• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.044 seconds

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

A Study on Steganography to Hide Secret Messages in Skeleton Datasets for Action Recognition (행동 인식을 위한 스켈레톤 데이터셋에 비밀 메시지를 은닉하기 위한 스테가노그라피 연구)

  • Sung, Rakbin;Lee, Daewon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.157-160
    • /
    • 2022
  • 딥러닝이 각광받기 시작하면서 인간의 자세와 행동을 인식하고 분류하기 위한 인공지능 기술 또한 급속도로 발전하게 되었다. 영상에서 인간의 자세를 디지털 데이터로 표현할 때 인체의 주요 관절점의 위치와 연결관계를 나타내는 스켈레톤 표현 방식을 주로 사용한다. 본 논문에서는 스켈레톤 데이터에 비밀 메시지를 은닉할 수 있는 스테가노그라피 알고리즘에 대해 소개하고, 스켈레톤을 구성하는 주요 관절점 키포인트를 조작했을 때 행동 인식 인공지능 모델이 어떻게 반응하는지 살펴봄으로써 스켈레톤 데이터에 대한 스테가노그라피 알고리즘의 특성과 보안성에 대해 논의한다.

On the Double-Sidedness of Facebook Users: The Desire to Hide vs. Peeping Voyeurism (Facebook 사용자들의 양면성에 대하여 - 감추고 싶은 욕구와 타인을 훔쳐보는 관음증적 욕구)

  • Lee, Eunji;Li, Hyung-Chul O.;Kim, ShinWoo
    • Journal of the HCI Society of Korea
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2014
  • Use of smart phones and other means allowed ready access to social networking service (SNS) and its users have explosively increased. In the meantime, Facebook which has the largest user community has caused various social problems due to its conservative privacy policy; yet its users are continuously increasing and committed to the service although its privacy policy has not so much changed. In this research, we studied the irony of increasing popularity of Facebook despite its negative privacy policy in the light of its users' double-sided desire. That is, users use Facebook because they are curious about other users' personal information and activities although they are at the same time anxious about public exposure of their own personal information and activities. To test this conjecture, we investigated users' double-sided desire (privacy protection, viewing others' activities) using questionnaire and reverse scenario test and confirmed that proper balance of privacy protection and activity exposure is an important contributor to continued popularity of Facebook. Much research studied SNS focusing on self-presentation that is on the side of self-exposure. This research highlights the importance of balance keeping between hide-and-seek for SNS companies such as Facebook in the use of privacy policy.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Colorization Algorithm Using Wavelet Packet Transform (웨이블릿 패킷 변환을 이용한 흑백 영상의 칼라화 알고리즘)

  • Ko, Kyung-Woo;Kwon, Oh-Seol;Son, Chang-Hwan;Ha, Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.1-10
    • /
    • 2008
  • Coloriztion algorithms, which hide color information into gray images and find them to recover color images, have been developed recently. In these methods, it is important to minimize the loss of original information while the color components are embedded and extracted. In this paper, we propose a colorization method using a wavelet packet transform in order to embed color components with minimum loss of original information. In addition, the compensation processing of color saturation in the recovered color images is achieved. In the color-to-gray process, an input RGB image is converted into Y, Cb, and Cr images, and a wavelet packet transform is applied to the Y image. After analyzing the amounts of total energy for each sub-band, color components are embedded into two sub-bands including minimum amount of energy on the Y image. This makes it possible not only to hide color components in the Y image, but to recover the Y image with minimum loss of original information. In the gray-to-color process, the color saturation of the recovered color images is decreased by printing and scanning process. To increase color saturation, the characteristic curve between printer and scanner, which can estimate the change of pixel values before and after printing and scanning process, is used to compensate the pixel values of printed and scanned gray images. In addition, the scaling method of the Cb and Cr components is applied to the gray-to-color process. Through the experiments, it is shown that the proposed method improves both boundary details and color saturation in the recovered color images.

Experiences of the Use of External Breast Prosthesis among Breast Cancer Survivors in Korea (유방암 생존자의 인조유방 사용경험)

  • Jun, Eun-Young;Choi, Soon-Ran;Kang, Hee-Sun
    • Women's Health Nursing
    • /
    • v.18 no.1
    • /
    • pp.49-61
    • /
    • 2012
  • Purpose: The purpose of this study was to examine the experiences of the use of external breast prostheses among breast cancer survivors in Korea. Methods: A qualitative descriptive study was conducted, using focus groups. Data were collected from breast cancer survivors who were patients of C women's hospital in Seoul, Korea. Data were analyzed using content analysis in order to identify significant themes. Results: Participants included forty breast cancer survivors who had mastectomy as a surgical treatment. Four themes emerged from the collected data were: 1) concern over the high price of external breast prosthesis, 2) irregular use of external breast prosthesis, 3) unsatisfied with mastectomy bra, and 4) wanting to hide or not to talk about using breast prosthesis openly. Conclusion: Since most participants reported irregular use and negative experiences related to external breast prosthesis or mastectomy bra use, healthcare workers should allow more time for proper fitting and counseling and consulting with breast cancer survivors. In addition, health care providers as well as family and friends should keep in mind that cancer survivors need support that can help them cope by using positive reframing. Furthermore, improvements in the coverage of costs and services are needed for these women. This would be helpful for breast prosthesis users.

A Class and Cosmetics of Make-up in Make-up Deisgn (메이크업 디자인에서 메이크업 종류)

  • Shin, Seong-Yoon;Shin, Kwang-Sung;Lee, Hyun-Chang;Jin, Chan-Yong;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.144-145
    • /
    • 2012
  • Make-up is the act of protecting the body and face, or a beautifully decorating by covering the shortcomings. In this paper, classification and type of makeup was newly organized to suit the present day. And the meaning of the new make-up were evaluated. Makeup helps protect skin from external changes. It gives the beauty function to hide defects of the skin and make it beautiful. Thus, it allows to have a social life actively and aggressively given the confidence to look.

  • PDF

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

A Car Plate Area Detection System Using Deep Convolution Neural Network (딥 컨볼루션 신경망을 이용한 자동차 번호판 영역 검출 시스템)

  • Jeong, Yunju;Ansari, Israfil;Shim, Jaechang;Lee, Jeonghwan
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1166-1174
    • /
    • 2017
  • In general, the detection of the vehicle license plate is a previous step of license plate recognition and has been actively studied for several decades. In this paper, we propose an algorithm to detect a license plate area of a moving vehicle from a video captured by a fixed camera installed on the road using the Convolution Neural Network (CNN) technology. First, license plate images and non-license plate images are applied to a previously learned CNN model (AlexNet) to extract and classify features. Then, after detecting the moving vehicle in the video, CNN detects the license plate area by comparing the features of the license plate region with the features of the license plate area. Experimental result shows relatively good performance in various environments such as incomplete lighting, noise due to rain, and low resolution. In addition, to protect personal information this proposed system can also be used independently to detect the license plate area and hide that area to secure the public's personal information.