Operating System Data Hiding

Data Hiding ◽  
2013 ◽  
pp. 133-166 ◽  
Author(s):  
Michael Raggo ◽  
Chet Hosmer
2018 ◽  
Vol 7 (4.3) ◽  
pp. 266 ◽  
Author(s):  
S. Panchenko ◽  
O. Ohar ◽  
V. Kuleshov ◽  
M. Kutsenko ◽  
A. Kuleshov

A route made up of the groups of cars of different owners can be formed in accordance with the technological processes of the station operation by the transport operator, by the operator that owns the rolling stock, by structural or production units of the railways on the access tracks or on the station tracks which are leased by the branch railway lines to cargo owners. Route optimisation uses an estimation function that determines the routing cost based on the automatic operating system data bases and enables to control routing efficiency and other characteristics used further in making a route table with defining function costs. The technology of cargo transport logistic services with the operation sequence starting from the moment of arrival of empty and loaded cars is proposed. A model for determining cost savings in transportation of the route with bulk cargoes from a consignor as a two-stage model of stochastic programming with recursion and random right-hand sides of the restrictions at the Ukrainian railways is proposed. 


2015 ◽  
pp. 513-540
Author(s):  
Guillaume Aubrun ◽  
Cecilia Lancien

We study the distinguishability norms associated to families of locally restricted POVMs on multipartite systems. These norms (introduced by Matthews, Wehner and Winter) quantify how quantum measurements, subject to locality constraints, perform in the task of discriminating two multipartite quantum states. We mainly address the following question regarding the behaviour of these distinguishability norms in the highdimensional regime: On a bipartite space, what are the relative strengths of standard classes of locally restricted measurements? We show that the class of PPT measurements typically performs almost as well as the class of all measurements whereas restricting to local measurements and classical communication, or even just to separable measurements, implies a substantial loss. We also provide examples of state pairs which can be perfectly distinguished by local measurements if (one-way) classical communication is allowed between the parties, but very poorly without it. Finally, we study how many POVMs are needed to distinguish almost perfectly any pair of states on C^d, showing that the answer is exp(Θ(d^2 )).


Author(s):  
Mahalakshmi M ◽  
Kalyanasundaran S.

The backbone of this research is to design and developed an effective cloud environment for pretending and protection of portable client device information put away in the cloud. Portable gadgets, for example, advanced mobile phones or tablets that are fundamentally more restricted than PCs as far as memory, processors, secured operating system, and accessible system data transmission bandwidth because of that all information migrate in to cloud environment. A portable client may go about as an information owner will demand key from the cloud administrator, scrambles the information and afterward it transfers the information in the cloud. In the cloud secured encryption is finished. Certificate Authority Based Encryption (CABE) approach is utilized for security and adaptability. Frequent monitoring is accomplished for Privacy, Security, trustworthiness and accessibility.


Author(s):  
Edward F. Durner

Abstract This chapter provide information on the registration and mechanics of SAS® (Statistical Analysis System). SAS® is a software system for data management, analysis and presentation. SAS® is available for different platforms and all versions basically perform the same procedures. The main differences among them are how the user interacts with the software via the operating system. Data set size used to be an issue, often limited by the computer's memory, but that problem hardly exists anymore with today's modern machines.


Author(s):  
Yung-Yao Chen ◽  
Yu-Chen Hu ◽  
Hsiang-Yun Kao ◽  
Yu-Hsiu Lin

AbstractVarious eHealth applications based on the Internet of Things (IoT) contain a considerable number of medical images and visual electronic health records, which are transmitted through the Internet everyday. Information forensics thus becomes a critical issue. This paper presents a data hiding algorithm for absolute moment block truncation coding (AMBTC) images, wherein secret data, or the authentication code, can be embedded in images to enhance security. Moreover, in view of the importance of transmission efficiency in IoT, image compression is widely used in Internet-based applications. To cope with this challenge, we present a novel compression method named gradient-based (GB) compression, which is compatible with AMBTC compression. Therefore, after applying the block classification scheme, GB compression and data hiding can be performed jointly for blocks with strong gradient effects, and AMBTC compression and data hiding can be performed jointly for the remaining blocks. From the experimental results, we demonstrate that the proposed method outperforms other state-of-the-art methods.


2021 ◽  
Vol 295 (2) ◽  
pp. 64-70
Author(s):  
VITALIY YAKOVYNA ◽  
◽  
BOHDAN UHRYNOVSKYI ◽  

Android operating system is vulnerable to the aging-related effects such as performance degradation and increased of aging-related failures rate due prolonged usage of a mobile device without rebooting. This paper considers software aging phenomenon in system processes and user applications of the Android operating system and means for counteracting this phenomenon. Experimental research was performed using a methodology that consists in performing stress tests on mobile applications, collecting system data on running processes, converting the collected data into time series for the relevant metrics and analyzing these data using statistical methods. Thus, the analysis of oom_adj_score for determining processes priorities in the context of software aging allowed to identify two groups of processes, namely system processes and user applications. It is also pointed out the possibility of using oom_adj_score to determine the state of system usage in the tasks of software aging predicting and performing software rejuvenation. The results of the system processes analysis showed that the indicators of aging are system_server and surfaceflinger processes, as well as com.android.phone, cameraserver in the case of active use of contacts and camera applications. The considered processes can be used to implement software rejuvenation. Research has shown that user applications are also vulnerable to aging-related effects, but the rejuvenation procedure cannot be applied to them at the system level. It is important to take steps to prevent aging-related errors, such as using appropriate data structures and algorithms for efficient memory management, minimizing the load on the main UI stream, and using effective graphics techniques to reduce the number of delayed frames. In future works it is important to investigate the considered system processes and services in tasks of software aging forecasting and performing of rejuvenation procedure. It is important for user applications to develop tools that provide developers with information about the state of software aging in the system, which would allow to decide on the feasibility of performing important and resource-intensive tasks in conditions when the system is already in a state with a high probability of aging-related failure.


2020 ◽  
Vol 10 (13) ◽  
pp. 4686
Author(s):  
Da-Yu Kao

When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, and intelligence agents to erase, tamper, or conceal secrets. However, ADS problems are much ignored in digital forensics. Rare researches illustrated the contact artifacts of ADS timestamps. This paper performs a sequence of experiments from an inherited variety and provides an in-depth overview of timestamp transfer on data hiding operations. It utilizes files or folders as original media and uses the timestamp rules as an investigative approach for the forensic exchange analysis of file sets. This paper also explores timestamp rules using case examples, which allow practical applications of crime scene reconstruction to real-world contexts. The experiment results demonstrate the effectiveness of temporal attributes, help digital forensic practitioners to uncover hidden relations, and trace the contact artifacts among crime scenes, victims, and suspects/criminals.


2008 ◽  
Vol 42 (3) ◽  
pp. 65-73 ◽  
Author(s):  
Iain Sutherland ◽  
Jon Evans ◽  
Theodore Tryfonas ◽  
Andrew Blyth

Sign in / Sign up

Export Citation Format

Share Document