The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given a collection of event-related documents, event ranking generates a list of ranked events based on the input query. Ranking news events, which takes event related news documents for the generation of ranked events, is both an essential research issue and important component for many security oriented applications, such as public event monitoring, retrieval, detection and mining. Previous related...
In this paper, we propose a high capacity text steganography method using Huffman compression. The forward email platform is used to hide the secret data. We make use of the number of characters used in email id to indicate the hidden secret data bits. So, to make optimal utilization of number of characters in email ids, the characters added to the email id to indicate the secret data bits are taken...
Online Web Forum is one of the prime attribute of the of web 2.0 technology that has empowered users across the globe to raise their opinion on a virtual planet. The internet has become an essential part of our lives. But it comes with the risk that it is inadvertently used by many users as a model to share their ideologies in social media which may be positive or negative. As vehement Ideology is...
Staying informed about security vulnerabilities, work-arounds and the availability of patches regarding the components of a given system is crucial to ensure system security. Several channels can be used to the monitor the new vulnerabilities publications, but these channels are scattered. We propose in this paper a vulnerability monitoring system based on twitter analysis that aggregates and analyses...
The emergence of social media and the huge amount of data generated by them, has lead researchers to study the possibility of their exploitation in order to identify hidden knowledge. Thus, two areas are attracting more and more interest in the research community, the opinion mining and sentiment analysis. The research papers in this field are increasing rapidly. However, few survey papers have been...
We previously proposed the artificial fiber (AF) patterns in order to be able to hide information in printed documents. AF pattern uses the features of the medium (e.g., paper). It has features of rotational invariance, low visibility of the hidden information. But it still suffered extraction threshold instability when using a camera to extract the information. This problem has now been overcome...
Our paper discusses how active warden operates and why it is important for steganographers to understand the impending threat in which they possess. It was a common belief that the main adversary for steganography is coming from steganalysis detection. However, we have found in some situation, the destruction of hidden information is more easily achievable compared to the task of detecting it. Active...
Digital watermarks provide the capability to insert additional information onto various media, such as still images, movies, and audio, by utilizing features of the content. Several methods that use features of the content, such as text or images, have already been proposed for printed documents. To overcome the disadvantages of the existing methods, we have proposed a new information hiding scheme...
The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development...
A widget is a packaged interactive client-side application, commonly developed using Web standards and techniques to access data services both on the Web and host devices. The purpose of this paper is to review the widget landscape and present key characteristics and concerns of widget technologies. Various incompatibilities exist between widgets and the proprietary engines hosting them on different...
Security requirements analysis is gaining growing attention as new vulnerabilities and threats are emerging on daily basis, the systematic evaluation of security requirements is of utmost importance among the various decisions to be made related to security. This short contribution proposes using a 3-dimensional vector for quantitative evaluation of security requirements, which takes into account...
Investor Relations is proved to be very important for listed companies, but how to carry out strategic management of it? Utilizing strategic management tools, through cases analysis, references synthesis and concept analysis, the paper puts forward a strategic management framework of Investor Relations. The framework exploits key problems and strategic issues existing in IR management of Chinese listed...
In this paper an overview of the challenges to long term preservation of digital objects is given. We highlight threats, which can be posed by humans, hardware/software, environment and institutions to long term digital preservation systems, with specific emphasis to security threats. Some technological solutions are described, and the Italian experience on long term digital preservation is briefly...
Along with fast growing of Chinese capital market, investor relations is getting more and more attention from regulators, listed companies and other market participants. Through experimental studies, cases analysis, references synthesis and concept analysis, the paper exploits key problems and strategic issues existing in IR management of Chinese listed companies, puts forward and analyzes strategic...
Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper, a new approach for steganography in Arabic texts is proposed. The main idea is that each Arabic word may have some characters which can be extended by dasiaKashidapsila. The ranks dasialocationspsila of such characters and the inserted Kashida, construct a coding...
This paper describes iPay, the local exchange trading systems developed by digital media in Italia, and the extensions developed to the digital media project interoperable DRM platform specification allowing the integration of the two specifications in a complete system for creating and distributing digital media, and remunerating its users for the content and the services provided. The solution presented...
Integer-based vulnerability is an extremely serious bug for programs written in languages such as C/C++. However,in practice, very few software security tools can efficiently detect and accurately locate such vulnerability. In addition, previous methods mainly depend on source code analysis and recompilation which are impractical when protecting the program without source code. In this paper,we present...
Recently, there is the attempt to use P2P-based multicast to distribute streaming media data for reducing network load and management cost. But there exist many security threats about P2P-based overlay multicast mechanism. In this paper we analyze the security vulnerability of P2P-based overlay multicast mechanism, and propose the security solutions against it.
AACS (advanced access content system) has been developed for preventing the piracy of digital contents using broadcast encryption scheme. AACS distinguishes just privileged devices from revoked devices. However, it isn't sufficient for protecting private digital contents created by general consumers who want to keep their private contents using recordable medias like DVD. This paper presents an improved...
The digital content services in home network provide a various kind of services such as cultural life and offer convenience, accessibility and effectiveness to users. But, digital contents are easy to be duplicated illegally and used fraudulent by malicious party which break down the development of digital content services in smart home environment. To protect digital contents from those problems,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.