scholarly journals Describing the steganalysis tool: BBD15 “OurSecret detector”

2021 ◽  
Vol 1 (2) ◽  
pp. 88-91
Author(s):  
BENAROUS Leila ◽  
DJOUDI Mohamed ◽  
BOURIDANE Ahmed

Digital steganography is the art of hiding secret messages and data in innocent cover, most likely in images and videos. Images and videos offer the best cover files for steganography with their high capacity, by being innocent and for being easily exchanged without raising the suspicions of a third party. A lot are the free tools that embeds data in images and videos, among which is OurSecret. In this paper we aim to detect the stego images and videos created by OurSecret by developing a steganalysis tool BBD15.

2019 ◽  
Vol 9 (1) ◽  
pp. 146 ◽  
Author(s):  
Xiaodong Zhu ◽  
Lingfei Yu

In closed-loop supply chain systems for power battery remanufacturing, recycling and dismantling tasks will be relegated to third-party recyclers. This has significant disadvantages, inasmuch as the asymmetric exchange of information regarding the level of recycling capacity and effort after signing a contract fiscal risks to the manufacturers. The purpose of this paper is to study the “adverse selection” of recyclers and “moral hazards” hidden in their purported effort levels, based on Information Screening Models in the principal-agent theory. Our information screening model for revenue sharing will be presented, and subsequently verified using numerical simulation to demonstrate the impact of the screening contract on the expected returns of both parties. Our results show that the sharing coefficient of the remanufacturing revenue for low-capability recyclers is distorted downwards, and only truthful reporting can retain profits. High-capacity recyclers will obtain additional information while retaining profit. At the same time, as the proportion of high-capacity recyclers in the market increases, the expected return of the entrusting party increases. One critical area where this will impact the Chinese economy is in the area of new energy vehicles. We investigate a case study of our approach in new energy vehicles, which are being used to reduced CO 2 emissions, but have environmentally hazardous batteries that must be recycled safely and economically.


2021 ◽  
Vol 11 (23) ◽  
pp. 11529
Author(s):  
Tai-Lin Chin ◽  
Wan-Ni Shih

With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities. People can access and share their data with others at anytime, from anywhere. However, the convenience of cloud storages also comes with new problems and challenges. This paper investigates the problem of secure document search on the cloud. Traditional search schemes use a long index for each document to facilitate keyword search in a large dataset, but long indexes can reduce the search efficiency and waste space. Another concern to prevent people from using cloud storages is the security and privacy problem. Since cloud services are usually run by third party providers, data owners desire to avoid the leakage of their confidential information, and data users desire to protect their privacy when performing search. A trivial solution is to encrypt the data before outsourcing the data to the cloud. However, the encryption could make the search difficult by plain keywords. This paper proposes a secure multi-keyword search scheme with condensed index for encrypted cloud documents. The proposed scheme resolves the issue of long document index and the problem of searching documents over encrypted data, simultaneously. Extended simulations are conducted to show the improvements in terms of time and space efficiency for cloud data search.


Author(s):  
Toan Ong ◽  
Ibrahim Lazrig ◽  
Indrajit Ray ◽  
Indrakshi Ray ◽  
Michael Kahn

IntroductionBloom Filters (BFs) are a scalable solution for probabilistic privacy-preserving record linkage but BFs can be compromised. Yao’s garbled circuits (GCs) can perform secure multi-party computation to compute the similarity of two BFs without a trusted third party. The major drawback of using BFs and GCs together is poor efficiency. Objectives and ApproachWe evaluated the feasibility of BFs+GCs using high capacity compute engines and implementing a novel parallel processing framework in Google Cloud Compute Engines (GCCE). In the Yao’s two-party secure computation protocol, one party serves as the generator and the other party serves as the evaluator. To link data in parallel, records from both parties are divided into chunks. Linkage between every two chunks in the same block is processed by a thread. The number of threads for linkage depends on available computing resources. We tested the parallelized process in various scenarios with variations in hardware and software configurations. ResultsTwo synthetic datasets with 10K records were linked using BFs+GCs on 12 different software and hardware configurations which varied by: number of CPU cores (4 to 32), memory size (15GB – 28.8GB), number of threads (6-41), and chunk size (50-200 records). The minimum configuration (4 cores; 15GB memory) took 8,062.4s to complete whereas the maximum configuration (32 cores; 28.8GB memory) took 1,454.1s. Increasing the number of threads or changing the chunk size without providing more CPU cores and memory did not improve the efficiency. Efficiency is improved on average by 39.81% when the number of cores and memory on the both sides are doubled. The CPU utilization is maximized (near 100% on both sides) when the computing power of the generator is double the evaluator. Conclusion/ImplicationsThe PPRL runtime of BFs+GCs was greatly improved using parallel processing in a cloud-based infrastructure. A cluster of GCCEs could be leveraged to reduce the runtime of data linkage operations even further. Scalable cloud-based infrastructures can overcome the trade-off between security and efficiency, allowing computationally complex methods to be implemented.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Tomasello

Abstract My response to the commentaries focuses on four issues: (1) the diversity both within and between cultures of the many different faces of obligation; (2) the possible evolutionary roots of the sense of obligation, including possible sources that I did not consider; (3) the possible ontogenetic roots of the sense of obligation, including especially children's understanding of groups from a third-party perspective (rather than through participation, as in my account); and (4) the relation between philosophical accounts of normative phenomena in general – which are pitched as not totally empirical – and empirical accounts such as my own. I have tried to distinguish comments that argue for extensions of the theory from those that represent genuine disagreement.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


Author(s):  
Shaohua Lu ◽  
Weidong Hu ◽  
Xiaojun Hu

Due to their low cost and improved safety compared to lithium-ion batteries, sodium-ion batteries have attracted worldwide attention in recent decades.


2008 ◽  
Vol 18 (1) ◽  
pp. 9-20 ◽  
Author(s):  
Mark Kander ◽  
Steve White

Abstract This article explains the development and use of ICD-9-CM diagnosis codes, CPT procedure codes, and HCPCS supply/device codes. Examples of appropriate coding combinations, and Coding rules adopted by most third party payers are given. Additionally, references for complete code lists on the Web and a list of voice-related CPT code edits are included. The reader is given adequate information to report an evaluation or treatment session with accurate diagnosis, procedure, and supply/device codes. Speech-language pathologists can accurately code services when given adequate resources and rules and are encouraged to insert relevant codes in the medical record rather than depend on billing personnel to accurately provide this information. Consultation is available from the Division 3 Reimbursement Committee members and from [email protected] .


Sign in / Sign up

Export Citation Format

Share Document