328 research outputs found

    CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap

    Get PDF
    One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to higher resistance to brute force and other types of attacks. Since accepted cryptographic design principles dictate that larger key lengths also impose higher processing costs, increasing the security of a cryptographic file system also increases the overhead of the underlying cipher. We present a general approach to effectively extend the key length without imposing the concomitant processing overhead. Our scheme is to spread the ciphertext inside an artificially large file that is seemingly filled with random bits according to a key-driven spreading sequence. Our prototype implementation, CamouflageFS, offers improved performance relative to a cipher with a larger key-schedule, while providing the same security properties. We discuss our implementation (based on the Linux Ext2 file system) and present some preliminary performance results. While CamouflageFS is implemented as a stand-alone file system, its primary mechanisms can easily be integrated into existing cryptographic file systems

    Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah?

    Get PDF
    In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present some recent algorithms and developments of these fields. We show how the existing techniques used nowadays are related to Image Processing and Computer Vision, point out several trendy applications of Steganography and Steganalysis, and list a few great research opportunities just waiting to be addressed.In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present some recent algorithms and developments of these fields. We show how the existing techniques used nowadays are related to Image Processing and Computer Vision, point out several trendy applications of Steganography and Steganalysis, and list a few great research opportunities just waiting to be addressed

    Space in Ancient Greek Literature

    Get PDF
    The third volume of the Studies in Ancient Greek narrative deals with the narratological category of space: how is space, including objects which function as 'props', presented in narrative texts and what are its functions (thematic, symbolic, psychologising, or characterising).; Readership: All those interested in ancient Greek literature, narrative theory, literary history, comparative literature

    Machine Learning Meets Mental Training -- A Proof of Concept Applied to Memory Sports

    Full text link
    This work aims to combine these two fields together by presenting a practical implementation of machine learning to the particular form of mental training that is the art of memory, taken in its competitive version called "Memory Sports". Such a fusion, on the one hand, strives to raise awareness about both realms, while on the other it seeks to encourage research in this mixed field as a way to, ultimately, drive forward the development of this seemingly underestimated sport.Comment: 75 pages, 47 figures, 2 tables, 26 code excerpt

    Brian Ferneyhough : the logic of the figure

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Space in Ancient Greek Literature

    Get PDF
    The third volume of the Studies in Ancient Greek narrative deals with the narratological category of space: how is space, including objects which function as 'props', presented in narrative texts and what are its functions (thematic, symbolic, psychologising, or characterising).; Readership: All those interested in ancient Greek literature, narrative theory, literary history, comparative literature
    corecore