• 제목/요약/키워드: Data concealing

검색결과 31건 처리시간 0.022초

OOXML 문서에 대한 향상된 데이터 은닉 및 탐지 방법 (Improved Data Concealing and Detecting Methods for OOXML Document)

  • 홍기원;조재형;김소람;김종성
    • 정보보호학회논문지
    • /
    • 제27권3호
    • /
    • pp.489-499
    • /
    • 2017
  • MS 오피스는 국내뿐만 아니라 세계적으로 널리 사용되는 오피스 소프트웨어이다. 여러 버전 중 MS 오피스 2007부터 최신 버전인 MS 오피스 2016까지 문서 구조에 OOXML 형식이 사용되고 있다. 이와 관련해 대표적인 안티-포렌식 행위인 데이터 은닉에 대한 방법이 연구, 개발되어 은닉된 데이터에 대한 탐지 방법은 디지털 포렌식 수사 관점에서 매우 중요하다. 본 논문에서는 기존에 발표된 OOXML 형식의 MS 오피스 문서에 데이터 은닉 및 탐지에 관한 두가지 연구를 소개한 뒤 두 연구의 탐지 방법을 우회하는 데이터 삽입 방법과 MS 오피스 엑셀, 파워포인트의 데이터인 시트, 슬라이드 등을 은닉하는 방법을 제시한다. 이와 같은 방법으로 은닉된 데이터를 탐지할 수 있는 향상된 탐지 알고리즘 또한 제시한다.

이스탄불여성의 폐면문화 연구 (The Study of Face Concealing Culture of Istanbul Women)

  • 박보영
    • 대한가정학회지
    • /
    • 제49권5호
    • /
    • pp.23-32
    • /
    • 2011
  • This study will covered socio-cultural background and characteristic of the face-concealing culture of Istanbul which has liberal and westernized clothes culture for women even if it's an city in an Islamic country. This study depended on literatures related to religion, culture and costumes of the Ottoman Empire, especially costumic data on miniature of turkey, which was famous from 16th to 19th century. Since the 17th century, the Ottoman Empire has been gradually influenced by European countries but the change of women's clothes was not considerable. In the 18th century, women's clothes were influenced by foreign fashions. A veil to cover the face was gradually disappeared and traditional Turkish headdresses were replaced by European hats. Through face-concealing culture of Istanbul, we can see some socio-cultural features like Islamic religious character, one's social position, economic situation, westernization and renovation, beauty and completion of costume, duality for the reason of regional difference.

사춘기 정신지체여아의 초경에 대한 어머니의 경험 연구(Parse의 방법론 적용) (The Lived Experience of Mothers Mentally Handicapped Daughters Having Menarche at Puberty)

  • 이명숙
    • 대한간호학회지
    • /
    • 제29권3호
    • /
    • pp.494-506
    • /
    • 1999
  • The purpose of this study is to understand the structure of mothers of mentally handicapped daughters' lived experience, to apprehend the connectedness of the structure of the experience with concept of Parse's human becoming theory, and to provide a foundation for nursing research and education. Data collection was conducted from October 1995 to April 1996. Research participants were eight mothers of mentally handicapped daughters whose ages ranged from 12 to 18 attending special schools located in either Inchon or Seoul. The researcher had interviews with them over their lived experience conducted tape recorded, and made an analysis according to Parse's “human becoming research methodoloy.” The data were collected using the dialogical engagement process “I and You,” the participant researcher and the participant subject. The data were analyzed using the extraction-synthesis and heuristic interpretation. The structural integration is illustrated in the following : 1) Realizing the mother's role of mentally handicapped daughters and admitting situation. 2) Concealing a part of their relationship with others is interpreted as revealing-concealing. 3) Living a life kept moving between separating and connecting. 4) Their flight back voluntarily to improve the situation is interpreted as powering. The conceptual integration which emerged was the lived experience of mothers is powering through the revealing-concealing and connecting-separating of valuing.

  • PDF

SQLite 데이터베이스 파일에 대한 데이터 은닉 및 탐지 기법 연구 (The Research on Data Concealing and Detection of SQLite Database)

  • 이재형;조재형;홍기원;김종성
    • 정보보호학회논문지
    • /
    • 제27권6호
    • /
    • pp.1347-1359
    • /
    • 2017
  • SQLite는 트랜잭션을 제공하는 파일 기반의 DBMS(Database Management System)이며 경량 플랫폼에 적절하기 때문에 요즘에는 스마트폰에 주로 적재된다. 따라서 스마트폰의 사용량이 증가함에 따라 SQLite와 관련된 범죄가 발생할 가능성이 있다. 본 논문에서는 SQLite 데이터베이스 파일에 대한 새로운 은닉 기법과 이에 대한 탐지 방법을 제안한다. 은닉 실험 결과, 데이터베이스 파일 헤더의 영역 중 70바이트에 고의적으로 데이터를 은닉하는 행위가 가능하였다. 또한 데이터베이스 파일의 페이지 영역을 추가하여 기존의 페이지를 은닉할 수 있었다. 그러나 SQLite 구조를 기반으로 헤더의 70바이트를 파싱하거나 레코드 및 인덱스의 개수를 이용하여 제안하는 은닉을 탐지하는 방법이 가능하였다. 이후, SQLite 은닉된 데이터에 대한 탐지 알고리즘을 제시하였다.

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

  • Khaled H. Abuhmaidan;Marwan A. Al-Share;Abdallah M. Abualkishik;Ahmad Kayed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권6호
    • /
    • pp.1619-1637
    • /
    • 2024
  • In today's highly digitized landscape, securing digital communication is paramount due to threats like hacking, unauthorized data access, and network policy violations. The response to these challenges has been the development of cryptography applications, though many existing techniques face issues of complexity, efficiency, and limitations. Notably, sophisticated intruders can easily discern encrypted data during transmission, casting doubt on overall security. In contrast to encryption, steganography offers the unique advantage of concealing data without easy detection, although it, too, grapples with challenges. The primary hurdles in image steganography revolve around the quality and payload capacity of the cover image, which are persistently compromised. This article introduces a pioneering approach that integrates image steganography and encryption, presenting the BitPatternStego method. This novel technique addresses prevalent issues in image steganography, such as stego-image quality and payload, by concealing secret data within image pixels with identical bit patterns as their characters. Consequently, concerns regarding the quality and payload capacity of steganographic images become obsolete. Moreover, the BitPatternStego method boasts the capability to generate millions of keys for the same secret message, offering a robust and versatile solution to the evolving landscape of digital security challenges.

Image Steganography to Hide Unlimited Secret Text Size

  • Almazaydeh, Wa'el Ibrahim A.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.73-82
    • /
    • 2022
  • This paper shows the hiding process of unlimited secret text size in an image using three methods: the first method is the traditional method in steganography that based on the concealing the binary value of the text using the least significant bits method, the second method is a new method to hide the data in an image based on Exclusive OR process and the third one is a new method for hiding the binary data of the text into an image (that may be grayscale or RGB images) using Exclusive and Huffman Coding. The new methods shows the hiding process of unlimited text size (data) in an image. Peak Signal to Noise Ratio (PSNR) is applied in the research to simulate the results.

Watermarking Technique using Image Characteristics

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.187-193
    • /
    • 2021
  • In this paper, we propose an image watermarking technique that effectively hides confidential data in the LSB of image pixels by utilizing the characteristics of the image. In the proposed technique, the image is precisely divided into boundary surface and normal region other than the boundary surface and performs different processing. The boundary surface existing in the image is created by meeting different regions and contains important information of the image. One bit of confidential data is concealed in the LSB of the pixel at the boundary surface to preserve the characteristics of the boundary surface. In normal region other than the boundary surface, the pixel values are similar, and the change with the adjacent pixel values is smooth. Based on this property, even if the 2 bits of confidential data are hidden in the lower 2 bits of the pixel in the normal region, the difference cannot be visually distinguished. When confidential data is concealed in an image as described above, the amount of confidential data concealed in an image can be increased while maintaining excellent image quality. Concealing confidential data by applying the proposed method increases the amount of confidential data concealed by up to 84.6% compared to the existing method. The proposed technique can be effectively used for commercial image watermarking that hides copyright information.

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

말기 암환자의 체험에 관한 현상학적 연구 (Lived Experience of patients with Terminal Cancer : Parses Human Becoming Methodology)

  • 이옥자
    • 대한간호학회지
    • /
    • 제25권3호
    • /
    • pp.510-537
    • /
    • 1995
  • Human health is an integral part of experience in the process of Human Becoming. Through continual interaction with the environment human beings freely choose experience and develop as responsible beings. The process of the health experience of patient with terminal cancer is a unique. he objective of this study is to understand the lived experience of patients with terminal cancer in order to provide basic information for nursing care in the clinical setting and to develop a theoretical background for clinical practice. This study is to de-scribe and define the lived experience of patients with terminal cancer in order to provide a foundation for nursing research and education. Data collection has been done between December 1993 and November 1994. The subjects included five persons -four females and one male : one who was in her sixties, one in his fifties, two in their forties, and one who was in her thirties. The researcher has met with these patients 35 times, but at eight times the patient was in a stuporous condition and not able to participate, so these were not included in the data analysis. Parse's "Human Becoming Methodology", an existential phenomenological research methodology is used for this study. Data has been collected using he dialogical engagement process of "I and You", the participant researcher and the participant subject. Dialogical engagement was discontinued when the data was theoretically saturated. Data was analyzed using the extraction - synthesis and heuristic interpretation. The criteria of Guba and Lincoln(1985). and Sandelo wski(1986) : credibility, auditability, fitness and objectivity were used to test the validity and reliability of the data. The following is a description of the structure of the lived experience of patients with terminal cancer as defined by this study : 1. Structure : 1) Suffering through the reminiscence of past experience 2) The appearance of complex emotions related to life and connectedness 3) The increasing importance of significant people and of the Absolute Being 4) The increasing realization of the importance of health and belief 5) Desire for a return to health and a peaceful life or for acceptance of dying and a comfortable death In summary the structure of the lived experience of these patients can be said to be : suffering comes through reminiscence of past experience, and there are complex emotions related to life and connectedness. Significant people and the Absolute Being become increasingly important along with a realization of the importance of health and faith. And finally there is a desire for either a return to health and a peaceful life or for the acceptance of dying and a comfortable death. 2. Heuristic Interpretation : Using Parse's Human Becoming Methodology, the structure of the lived experience of patients with terminal cancer identified in this research is interpreted as. The lived experience of patients with terminal cancer involves the solving of past conflicts, and the experience of the healing and valuing of sorrow and pain. Through the relation of life and health, and the complex emotions that arise, the lived experience of revealing - concealing is of paradoxical emotions. The increasing importance of significant others and of the Absolute Being shows Connecting and Separating an on- going process of nearness and farness. Revision of thoughts about health and faith is interpreted as transforming and desire for restoration to health and a peaceful life or acceptance of dying and a cowfortable death, as powering. In summary, it is possible to see, in the lived experience of patients with terminal cancer, the relationship of the five concepts of Parse's theory : valuing, revealing -concealing, connecting-separating, transforming, and powering. From Parse's theory, the results of this study show that meaning is related to valuing, rhythmicity to revealing-concealing and connect-ing-separating, and cotranscendence to transforming and powering.

  • PDF

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • 제15권3호
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.