scholarly journals A new method for watermarking color images using virtual hiding and El-Gamal ciphering

Author(s):  
Noor Kadhim Ayoob ◽  
Asraa Abdullah Hussein ◽  
Rusul Mohammed Neamah

One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.

Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.


2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.


2014 ◽  
Vol 602-605 ◽  
pp. 3363-3366
Author(s):  
Yi Ming Sun ◽  
Chun Lei Han

In order to automatically identify the mobile phones' reviews that the users comment on the mobile phone on the internet and obtain valuable information from the reviews, this paper presents the process of constructing ontology for the mobile phones' reviews and preliminarily establish a domain ontology of the mobile phones' reviews. The ontology construction adopts the Protégé tool and the Seven Steps method of Stanford University research. The ontology can provide convenience for the semantic information mining on Web mobile phones' reviews, and it can provide a new method to effectively mine the use feelings of the phone from a large number of mobile phone users' reviews.


Author(s):  
Vivek Charu ◽  
Paul B. Rosenberg ◽  
Lon S. Schneider ◽  
Lea T. Drye ◽  
Lisa Rein ◽  
...  

AbstractPhysicians and patients may choose a certain treatment only if it is predicted to have a large effect for the profile of that patient. We consider randomized controlled trials in which the clinical goal is to identify as many patients as possible that can highly benefit from the treatment. This is challenging with large numbers of covariate profiles, first, because the theoretical, exact method is not feasible, and, second, because usual model-based methods typically give incorrect results. Better, more recent methods use a two-stage approach, where a first stage estimates a working model to produce a scalar predictor of the treatment effect for each covariate profile; and a second stage estimates empirically a high-benefit group based on the first-stage predictor. The problem with these methods is that each of the two stages is usually agnostic about the role of the other one in addressing the clinical goal. We propose a method that characterizes highly benefited patients by linking model estimation directly to the particular clinical goal. It is shown that the new method has the following two key properties in comparison with existing approaches: first, the meaning of the solution with regard to the clinical goal is the same, and second, the value of the solution is the best that can be achieved when using the working model as a predictor, even if that model is incorrect. In the Citalopram for Agitation in Alzheimer’s Disease (CitAD) randomized controlled trial, the new method identifies substantially larger groups of highly benefited patients, many of whom are missed by the standard method.


2004 ◽  
Vol 6 (2) ◽  
pp. 1-33 ◽  
Author(s):  
David Bach

The battle between the recording industry and those illegal sharing music over the Internet has gripped headlines over the last few years like few others related to the digital age. At its core, it is a battle about the meaning of property and thus a battle over the heart of the emerging information economy. This article critically examines the double punch of law and technology – the simultaneous and interwoven deployment of legal and electronic measures to protect digital content – and asks whether it is merely a defense strategy against piracy, as the industry asserts, or rather an attempt to fundamentally redefine the producer-consumer relationship. Based on some initial evidence for the latter proposition, the article analyzes reasons for concern, outlines the current politics of copyright policymaking that have given producers the upper hand, and sketches elements of a strategy to fight music piracy that does not infringe on basic consumer rights.


2018 ◽  
Vol 41 (2) ◽  
pp. 37-47
Author(s):  
Marzenna Nowicka

Scholaris is a portal of MEN agenda with educational electronic resources designated for teachers of all stages of education. The aim of the research was to identify the promoted model of digital early childhood education. An analysis of the content of portal showed a focus on technology being used to illustrate the content covered by the teaching program, limitation of openness to other communities and places on the internet, negligence of the communication between education entities and the hegemony of digital content for the teacher to reproduce. The digitality on the portal is seen as a visualsound enhancement of classes and the technical facilitation of the teacher’s work. In spite of the current innovative trends, the general model promoted on the website is seen as functional-behavioral.


Sign in / Sign up

Export Citation Format

Share Document