scholarly journals An Implementation of MMS Steganography With The LSB Method

Author(s):  
Dian Ahkam Sani ◽  
Mohammad Zoqi Sarwani ◽  
Muhamad Agus Setiawan

Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.

Comunicar ◽  
2005 ◽  
Vol 13 (25) ◽  
Author(s):  
Ana-Luisa Fernandes-Gonçalves

The present article is about the presence of the tv in the society, in general, and its potential as an important agent, such as the family and the school, on the children’s and young people’s development and education. Nowadays we live in a complex world of images with sound, the most of them transmitted by the tv, the cinema and the internet. The infantile universe is full of those images. This way we structured this article in four parts, refering some of the contents related with this subject. The first part describes the presence of the television in the children's daylife and their relationship with the magic box, even the identification that they make with its favourites characters, in order to understand the space that the TV occupies in their lives. The second part presents the different messages transmitted by the television. It is important to analyze the main risks and advantages of television, that is to say, in spite of some programs show bad values, foment the excessive consumption, expose the children to an atmosphere of violence and pornography, also entertains, accompanies, educates, informs, favours the access to the culture and allows to unite the family around a program. At last the third part, this one outlines the necessity to put the tele as a curricular resource in the school, to teaches the students how to analyze, how to criticize and to think about the texts and the news of the world today. The television, considered a powerful tool, is decisive in the communication, such in the formation of values and ideas as in the culture transmission. The function of the school is not to remain far from this factor, but to try to meditate, to understand and to decide its impact, in a better way, on the development of the children and youngs. As conclusion we can add that we’ve tried to aim some strategies that educators and parents will be able to work, united to the children and the youngs, so they could have a new look of the Tv’s world and that they could know how to make their own selection and how to have a critical attitude before the watched product.La presente comunicación se refiere a la presencia de la tele en la sociedad en general y a su potencial como agente importante de formación y educación, junto con la escuela y la familia, en la vida de los niños y de los jóvenes. Actualmente vivimos inmersos en un mundo complejo de imágenes con sonido, que recibimos muy especialmente a través de la tele, del cine y de Internet, los cuales hacen parte del cotidiano del universo infantil. Así, a fin de organizar algunos de los contenidos desde los que es posible enfocar el tema, estructuramos este artículo en cuatro partes. La primera parte describe la presencia de la tele a diario de los niños y su relación con la caja mágica, incluso la identificación que hacen de sus personajes favoritos, a fin de comprender el espacio que ocupa la tele en su cotidianidad. La segunda parte presenta los distintos mensajes transmitidos por la tele. Es importante analizar las principales riesgos y ventajes de la televisión, o sea, a pesar de algunos programas muestran antivalores de la tele: fomentar excesivamente el consumo, exponer a los niños a un ambiente de violencia y pornografía también entretiene, acompaña, educa, informa, favorece el acceso a la cultura y permite unir a la familia en torno a un programa. Cuanto a la tercera parte, plantea la necesidad de incorporar la tele como recurso curricular en la escuela, para que enseñe a los alumnos a analizar crítica y reflexivamente los textos mediáticos. La televisión es considerada como una herramienta poderosa, determinante en la comunicación, tanto en la formación de valores e ideas, como en la transmisión de cultura; la función de la escuela no es permanecer ajena a este factor, pero procurar reflexionar para comprender y decidir mejor su impacto en el desarrollo de los niños y jóvenes. Como conclusión podemos añadir que hemos tratado de apuntar algunas estrategias que educadores y padres podrán trabajar junto con los niños y los jóvenes, para que éstes tengan una nueva mirada del mundo de la tele y para que sepan hacer su propia selección y tener una actitud crítica ante el producto visionado.


Author(s):  
Sathiyamoorthi V.

It is generally observed throughout the world that in the last two decades, while the average speed of computers has almost doubled in a span of around eighteen months, the average speed of the network has doubled merely in a span of just eight months! In order to improve the performance, more and more researchers are focusing their research in the field of computers and its related technologies. Internet is one such technology that plays a major role in simplifying the information sharing and retrieval. World Wide Web (WWW) is one such service provided by the Internet. It acts as a medium for sharing of information. As a result, millions of applications run on the Internet and cause increased network traffic and put a great demand on the available network infrastructure.


2011 ◽  
Vol 22 (1) ◽  
pp. 155-166
Author(s):  
Markus Eberl ◽  
Hanns J. Prem

AbstractAmong the original holdings of the recently opened World Digital Library was a Spanish manuscript on the Maya that supposedly dates to 1548 (initially available at http://www.wdl.org/en/item/2961). It was given the title El modo de cómo hacían la pintura los indígenas (“How the Indians Made Their Paintings”) and contained an explanation of Maya culture accompanied by drawings of Maya glyphs and deities. Detailed analysis shows that the Pintura manuscript is a fake that belongs to the Canek group of forged manuscripts. It is written in the same hand as the Canek forgeries and shares the same stylistic characteristics with this group. Its drawings copy illustrations from the third English or the second Spanish edition of Sylvanus Morley's The Ancient Maya, and from the Madrid Codex. The World Digital Library aims to make significant primary materials from all UNESCO member countries available on the Internet. Forgeries like the Pintura manuscript undermine the trustworthiness and eminence of this project. While the Pintura manuscript was removed from the World Digital Library in August 2009, researchers may find useful the holistic approach that allowed identifying it as a forgery. A historical document is here examined from six angles. What are its physical makeup, its penmanship, and its linguistic properties? Authentic documents should have a traceable history of documentation (here termed a “pedigree”) and their content should be consistent with well-established sources and with culture- and time-specific conventions.


Phytotaxa ◽  
2020 ◽  
Vol 454 (3) ◽  
pp. 213-225
Author(s):  
DAIANE VALENTE VALENTE ◽  
DENILSON FERNANDES PERALTA ◽  
RENATO XAVIER ARAÚJO PRUDÊNCIO ◽  
PAULO EDUARDO AGUIAR SARAIVA CÂMARA

Brazil is a megadiverse country that intends to catalog all its flora by 2020. Therefore, knowledge about taxonomy and the correct identification of species is essential for accessing the real species biodiversity. Macromitrium (Orthotrichaceae) is considered the third largest moss genus in the world and with the majority of its species distributed in tropical and subtropical regions. For Brazil 64 species have been cited, but 44 remain as unknown to the Brazilian flora. The aim of this work was to check all 64 names of Brazilian Macromitrium helping to clarify its validity and correct identification. Type specimens from 14 herbaria were studied using optical microscopy. After this analysis 22% are good species, 54% are synonymous of others species; 13% are excluded from the Brazilian flora and 11% were not possible to check. This work contributed to clarify the diversity of Macromitrium in Brazil, contributing to the knowledge of bryophytes and important data for the flora of Brazil 2020.


Author(s):  
Yusuf Perwej ◽  
Firoj Parwej ◽  
Mumdouh Mirghani Mohamed Hassan ◽  
Nikhat Akhtar

Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges to overcome. The Internet of Things combines actual and virtual anywhere and anytime, fascinate the attention of both constructor and hacker. Necessarily, leaving the devices without human interference for a long period could lead to theft and IoT incorporates many such things. In this paper, we are briefly discussing technological perspective of Internet of Things security. Because, the protection was a major concern when just two devices were coupled. In this context, security is the most significant of them. Today scenario, there are millions of connected devices and billions of sensors and their numbers are growing. All of them are expected secure and reliable connectivity. Consequently, companies and organizations adopting IoT technologies require well-designed security IoT architectures.


2013 ◽  
Vol 10 (10) ◽  
pp. 2057-2061
Author(s):  
Madhurima Hooda ◽  
Amandeep Kaur ◽  
Madhulika Bhadauria

The World Wide Web is used by millions of people everyday for various purposes including email, reading news, downloading music, online shopping or simply accessing information about anything. Using a standard web browser, the user can access information stored on Web servers situated anywhere on the globe. This gives the illusion that all this information is situated locally on the user’s computer. In reality, the Web represents a huge distributed system that appears as a single resource to the user available at the click of a button. This paper gives an overview of distributed systems in current IT sector. Distributed systems are everywhere. The internet enable users throughout the world to access its services wherever they may be located [1]. Each organization manages an intranet, which provides local services for local users and generally provides services to other users in the internet. Small distributed systems can be constructed from mobile computers and other small computational devices that are attached to a wireless network.


Author(s):  
Leslee Francis Pelton ◽  
Timothy Ward Pelton ◽  
Bob St. Cyr

The development and growth of the Internet has revolutionized not only the way we access information, but the way we present it as well. Prior to the advent of the World Wide Web, most learning presentations were audio, textual, or video publications that were viewed linearly, or planned learning activities that were presented in a linear fashion. The learner may have listened to a lecture, completed a sequence of activities, read a chapter in a textbook, followed along on a tour, or watched a film or video to gain the information needed to learn a new concept – and opportunities to adjust the presentation sequence were limited. Linear presentations (lectures, expositions, demonstrations, activity sequences, etc.) can be seen as efficient from the perspective of the instructor and the institution. They aim to maximize the overall learning effects for a target audience by identifying the state of understanding and needs of the average learner, and then creating and reusing a fixed presentation to meet those typical needs. These presentations are often well polished and can be effective for large portions of their target audiences.


Author(s):  
Chetan Kumar

The amount and range of information on the Internet is growing at a rapid pace. Cisco systems report (2008) expects Internet traffic growth to be spurred by video, social networking and collaboration applications collectively referred to as Web 2.0 technologies. The Cisco systems report (2008) forecasts that “global Internet Protocol (IP) traffic will increase by a factor of six from 2007 to 2012, reaching 44 exabytes per month in 2012, compared to fewer than 7 exabytes per month in 2007.” ComScore report (2009) estimates that the total global Internet audience has surpassed 1 billion visitors in December 2008. Magid Abraham, CEO of ComScore Inc., says “Surpassing one billion global users is a significant landmark in the history of the Internet. It is a monument to the increasingly unified global community in which we live and reminds us that the world truly is becoming more flat. The second billion will be online before we know it, and the third billion will arrive even faster than that, until we have a truly global network of interconnected people and ideas that transcend borders and cultural boundaries.” The increase in Internet traffic is aided because making information available online is becoming relatively inexpensive, and as more people have Internet access demand for information increases. The trend of increasing Internet traffic is likely to continue (Datta et al. 2003, Cisco systems report 2008).


2022 ◽  
pp. 344-362
Author(s):  
Ceray Aldemir ◽  
Eyüp Şen

Crowdsourcing is a form of citizen participation in which an institution has a question submits to citizens via the internet in order to get citizens to think about innovative solutions to the problem. Several municipalities around the world have already used this means, but it has not yet been clear exactly how they can use it and which preconditions play a role in this. Thus, this chapter argued the concept of citizen involvement in the age of ICT by emphasizing the two related terms e-government and e-local government, then secondly the chapter underlined the importance of the necessity of citizen participation in the policymaking process. In the third section of this chapter, it has been argued the crowdsourcing concept as a tool of participation in the age of ICT. Then finally the paper outlined a model for local governments that may use the crowdsourcing approach in the decision-making process.


Author(s):  
Ravi Agrawal

The world changed on January 9, 2007. It was the Macworld trade show in San Francisco, an annual showcase for Apple products, and founder Steve Jobs was about to introduce a new gadget. “Every once in a while, a revolutionary product comes along that changes everything,” announced Jobs. The Macworld audience had a Pavlovian expectation for something game-changing that day. In 1984 Apple introduced the Macintosh, which went on to transform computing and make the mouse a mainstream accessory. Then in 2001, the iPod arrived. “It didn’t just change the way we all listened to music. It changed the entire music industry,” Jobs reminded his audience. (This was no exaggeration. When Apple began offering individual songs for ninety-nine cents on its iTunes store, the era of record companies selling entire albums was shattered.) “Today, we’re introducing three revolutionary products. The first one is a wide-screen iPod with touch controls.” Jobs paused for dramatic effect. On cue, the audience broke into hearty applause. “The second,” continued Jobs, “is a revolutionary mobile phone.” This time, before he could pause, cheers rang out—with a louder, prolonged burst of clapping. Apple had never manufactured a phone before. “And the third,” he went on, as a big screen behind him mirrored his words, “is a breakthrough internet communications device.” A whoop, followed by a polite round of clapping; by now the audience was a bit confused at the deluge of new products. Jobs let his words hang in the air, teasing the crowd as it waited in anticipation. “So, three things,” he recapped, as the screen behind him showed three Apple icons representing an iPod, a phone, and the internet. “A wide-screen iPod with touch controls, a revolutionary mobile phone, and a breakthrough internet communications device.” Silence. “An iPod, a phone, and an internet communicator,” Jobs repeated, as the screen displayed each of those icons in the center, flipping to reveal the next one. The animations behind Jobs had been carefully choreographed to match his words.


Sign in / Sign up

Export Citation Format

Share Document