96,682 research outputs found

    Unified Description for Network Information Hiding Methods

    Full text link
    Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe the embedding of hidden information. We introduce the first unified description of hiding methods in network steganography. Our description method is based on a comprehensive analysis of the existing publications in the domain. When our description method is applied by the research community, future publications will be easier to categorize, compare and extend. Our method can also serve as a basis to evaluate the novelty of hiding methods proposed in the future.Comment: 24 pages, 7 figures, 1 table; currently under revie

    PROPYLA: Privacy Preserving Long-Term Secure Storage

    Full text link
    An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries). When sensitive data is stored, then integrity and confidentiality must be protected to ensure reliability and privacy. Commonly used cryptographic schemes, however, are not designed for protecting data over such long time periods. Recently, the first storage architecture combining long-term integrity with long-term confidentiality protection was proposed (AsiaCCS'17). However, the architecture only deals with a simplified storage scenario where parts of the stored data cannot be accessed and verified individually. If this is allowed, however, not only the data content itself, but also the access pattern to the data (i.e., the information which data items are accessed at which times) may be sensitive information. Here we present the first long-term secure storage architecture that provides long-term access pattern hiding security in addition to long-term integrity and long-term confidentiality protection. To achieve this, we combine information-theoretic secret sharing, renewable timestamps, and renewable commitments with an information-theoretic oblivious random access machine. Our performance analysis of the proposed architecture shows that achieving long-term integrity, confidentiality, and access pattern hiding security is feasible.Comment: Few changes have been made compared to proceedings versio

    Code wars: steganography, signals intelligence, and terrorism

    Get PDF
    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead

    Work design improvement at Miroad Rubber Industries Sdn. Bhd.

    Get PDF
    Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan. Previously, Salaiport Industry operated in-house located at Pagoh, Johor. This small company major business is producing frozen smoked beef, smoked quail, smoke catfish and smoked duck. The main frozen product is smoked beef. The frozen smoked meat produced by Salaiport Industry is depending on customer demands. Usually the company produce 40 kg to 60 kg a day and operated between for four days until five days. Therefore, the company produce approximately around 80 kg to 120 kg per week. The company usually take 2 days for 1 complete cycle for the production as the first day the company will only receive the meat from the supplier and freeze the meat for use of tomorrow

    Escape from the List: Courage, Sacrifice, Survival

    Get PDF
    Anne Frank has been described as Hitler’s most famous victim. By virtue of her diary, which was in fact a heavily revised memoir that today might be considered to belong to the genre of creative non-fiction, Anne Frank has attained a kind of immortality that the art form of writing frequently provides. This should not, of course, trivialize her fate, nor the suffering of the multitudes of other victims of the Nazi regime, a group comprised of Jews, as well as non-Jews. Some of these stories have been told in great detail, while many others have not. What follows is the story of Elisabeth Rodrigues Lopes de la Peña, a Jewish girl whose family had fled the Spanish Inquisition to settle in the Netherlands. During the German occupation of Amsterdam during the Second World War, this family faced yet another existential threat, one that some of them did not survive. Elisabeth may well have ended up as yet one more entry in the long list of the Nazi’s victims, if not for the intervention and courageous efforts of her non-Jewish neighbors—efforts that were based in large part on their own deeply held religious beliefs and sense of morals. Elisabeth’s rescuers are known to Holocaust historians, and their names are enshrined in the Yad Vashem World Holocaust Remembrance Museum in Israel, as well as in the United States Holocaust Memorial Museum in Washington, DC. Along with my Research Assistant Angelica Roman, I have conducted personal meetings and interviews with Elisabeth’s daughter, Carolyn Stewart. Ms. Stewart has graciously shared many heretofore unknown details of her mother’s story of rescue, as well as photographs and documents, including some that have been unseen by anyone in over sixty years. What follows is new insight into Elisabeth Rodrigues’ escape from the list: a true story of courage, sacrifice, and survival. I would like to acknowledge with gratitude the assistance and support of the following people: Jennifer Crespo, Student Success Coordinator at Pace University in New York City, who generously provided funding for this project as part of the Pace Undergraduate Student – Faculty Research Program; Bonnie and Howard J. Price, without whose help this project would never have seen the light of day; my colleague at Pace University Dr. Maria Plochocki, for reviewing the manuscript and providing valuable suggestions; Gertjan Broek and Karolien Stocking Korzen at the Anne Frank House in Amsterdam; Beth Slepian at The Anne Frank Center NYC, and my superbly talented Research Assistant, Angelica E. Roman ‘19, who tirelessly conducted research, helped revise early drafts, and patiently fielded a multitude of my requests while putting up with my numerous anxieties. Special thanks go to Carolyn Stewart, who traveled from Maryland to New York City for interviews, and who spent many hours communicating with Angelica and me over the course of several months. Carolyn shared many details and primary historical artifacts with us, and she relates her mother’s fascinating tale in a captivating and compelling manner. Our hope is that we can do this wonderful, inspiring story justice in the pages that follow

    A novel steganography approach for audio files

    Get PDF
    We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are compressed by the GMPR technique which is based on the Discrete Cosine Transform (DCT) and high frequency minimization encoding algorithm. The method involves compression-encryption of an image file by the GMPR technique followed by hiding it into audio data by appropriate bit substitution. The maximum number of bits without significant effect on audio signal for LSB audio steganography is 6 LSBs. The encrypted image bits are hidden into variable and multiple LSB layers in the proposed method. Experimental results from observed listening tests show that there is no significant difference between the stego audio reconstructed from the novel technique and the original signal. A performance evaluation has been carried out according to quality measurement criteria of Signal-to-Noise Ratio (SNR) and Peak Signal-to-Noise Ratio (PSNR)
    corecore