ultrasound. The information and data can be violated by different means, this project addresses how from workstations, a user can transmit information using peripheral systems that support ultrasound, whereby the principle of confidentiality is violated. To achieve the objective, 2 situations were used, one free of noise and the other, an office environment, likewise, the use of GNU Radio software, QuietNet and its own development was counted, which is connected through the definition of Some levels of classification, visualize the process of exfiltration of information. With the execution of the different tests, the transmission, reception and visualization of data is controlled, it is detected once received, an information classification process was applied, which, although it is a test environment, can be applied to any computer element that can be transmitted by ultrasound. The tests carried out focused on the use of basic unmodified hardware (portable equipment without modifications), for simulate conditions of specific controlsMagister en Seguridad Informátic

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
    corecore