1,701 research outputs found

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Full text link
    The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography

    Get PDF
    The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java

    Preparation of silver nanoparticles in virgin coconut oil using laser ablation

    Get PDF
    Laser ablation of a silver plate immersed in virgin coconut oil was carried out for fabrication of silver nanoparticles. A Nd:YAG laser at wavelengths of 1064 nm was used for ablation of the plate at different times. The virgin coconut oil allowed formation of nanoparticles with well-dispersed, uniform particle diameters that were stable for a reasonable length of time. The particle sizes and volume fraction of nanoparticles inside the solutions obtained at 15, 30, 45 min ablation times were 4.84, 5.18, 6.33 nm and 1.0 × 10−8, 1.6 × 10−8, 2.4 × 10−8, respectively. The presented method for preparation of silver nanoparticles in virgin coconut oil is environmentally friendly and may be considered a green method

    Passively Q-switched erbium-doped fiber laser with graphene oxide film as saturable absorber

    Get PDF
    Passively Q-switched erbium-doped fiber laser (EDFL) have been demonstrated using graphene oxide (GO) film as saturable absorber (SA). The aim of this experiment is to generate and demonstrate passively Q-Switched Erbium-doped fiber laser (EDFL) using GO as a saturable absorber. Stable Q-switched operation can be achieved at 1558.8 nm. By increasing the pump power from 26.32mW to 71.65mW, the repetition rate also increased from 30.58 kHz to 51.81k Hz. The pulse width of the laser were 11.2 - 4.73 µs. The maximum output power and maximum peak power obtained are 128 µW and 521.98 µW respectively at a pump power of 71.65 mW. The pulse energy reaches 2.47nJ. These results show that GO is a new potential SA material for pulsed laser applications

    Tunable Raman fiber laser induced by Rayleigh backscattering in an ultra-long cavity

    Get PDF
    We report an ultra-long Raman laser with a 46 km fiber length that behaved as a Rayleigh back-scattering–based optical feedback. The laser was tunable from 1550 nm to 1571 nm (3 dB bandwidth) with the insertion of an optical grating filter. Evaluations on the spectral evolution and power development were also performed from the results obtained. In fact, it was discovered that the spectral broadening effect between the modeless spectra resembled the same process that happens in a typical fiber cavity that has high reflectors at each cavity end. In addition, the output power showed a square-root development with respect to the input power

    Tocotrienol Affects Oxidative Stress, Cholesterol Homeostasis and the Amyloidogenic Pathway in Neuroblastoma Cells: Consequences for Alzheimer’s Disease

    Get PDF
    One of the characteristics of Alzheimer´s disease (AD) is an increased amyloid load and an enhanced level of reactive oxidative species (ROS). Vitamin E has known beneficial neuroprotective effects, and previously, some studies suggested that vitamin E is associated with a reduced risk of AD due to its antioxidative properties. However, epidemiological studies and nutritional approaches of vitamin E treatment are controversial. Here, we investigate the effect of α-tocotrienol, which belongs to the group of vitamin E, on AD-relevant processes in neuronal cell lines. In line with the literature, α-tocotrienol reduced the ROS level in SH-SY5Y cells. In the presence of tocotrienols, cholesterol and cholesterol esters, which have been shown to be risk factors in AD, were decreased. Besides the unambiguous positive effects of tocotrienol, amyloid-β (Aβ) levels were increased accompanied by an increase in the activity of enzymes responsible for Aβ production. Proteins and gene expression of the secretases and their components remained unchanged, whereas tocotrienol accelerates enzyme activity in cell-free assays. Besides enhanced Aβ production, tocotrienols inhibited Aβ degradation in neuro 2a (N2a)-cells. Our results might help to understand the controversial findings of vitamin E studies and demonstrate that besides the known positive neuroprotective properties, tocotrienols also have negative characteristics with respect to AD

    Kuwait's marine biodiversity: Qualitative assessment of indicator habitats and species

    Get PDF
    The tropical waters of the Northern Arabian Gulf have a long history of maritime resource richness. High levels of biodiversity result from the complex matrix of coastal habitats, coral reefs and sea grass beds that characterise the region. Insight into the ongoing health of such habitats and the broader Kuwait maritime environment can be gauged by the status of indicator species found within these habitats. Here we review information on the occurrence, distribution and threats to key marine habitats and associated indicator species to provide an updated assessment of the state of the Kuwait's marine biodiversity. Critical evaluation of historic data highlights knowledge gaps needed inform the focus of future monitoring and conservation efforts. This assessment is designed to evaluate performance against environmental policy commitments, while providing a solid foundation for the design of comprehensive marine ecosystem management strategies

    Measurement of the cross-section and charge asymmetry of WW bosons produced in proton-proton collisions at s=8\sqrt{s}=8 TeV with the ATLAS detector

    Get PDF
    This paper presents measurements of the W+μ+νW^+ \rightarrow \mu^+\nu and WμνW^- \rightarrow \mu^-\nu cross-sections and the associated charge asymmetry as a function of the absolute pseudorapidity of the decay muon. The data were collected in proton--proton collisions at a centre-of-mass energy of 8 TeV with the ATLAS experiment at the LHC and correspond to a total integrated luminosity of 20.2~\mbox{fb^{-1}}. The precision of the cross-section measurements varies between 0.8% to 1.5% as a function of the pseudorapidity, excluding the 1.9% uncertainty on the integrated luminosity. The charge asymmetry is measured with an uncertainty between 0.002 and 0.003. The results are compared with predictions based on next-to-next-to-leading-order calculations with various parton distribution functions and have the sensitivity to discriminate between them.Comment: 38 pages in total, author list starting page 22, 5 figures, 4 tables, submitted to EPJC. All figures including auxiliary figures are available at https://atlas.web.cern.ch/Atlas/GROUPS/PHYSICS/PAPERS/STDM-2017-13

    Study of CP violation in Dalitz-plot analyses of B0 --> K+K-KS, B+ --> K+K-K+, and B+ --> KSKSK+

    Get PDF
    We perform amplitude analyses of the decays B0K+KKS0B^0 \to K^+K^-K^0_S, B+K+KK+B^+ \rightarrow K^+K^-K^+, and B+KS0KS0K+B^+ \to K^0_S K^0_S K^+, and measure CP-violating parameters and partial branching fractions. The results are based on a data sample of approximately 470×106470\times 10^6 BBˉB\bar{B} decays, collected with the BABAR detector at the PEP-II asymmetric-energy BB factory at the SLAC National Accelerator Laboratory. For B+K+KK+B^+ \to K^+K^-K^+, we find a direct CP asymmetry in B+ϕ(1020)K+B^+ \to \phi(1020)K^+ of ACP=(12.8±4.4±1.3)A_{CP}= (12.8\pm 4.4 \pm 1.3)%, which differs from zero by 2.8σ2.8 \sigma. For B0K+KKS0B^0 \to K^+K^-K^0_S, we measure the CP-violating phase βeff(ϕ(1020)KS0)=(21±6±2)\beta_{\rm eff} (\phi(1020)K^0_S) = (21\pm 6 \pm 2)^\circ. For B+KS0KS0K+B^+ \to K^0_S K^0_S K^+, we measure an overall direct CP asymmetry of ACP=(45+4±2)A_{CP} = (4 ^{+4}_{-5} \pm 2)%. We also perform an angular-moment analysis of the three channels, and determine that the fX(1500)f_X(1500) state can be described well by the sum of the resonances f0(1500)f_0(1500), f2(1525)f_2^{\prime}(1525), and f0(1710)f_0(1710).Comment: 35 pages, 68 postscript figures. v3 - minor modifications to agree with published versio
    corecore