• Title/Summary/Keyword: Data-hiding

Search Result 302, Processing Time 0.026 seconds

Digital Forensics of Microsoft Office 2007-2013 Documents to Prevent Covert Communication

  • Fu, Zhangjie;Sun, Xingming;Xi, Jie
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.525-533
    • /
    • 2015
  • MS Office suit software is the most widely used electronic documents by a large number of users in the world, which has absolute predominance in office software market. MS Office 2007-2013 documents, which use new office open extensible markup language (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes nine forensic methods and an integrated forensic tool for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods and tool cover three categories; document structure, document content, and document format. The aim is to prevent covert communication and provide security detection technology for electronic documents downloaded by users. The proposed methods can prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.

Adaptation Experiences of Male Students in Nursing Education Programs: A Meta-synthesis Study (간호학과 남학생의 학과 적응에 관한 질적 메타합성 연구)

  • Son, Haeng-Mi;Oh, Seieun;Jang, Hye-Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.4
    • /
    • pp.391-405
    • /
    • 2018
  • Purpose: The purpose of this study was to integrate and synthesize findings from qualitative studies exploring male students' experiences of adapting to nursing education programs so as to obtain further understanding of the phenomenon. Methods: The meta-synthesis process was primarily guided by Noblit and Hare's approach, which consists of four stages including searching, appraisal of an individual study's quality, data extraction for analysis, and meta-synthesizing the results. Results: Findings from the literature reviewed were synthesized into six themes: 1) extraordinary choice based on job stability and gender scarcity; 2) unexpected feeling of marginalization as minority far apart from the mainstream; 3) assimilation and negotiation for relational adaptation through perspective shift; 4) fortifying the vision and identity as nursing students by meaning making for adapting to the nursing major; 5) mutual support among colleague male students; and 6) serving in the military as way of hiding out and achieving maturation. Conclusion: The findings illustrate that nursing education programs need practical changes promoting male students' adaptation to the program itself as well as preparation to be a professional nurse in the future.

A Study on a Method of Rigid Body Movement Analysis -Mainly on Mandible Movement Parameter Determination- (강체 운동 해석 기법에 관한 연구 -하악골 운동 파라미터 결정 기법을 주로-)

  • Jung, Chae-Young;Song, Chul;Lee, Kwon-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.4
    • /
    • pp.301-314
    • /
    • 1990
  • This paper is an attempt to use vision-pattern recognition technique to analyzation on a hidden rigid body motion. Specially shaped rod, rigidly connected to the hidden body is extended to the ouside of hiding object so that a camera may catch the motion data. Every motion can be described with translatio and rotation. But translation can be explanied with ratation with a infinitly far centroid. Motion analysis is to find the instantaneous centroid and ratation angle. With this theory jaw motion is analyzed in this paper.

  • PDF

Factors affecting the job embeddedness of clinical dental hygienists (임상치과위생사의 직무배태성에 영향을 미치는 요인)

  • Kim, Im-Young;Jang, Yun-Jung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.6
    • /
    • pp.879-889
    • /
    • 2018
  • Objectives: This study aimed to provide basic data to establish a foundation for efficient operation of the organization by identifying the factors that affect the job embeddedness of dental hygienists. Methods: A survey was conducted from March to July 2018, targeting dental hygienists working in dental clinics and hospitals. Results: The study of the factors affecting job embeddedness of dental hygienists revealed that along with career, marital status, surface acting of emotional labor, and even emotional hiding and false expression, which are sub-areas of the surface acting, have statistically significant influences on job embeddedness. In other words, in a married dental hygienist with relatively high work experience, the surface acting of emotional labor is found to be high in job embeddedness, and the explanatory power of the model is approximately 53.2%. Conclusions: In order to improve the job embeddedness of clinical dental hygienists, it seems necessary to prepare an effective program to strengthen the surface behavior of emotional labor.

Working Conditions and Health Status of Delivery Workers (배달종사자의 근로환경과 건강)

  • Lee, Bokim
    • Korean Journal of Occupational Health Nursing
    • /
    • v.28 no.3
    • /
    • pp.156-165
    • /
    • 2019
  • Purpose: The purpose of this study was to compare working condition and health status between parcel delivery workers (PDW) and food delivery workers (FDW) and to examine the factors influencing their health status. Methods: This was a secondary analysis of data collected from the fifth Korean Working Conditions Survey (KWCS). Based on existing literature, a set of variables was chosen from the KWCS. Results: The proportion of PDW who carryied/moved heavy loads and experienced high job stress and lack of rest time was significantly higher than that of FDW. However, more FDW than their counterparts worked atypical hours. The differences in fatigue and well-being between PDW and FDW were not statistically significant. The multiple logistic regression analysis revealed low temperature, tobacco smoke, standing for long periods, and job stress were significant predictors of fatigue or well-being of FDW. Among PDW, noise, tobacco smoke, sitting for long periods, quantitative demands, hiding emotions, support from colleagues, job stress, no recovery period, and night work were significant predictors of fatigue or well-being. Conclusion: The findings of this study may be useful in developing nursing interventions for disease protection health promotion of delivery workers.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Steganographic Method on Spatial Domain Using Modular Characteristic (모듈러 특성을 이용한 공간영역 기반의 심층암호)

  • Park Young-Ran;Shin Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.113-119
    • /
    • 2006
  • Image steganography is a secret communication method used to transmit secret messages that have been embedded into an image. To accommodate a secret message in a digital image, the original cover image is modified by the embedding algorithm. As a result, a stego image is obtained. The sender hides the secret message in a cover image that has no meaning, and then transmits the stego image to the receiver. In this paper, we propose a steganographic method based on spatial domain to embed a secret message using a difference value of two consecutive pixels and a secret quantization range. Especially, we use the modular operation for increasing of insertion information. Through experiments, we have shown that the proposed method has much mon payload capacity, average 60 percent, than some existing methods by using modular operation.

A Study on Analysis of Hidden Areas of Removable Storage Device from a Digital Forensics Point of View (디지털 포렌식 관점에서 이동식 저장매체의 은닉영역 분석 연구)

  • Hong, Pyo-gil;Lee, Dae-sung;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.111-113
    • /
    • 2021
  • USB storage devices, which are represented by removable storage media, are widely used even nowadays when cloud services are common. However, since they are cases where hidden areas are created and exploited in USB storage devices. This research is needed to detect and analyze them from an Anti-forensic point of view. In this paper, we analyze a program that can be exploited as Anti-forensic because it can create a hidden partition and store files there, and the file system created by it from a digital forensic point of view.

  • PDF

An Analysis on Audio Quality Deterioration of Acoustic OFDM (음향 OFDM의 음질 저하 원인 분석)

  • Cho, Ki-Ho;Yu, Hwan-Sik;Chang, Jun-Hyuck;Kim, Nam-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.2
    • /
    • pp.107-111
    • /
    • 2009
  • Acoustic OFDM is used for audible frequency band acoustic communication which employs loudspeaker as transmitter and microphone as the receiver antenna. Since acoustic OFDM can transmit about 1 kbps using 1600 Hz band. acoustic OFDM signal is inserted into the audio signal like music or speech, However. audio quality deteriorates definitely during the inserting process. This paper introduces a reason for audio quality deterioration and discuss how to reduce this phenomenon.

Exploration of Water Pumping Station Digital Twin System Development Process According to Software Development Methodologies (소프트웨어 개발 방법론에 따른 양배수장 디지털 트윈 시스템 개발과정 고찰)

  • Lee, Byungjoon;Kim, Nanyoung;Yoon, Seongsoo
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.3
    • /
    • pp.53-62
    • /
    • 2024
  • The purpose of this study is to examine the methodology for applying digital twin technology to pumping station, identify the factors to be determined at each stage, and present its applicability. When analyzing the requirements for developing a digital twin for pumping station, they were categorized into service requirements, IoT device requirements, and gateway requirements, with a total of 39 requirements established. In system design, it was structured according to the principles of modularity, abstraction, stepwise decomposition, and information hiding, allowing the implementation of planned items for diagnosis and operational management. There are difficulties in setting communication-related protocols and applying them in the field due to the complexity of overseeing the entire system with data. Therefore, it is necessary to clarify the purpose of the system, and there are challenges in identifying the characteristics of individual facilities, such as pumps in pumping station, and fully incorporating them into the system process. Thus, the framework of the initial design is crucial for implementing a digital twin.