Saturday, November 9, 2019
Minority languages Essay
The world has very many languages that are considered as minor. These are well spread through the lands and they are threatened towards extinction. Various policies have been put forward by different countries to help preserve these unique dialects and one of the ways is by use of education scholarships given to people of these languages to encourage the to advance. As they advance, their languages get known in various places. Broadcasting stations that air programs in these languages have also been set up. Many more people can as a result hear them and adopt their ways. The culture of these minority groups can be used as a platform of preserving the dialects. Various campaigns have been set up to help market the culture of these people so that they remain dominant. Some countries have also gone to an extent of declaring that the minority languages are the national languages of their countries and this is a boost towards preserving the languages. Some education curriculums have also been set up so that these languages can be used in learning institutions and this has worked to spread awareness on these minority languages. This occurred in Sami which is an Irish dialect. Some important books like the bible have been printed in these languages and this gives security and helps to preserve the languages. The local owners of these languages are hence kept busy in their tradition and they feel comfortable and lack nothing because of the translations. The minor languages can best be preserved by making sure that the members fit in all arena of life by providing books and programs that are representative of their language. This is the only secure way. Source Tomasi, K. (2005). World History. NY: Oxford press.
Thursday, November 7, 2019
When College Has a Negative ROI - Guest Post by David I. Block, EA
When College Has a Negative ROI - Guest Post by David I. Block, EA My accountant from NYC, David Block, sent this out to his list and I thought it brought up some important issues to consider for anyone considering going to (or sending a child to) an expensive yet low-ranked college. For some, at least on pure economic/financial grounds, it might make sense to go straight from high school into the working world. Heres what David has to report: With graduation season pretty much behind us, there are a slew of high school graduates who are enjoying their last golden summer, before well, before that time that many consider to be another golden four years. [I fondly remember those halcyon days before the real world hits! Even in college, I remember thinking: Wow, am I everà BUSY! All of these social events to juggle!!!à But alas, real life isnt quite so bubble-wrapped.] But over the last couple decades, there has been a rising chorus of critics who point to skyrocketing tuitions, and the corresponding skyrocketing debt-loads, and are just wondering:à is it ACTUALLY worth it? Well, for some schools, the answer is a resounding: NO. TaxMaster Financials Real World Personal Strategy Note When College Has a Negative ROI Whats right isnt always popular. Whats popular isnt always right. Howard Cosell As many have claimed (such as the US Census Bureauà https://www.census.gov/prod/2002pubs/p23-210.pdfà ), a typical college degree is worth up to a million bucks over a career but thats not true for every degree. Whats becoming more and more apparent is thatà prospectiveà college students need to do their homework beforehand, because some degrees simply arent worth the investment. Of the 1312 colleges evaluated in the 2014 PayScale College ROI Report (found here:à https://www.payscale.com/college-roi/full-list/financial-aid/yesà ), graduates from 58 institutions are estimated to be worse off after 20 years compared with those who skipped college and went straight to work. These 58 lackluster institutions make up 4.42% of all the colleges surveyed. The lowest grade goes to Shaw University in Raleigh, North Carolina, where PayScale estimates that grads will be $121,000 worse off after 20 years for earning a degree. To calculate this estimate, PayScale uses an opportunity cost measure they call return on investment (ROI). After factoring all the net college costs, the report compares 20 years of estimated income of a college graduate versus 24 years of income from a high school graduate who started working immediately and didnt have to pay college expenses (or take loans). Future college students (and their parents) must realize that not all colleges are equal. The graduates from the lowest ranking schools report earning less income after graduation. The PayScale website is helpful because it allows you to see reported earnings of graduates from over a thousand colleges. I also assume that low-performing schools in this report tend to offer less financial assistance, which leaves their graduates with larger debt burdens. However, the most highly endowed colleges can reduce their cost of attendance with grants and scholarships. For example, Stanford is one of the most expensive schools based on sticker price, but its financial assistance is typically generous. So the net cost is very competitive, and their ranking is number 4 based on the PayScale study. The list, unfortunately, is not all inclusive. For example, my alma mater does not seem to be in the list at all. And, of course, there is a question about whether or not college is to be best utilized to create well-rounded, intelligent students, well-versed in liberal arts, or if college is now simply to be considered as vocational school. Nonetheless, the list has some value, as there are differences between schools and majors.Debt burdens are relative. A doctors salary can more quickly pay off a high-price education loan than can a teachers. A good rule of thumb is to avoid incurring college debts that will be more than half of your expected annual income. Limiting loans to no more than 50% of a future salary allows graduates to pay off their debts after five years, using 10% of their future salary.Some students begin to realize their faulty economics only after they have enrolled. Not surprisingly, those schools with the lowest ROI also have the highest dropout rates in the coun try. For example, we have Adams State, which has a 21% graduation rate and a 20-year net ROI of minus $20,143. What should be clear from this data is the world of difference between the outcomes of graduates of highly-rated schools, and of those near the bottom of the barrel.à Attending a college with a poor ROI is not necessarily a mistake, but the financial aid package had better be sweet.à So, treat your college decision like any investment:à you also need to do your homework before you commit your time and money to an unknown outcome. I hope I am helping the college choice discussion for you, rather than hindering! Warmly, David à I. Block, EA For Arnold, Tina and Dianne TaxMaster Financial Service Corporation (212) 247-9090 What do you think of Davidsà analysis of College ROI? Does it change your view of how you will approach the college choice process? Please share below.
Tuesday, November 5, 2019
Nolo (Irregular Latin Verb) Definition and Use
Nolo (Irregular Latin Verb) Definition and Use Nolo, nolle, nolui - to wish not to Nolo is an important verb because the imperative is used to form negative commands. To say dont in Latin, you use the imperative of nolo. Indicative PresentSingular1 - nolo2 - non vis3 - non vultPlural1 - nolimus2 - non vultis3 - noluntIndicative ImperfectSingular1 - nolebam2 - nolebas3 - nolebatPlural1 - nolebamus2 - nolebatis3 - nolebantIndicative FutureSingular1 - nolam2 - noles3 - noletPlural1 - nolemus2 - noletis3 - nolent Imperative PresentSg. 2. noliPl. 2. noliteFutureSg. 2. and 3. nolitoPl. 2. nolitotePl. 3. nolinto Subjunctive Present Singular1 - nolim2 - nolis3 - nolitPlural1 - nolimus2 - nolitis3 - nolint Subjunctive Imperfect Singular1 - nollem2 - nolles3 - nolletPlural1 - nollemus2 - nolletis3 - nollent Infinitive Present nolleParticiple Present nollens, entis Malo and Nolo are based on Volo: malo magis volo and nolo non/ne volo Irregular Latin Verbs Eo - to goFio - to becomeVolo - to wishnolo, nolle, nolui to be unwilling and malo, malle, malui to prefer are similar.Sum - to beDo - to giveFero - to carryEdo - to eat
Sunday, November 3, 2019
The United States Prohibition of Alcohol Essay Example | Topics and Well Written Essays - 1250 words
The United States Prohibition of Alcohol - Essay Example The law of prohibition does not include the consumption and carrying of alcohol. As a result of this prohibition, the era faced a difficult time which was full of social unbalances. The illegal alcohol became the high income commodity that lead to the black marketing business during that period. The business of the racketeer was rising without any limits, in which strong and powerful groups started corrupting the agencies responsible for the enforcement of law. The demand for alcohol got sky high as it showed great potential to get smuggled. The amount required for the enforcement of forbidden law was quite much and there were little revenues generated from the taxes i.e. $500 million collection every year from the whole U.S. that inversely impacted the economy and government exchequers. In 1933, the law of prohibition of alcohol got reversed through the implementation of 21st Amendment in the constitution. The black market group ultimately lost their shares in the illegal activity i n every state of U.S as each state was enjoying the right to place their own developed rules and laws to counter the use of alcohol and the legal stores were introduced to sell the economical priced alcohol. The illicit criminal groups found it difficult to sustain their profits and started the more dangerous criminal activity by dealing in other products like narcotics and drugs. Not just the formal legal control over the use of alcohol, the colonial America had some informal majors of controlling the consumption of liquor at home and social grounds in the community by maintaining the ideals that use of alcohol is bad and not at all acceptable. It was quite clear in the minds of the people that alcohol is from the God but the negative aspects are derived from the devil along. Therefore, anyone found guilty of consuming alcohol will be punished by God and it is condemned at a greater scale. In case of failure for informal controlling techniques, the legal method was used to counter the effects. The violation was no doubt happening in U.S but the normal sobriety of the people reveals the improvement of the controlling system from formal and informal levels for the population that intakes over 3 gallon of alcohol/ person each annum. This statistic is much higher than the current rate of using alcohol. There were some details that were given by the medical experts. Dr Benjamin Rush, a psychiatrist of the 18th century stated that during the period of 1784, that high consumption of (r is harmful for the physical health as well as physiological health. His idea was related to the moderate consumption instead of complete forbidden (Gerritsen 165). Under the influence of the revelation of Benjamin rush, 200 farmers of Connecticut community created an association in 1789. Same kinds of formations were developed in other states like Virginia in 1800 and in network in 1808. In the next ten years, other associations were formed in more than eight states of U.S. out of whi ch there were some that were accepted to the state level. In 1840, the prohibition movement or dry movement was initiated and expanded by the pietistic religious dominations; the most important one was the Methodists (Gann 358). During the years of 1830 and 1840, most of the associations that were formed started believing in the fact that the only way to avoid the state
Thursday, October 31, 2019
Adolf Hitler-World War I and II Essay Example | Topics and Well Written Essays - 500 words
Adolf Hitler-World War I and II - Essay Example He was part of the Bavarian Reserve Infantry Regiment 16, where he was involved in major combats. Hitler is also presented as being responsible for the Second World War (Haugen 7). Adolf Hitler is said to have influenced society, economy, politics, and ideas that are there for the people living today. Hitlerââ¬â¢s love for the army majorly influenced how he ruled Germany at the time he was a dictator. He used military styles to rule the country. During WW1, Hitler won many awards for being an exemplary soldier who depicted cold-blooded boldness and courage (Haugen 53). Hitler also influenced major economic activities like agriculture in the sense that he idealized rural life, and saw that cities had a corrupting effect to the peopleââ¬â¢s minds. He supported the preservation of the peasant class. He also influenced the aviation industry through the creation of the Air Ministry. Previously, aviation was only seen in the United States (Nicholls 16). As Hitler rose to power, he preached murder, violence, and hate. When he was the absolute German leader between the 1930s and 1940s, millions and millions of people died because of his wishes. He lied and encouraged prejudice, ironically winning the support of those who believed him (Roberts 6). Politically, WW2 is said to have been caused by Hitler as a result of his 1930s influence on German politics. Hitler has affected the world and ideas of people today through many things such as the massive loss of life. From an economic perspective, the United States is said to have been led out of depression and into the post war era boom. This has enabled it to remain a superpower ever since (Haugen 7). Socially, Hitler has influenced technological advancements, both to civilians and the military. These include atomic energy, jet engines, and synthetic nylon fibers among others. Hitlerââ¬â¢s legacy also led to the realignment of many of the states in the Eastern Bloc. From another
Tuesday, October 29, 2019
The wholesale clothing Industry in the US Essay
The wholesale clothing Industry in the US - Essay Example But as the century approached its midpoint, more and more respectable Americans started to buy their clothes off the rack. This was especially true of men whose clothes were loosely fitted and not subject to the volatility of fashion as that of women (Soyer, 2005). During the 1830s, the textile industry became more established in America and machine-made clothes were made available to average households. The ready-made garment industry marked its beginning in America history in the early eighteenth century. The first clothing factory was established in 1831 in New York City. Ready-made clothing, however, remained a small part of the American garment production which was still dominated by home-made clothing. New York rapidly became the center for ready-made garment trade because of its regular shipping connections with southern states. The Civil War brought in demand for soldier's uniforms and this increased production and led to the introduction of standardized sizes. This period also marked a substantial technical change in the mode of manufacture of garments. Sewing machines were introduced into the manufacturing sector and the shift moved from manual to machine labor. This important technical innovation also paved way for mass production of clothing in the industry. Between 1880 and 1920, over 2 million Jews migrated to America to escape persecution in their home countries and to take advantage of the economic opportunities in America. Their skills as artisans and factory laborers became important assets in their adopted homeland. The sheer concentration of Jewish immigrants within the industry helped shape the American garment industry, especially in New York. From the middle of the nineteenth century to the end of the twentieth, the garment industry was the largest manufacturing industry in New York City. By 1900, Eastern European Jews constituted a majority of both workers and employers within the industry. One of the many accomplishments of the Jewish contractors was the priority given to ethnic ties in the industry, as they hired mostly members from their own community. The Jewish immigrants built the New York based garment business into a billion dollar industry. By 1900, ready-made clothing was within reach of the average working family as well. Distribution was handled through a network of department stores and shops across the country. The stores offered a wide range of goods that catered to a broad spectrum of customers. Special sales, newspaper advertisements and window displays worked to entice customers. Mail order catalogues were introduced to reach customers in small towns (yumuseum.org). Followed closely behind the Jews, in flooding the garment industry, were Italians, especially Italian women. On the one hand, they worked in large, modern shirtwaist factories and on the other, they made up approximately 98 percent of the home workers within the industry (Soyer, 2005). The garment industry also played a crucial role in shaping the American labor movement. Many of the rights taken for granted by workers today were fought for by the garment unions. Concepts of such significance today, such as arbitration and collective bargaining, emerged out of the struggles of the then garment unions (yumuseum.org). By the second decade of the twentieth century, workers formed unions that became powerful forces within the indus
Sunday, October 27, 2019
Steganography: Uses, Methods, Tools and Examples
Steganography: Uses, Methods, Tools and Examples Steganography by Mohammed Almintakh ABSTRACT This paper talks about steganography, steganography is the art or hiding data within a medium without letting others to know about that data is exsisting. I will go through an introduction about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own good. This topic surprisingly is new for most of people who read its name , ill try to simplify the idea of this approach as much as possible. 1. Introduction Steganography is the art of hiding a message. The purpose of steganography is to hide a message from a someone you donââ¬â¢t want to see it. It is different than cryptography, the art of secret writing, which is intended to make a message cannot be read , but does not hide the existence of the secret communication. Although steganography differs from cryptography, there are many analogies between the two, and some authors classify steganography as a form of cryptography since hidden communication is a type of secret writing. Steganography works by changing bits of useless or bot usedà data in regular computerà filesà (such as graphics, sound, text,à HTML) with bits of different, invisible information. This hidden information can beà plain text,à cipher text, or even images. 2. Steganography Background: Information hiding is related to two fields, Steganography and watermarking. There are three main aspects for information hiding, capacity, security, and robustness. Capacity means the amount of information that can be hidden, security refers to the unability of an eavesdropper to detect hidden information, and robustness to the amount of modification the cover medium can resist before the hidden information is corrupted. In general, information hiding goes through these processes: 1. Identification of redundant bits in a cover medium. Redundant bits are those bits that can be edited without taking care of the quality of the cover medium. 2. Then, we select a subset of the redundant bits to be replaced with data from a private message. The stage medium is created by replacing the selected redundant bits with message bits. The modification of redundant bits can change the statistical properties of the cover medium. As a result, statistical analysis may reveal the hidden content. 3. Uses of Steganography Steganography means of storing data in a way that it hides the existence of them. Steganography used to carry out hidden exchanges .For example, Governments are interested in two types of communication of hidden data: first, which supports national security and second, which does not. Steganography support both types, also business have similar concerns, about trade secrets for new technologies or products information. Of course, using steganography to communicate greatly reduces the risk of information leakage. Businesses takes advantage of another form of steganography, called watermarking. Watermarking is mainly used to identify and entails hidden unique part of information within a medium without touching the medium. For example , letââ¬â¢s say that I have design an image , with that image , I have embedded a watermark that identifies me as the one who created this image, later on , when this image is spread with people , I can later identify myself as the creator and I can of course prove that I am the owner of this. This approach is used by companies for the copyrighted digital media a lot for the purpose of protection. Also, steganography enhances the privacy individually, although it is not a substitute for encryption, of course this is effective only if the hidden embedded information is not detected. If the communication is almost never exists, this will becomes so private to be caught. Like many tools, steganography: 1. Steganography can be a way which makes it possible to send news and information without being censored and without the fear of the messages being intercepted and traced back to us. 2. It is also possible to simply use steganography to store information on a location. For example, several information sources like our private banking information, some military secrets, can be stored in a cover source. When we are required to unhide the secret information in our cover source, we can easily reveal our banking data and it will be impossible to prove the existence of the military secrets inside. 3. Steganography can also be used to implement watermarking. Although the concept of watermarking is not necessarily steganography, there are several steganography techniques that are being used to store watermarks in data. The main difference is on intent, while the purpose of steganography is hiding information, watermarking is merely extending the cover source with extra information. Since people will not accept noticeable changes in images, audio or video files because of a watermark, steganography methods can be used to hide this. 4- Steganographic Methods: The formula below describes the process of steganography as discussed above: cover_medium + hidden_data + stego_key = stego_medium The explanation of this formula is, The cover medium refers to the file that we are going to put our information on it. Hidden data obviously is the data we want to keep secret. An encryption advanced which is a choice for us. The result shall be a stego medium , which is the same file as the cover medium. The easiest way to hide the data in an image , is called LSB(least significant bit) insertion. Figure 1: shows a common taxonomy of steganographic techniques. 5. Steganography Tools: Aà steganographyà software tools allows a user to attach hidden data in a carrier file, such as an image or video, and sometimes it could be an audio , and later take off that data. It is not necessary to hide the message in the original file at all. Thus, it is not necessary to edit the original file and thus, it is hard to detect nothing. If a given part of the message is subjected to successive bitwise manipulation to generate the cyphertext, then there is no evidence in the original file to show that it is being used by a third party. to encrypt a file. An example of this method is described in a self-published science fiction novel. In that example a file is encrypted using a 1949 photo from a digital archive of National Geographic magazine. 6. Steganography Example: There are software that preform steganography, some of well knows programs are : Hide4PGP (http://www.heinz-repp.onlinehome.de/Hide4PGP.htm) MP3Stego (http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/) Stash (http://www.smalleranimals.com/stash.htm) Steganos (http://www.steganos.com/english/steganos/download.htm) S-Tools (available fromhttp://www.webattack.com/download/dlstools.shtml) 7- Describing a tool of Steganography and how it works: Take a look on this picture Figure 2: Stego picture This picture looks ok , nothing suspicious , nothing wrong with it , but in reality it has a hidden message. If you use a software tool to analyze the pictures , this result will come up: Figure 3: QuickStego program Basically , this technique is done by these steps below : Figure 4: Steganography process 8- Deep knowledge of Steganography: Steganography comes from the Greek words for ââ¬Å"covered writingâ⬠.It is the practice of disguising the existence of a message.Generally, innocent looking carriers, e.g., pictures, audio, video, text, etc. that hold the hidden information The combination of hidden data-plus-cover is known as the stego-object Stegokey An additional piece of information, such as a password or mathematical variable, required to embed the secret information Typical Scenario Sender Sender Hides Secret Message In a Cover Using a Stegokey Transmitted Carrier Appears Innocuous Receiver Decodes Secret Message by Removing the Cover Using the Stegokey Receiver Reads Secret Message 9.Steganography and Security As noted above , steganography is an effective and efficient way of hiding data, it is just protecting the data from the unauthorized or unwanted interception. But stego is merely one of many methods to defend the confidentiality of data. It is probably the best used in integration with another data-hiding method. When used in collection, these ways can all be a part of a layered security mechanism. Some good complementary methods include: Encryption-à Encryptionà is the operation of crossing data or plaintext through a series of mathematical processes that generate an alternate form of the original text known as ciphertext. The encrypted text can only be read by one who have been given the proper key to decrypt the ciphertext back into its original plaintext form. Encryption doesnt hide data, but it does make it difficult to read! Hidden directories (Windows)- Windows provides this feature, which allows users to hide files. Using this mechanism is as easy as changing the characteristics of a directory to hidden, and hoping that no one can view all types of files in their explorer. Hiding directories (Unix)- in current directories that have a lot of files, such as in the /dev directory on a Unix implementation, or making a directory that starts with three dots () versus the normal single or double dot. Covert channels- Some tools can be used to transfer important data in seemingly normal network traffic. One such tool that does that is Loki. Loki is a tool that hides data in ICMP traffic (like ping). 10.à Steganography vs. Encryption The goal of steganography is to not keep others know the hidden information, of cource , to keep others from thinking that the information even exist.if a method of steganography causes someone to suspect the medium which carries the data , then the method has failed. Encryption and Steganography achieve separate goals, encryption is changing the meaning of the message so it cannot be read, steganography does not change the meaning or change the data to make it unusable or unintended, rather, it prevents the third party from suspecting that there is a communication or data even exists. For these people who want to reach ultimate in security or privacy , can combine both approaches , encryption and steganography. Encrypted data is difficult to be differentiate from normal occurring phenomena than a normal plain text (which is a raw text) in the medium, there are several steganography tools that can encrypt data before hiding them in a chosen medium. Steganography should not be confused with encryption .Encryption disguises the content of a message. The existence of the message is usually obvious.Steganography disguises the existence of the message .However, additional security can be obtained if steganography is combined with encryption. 11. Steganalysis and its techniques: Steganalysis , is the counter measure of steganography, is the art of detecting that there is a steganography exists , or a decoded data within a medium. There are two main major tools in Steganalysis, information theory and statistical analysis. Mainly , this reveals clearly the tremendous potential for hidden information in the interner data of course as long as a set of data can be compressed to smaller sizes.there should be a space for hidden data within the medium. Steganalysis can be classified in a similar way as cryptanalysis methods, largely based on how much prior information is known : Steganography-only attack: The steganography medium is the only item available for analysis. Known-carrier attack: The carrier and steganography media are both available for analysis. Known-message attack: The hidden message is known. Chosen-steganography attack: The steganography medium and algorithm are both known. Chosen-message attack: A known message and steganography algorithm are used to create steganography media for future analysis and comparison. Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known. 12. Method of Steganography: A lot of methods are available for digital Steganography. But exploiting the lenient constraints of a file formats is the most famous one. There are a lot of softwares that uses this technique. a- Image as carriers: One of the ways to hide data is using images , which is a good method. The difficulty to reveal the data hidden increases with the detailed in an image, and that makes it harder to guess or to suspect that image. JPHIDE/JPSeek is a package that uses the coefficients to hide the information. (http://linux01.gwdg.de/~alatham/stego.html). There was a new method of that , that embeds data in visually insignificant parts of an image. These both methods modify the image. The user however can explore image degradation with different messages and images of different length. Another way is for GIF images, is to modify an imageââ¬â¢s palette for hiding its data. Gifshuffle, which is a tool , that doesnââ¬â¢t modify the image itself, in any visible way. It permutes a GIF imageââ¬â¢s color map, that will leave the original image completely intact. b- Audio File Carriers: A lot of packages also available for embedding and hiding data in the audio files. One of the tools for audio file hiding stego is the MP3Stego,which does not only hide information effectively , of cource arbitrary, rather also claims to be partly strong method of watermarking the targeted MP3 audio files. The WAV formal , which stands for Wavaform Audio File Format, is a Microsoft audio format which mainly windows depends on, however, this format lets users hide data using StegoWave or Steghide (http://www.radiusnet.net/crypto/steanography/Java/stegowav.zip) (http://steghide.sourceforge.net/). These sites refer to both programs in order. Steghide modifies the LSB of data to be transmit in the carrier medium. Using an audio file as a medium is less popular than using an image as a steganography medium. c- Data Ordering: The data ordering which does not have ordering constrains, is usually a very good method of steganography. Each change of a group of objects could be pointed to a positive integer. pointing can then be used to encode the hidden data by modifying the sequence of objects that are not considered in ordered by the carrier medium. While this technique mainly, does not change the information quality, the data which are hidden can of course easily get lost if the medium is encoded again. For example, if we have a GIF which its color map consist of hidden data, we could then open the GIF in our favorite graphics-editing tool package that will be used , and save it again. Visually, the result will be both identical , from the original file to the second file, but the ordering of the color map may have been lost. 13. Limitations: Steganography is limited just like that encryption is, if bob wants to send an image with a hidden message to alice , he have to first agree secretly with alice on a way of steganography. Underneath the encryption model , alice can be fairly sure when she has got some ciphertext. Let us have a scenario about alice ,when she wants to borrow bobs camera and neglects to tell him to be careful for every 73rd byte in the images she sends him.Bobs will be ignorant of Aliceââ¬â¢s steganography efforts. The chanses that bob will let alice borrow his digital camera will decrease the large number of pictures he will receive from her.The amount of data that could be effectively hidden in a medium is heading to be limited by the size of the medium itselt. The less limitations that exist on the integrity of the medium, the more potential it has for hiding data. 14. Conclution I have briefly explained and defined steganography , which is in my opinion an effective tool to do so many things regarding security or reliability in any field of communication .what I mean that , this technique can be used in any section in real life, military , businesess, educational , governments and more.Also , I have shown varous tools and how they function well. 15- References: 1- Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 75-80. 2- Provos, N., Honeyman, P. (2012). Detecting Steganographic Content on the Internet. 3- Classification of Hiding Techniques Ref: F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, ââ¬Å"Information Hiding A Survey,â⬠in Proc. Of the IEEE , vol. 87, No. 7, July 1999, pg. 1063 Kessler, G. (2001, September 11). Steganography: Hiding Data Within Data. Retrieved December 6, 2014, from http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/fsc_stego.html Kessler, G. (2004, February 2). An Overview of Steganography for the Computer Forensics Examiner. Retrieved December 6, 2014, from http://www.garykessler.net/library/fsc_stego.html http://www.symantec.com/connect/articles/steganography-revealed http://en.wikipedia.org/wiki/Steganography#Network http://www.webopedia.com/TERM/S/steganography.html http://quickcrypto.com/free-steganography-software.htm
Subscribe to:
Posts (Atom)