328 research outputs found
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to higher resistance to brute force and other types of attacks. Since accepted cryptographic design principles dictate that larger key lengths also impose higher processing costs, increasing the security of a cryptographic file system also increases the overhead of the underlying cipher. We present a general approach to effectively extend the key length without imposing the concomitant processing overhead. Our scheme is to spread the ciphertext inside an artificially large file that is seemingly filled with random bits according to a key-driven spreading sequence. Our prototype implementation, CamouflageFS, offers improved performance relative to a cipher with a larger key-schedule, while providing the same security properties. We discuss our implementation (based on the Linux Ext2 file system) and present some preliminary performance results. While CamouflageFS is implemented as a stand-alone file system, its primary mechanisms can easily be integrated into existing cryptographic file systems
Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah?
In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present some recent algorithms and developments of these fields. We show how the existing techniques used nowadays are related to Image Processing and Computer Vision, point out several trendy applications of Steganography and Steganalysis, and list a few great research opportunities just waiting to be addressed.In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present some recent algorithms and developments of these fields. We show how the existing techniques used nowadays are related to Image Processing and Computer Vision, point out several trendy applications of Steganography and Steganalysis, and list a few great research opportunities just waiting to be addressed
Space in Ancient Greek Literature
The third volume of the Studies in Ancient Greek narrative deals with the narratological category of space: how is space, including objects which function as 'props', presented in narrative texts and what are its functions (thematic, symbolic, psychologising, or characterising).; Readership: All those interested in ancient Greek literature, narrative theory, literary history, comparative literature
Machine Learning Meets Mental Training -- A Proof of Concept Applied to Memory Sports
This work aims to combine these two fields together by presenting a practical
implementation of machine learning to the particular form of mental training
that is the art of memory, taken in its competitive version called "Memory
Sports". Such a fusion, on the one hand, strives to raise awareness about both
realms, while on the other it seeks to encourage research in this mixed field
as a way to, ultimately, drive forward the development of this seemingly
underestimated sport.Comment: 75 pages, 47 figures, 2 tables, 26 code excerpt
Brian Ferneyhough : the logic of the figure
EThOS - Electronic Theses Online ServiceGBUnited Kingdo
Space in Ancient Greek Literature
The third volume of the Studies in Ancient Greek narrative deals with the narratological category of space: how is space, including objects which function as 'props', presented in narrative texts and what are its functions (thematic, symbolic, psychologising, or characterising).; Readership: All those interested in ancient Greek literature, narrative theory, literary history, comparative literature
- …