• Title/Summary/Keyword: Data concealing

Search Result 31, Processing Time 0.023 seconds

Improved Data Concealing and Detecting Methods for OOXML Document (OOXML 문서에 대한 향상된 데이터 은닉 및 탐지 방법)

  • Hong, Kiwon;Cho, Jaehyung;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.489-499
    • /
    • 2017
  • MS office is a office software which is widely used in the world. The OOXML format has been applied to the document structure from MS office 2007 to the newest version. In this regard, the method of data concealing, which is a representative anti-forensic act has been researched and developed, so the method of detecting concealed data is very important to the digital forensic investigation. In this paper, we present an improved data concealing method bypassing the previewers detecting methods for OOXML formatted MS office documents. In addition, we show concealment of the internal data like sheets and slides for MS office 2013 Excel and PowerPoint, and suggest an improved detecting algorithm against this data concealing.

The Study of Face Concealing Culture of Istanbul Women (이스탄불여성의 폐면문화 연구)

  • Park, Bo-Young
    • Journal of the Korean Home Economics Association
    • /
    • v.49 no.5
    • /
    • pp.23-32
    • /
    • 2011
  • This study will covered socio-cultural background and characteristic of the face-concealing culture of Istanbul which has liberal and westernized clothes culture for women even if it's an city in an Islamic country. This study depended on literatures related to religion, culture and costumes of the Ottoman Empire, especially costumic data on miniature of turkey, which was famous from 16th to 19th century. Since the 17th century, the Ottoman Empire has been gradually influenced by European countries but the change of women's clothes was not considerable. In the 18th century, women's clothes were influenced by foreign fashions. A veil to cover the face was gradually disappeared and traditional Turkish headdresses were replaced by European hats. Through face-concealing culture of Istanbul, we can see some socio-cultural features like Islamic religious character, one's social position, economic situation, westernization and renovation, beauty and completion of costume, duality for the reason of regional difference.

The Lived Experience of Mothers Mentally Handicapped Daughters Having Menarche at Puberty (사춘기 정신지체여아의 초경에 대한 어머니의 경험 연구(Parse의 방법론 적용))

  • 이명숙
    • Journal of Korean Academy of Nursing
    • /
    • v.29 no.3
    • /
    • pp.494-506
    • /
    • 1999
  • The purpose of this study is to understand the structure of mothers of mentally handicapped daughters' lived experience, to apprehend the connectedness of the structure of the experience with concept of Parse's human becoming theory, and to provide a foundation for nursing research and education. Data collection was conducted from October 1995 to April 1996. Research participants were eight mothers of mentally handicapped daughters whose ages ranged from 12 to 18 attending special schools located in either Inchon or Seoul. The researcher had interviews with them over their lived experience conducted tape recorded, and made an analysis according to Parse's “human becoming research methodoloy.” The data were collected using the dialogical engagement process “I and You,” the participant researcher and the participant subject. The data were analyzed using the extraction-synthesis and heuristic interpretation. The structural integration is illustrated in the following : 1) Realizing the mother's role of mentally handicapped daughters and admitting situation. 2) Concealing a part of their relationship with others is interpreted as revealing-concealing. 3) Living a life kept moving between separating and connecting. 4) Their flight back voluntarily to improve the situation is interpreted as powering. The conceptual integration which emerged was the lived experience of mothers is powering through the revealing-concealing and connecting-separating of valuing.

  • PDF

The Research on Data Concealing and Detection of SQLite Database (SQLite 데이터베이스 파일에 대한 데이터 은닉 및 탐지 기법 연구)

  • Lee, Jae-hyoung;Cho, Jaehyung;Hong, Kiwon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1347-1359
    • /
    • 2017
  • SQLite database is a file-based DBMS(Database Management System) that provides transactions, and it is loaded on smartphone because it is appropriate for lightweight platform. AS the usage of smartphone increased, SQLite-related crimes can occur. In this paper, we proposed a new concealing method for SQLite db file and a detection method against it. As a result of concealing experiments, it is possible to intentionally conceal 70bytes in the DB file header and conceal original data by inserting artificial pages. But it can be detected by parsing 70bytes based on SQLite structure or using the number of record and index. After that, we proposed detection algorithm for concealed data.

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

  • Khaled H. Abuhmaidan;Marwan A. Al-Share;Abdallah M. Abualkishik;Ahmad Kayed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1619-1637
    • /
    • 2024
  • In today's highly digitized landscape, securing digital communication is paramount due to threats like hacking, unauthorized data access, and network policy violations. The response to these challenges has been the development of cryptography applications, though many existing techniques face issues of complexity, efficiency, and limitations. Notably, sophisticated intruders can easily discern encrypted data during transmission, casting doubt on overall security. In contrast to encryption, steganography offers the unique advantage of concealing data without easy detection, although it, too, grapples with challenges. The primary hurdles in image steganography revolve around the quality and payload capacity of the cover image, which are persistently compromised. This article introduces a pioneering approach that integrates image steganography and encryption, presenting the BitPatternStego method. This novel technique addresses prevalent issues in image steganography, such as stego-image quality and payload, by concealing secret data within image pixels with identical bit patterns as their characters. Consequently, concerns regarding the quality and payload capacity of steganographic images become obsolete. Moreover, the BitPatternStego method boasts the capability to generate millions of keys for the same secret message, offering a robust and versatile solution to the evolving landscape of digital security challenges.

Image Steganography to Hide Unlimited Secret Text Size

  • Almazaydeh, Wa'el Ibrahim A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.73-82
    • /
    • 2022
  • This paper shows the hiding process of unlimited secret text size in an image using three methods: the first method is the traditional method in steganography that based on the concealing the binary value of the text using the least significant bits method, the second method is a new method to hide the data in an image based on Exclusive OR process and the third one is a new method for hiding the binary data of the text into an image (that may be grayscale or RGB images) using Exclusive and Huffman Coding. The new methods shows the hiding process of unlimited text size (data) in an image. Peak Signal to Noise Ratio (PSNR) is applied in the research to simulate the results.

Watermarking Technique using Image Characteristics

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.187-193
    • /
    • 2021
  • In this paper, we propose an image watermarking technique that effectively hides confidential data in the LSB of image pixels by utilizing the characteristics of the image. In the proposed technique, the image is precisely divided into boundary surface and normal region other than the boundary surface and performs different processing. The boundary surface existing in the image is created by meeting different regions and contains important information of the image. One bit of confidential data is concealed in the LSB of the pixel at the boundary surface to preserve the characteristics of the boundary surface. In normal region other than the boundary surface, the pixel values are similar, and the change with the adjacent pixel values is smooth. Based on this property, even if the 2 bits of confidential data are hidden in the lower 2 bits of the pixel in the normal region, the difference cannot be visually distinguished. When confidential data is concealed in an image as described above, the amount of confidential data concealed in an image can be increased while maintaining excellent image quality. Concealing confidential data by applying the proposed method increases the amount of confidential data concealed by up to 84.6% compared to the existing method. The proposed technique can be effectively used for commercial image watermarking that hides copyright information.

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

Lived Experience of patients with Terminal Cancer : Parses Human Becoming Methodology (말기 암환자의 체험에 관한 현상학적 연구)

  • 이옥자
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.3
    • /
    • pp.510-537
    • /
    • 1995
  • Human health is an integral part of experience in the process of Human Becoming. Through continual interaction with the environment human beings freely choose experience and develop as responsible beings. The process of the health experience of patient with terminal cancer is a unique. he objective of this study is to understand the lived experience of patients with terminal cancer in order to provide basic information for nursing care in the clinical setting and to develop a theoretical background for clinical practice. This study is to de-scribe and define the lived experience of patients with terminal cancer in order to provide a foundation for nursing research and education. Data collection has been done between December 1993 and November 1994. The subjects included five persons -four females and one male : one who was in her sixties, one in his fifties, two in their forties, and one who was in her thirties. The researcher has met with these patients 35 times, but at eight times the patient was in a stuporous condition and not able to participate, so these were not included in the data analysis. Parse's "Human Becoming Methodology", an existential phenomenological research methodology is used for this study. Data has been collected using he dialogical engagement process of "I and You", the participant researcher and the participant subject. Dialogical engagement was discontinued when the data was theoretically saturated. Data was analyzed using the extraction - synthesis and heuristic interpretation. The criteria of Guba and Lincoln(1985). and Sandelo wski(1986) : credibility, auditability, fitness and objectivity were used to test the validity and reliability of the data. The following is a description of the structure of the lived experience of patients with terminal cancer as defined by this study : 1. Structure : 1) Suffering through the reminiscence of past experience 2) The appearance of complex emotions related to life and connectedness 3) The increasing importance of significant people and of the Absolute Being 4) The increasing realization of the importance of health and belief 5) Desire for a return to health and a peaceful life or for acceptance of dying and a comfortable death In summary the structure of the lived experience of these patients can be said to be : suffering comes through reminiscence of past experience, and there are complex emotions related to life and connectedness. Significant people and the Absolute Being become increasingly important along with a realization of the importance of health and faith. And finally there is a desire for either a return to health and a peaceful life or for the acceptance of dying and a comfortable death. 2. Heuristic Interpretation : Using Parse's Human Becoming Methodology, the structure of the lived experience of patients with terminal cancer identified in this research is interpreted as. The lived experience of patients with terminal cancer involves the solving of past conflicts, and the experience of the healing and valuing of sorrow and pain. Through the relation of life and health, and the complex emotions that arise, the lived experience of revealing - concealing is of paradoxical emotions. The increasing importance of significant others and of the Absolute Being shows Connecting and Separating an on- going process of nearness and farness. Revision of thoughts about health and faith is interpreted as transforming and desire for restoration to health and a peaceful life or acceptance of dying and a cowfortable death, as powering. In summary, it is possible to see, in the lived experience of patients with terminal cancer, the relationship of the five concepts of Parse's theory : valuing, revealing -concealing, connecting-separating, transforming, and powering. From Parse's theory, the results of this study show that meaning is related to valuing, rhythmicity to revealing-concealing and connect-ing-separating, and cotranscendence to transforming and powering.

  • PDF

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.