• Title/Summary/Keyword: confidential data

Search Result 147, Processing Time 0.032 seconds

An Improved Data Hiding Algorithm for Increasing Hidden Capacity

  • Dae-Jea Cho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.11-16
    • /
    • 2024
  • Illegal manipulation and alteration of digital content are becoming a social issue. To address this problem, there is an increasing demand for the development of technologies to prevent the manipulation and alteration of digital content. This paper proposes a data hiding algorithm capable of embedding a larger amount of confidential data in the original cover image while minimizing the degradation of image quality in stego images. The algorithm presented in this paper analyzes the characteristics of the image to extract corner points and then uses a method to insert watermarks around these extracted corner points. Additionally, through experimentation, it has been proven that this algorithm can insert a greater amount of watermark without degrading the image quality compared to other existing algorithms.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

Production Increase of Milk in Dairy Cow by Metabolic Profile Test (대사판정시험을 이용한 젖소의 우유증산)

  • Lee Chang-Woo;Kim Bonn-Won;Ra Jeong-Chan;Shin Sang-Tae;Kim Doo;Kim Jong-Taik;Hong Soon-Il
    • Journal of Veterinary Clinics
    • /
    • v.10 no.1
    • /
    • pp.65-94
    • /
    • 1993
  • This study examined metabolic profiles of 1349 Holstein cows from 91 commercial herds. Thirteen parameters which are consisted of twelve blood components and body condition score were examined and their mean values. standard deviations and standard limits, which are 80% confidential limits, in each lactational stage were reported. The variations of each parameter affected by season, individual milk yield, adjusted corrected milk yield of herd. and lactation number were also reported. A model of metabolic profile test applicable to this country where the average number of cows in a herd is small as to be fifteen is designed. Metabolic profiles as reflected in each parameter were discussed in relation to adequacy of dietary intake for production, milk production, reproductive performance, and diseases, and the possible measure to improve productivity of dairy cows were proposed. Much of the variation in parameters was due to differences between herds, and less to differences between seasons, differences between individual milk yield, and differences between lactational stages. As the average herd size in this country is small, it is believed that all the cows in a herd must be sampled, and the individual result of each parameter was compared with the standard limit for each lactational stage, and the percentage of cows which are outside the standard limits in a herd was calculated to use as a criteria for evaluation of the herd. Data outside the 99% confidential limits were to be deleted at first, but when the trends of the data outside the 99% confidential limits are same as the trends of the data within 99% confidential limits, the deleted data must be reviewed again, otherwise some important informations would be missed. The mean concentration of blood urea nitrogen in this study was much higher than that was reported in England, U.S.A. and Japan, and it was similar to the upper limits reported in England, U.S.A. and Japan. So it was thought that the concentration of blood urea nitrogen is improper as a criteria for protein intake. The increase of serum total protein cocentration beyond standard limits was due to increase of serum globulin concentration in most of the cows. The correlation coefficient between serum and protein and serum globulin concentration was 0.83. Serum globulin concentration was negatively related to adjusted corrected milk of herd. Serum albumin, calcium and magnessium concentrations were negatively related to adjusted corrected milk of herd, which indicate that high-producing individual or high-producing herd have not taken sufficient protein/amino acids, calcium and magnessium. Packed cell volume was negatively related to adjusted corrected milk of the herd, and the trend was same In each lactational stage. The correlation coefficient between serum and packed cell volume was 0.16 and the correlation was very weak. Blood glucose concentration was lowest in early lactational stage, which indicates negative energy balance in early lactational stage. Blood glucose concentration was negatively related to adjusted corrected milk of herd from peak to late lactational stage, which indicates negative energy balance during the period in high-producing individuals or high-producing herds. Correlation coefficient between serum aspartate aminotransferase activity and serum ${\gamma}$-glutamyltransferase activity was 0.41, and this indicates that serum ${\gamma}$-glutamyltransferase should be included as a parameter of metabolic profile test to evaluate liver function. Body condition score of dairy cows in this country was lower than that of Japan in every lactational stages, and the magnitude of increase in body condition score during middle and late lactational stages was small. Metabolic profile can not be evaluated with solely nutritional intake. When an individual or large percentage of cows in a herd have adnormal values In parameters of metabolic profile test, veterinary clinician and nutritionist should cooperate so as to diagnose diseases and to calculate the e of no운ents simultaneously.

  • PDF

Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings

  • Memis, Burak;Yakut, Ibrahim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2948-2966
    • /
    • 2014
  • To promote recommendation services through prediction quality, some privacy-preserving collaborative filtering solutions are proposed to make e-commerce parties collaborate on partitioned data. It is almost probable that two parties hold ratings for the same users and items simultaneously; however, existing two-party privacy-preserving collaborative filtering solutions do not cover such overlaps. Since rating values and rated items are confidential, overlapping ratings make privacy-preservation more challenging. This study examines how to estimate predictions privately based on partitioned data with overlapped entries between two e-commerce companies. We consider both user-based and item-based collaborative filtering approaches and propose novel privacy-preserving collaborative filtering schemes in this sense. We also evaluate our schemes using real movie dataset, and the empirical outcomes show that the parties can promote collaborative services using our schemes.

Confidential Convergecast Based on Random Linear Network Coding for the Multi-hop Wireless Sensor Network

  • Davaabayar Ganchimeg;Sanghyun Ahn;Minyeong Gong
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.252-262
    • /
    • 2024
  • The multi-hop wireless sensor network (WSN) suffers from energy limitation and eavesdropping attacks. We propose a simple and energy-efficient convergecast mechanism using inter-flow random linear network coding that can provide confidentiality to the multi-hop WSN. Our scheme consists of two steps, constructing a logical tree of sensor nodes rooted at the sink node, with using the Bloom filter, and transmitting sensory data encoded by sensor nodes along the logical tree upward to the sink where the encoded data are decoded according to our proposed multi-hop network coding (MHNC) mechanism. We conducted simulations using OMNET++ CASTALIA-3.3 framework and validated that MHNC outperforms the conventional mechanism in terms of packet delivery ratio, data delivery time and energy efficiency.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

The research of Decision Matrix design methodologies for business data protection and protection by data leveling (비즈니스 데이터 보호를 위한 decision matrix 설계 방법론 및 등급별 보호조치 기준 연구)

  • Shin, Dong Hyuk;Choi, Jin-Gu
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.3-15
    • /
    • 2016
  • Business data means data of all the documents and electronically generated on / off-line form, storage, use, and transfer the company work process. Business, organization, sales, marketing, means any data related to shipping. Many companies are investing in privacy. But not so for business data. In most companies, secret, confidential rating already exists, the basis is insufficient to establish that decisions can be analyzed in detail to reflect the actual business data in use. In this paper we want to present the criteria that can offer ways to design your business data decision matrix to establish the qualitative and quantitative criteria (evaluation indicators) that can be classified business data and protected by each class.

Managing Business Quality Using a Performance Management System

  • Kumari, Neeraj
    • The Journal of Industrial Distribution & Business
    • /
    • v.6 no.3
    • /
    • pp.9-17
    • /
    • 2015
  • Purpose - The study's aim is to assess performance quality delivered through a performance management system. The case study first measures the effectiveness of the present performance management system of Bhushan Steel Ltd. (BSL), and then secondarily analyzes the employee training impact. Research design, data, and methodology - A case study research approach using a survey was followed. The final sample size was 50, with a simple random sampling technique used. Primary data came from the company itself and the secondary from books, the Internet, journals, etc. Results - BSL employee appraisals are used for many developmental aspects such as competence in the present job, improvements, performance development, and training needs. The results indicate that individual performance can improve if employees perceive the system as more transparent (i.e., not so confidential). Conclusions - Overall, the BSL employees think that the company appraisal system is useful; however, to make it better the company has to improve many aspects including appraisals based on supervisor observations. The company could use a self-appraisal and a 360-appraisal approach to improve such assessments.

Encryption Algorithm using Polyline Simplification for GIS Vector Map

  • Bang, N.V.;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1453-1459
    • /
    • 2016
  • Recently, vector map has developed, used in many domains, and in most cases vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the manufacturing process of a vector map is complex and the maintenance of a digital map requires substantial monetary and human resources. This paper presents the selective encryption scheme based on polyline simplification methods for GIS vector map data protection to store, transmit or distribute to authorized users. Main advantages of our algorithm are random vertices and transformation processes but it still meets requirements of security by random processes, and this algorithm can be implement to many types of vector map formats.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.