Stegosaurus Development Report
|
|
|
- Thomas Maxwell
- 5 years ago
- Views:
From this document you will learn the answers to the following questions:
What operating system has a more sophisticated form of steganography?
What kind of steganography is Stegosaurus?
What is Image Decoder?
Transcription
1 Stegosaurus Development Report Final Report Word Count: 2489 Dhaval Miyani (Programmer) Abhishek Rudra (Programmer) Brendan Smith (Apper) University of Toronto April 09, 2015
2 Introduction Stegosaurus is a password storage and management application that operates differently from standard password manager apps. Unlike standard password managers like LastPass, which use cryptography to securely store account information, Stegosaurus uses steganography and cryptography, as opposed to only cryptography, to secure account information. We used steganography to securely store password and account information inside images selected by users, in such a way that it is exceedingly difficult to tell that any information is hidden inside the picture. The stored account information can only be accessed if both an image with hidden information is selected and the correct account tag for that particular account information is provided; if an image without account information is selected or an incorrect account tag provided then Stegosaurus simply returns that no data was found. To hide and store account information inside pictures Stegosaurus uses an algorithm called HUGO (Highly Undetectable steganography) [1]. Motivation Following the Snowden leaks of 2013 there has been an increased focus on cryptography as a mechanism for privacy protection. However, while cryptography is an essential part of privacy protection, the fact that it is detectable as encypted information has led numerous jurisdictions to write legislation controlling or outlawing the use of cryptography, as well as legislation requiring individuals to give up their cryptographic key(s) under certain contexts [2, 3, 4]. The detectability of encryption makes such legislative encryption controls enforceable, no matter that the encrypted data cannot be read. It also makes encrypted information subject to traffic analysis [5], which can reveal a large amount of information about the individual without ever needing to know the content of the encrypted data. In contrast, steganography is a class of formal methods for hiding information inside other information; this makes your device look like it only has the most commonplace of digital information and so stops entities from becoming interested in your device in the first place. Steganography not only obfuscates the presence of encryption, circumventing current jurisdictional and legislative controls, but its hiddenness means it would be very difficult to effectively enforce legislation designed to curtail 1
3 or control steganography. In addition, storing passwords in pictures allows passwords to be remembered pictorially (you just remember the password as the picture in which it was hidden), allowing significantly better memory recall compared to character-based passwords [6]. Apper Context My degree program is the Master of Information, and my field of study is the Specialization in Identity, Privacy, and Security. In particular, I focus on how geopolitical and social issues affect information security and privacy, on human factors of information security, and on the relationship between usability and security. I look at not just the technical means by which privacy and security measures are implemented and subverted, but I look at the geopolitical and sociological contexts of these technologies. For example, I look at how states and other actors are responding to the growth of privacy protection technologies such as encryption, and how legislative and regulatory effects can encourage or chill the development and use of privacy-enhancing technologies. I also look at how usability and human factors of information security and privacy influence the effectiveness and willingness with which such tools are adopted and used. The development of Stegosaurus has significantly contributed to my research in two ways. First, Stegosaurus seems to be the first mobile implementation of a new, more sophisticated class of steganography algorithm known as model-adaptive steganography [1]. Older algorithms embed the information to be hidden directly inside the target picture, whereas model-adaptive algorithms have two components; an image analyzer to determine where in the image to embed information to best interfere with steganalysis techniques, and an image embedder to embed the information in accordance with the image analyzer s results. Given the growth of mobile computing, developing a much more sophisticated form of steganography for the Android environment fits with my research into the geopolitical context of privacy and security technologies. Second, developing Stegosaurus required significant work on developing deign patterns and user interfaces for steganography, as there is little current work on this particular topic. User Interface (UI) design for steganography is very different than 2
4 for cryptography, yet there currently is little research in how to do UI to complement steganography. Overall Design Stegosaurus Block Diagram Access Control This block represents the main authentication layer of our app and requires the user to select the correct master picture and master password in order to gain access to the password management functions. Select Image This block is the gallery intent created each time a picture needs to be selected and retrieved from the user s phone memory. Store This is a frontend block visible to users and allows them to save account information in the chosen picture. Retrieve This is a frontend block visible to users and allows them to view any account information stored in the chosen picture. Image Encoder This block is not visible to the users and runs on native code after reading information passed through the JNI. It is the block which is called when a user wants to store account information in a picture. 3
5 Image Decoder This block is not visible to users and runs on native code after reading information passed through the JNI. It is the block called when a user wants to retrieve account information from a picture. Password Generator This block is automatically called during the store function to create a randomly generated password. The users can choose to use this password or enter their own. Stego Master This is the main block of our app and handles all communication between the front and back ends. It also stores useful information and handles all errors. Steganography The first stage in our design process was to select the steganographic algorithm. After reviewing research literature we decided on HUGO because it was an example of model-adaptive steganography, it was significantly more secure than F5, the best algorithm for which there was already a Java implementation [1, 7], and it had a robust body of research as there was a published competition, BOSS, or Break Our Steganographic System, dedicated to researching and breaking it [8, 9, 10, 11] that provided us with valuable insight on its use and implementation that other algorithms lacked. Obfuscation Obfuscation, or the hiding of information to make it appear to be something else, was the primary design framework for developing Stegosaurus. Obfuscation is what steganography does, and so we wanted our app design to maximally complement this functionality. We developed three layers of obfuscation, encryption obfuscation, content obfuscation, and access obfuscation, all of which use HUGO. The hiding of account information obfuscated both the content that was being hidden and the use of encryption, making it impossible to detect the use of encryption without extracting the content from the picture. Obfuscated access control was implemented by having the user select a 'master image' and 'master password,' embedding the password inside the image using HUGO. 4
6 Trust Our second guiding framework was trust - we realized we needed Stegosaurus to have a UI and feature set that allowed users to trust the app enough to store their sensitive account information. To this end we researched trust-creation in UI and performed formal usability testing. Testing involved four participants, who were administered a pre-session screening questionnaire, guided through a set of standardized scenarios and tasks while voicing their thoughts and reactions, and then administered a post-session System Usability Scale. The pressing need for access control, the use of both a Master Password and the Master Picture in access control, making Stegosaurus unable to extract information stored using a different device, and the validation of the simplicity of our UI were major results to emerge from this testing. Algorithm Development Process The development of HUGO for Android was our major technical hurdle, and the entire functionality of Stegosaurus depended on its success. After deciding on HUGO as our steganographic algorithm, we used an open-source simulated version of HUGO written in C++ and hosted on as our guide for our implementation. However, this C++ version only contains the image analyzer; it finds the optimal parameter values used for embedding in HUGO that give information about how hard it is to detect hidden info in an image, but does not embed or extract any information. To this we had to add the core functionality of actually embedding and extracting information from pictures. To do so we had to resolve many issues, including: o The original program used special Intel instructions, SSE intrinsic instructions, which are not supported by ARM processors. We manually converted ARM instructions into C++ code. o Adding support for different image file formats. o Fixing the many memory issues in the simulation code - memory corruption, memory leakage, extensive heap allocations. 5
7 o To port to Android, we used Java Native Interface (JNI) to use our implementation in C++ on Android. Statement of Functionality Thankfully all the functionality that we attempted to implement in Stegosaurus worked as expected. The following is a walk-through of Stegosaurus, with screenshots and descriptions to demonstrate its functionality. The set-up screen occurs the first time Stegosaurus is accessed. 6
8 Clicking setup takes the user to the gallery to select the Master Picture. Then the user inputs and confirms their Master Password. 7
9 After setup is completed, every time Stegosaurus is launched it goes to the gallery, in order to obfuscate its functionality and the presence of access control. The Master Picture must be selected and Master Password provided to access Stegosaurus functionality. 8
10 Only with both the proper picture and password provided is the functionality of Stegosaurus accessed. To store account information, users provide an account type (a tag ) for the information that must be provided in the future to access the account data being stored. 9
11 After the account tag has been selected, the user selects an image in which to store the account information and then inputs and confirms the account information they want stored. A random password is generated by default but the user just needs to tap on the password field to enter a password of their choosing. To retrieve account information, users must both select the right picture and provide the account tag associated with the picture. A failure in either case simply returns a no data found message. This is so no additional information is revealed about whether any given picture has information hidden inside. 10
12 When a picture with hidden information is selected and the correct account tag provided, the Account Information stored within the picture is displayed. The password is obscured by default and the user can copy it to clipboard for use in an account or can show the password for manual input on a different device. What Did We Learn First, we learned just how difficult it was to implement steganography in a mobile environment, even with simulation code available to aid us. Implementing HUGO within the timeframe of the course was a significant challenge that threw unexpected hurdles in both implementing the algorithm and integrating it with our front-end. As all of the other functions in Stegosaurus depend on HUGO, not having a working implementation would have been catastrophic. Luckily the HUGO implementation was completed successfully, but we should have developed an Android version of the F5 algorithm in parallel as a backup, as there was already a Java implementation of F5. While F5 isn t nearly as secure as HUGO, using it would have still allowed us to address exactly the same UI design problems as HUGO and thus a large amount of the research value of Stegosaurus would have remained while giving ourselves protection from catastrophic failure. Second, the additional time it took to implement HUGO meant that we only had a working app in time for one round of formal usability testing, which was still 11
13 extremely valuable but more formal usability testing would have been helpful. Finally, we would have liked to schedule an informal code audit of our implementation of HUGO with the Citizen Lab, but this wasn t possible due to timing and scheduling issues. Contribution by Group Members Brendan 1. Steganography algorithm research: Led the research on which steganography algorithm to use, though the ultimate decision was the result of collaboration between all three team members. 2. UI research: Research into UI design to both elicit trust among users and complement the obfuscation afforded by steganography. 3. Formal Usability Testing: Recruited participants, created the test materials, wrote scenarios and scripts, administered the test, and analyzed and incorporated the results into our design. 4. Presentation slide deck creation and report writing: was the primary group member tasked with writing and slide creation throughout the course. Dhaval 1. Embed and Extract component: Modified simulation version of HUGO and implemented functionalities such as embedding and extracting the string inside an image. 2. Porting to Android: Using JNI on Android, I ported the C++ implementation of HUGO on Android. Also resolved several challenges such as memory corruption, optimizing heapallocation to make it work on Android and improved the performance. 3. Stego Master component: Created an interface that given an image, one can embedded and extract easily without worrying about the back-end. 4. Random Password Generation component: Added functionality to randomly generate alphanumeric password securely. 12
14 Abhishek 1. Select Image: Worked on sending gallery intent and receiving the result URI. Converted this URI into a Bitmap image for processing. 2. Connected Android to Stego Master: The stego master component is the interface for the backend. Sent the image some other inputs to the component for embedding and extracting. 3. Implemented Access Control: One major part of my contribution is implementing the whole access control scheme. I implemented the setup infrastructure and fragments to add the layer of authentication. This was a major part in gaining the "user trust" as mentioned above. 4. Worked on UI: Another major part of my contribution is adding all the UI elements in a clean layout and adding small useful elements such as show password + copy to clipboard. Also worked on a fragment layout + transitions that were intuitive. Future Work We still have significant work on improving our method of access obfuscation - ideally we want the very fact that Stegosaurus is installed on your phone to be hidden. We would also like to expand the functionality of our steganographic algorithm to obfuscate and store a wide range of digital media, to form the basis of a suite of obfuscation capabilities rather than remain restricted to password management. On the password management side, we would like to develop a Google Chrome extension so that passwords can be securely accessed across devices instead of access being only possible from the particular mobile device. Finally, we would like to develop an ios version, work on optimization of our algorithm, and have a formal security audit. Consent: We consent to having the video of our final presentation posted on the ECE course page, but as we are continuing our work on Stegosaurus we DO NOT want the provided source code shared or posted. 13
15 References 1. Pevný, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., P. W. L. Fong, P. W. L., Safavi-Naini, R. (eds.), Information Hiding LNCS, vol. 6387, pp Heidelberg: Springer Verlag. 2. Messmer, E. (2004, March 15). Encryption restrictions. NetworkWorld. Accessed Feb 2, Retrieved from 3. Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property 11(7), pp Key disclosure law. (2015, January 27). Wikipedia. Accessed Feb 2, Retrieved from 5. Danezis, G., & Clayton, R. (2007). Introducing traffic analysis. In Acquisti, A., Gritzalis, S., Lambrinoudakis, C., & di Vimercati, S. (eds), Digital Privacy: Theory, Technologies, and Practice, pp. New York: Auerback Publications. 6. Bonneau, J., Herley, C., van Oorschot, P. C., Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proc. IEEE Symp. on Security and Privacy Fridrich, J., Pevny, T., Kodovsky, J. (2007). Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, in: Proceedings of the ACM Ninth Workshop on Multimedia & Security, Dallas, Texas, USA, September 20 21, 2007, pp Bas, P., Filler, T., & Pevný, T. (2010). Break our steganographic system : The ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) Information Hiding LNCS, vol. 6958, pp Heidelberg: Springer Verlag. 9. Gul, G., Kurugoiiu, F. (2011). A new methodology in steganalysis: Breaking highly undetectable steganography (HUGO). In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) Information Hiding LNCS, vol. 6958, pp Heidelberg: Springer Verlag. 14
16 10. Fridrich, J., Kodovský, J., Holub, V., & Goljan, M. (2011a). Breaking HUGO The process discovery. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) Information Hiding LNCS, vol. 6958, pp Heidelberg: Springer Verlag. 11. Fridrich, J., Kodovský, J., Holub, V., & Goljan, M. (2011b). Steganalysis of contentadaptive steganography in spatial domain. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) Information Hiding LNCS, vol. 6958, pp Heidelberg: Springer Verlag. 15
Technical Points about Adaptive Steganography by Oracle (ASO)
S. Kouider et al. (LIRMM, France) 1 / 23 EUSIPCO 2012 Technical Points about Adaptive Steganography by Oracle (ASO) Sarra Kouider, Marc Chaumont, William Puech E-mail: [email protected] http://www.lirmm.fr/
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Mastering Mobile Web with 8 Key Rules. Mastering Mobile Web with 8 Key Rules www.mobilelabsinc.com
Mastering Mobile Web with 8 Key Rules 1 2 Introduction When it comes to mobile web design and testing, mobility plays by a far different set of rules than the desktops of years past. Today we are challenged
Native v HTML5 An Event Planner s Primer
v HTML5 An Event Planner s Primer If you ve researched mobile apps for your conference, tradeshow or event, you ve probably come across the question or HTML5? Both provide an app experience designed for
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Practical Internet Steganography: Data Hiding in IP
Practical Internet Steganography: Data Hiding in IP Deepa Kundur Texas A&M University, College Station Department of Electrical Engineering 3128 TAMU, College Station Texas, USA 77843-3128 [email protected]
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Steganography Detection for Digital Forensics
Sage LaTorra Digital Forensics Steganography Detection for Digital Forensics Steganography is the pursuit of cryptography that doesn't appear to be cryptography. In essence, steganography is hiding a message
Deltek Touch Time & Expense for Vision 1.3. Release Notes
Deltek Touch Time & Expense for Vision 1.3 Release Notes June 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical
Email Archiving, Retrieval and Analysis The Key Issues
Email Archiving, Retrieval and Analysis The "If you are going to find a smoking gun, you will find it in email." Abstract Organisations are increasingly dependent on email for conducting business, internally
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Computer Forensics Principles and Practices
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 7: Investigating Windows, Linux, and Graphics Files Objectives Conduct efficient and effective investigations of Windows
Appium mobile test automation
Appium mobile test automation for Google Android and Apple ios Last updated: 4 January 2016 Pepgo Limited, 71-75 Shelton Street, Covent Garden, London, WC2H 9JQ, United Kingdom Contents About this document...
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS A Detailed Review ABSTRACT This white paper highlights integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Security in Offloading Computations in Mobile Systems Using Cloud Computing
Security in Offloading Computations in Mobile Systems Using Cloud Computing S.Masiperiyannan 1,C.M.Mehathaf Begum 2,I.Mohammed Farook Ali 3,G.Mayuri Priya 4,S.Sudhakar 5 UG Student, Dept. of CSE, K S R
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
Title: Appium Automation for Mac OS X. Created By: Prithivirajan M. Abstract. Introduction
Title: Appium Automation for Mac OS X Created By: Prithivirajan M Abstract This document aims at providing the necessary information required for setting up mobile testing environment in Mac OS X for testing
Localization of Open Source Web Content Management System
Localization of Open Source Web Content Management System Rufael Tadesse HiLCoE, Computer Science Programme, Ethiopia Computer Revolution Africa, Ethiopia [email protected] Fekade Getahun HiLCoE,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Whitepaper on identity solutions for mobile devices
Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Manual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
A Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1, Patrick Bas 12 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O. Box
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Introduction site management software
Web Testing Introduction Making a web site does not end with putting all the media and software together. Actually, web site work never ends. When all the design is done, you have to test the site first
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Xerox ConnectKey Remote Control Panel White Paper
Xerox ConnectKey Remote Control Panel White Paper 1 Table of Contents The information presented in this document is broken into the following sections: Section 1 General Overview......2 Section 2 Enabling
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
Clearswift SECURE File Gateway
Security solutions for a changing world You wouldn t leave your front door unlocked if you were going out for the day, so why do the same with your business? In today s rapidly evolving business environment,
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Server & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
International ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
PLEASE NOTE: The client data used in these manuals is purely fictional.
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
Integrating the F5 BigIP with Blackboard
Integrating the F5 BigIP with Blackboard Nick McClure [email protected] Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard
Client Training Manual
Client Training Manual Contents Quick Summary on How to Open Encrypted Email from Arlington County.2 I. Overview... 4 A. Overview of Email Encryption with Arlington County Government... 4 Link to YouTube
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Public Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA [email protected] [email protected]
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Best Practices for Maximizing Revenue with MoPub. Publisher Playbook
! Best Practices for Maximizing Revenue with MoPub Publisher Playbook Table of Contents Introduction 3 Ad Formats 4 Singleton Ad Unit for Banners 4 Interstitial Ad Unit 5 Video Ads on MoPub Marketplace
Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
Business mail 1 MS OUTLOOK CONFIGURATION... 2
Business mail Instructions for configuration of Outlook, 2007, 2010, 2013 and mobile devices CONTENT 1 MS OUTLOOK CONFIGURATION... 2 1.1 Outlook 2007, 2010 and 2013 adding new exchange account, automatic
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
introducing COMPUTER ANTI FORENSIC TECHNIQUES
introducing COMPUTER ANTI FORENSIC TECHNIQUES COMPUTER FORENSIC DATA RECOVERY TECHNIQUES AND SOLUTIONS WORKSHOP Executive Summary Computer Forensics, a term that precisely identifies the discipline that
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Generate Android App
Generate Android App This paper describes how someone with no programming experience can generate an Android application in minutes without writing any code. The application, also called an APK file can
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
Presto User s Manual. Collobos Software Version 1.1. 2013 Collobos Software, Inc! http://www.collobos.com
Presto User s Manual Collobos Software Version 1.1 2013 Collobos Software, Inc! http://www.collobos.com Welcome To Presto! 3 AirPrint! 3 Google Cloud Print! 3 System Requirements! 3 How It Works! 5 PrintKit
LivePoplet: Technology That Enables Mashup of Existing Applications
LivePoplet: Technology That Enables Mashup of Existing Applications Akihiko Matsuo Kenji Oki Akio Shimono (Manuscript received January 29, 2009) We have developed LivePoplet, a technology that allows the
Windows Server 2012 Server Manager
Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities
Kathy Au Billy Yi Fan Zhou Department of Electrical and Computer Engineering University of Toronto { kathy.au, billy.zhou }@utoronto.
ECE1778 Project Report Kathy Au Billy Yi Fan Zhou Department of Electrical and Computer Engineering University of Toronto { kathy.au, billy.zhou }@utoronto.ca Executive Summary The goal of this project
Metadata, Electronic File Management and File Destruction
Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information
