• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 68
  • 9
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 23
  • 19
  • 16
  • 13
  • 13
  • 12
  • 12
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

Alanko Öberg, John, Svensson, Carl January 2023 (has links)
Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. Early coverless methods were applied to images or texts but more recently the possibilities in the video and audio domain have been explored. The audio domain still remains relatively unexplored however, with the earliest work being presented in 2022. In this thesis, we narrow the existing research gap by proposing an audio-compatible method which uses the timestamp that marks when a carrier media was received to generate a time-based key which can be applied to the hash produced by said carrier. This effectively allows one carrier to represent a range of different hashes depending on the timestamp specifying when it was received, increasing capacity. Objectives. The objectives of the thesis are to explore what features of audio are suitable for steganographic use, to establish a method for finding audio clips which can represent a specific message to be sent and to improve on the current state-of-the-art method, taking capacity, robustness and cost into consideration. Methods. A literature review was first conducted to gain insight on techniques used in previous works. This served both to illuminate features of audio that could be used to good effect in a coverless approach, and to identify coverless approaches which could work but had not been tested yet. Experiments were then performed on two datasets to show the effective capacity increase of the proposed method when used in tandem with the existing state-of-the-art method for coverless audio steganography. Additional robustness tests for said state-of-the-art method were also performed. Results. The results show that the proposed method could increase the per-message capacity from eight bits to 16 bits, while still retaining 100% effective capacity using only 200 key permutations, given a database consisting of 50 one-minute long audio clips. They further show that the time cost added by the proposed method is in total less than 0.1 seconds for 2048 key permutations. The robustness experiments show that the hashing algorithms used in the state-of-the-art method have high robustness against additive white gaussian noise, low-pass filters, and resampling attacks but are weaker against compression and band-pass filters.  Conclusions. We address the scientific gap and complete our objectives by proposing a method which can increase capacity of existing coverless steganography methods. We demonstrate the capacity increase our method brings by using it in tandem with the state-of-the-art method for the coverless audio domain. We argue that our method is not limited to the audio domain, or to the coverless method with which we performed our experiments. Finally, we discuss several directions for future works. / Bakgrund. Täcklös steganografi är ett relativt outforskat område inom steganografi där meddelandet, istället för att gömmas i ett medium, representeras av en eller flera egenskaper som kan erhållas från mediet. Detta faktum hindrar nuvarande steganalysmetoder från att upptäcka bruk av täcklös steganografi. Tidiga studier inom området behandlar bilder och text, senare studier har utökat området genom att behandla video och ljud. Den första studien inom täcklös ljudsteganografi publicerades år 2022. Målet med examensarbetet är att utöka forskningen med en föreslagen ljudkompatibel metod som använder tidsstämpeln då ett meddelande mottagits för att skapa en tidsbaserad nyckel som kan appliceras på en hash erhållen från ett steganografiskt medium. Detta tillåter mediet att representera olika hashar beroende på tiden, vilket ökar kapaciteten.   Syfte. Syftet med examensarbetet är att utforska vilka egenskaper i ett ljudmedia som lämpar sig åt steganografiskt bruk, att skapa en metod som kan hitta ljudklipp som representerar ett efterfrågat meddelande, samt att förbättra nuvarande state-of-the-art inom täcklös ljudsteganografi genom att finna en bra balans mellan kapacitet, robusthet och kostnad.   Metod. En litteraturstudie utfördes för att få förståelse för metoder använda i tidigare studier. Syftet var att hitta egenskaper i ljud som lämpar sig åt täcklös ljudsteganografi samt identifiera icke-täcklösa metoder som skulle kunna anpassas för att fungera som täcklösa. Experiment utfördes sedan på två dataset för att påvisa den ökning i effektiv kapacitet den föreslagna metoden ger när den appliceras på state-of-the-art-metoden inom täcklös ljudsteganografi. Experiment utfördes även för att utöka tidigare forskning på robustheten av state-of-the-art-metoden inom täcklös ljudsteganografi. Resultat. Resultaten visar att den föreslagna metoden kan öka kapaciteten per meddelande från åtta till 16 bits med 100% effektiv kapacitet med 200 nyckelpermutationer och en databas bestående av 50 stycken en-minut långa ljudklipp. De visar även att tidskostnaden för den föreslagna metoden är mindre än 0,1 sekund för 2048 nyckelpermutationer. Experimenten på robusthet visar att state-of-the-art-metoden har god robusthet mot additivt vitt gaussiskt brus, lågpassfilter och omsampling men är svagare mot kompression och bandpassfilter. Slutsatser. Vi fullbordar målen och utökar forskningen inom området genom att föreslå en metod kan öka kapaciteten av befintliga täcklösa metoder. Vi demonstrerar kapacitetsökningen genom att applicera vår metod på den senaste täcklösa ljudsteganografimetoden. Vi presenterar argument för vår metods tillämpning i områden utanför ljuddomänen och utanför metoden som den applicerades på. Slutligen diskuteras riktningar för framtida forskning.
102

The story of the Berlin Tunnel: What the operations narrative teaches us about covert conflict in an ongoing Cold War

Collier, Jonathan 01 January 2018 (has links) (PDF)
Operation Gold (1953-56) was a collaborative covert operation between the American CIA and British SIS. The two major objectives: firstly, rebalance the state of affairs in covert activity, which the KGB had been dominating heading into the 1950s. Secondly, gain more detailed, valuable information on the state of Soviet forces throughout Europe and gain prior warning of possible information. The technological nature of the operation marks it as the beginning of a move away from traditional espionage. Understanding the narrative of Operation Gold establishes a firm foundation on which to address the development of covert activity into the modern day. Key elements of the story of the Berlin Tunnel serve to tie this lesser known operation to modern concerns of privacy, personal data, and covert involvement in international affairs. While unravelling the truest narrative of the planning and implementation of the operation, this thesis integrates substantial events, groups and people which shape the role of the Berlin Tunnel in understanding covert conflict. Further consideration is also given to how this operations legacy unfolded and the role of the media in understanding events in this separate sphere. Lessons about the covert sphere not only address a sub-narrative of 1950s Cold War but reach conclusions pertinent to the 21st century.
103

An investigation of the economic viability and ethical ramifications of video surveillance in the ICU

Bagge, Laura 01 August 2013 (has links)
The purpose of this review of literature is to investigate the various roles of video surveillance (VS) in the hospital's intensive care unit (ICU) as well as its legal and ethical implications. Today, hospitals spend more money on the ICU than on any other unit. By 2030, the population of those 65 and over is expected to double. 80% of older adults have at least one chronic diseases (Centers for Disease Control and Prevention, 2013). As a consequence, the demand for ICU services will likely increase, which may burden hospital with additional costs. Because of increasing economic pressures, more hospitals are using video surveillance to enhance quality care and reduce ICU costs (Goran, 2012). Research shows that VS enhances positive outcomes among patients and best practice compliance among hospital staff. The results are fewer reports of patient complications and days spent in the ICU, and an increase in reported hospital savings. In addition, VS is becoming an important tool for the families of newborns in the neonatal ICU (NICU). The belief is that the VS can facilitate parent-baby bonding. In the United States of America, privacy rights impose legal restrictions on VS. These rights come from the U.S. Constitution, Statutory law, Regulatory law, and State law. HIPPA authorizes the patient to control the use and disclosure of his or her health information. Accordingly, hospitals are under obligation to inform patients on their right to protected health information. It is appropriate that hospitals use VS for diagnostic purposes as long as they have obtained patient consent. According to modern day privacy experts Charles Fried and Alan Westin, a violation of a person's privacy equates a violation on their liberty and morality. However, if a physician suspects that a third party person is causing harm to the patient, than the use of covert VS is justifiable.
104

Information Theoretical Studies on MIMO Channel with Limited Channel State Information

Abdelaziz, Amr Mohamed January 2017 (has links)
No description available.
105

Covert Cognizance: Embedded Intelligence for Industrial Systems

Arvind Sundaram (13883201) 07 October 2022 (has links)
<p>Can a critical industrial system, such as a nuclear reactor, be made self-aware and cognizant of its operational history? Can it alert authorities covertly to malicious intrusion without exposing its  defense  mechanisms?  What  if  the  intruders  are  highly  knowledgeable  adversaries,  or  even  insiders that may have designed the system? This thesis addresses these research questions through a novel physical process defense called Covert Cognizance (C2). </p> <p>C2  serves  as  a  last  line  of  defense  to  industrial  systems  when  existing  information  and  operational technology defenses have been breached by advanced persistent threat (APT) actors or insiders. It is an active form of defense that may be embedded in an existing system to induce intelligence,  i.e.,  self-awareness,  and  make  various subsystems  aware  of  each  other.  It  interacts with the system at the process level and provides an additional layer of security to the process data therein without the need of a human in the loop. </p> <p>The C2 paradigm is  founded on two core requirements – zero-impact and zero-observability. Departing from contemporary active defenses, zero-impact requires a successful implementationto leave no footprint on the system ensuring identical operation while zero-observability requires that the embedding is immune to pattern-discovery algorithms.  In other words, a third-party such as  a  malicious  intruder  must  be  unable  to  detect  the  presence  of  the  C2  defense  based  on  observation of the process data, even when augmented by machine learning tools that are adept at pattern discovery. </p> <p>In the present work, nuclear reactor simulations are embedded with the C2 defense to induce awareness across subsystems and defend them against highly knowledgeable adversaries that have bypassed existing safeguards such as model-based defenses.  Specifically, the subsystems are made aware  of  each  other  by  embedding  critical information from  the  process  variables  of  one sub-module  along  the  noise of  the  process  variables  of  another,  thus  rendering  the  implementation  covert and  immune  to  pattern  discovery.   The  implementation  is  validated  using  generative adversarial  nets,  representing  a  state-of-the-art  machine  learning  tool,  and  statistical  analysis  of  the  reactor  states,  control  inputs,  outputs  etc. The  work  is  also  extended  to  data  masking  applications  via  the  deceptive  infusion  of  data  (DIOD)  paradigm.  Future  work  focuses  on  the  development of automated C2 modules for “plug ‘n’ play” deployment onto critical infrastructure and/or their digital twins.</p>
106

An investigation of children's aggression in the foundation phase : a socio-education perspective

Padayichie, Kumaree 11 1900 (has links)
This study served to highlight the aggressive nature of learners in the Foundation Phase, namely of those who are between the ages of 5 to 6 years. The project is based on qualitative research, and the data were collected from three primary schools in the northern suburbs of Johannesburg. Interviews were conducted with two principals, three educators and three parents. Four learners were used in order to gather further information on the causes of the aggressive behaviour of learners. Their input assisted the researcher to understand the various discipline structures within the school and also, how parents and educators manage the aggressive behaviour of learners. The study sought to identify whether primary and secondary socialisation, and the influence of the media are related to learners behaving aggressively. The information collected confirmed that children model the behaviour of adults and of their peers. The principals and the educators were of the opinion that positive primary socialisation is of the utmost importance, as it lays the foundation for future socialisation. / Educational Studies / M. Ed. (Socio-Education)
107

The use of physical surveillance in forensic investigation

Knoesen, Andre Leon 11 1900 (has links)
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic. To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool. / Police Practice / M. Tech. (Forensic Investigation)
108

Self-reflexivity In Postmodernist Texts: A Comparative Study Of The Works Of John Fowles And Orhan Pamuk

Saracoglu, Semra 01 September 2003 (has links) (PDF)
This dissertation makes a comparative analysis of the self-reflexivity in the novels of one British and one Turkish writer - John Fowles and Orhan Pamuk. The study restricts itself to three novels by each writer. In making this analysis under the light of Robert Scholes&amp / #8217 / s theory of reality, and making use of Linda Hutcheon&amp / #8217 / s classification of self-reflexivity, and Jacque Lacan&amp / #8217 / s The Mirror Stage, it is argued that both Fowles and Pamuk create worlds within worlds which are similar to but different from each other, namely the fictional world, the world of the implied author, and the outer world, i.e. the world of the writer. Although these worlds reflect each other, it is not a one-to-one reflection of outer reality, since art/fiction is illusion. This dissertation argues that in accordance with their aims in both life and literature, and their views on reality, Fowles and Pamuk make use iv of different self-reflexive devices. While Fowles prefers overt self-reflexive devices, Pamuk chooses to employ both overt and covert ones / this may be because Fowles aims to be didactic whereas Pamuk does not. While Fowles believes in the existence of the external world, Pamuk rejects it. Whatever techniques they use, it is shown that they both write self-reflexive texts focusing on fictionality as their theme. The analysis of the six novels by Fowles and Pamuk as the representatives of two different literatures demonstrates that self-reflexivity is an indispensable characteristic of postmodern fiction and that Pamuk is more postmodernist compared to Fowles.
109

隱性行銷的可行性: 時尚美妝部落格商業意圖揭露對部落客態度的影響 / Feasibility of Covert Marketing: The Effect of Beauty Blogs Commercial Intent Disclosure on the Attitude toward Bloggers

邱瑜庭 Unknown Date (has links)
在資訊爆炸的時代,行銷商在傳遞行銷訊息上面臨了巨大的難題,迫使市場繁衍出全新的行銷方式以抓住消費者的目光,隱性行銷便是這變革中的其一。在台灣,隱性行銷的運用方式除了商品置入外,另一較常見的就是「部落格行銷」。 只是當部落格沾染上行銷的色彩時,讀者將無法分辨文章的內容到底是出自於部落客的個人經驗或是廣告美言,也許會因此破壞讀者對部落客的好感與信任。 本研究目的為探討時尚美妝部落格商業意圖揭露(有/無)與商業意圖揭露時機(前/後)是否會對部落客的態度造成影響;此外本研究亦想探討消費者對商業意圖揭露的既存態度(高/低)是否也是影響該消費者對部落客態度的潛在因素。 本研究採取「實驗室研究法」,並以美妝保養部落格為例。實驗共分為三組(無揭露/揭露於產品置入之前/揭露於產品置入之後),對商業意圖揭露的既存態度則為調節因素。實驗對象主要為國立政治大學曾經在欲購買某產品前有先透過部落格搜集相關資訊的女學生共90人。統計工具使用SPSS進行分析,以檢驗本研究之模型及相關假設。 依據本研究結果,文章商業意圖揭露的有無與時機並不會顯著影響讀者對部落客的態度,另外讀者對商業意圖揭露的既存態度亦不會調節文章商業意圖揭露對部落客態度的影響。
110

Developing a theoretical basis for the concept of organizational behaviour

Richards, James January 2006 (has links)
Workplace misbehaviour is seen to be a neglected feature of organizational study (Ackroyd and Thompson; Vardi and Weitz, 2004). Where research has been undertaken into misbehaviour the emphasis tends fall into two broad categories. First of all, organizational behaviour theorists use the term misbehaviour as a means to highlight how the ‘negative’ behaviour of employees gets in the way of formal organizational goals. Secondly, radical sociologists tend to use the term misbehaviour as a means to critique Foucauldian labour process theory. Here an argument is made that suggests the disciplinary affects of new management practices associated with human resource management and total quality management have been overstated. Furthermore, radical sociologists also use the term misbehaviour as means to critique organizational behaviour accounts, which are believed to paint overly optimistic accounts of organizational life. However, on further examination it was discovered that neither a radical sociological approach, nor a traditional organizational behaviour approach, sufficiently addresses the current deficit in our understandings and explanations for workplace misbehaviour. Hence, one of the main themes of this thesis was to design a theoretical and methodological framework to address the deficit in our understandings and explanations. As such, a view was taken of how a radical sociological approach (orthodox labour process analysis) combined with an emerging social psychological perspective (a social identity approach (Haslam, 2001)) could help overcome previous theoretical problems associated with researching misbehaviour. Empirical support for this approach is provided by the detailed examination of the objective and subjective working conditions of four different sets of low status workers. The findings are based on longitudinal covert participant observations, as well as covert interviews and the covert gathering of company documents. The findings depart from previous insights into workplace misbehaviour in stressing the importance of acknowledging and investigating both the organizational and sub-group social identities of low status workers, in relation to such activities. As such, a great deal of the misbehaviour noted in the findings can be attributed to the poor treatment of low status workers by management, yet misbehaviour is equally if not more attributable to the empowering or inhibitive qualities of the many psychological groups that worker can associate with or disassociate themselves from. Recommendations are made about the direction of future research into workplace misbehaviour. There are many suggestions made and include examining misbehaviour in a wider range of settings, sectors and levels of organizations.

Page generated in 0.0496 seconds