A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System

2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.

2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography


2009 ◽  
Vol 13 (1) ◽  
pp. 2156759X0901300
Author(s):  
Sheri Bauman ◽  
Tanisha Tatum

Traffic on Web sites for young children (ages 3-12) has increased exponentially in recent years. Advocates proclaim that they are safe introductions to the Internet and online social networking and teach essential 21st-century skills. Critics note developmental concerns. In this article, we provide basic information about Web sites for young children, discuss developmental issues, and make recommendations for school counselors to be proactive and aware of the advantages and dangers inherent in these sites.


2021 ◽  
Author(s):  
Shahin Talaei

This thesis examines the performance for multimedia distribution and information sharing of social-networking web sites, with a focus on user networks in Facebook. We used real user network data from Facebook together with a synthetic Facebook network in the performance-testing experiments. We tested performance for multimedia distribution and information sharing using three different types of overlay networks: Facebook; structured peer-to-peer (ring topology); and unstructured peer-to-peer (mesh topology). The experiments used Network Simulator 2 (Ns-2) to simulate the network topologies. The results show that structured Peer-to-Peer has the best performance in terms of information transfer, and Facebook has the best performance in regards to average throughput. This thesis shows the strengths and weaknesses of online social networking while sharing information and multimedia content.


Author(s):  
Carlos Ricardo Caichiolo

The DSM, or Dispute Settlement Mechanism, in the absence of a judicial body, is the closest representation of a supreme court or judicial institution in a regional bloc or other international organisation. The search for a peaceful settlement of disputes in the international arena had led to the development of the DSM during the 20th and into the 21st century. The DSM acts as an impartial third party, wherein it intervenes in any international conflict to offer feasible solutions for both sides.O MSC, ou Mecanismo de Solução de Controvérsias, na ausência de um órgão judicial, é a representação mais próxima de uma Corte Suprema ou de instituição judiciária em um bloco regionl ou em organização internacional diversa. A busca por um meio pacífico de solução de disputas no meio internacional levou à criação do MSC ao longo dos séculos XX e XXI. O MSC age como um terceiro imparcial, na medida em que ele intervém em conflitos internacionais com o intuito de ofertar soluções possíveis para as partes envolvidas.


Author(s):  
NAMRATA PAWAR ◽  
SONALI CHIKHALE

With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of our daily lives. These devices have evolved rapidly from simple phones and SMS capable devices to Smartphone’s and now with android phones that we use to connect, interact and share information with our social circles. The Smartphone’s are used for traditional two-way messaging such as voice, SMS, multimedia messages, instant messaging or email. Moreover, the recent advances in the mobile application development frameworks and application stores have encouraged third party developers to create a huge number of mobile applications that allow users to interact and share information in many novel ways. In this paper, we elaborate a flexible system architecture based on the service-oriented specification to support social interactions in campus-wide environments using Wifi. In the client side, we designed a mobile middleware to collect social contexts such as the messaging, creating group, accessing emails etc. The server backend, on the other hand, aggregates such contexts, analyses social connections among users and provides social services to facilitate social interactions. A prototype of mobile social networking system is deployed on campus, and several applications are implemented based on the proposed architecture to demonstrate the effectiveness of the architecture.


Telos ◽  
2019 ◽  
Vol 21 (3) ◽  
pp. 643-660
Author(s):  
Rigo Grimaldos Olmos ◽  
Anny Paz Baptista

This investigation aimed to determine the use of web 2.0 services in the Catholic University Cecilio Acosta (UNICA) site by the institution, located in Maracaibo city, Venezuela. The theoretical contributions were supported by O'Reilly (2007), Lévy (2004), Rheingold (2004), Surowiecki (2005), Cobo (2007a), among other authors. The investigation comes from a project attached to the UNICA Research and Postgraduate Deanery, was descriptive, an observation guide was applied to collect information from the UNICA website and the 2.0 services to which it is associated as the platforms for vertical social networks YouTube, Instagram and SoundCloud, and platforms for horizontal social networks Facebook and Twitter. Among the most relevant findings was the exclusive use of social networking services for interaction with the university community, without including other services that seek to generate knowledge. It is concluded that UNICA uses web 2.0 services in its site in a limited and non-strategic way, with a purely informative nature that includes specific topics of the university and the catholic church, which could hinder the knowledge management as process of 21st century universities.


Author(s):  
Jerome Idiegbeyan-Ose ◽  
Stella C. Nduka ◽  
Olalekan A. Adekunjo ◽  
Innocent Okoedion

This chapter critically assess digital library functions and services in Nigeria academic libraries. It highlighted the roles of Information and Communications Technologies (ICTs) that brought about digital libraries. It is a collection of digital contents that is housed electronically and made available to users. The advantages of digital library were also discussed such as improved access, improved information preservation, it improved information sharing, it enhances library functions and services. Nigerian academic libraries has benefited from the enormous benefits of digital library. The chapter stressed that effort should be improved consortium building so as to improve the services Nigerian libraries render to their patrons. The chapter concludes that Digital library has come a long way in Nigeria, and 21st century libraries cannot afford to render services to users without digital contents added to the prints resources. Therefore, Nigeria libraries and information centres must cooperate in a formal consortia building; this will go a long way to reduce the burden of all participating libraries.


2012 ◽  
pp. 537-549 ◽  
Author(s):  
William Ross ◽  
Ross Slovensky

The development of the Internet affords new opportunities for organizations as they add talent to their workforce. Employers are using third-party job placement websites (e.g., Monster.com), virtual job fairs, social networking websites, and even massively multiplayer online games such as Second Life to recruit job candidates. Organizations are also using their own websites to both attract and to evaluate new applicants. Accompanying these trends is the use of Internet-based testing for evaluating job candidates. Such testing varies based on whether it is proctored or unproctored and whether it incorporates dynamic computer adaptive testing. Finally, many firms are using individual candidate’s social networking websites (e.g., Facebook) as a background screening tool for evaluating job candidates. These trends are described and research questions identified.


EP Europace ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1742-1758 ◽  
Author(s):  
Jens Cosedis Nielsen ◽  
Josef Kautzner ◽  
Ruben Casado-Arroyo ◽  
Haran Burri ◽  
Stefaan Callens ◽  
...  

Abstract The European Union (EU) General Data Protection Regulation (GDPR) imposes legal responsibilities concerning the collection and processing of personal information from individuals who live in the EU. It has particular implications for the remote monitoring of cardiac implantable electronic devices (CIEDs). This report from a joint Task Force of the European Heart Rhythm Association and the Regulatory Affairs Committee of the European Society of Cardiology (ESC) recommends a common legal interpretation of the GDPR. Manufacturers and hospitals should be designated as joint controllers of the data collected by remote monitoring (depending upon the system architecture) and they should have a mutual contract in place that defines their respective roles; a generic template is proposed. Alternatively, they may be two independent controllers. Self-employed cardiologists also are data controllers. Third-party providers of monitoring platforms may act as data processors. Manufacturers should always collect and process the minimum amount of identifiable data necessary, and wherever feasible have access only to pseudonymized data. Cybersecurity vulnerabilities have been reported concerning the security of transmission of data between a patient’s device and the transceiver, so manufacturers should use secure communication protocols. Patients need to be informed how their remotely monitored data will be handled and used, and their informed consent should be sought before their device is implanted. Review of consent forms in current use revealed great variability in length and content, and sometimes very technical language; therefore, a standard information sheet and generic consent form are proposed. Cardiologists who care for patients with CIEDs that are remotely monitored should be aware of these issues.


Sign in / Sign up

Export Citation Format

Share Document