Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2000, IBM Journal of Research and Development
…
14 pages
1 file
Industry coalitions are developing regulations to govern information sharing and to protect sensitive business data and the privacy of individuals. In many cases, these regulations make it impossible to outsource business operations, unless the companies have effective technologies to protect sensitive information. This paper addresses scenarios in which data servers and applications are owned and maintained on the premises of a company, and the service providers remotely access the data and the applications. We present a unique solution called Masking Gateway for Enterprises (MAGEN) that masks sensitive information appearing on application displays, without any interference with the applications that generate those screens. The major novelty lies in the utilization of optical character recognition (OCR) for analyzing and understanding application screens. Together with a comprehensive rule language, this approach makes it possible to characterize fields containing sensitive information and mask them according to predefined rules. The rule language is very flexible, abstract, and intuitive and is designed to cope with a vast set of policies and security needs. We describe the major challenges in implementing MAGEN and the results of experimenting with it in situations that occur in actual business settings. We outline techniques that optimize the OCR process to minimize latency and ensure robust operation.
RADIOELECTRONIC AND COMPUTER SYSTEMS
The subject of the study. A concept of OCR systems performance improvement is proposed, which is achieved through the integrated use of special algorithms for preliminary processing of documents picture, an extended set of service functions, and advanced techniques for information protection. Study objectives: development of algorithms that compensate for the influence of the unfavorable points like imperfect lighting conditions overshooting, images geometric deformation, noises, etc., which corrupt the pictured text, on the efficiency of that text recognition. It is needed to provide for a series of service procedures that would ensure adequate data handling while viewing, converting, and storing in standard formats the results, and ensuring the possibility to exchange data in open communication networks. Additionally, it is necessary to ensure the information protection against unauthorized use at the stage of data processing and provide secretiveness of their transmission through...
Data Masking is an emerging technology that shows great promise for various futuristic application in Software Development and Testing. It is often necessary to anonymize data in test and development databases in order to protect it from inappropriate visibility. There are many things, some incredibly subtle, which can cause problems when masking data. This paper provides a survey of the practical issues involved in the masking of sensitive data and tells you the things you really need to know about before getting started.
2000
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganography called data masking.
RADIOELECTRONIC AND COMPUTER SYSTEMS
The subject of research. There has been studying a new universal method of information protection in optical text recognition systems when transmitting confidential data over open communication channels. This work develops the concept of creating a modern, simple and reliable method for protecting information during its transmission over communication channels, to determine the objective criteria for the quality of its work, to create a set of algorithms for implementing the proposed method and software for conducting experimental studies. The current work puts on the concept of creation of a simple and reliable current method for protecting information when passing it through communication channels, also to define the objective criteria for assessing the tool operation quality and to exercise the dedicated programs, which implement the proposed methods and developed algorithms. Based on the results of these studies, it must evaluate the practice effectiveness of the proposed method...
Our modern world has witnessed a revolution in the digital information, which has their impact upon our societies and lives. On the other hand, many challenges have arisen embedded in the easy access for this information and revealing them, especially if we know that part of them is very important and needs pr otection as well as secrecy for various reasons. For protecting most of such information and da ta, which require secrecy, the need for inventing protection systems has become necessary, amongst them our research that deals with the studying and constructing a proposed system for this task. In guaranteeing more secrecy for such data and the difficulty in detecting them, the researcher trey to propose a system, which depends upon combining steganography with encryption in order to add more security layers. Our research, therefore, tries to support the secrecy of data and information the researcher wish to send with great secrecy that make them difficult to be detected or, at least, to hinder their detection for a long time in which they lose their importance. Our proposed system depends upon pr eparing the image's data for the next step (DCT Quantization) through steganographic process and using two levels of security: the RSA algorithm and the digital signature, then storing the image in a JPEG form at. In this case, the secret message will be looked as plain text with digital signature, while the cover is coloured image. Then, the results of the algorithm are submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm and its activity. Thus, the proposed algorithm for this research can be divided into two main parts: hiding th e text of the sender, and extracting it by the receiver. More over, part can be divided into many procedures done by the program Delphi 5.
Application of data masking in achieving information privacy is implemented in order to enhance privacy of sensitive data. Data privacy is something that is appreciated by all people in different works of life, not only for self-pride but also for security. Think of a medical institution and his patient: the medical client will appreciate the secrecy of his medical data by the medical personnel; in the case of a bank and his client: the client will appreciate the privacy of his account information; just to mention but few cases. The challenge in data privacy is to share data while protecting personally identifiable information. This research work gives detailed analytical information on application of data masking in achieving information privacy. It covers issues on how data in production environment are being masked to avoid exposure of sensitive of sensitive data to an unauthorized user. The information used for this study was extracted from relevant textbooks, journals and internet. A customer-based application was developed to illustrate this subject. Java (using netbeans as the IDE) and MySQL were used as the programming language and back-end database respectively in the development of the said application.
2006
In this paper, we propose a new theoretical framework for the data-hiding problem of digital and printed text documents. We explain how this problem can be seen as an instance of the well-known Gel'fand-Pinsker problem. The main idea for this interpretation is to consider a text character as a data structure consisting of multiple quantifiable features such as shape, position, orientation, size, color, etc. We also introduce color quantization, a new semi-fragile text data-hiding method that is fully automatable, has high information embedding rate, and can be applied to both digital and printed text documents. The main idea of this method is to quantize the color or luminance intensity of each character in such a manner that the human visual system is not able to distinguish between the original and quantized characters, but it can be easily performed by a specialized reader machine. We also describe halftone quantization, a related method that applies mainly to printed text documents. Since these methods may not be completely robust to printing and scanning, an outer coding layer is proposed to solve this issue. Finally, we describe a practical implementation of the color quantization method and present experimental results for comparison with other existing methods. * The concept of strong typicality is nicely introduced in the book by Cover and Thomas 8 † Usually, in the context of data-hiding, a secret key K is shared between both encoder and decoder. The secret key K is used for security purposes. For the sake of completeness explicitly shows the secret key K. However, since in this paper we do not perform a security analysis, we will not refer to it.
Application of data masking in achieving information privacy is implemented in order to enhance privacy of sensitive data. Data privacy is something that is appreciated by all people in different works of life, not only for self-pride but also for security. Think of a medical institution and his patient: the medical client will appreciate the secrecy of his medical data by the medical personnel; in the case of a bank and his client: the client will appreciate the privacy of his account information; just to mention but few cases. The challenge in data privacy is to share data while protecting personally identifiable information. This research work gives detailed analytical information on application of data masking in achieving information privacy. It covers issues on how data in production environment are being masked to avoid exposure of sensitive of sensitive data to an unauthorized user. The information used for this study was extracted from relevant textbooks, journals and internet. A customer-based application was developed to illustrate this subject. Java (using netbeans as the IDE) and MySQL were used as the programming language and back-end database respectively in the development of the said application.
2013
To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive information has become of prime and first importance and concern. Information hiding is an art that involves communication of secret information in an appropriate carrier, e.g., image, video, audio etc. To protect information from unauthorized access various methods for information hiding like cryptography, stegnography, hashing, and authentication have been developed and are in practice today. In this paper we will be discussing one such information hiding techniques called Steganography. Steganography's main goal is to hide the very existence of secure informat...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
IEEE Signal Processing Magazine, 1997
Journal of Computer Science, 2009
Available at SSRN 1512814, 2008
Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Journal of King Saud University - Computer and Information Sciences, 2020
Journal of Real-Time Image Processing, 2018
Advances in Multidisciplinary and scientific Research Journal Publication
Handbook of Research on Computational Intelligence for Engineering, Science, and Business, 2013
Advances in information security, 2001