scholarly journals Hide Secret Information in Blocks: Minimum Distortion Embedding

Author(s):  
Md Amiruzzaman ◽  
Rizal Mohd Nor
Alloy Digest ◽  
1981 ◽  
Vol 30 (4) ◽  

Abstract GUTERL D-2 is a high-hardenability tool and die steel of the high-carbon, high-chromium type. It has high compressive strength, his resistance to abrasion, minimum distortion in hardening but only fair toughness. Among its many uses are rolls, punches, shear blades, lathe centers and many types of cutting and forming dies. This datasheet provides information on composition, physical properties, hardness, and elasticity as well as fracture toughness. It also includes information on corrosion resistance as well as forming, heat treating, machining, and surface treatment. Filing Code: TS-380. Producer or source: Guterl Special Steel Corporation.


Alloy Digest ◽  
1979 ◽  
Vol 28 (3) ◽  

Abstract CYCLOPS SCK is a cold-work tool steel with a balanced composition to provide air hardening and an optimum combination of toughness, wear resistance and minimum distortion during heat treatment. Typical applications are shear blades, trimming dies and forming rolls, including grade rolls for cutlery and flatware. This datasheet provides information on composition, physical properties, hardness, and elasticity. It also includes information on forming, heat treating, and machining. Filing Code: TS-346. Producer or source: Cyclops Corporation.


Alloy Digest ◽  
1976 ◽  
Vol 25 (12) ◽  

Abstract DEWARD is an oil-hardening, non-deforming, manganese die steel that is characterized by uniformity, good machinability and satisfactory performance in service. Its composition permits a relatively low hardening temperature to give minimum distortion after heat treatment and little danger of cracking. It has good wear resistance and gives excellent results when used for all kinds of intricate tools. This datasheet provides information on composition, physical properties, hardness, elasticity, and compressive strength as well as fracture toughness. It also includes information on forming, heat treating, and machining. Filing Code: TS-310. Producer or source: AL Tech Specialty Steel Corporation.


Author(s):  
Мадина Усенбай ◽  
Акмарал Иманбаева

Конфиденциальность является одним из важных параметров для повышения безопасности в сети, цель которого - сохранить секретную информацию. Рассмотрена модель доверия, состоящая из текущих и прошлых оценок на основе репутации объекта в сети. В модели используется параметр времени для защиты конфиденциальности пользователя для статических и динамических объектов, например, в IoT или облачной технологии. Confidentiality is one of the important parameters for increasing security on the network, the coal of which is to keep secret information. A trust model consisting of current and past assessments based on the object reputation in the network is considered. The model uses a time parameter to protect user privacy for static and dynamic objects, for example, in IoT or cloud technology.


2021 ◽  
pp. 1-1
Author(s):  
Jieni Lin ◽  
Junren Qin ◽  
Shanxiang Lyu ◽  
Shanxiang Lyu ◽  
Bingwen Feng ◽  
...  

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


Author(s):  
Kiran S. Balagani ◽  
Mauro Conti ◽  
Paolo Gasti ◽  
Martin Georgiev ◽  
Tristan Gurtler ◽  
...  

Author(s):  
Feng Liu ◽  
Pengpeng Luo ◽  
Zhujuan Ma ◽  
Cheng Zhang ◽  
Yiwen Zhang ◽  
...  

2022 ◽  
Vol 14 (1) ◽  
pp. 24
Author(s):  
Hui Yan ◽  
Chaoyuan Cui

Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on these addresses. This paper proposes CacheHawkeye, which uses the frequent memory access characteristic of the attacker to detect attacks. CacheHawkeye monitors memory events by CPU hardware performance counters. We proved the effectiveness of CacheHawkeye on Flush+Reload and Flush+Flush attacks. In addition, we evaluated the accuracy of CacheHawkeye under different system loads. Experiments demonstrate that CacheHawkeye not only has good accuracy but can also adapt to various system loads.


Sign in / Sign up

Export Citation Format

Share Document