scispace - formally typeset
Search or ask a question

Showing papers on "Cover (telecommunications) published in 2014"


Patent
05 May 2014
TL;DR: A real-time automated data security system as mentioned in this paper protects both data and devices from loss, theft, and unauthorized access or activity, which is independent of electricity, GPS, satellites, the Internet, other software, and IT personnel.
Abstract: A real-time automated data security system protects both data and devices from loss, theft, and unauthorized access or activity. A miniature active RFID circuit is embodied in tags, area tags, controllers, USB sticks and a universal interface software for computers (i.e., Java), smart phones, and gateway boxes written to interface with the system. These devices are customizable and can link in arrays to cover large areas, use sensors, and scale up in module configurations to meet any need. The system is independent of electricity, GPS, satellites, the Internet, other software, and IT personnel. Its novel software, inside the tags, area tags and controllers is inaccessible and cannot be copied. Wireless transmissions are encrypted to military grade levels and packets are never repeated, making it unhackable, even by brute force attack. A unique battery-conserving protocol ensures good range and long battery life. The system has the ability to ignore copied packages or relaying by attackers, and to prevent of unauthorized access to USB sticks by proximity checks to the active RFID circuit.

200 citations


01 Jan 2014
TL;DR: A Hash based least significant bit technique for video steganography has been proposed whose main goal is to embed a secret information in a particular video file and then extract it using a stego key or password.
Abstract: The Hash Based Least Significant Bit Technique For Video Steganography deals with hiding secret message or information within a video.Steganography is nothing but the covered writing it includes process that conceals information within other data and also conceals the fact that a secret message is being sent.Steganography is the art of secret communication or the science of invisible communication. In this paper a Hash based least significant bit technique for video steganography has been proposed whose main goal is to embed a secret information in a particular video file and then extract it using a stego key or password. In this Least Significant Bit insertion method is used for steganography so as to embed data in cover video with change in the lower bit.This LSB insertion is not visible.Data hidding is the process of embedding information in a video without changing its perceptual quality. The proposed method involve with two terms that are Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE) .This two terms measured between the original video files and steganographic video files from all video frames where a distortion is measured using PSNR. A hash function is used to select the particular position for insertion of bits of secret message in LSB bits.

72 citations



Patent
Hee-Cheul Moon1, Andrew T. Kim1
22 Jan 2014
TL;DR: In this paper, an electronic device includes a connector detachable from part of an electronic devices including a display, and a cover connected to the connector, wherein the cover is capable of covering at least part of the display of the electronic device.
Abstract: An electronic device is provided. The electronic device includes a connector detachable from part of an electronic device including a display, and a cover connected to the connector, wherein the cover is capable of covering at least part of the display of the electronic device, and wherein the cover includes a window configured to expose the at least part of the display when the cover covers at least part of the display.

47 citations


Proceedings ArticleDOI
18 Jun 2014
TL;DR: This tutorial explores the space of designs studied in prior work on processing queries over encrypted data and discusses the privacy challenges that arise in both classic client-server and involving the use of a trusted hardware module where data can be securely decrypted.
Abstract: Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot "learn" anything about the encrypted columns, since she does not have access to the encryption key. However, query processing becomes a challenge since it needs to "look inside" the data. This tutorial explores the space of designs studied in prior work on processing queries over encrypted data. We cover approaches based on both classic client-server and involving the use of a trusted hardware module where data can be securely decrypted. We discuss the privacy challenges that arise in both approaches and how they may be addressed. Briefly, supporting the full complexity of a modern DBMS including complex queries, transactions and stored procedures leads to significant challenges that we survey and open problems which we highlight.

44 citations


Patent
27 Feb 2014
TL;DR: In this paper, a front cover is configured to couple with a rear cover to define a volume for receiving a mobile electronic communication device, the front cover having an aperture aligned with the user input interface when the mobile electronic communications device is received in the volume; a transparent membrane provided between the front covers and the rear cover, the transparent membrane configured to provide a seal between the transparent membranes and the front covering when the MEC device was received in a volume, and a compressible member arranged between the cover and the membrane and separate from the cover.
Abstract: A protective case for a mobile electronic communication device having a user input interface includes a front cover configured to couple with a rear cover to define a volume for receiving the mobile electronic communication device, the front cover having an aperture aligned with the user input interface when the mobile electronic communication device is received in the volume; a transparent membrane provided between the front cover and the rear cover to be disposed over the user input interface when the mobile electronic communication device is received in the volume; and a compressible member arranged between the front cover and the membrane and separate from the front cover, the transparent membrane configured to provide a seal between the transparent membrane and the front cover when the mobile electronic communication device is received in the volume and the front cover is coupled to the rear cover.

44 citations


Patent
22 Aug 2014
TL;DR: In this paper, a cover member of an electronic device is provided, which includes covers hingedly connected, wherein each cover includes a power receiving member configured to wirelessly receive power.
Abstract: A cover member of an electronic device is provided. The cover member includes covers hingedly connected, wherein each cover includes a power receiving member configured to wirelessly receive power.

39 citations


Patent
20 Aug 2014
TL;DR: In this paper, the authors described a wireless charging device with an upper cover covering an upper surface of the housing, screw holes formed on one surface thereof, magnets inserted into the screw holes to overlap the screws, and a pad disposed to cover the upper cover, the pad having a terminal mounting surface.
Abstract: A wireless charging device disclosed herein includes a housing having a wireless charging module mounted therein, an upper cover covering an upper surface of the housing, the upper cover having screw holes formed on one surface thereof, screws inserted into the screw holes to couple the housing and the upper cover to each other, magnets inserted into the screw holes to overlap the screws, and a pad disposed to cover the upper cover, the pad having a terminal mounting surface.

36 citations


Journal ArticleDOI
28 Feb 2014
TL;DR: A new technique proposed with the combination of cryptography and steganography enhanced with new secure feature for generating a new security system is introduced in applications such as transferring secret data that can be authentic at ion of various fields.
Abstract: A new technique proposed with the combination of cryptography and steganographyenhanced with new secure feature for generating a new security system.Cryptography and Steganography are two popular ways for secure data transmission in which the former distortsa message so it cannot be understood and another hides a message so it cannot be seen . In cryptography, this system is used advanced encryption standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be introduced in applications such as transferring secret data that can be authenticat ion of various fields.

32 citations


Journal ArticleDOI
TL;DR: An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed that can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content.
Abstract: Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

25 citations


Patent
24 Dec 2014
TL;DR: In this paper, a video cover generating method is proposed, which divides a target video into video clips and selects a preset amount of video images as pictures to be selected from the video clips.
Abstract: An embodiment of the invention discloses a video cover generating method. The video cover generating method includes dividing a target video into video clips, selecting a preset amount of video images as pictures to be selected from the video clips, and generating a video cover of the target video according to the pictures to be selected, wherein the video cover of the target video comprises at least two of the pictures to be selected. The embodiment of the invention further discloses a video cover generating device and a terminal. By the aid of the video cover generating method, the video cover generating device and the terminal, video cover display effect is optimized.

Patent
Hun-Cheol Oh1, Soo-Hyung Kim1
24 Jan 2014
TL;DR: In this paper, a method for operating an electronic device including an electronic cover device is presented, which includes coupling the electronic cover devices to the electronic device, determining a type of the electronic COVER device, and setting an interface based on the type of electronic COVER devices.
Abstract: A method for operating an electronic device including an electronic cover device is provided. The method includes coupling the electronic cover device to the electronic device, determining a type of the electronic cover device, and setting an interface based on the type of the electronic cover device.

Patent
22 Oct 2014

Patent
Sung-Joon Won1
04 Sep 2014
TL;DR: In this paper, a controller is used to detect whether a display screen is covered with one or more parts of a cover covering the display unit, and to perform a predetermined function if the display screen was covered with the cover.
Abstract: An electronic device, a cover of the electronic device, and a method of performing a function in the electronic device is provided. The electronic device includes a display unit configured to display information and a controller configured to detect whether a display screen is covered with one or more parts a cover covering the display unit, and to perform a predetermined function if the display screen is covered with the one or more parts of the cover. Another embodiment may be implemented at any amount.

01 Jan 2014
TL;DR: Comparison of the proposed method with an existing technique shows that proposed technique is capable of providing better quality stego-images even if the payload is slightly more, and 3dB increase in PSNR in case of proposed technique substantiates the argument.
Abstract: A spatial domain hiding technique based on Intermediate Significant Bit (ISB) embedding and pixel adjustment has been investigated and presented in this paper. The data has been embedded in the cover image at the locations pointed to by Pseudorandom Address Vector (PAV). The image quality deterioration of the stego-image has been taken care of using pixel adjustment technique. The pseudorandom embedding of data enhances the security of the hiding scheme. The comparison of our method with an existing technique shows that proposed technique is capable of providing better quality stego-images even if the payload is slightly more. A 3dB increase in PSNR in case of proposed technique substantiates the argument.

Proceedings ArticleDOI
20 Mar 2014
TL;DR: A new approach of using a new kind of number system for Steganography through a directed weighted graph cover media is introduced.
Abstract: In today's world the art of sending & displaying hidden information especially in public places, has received much attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in various cover media. Steganography is the method to hide a message inside another message without drawing any suspicion to others so that the message can only be detected by its intended recipient. With other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents a new approach for steganography where introduced a new approach of using a new kind of number system for Steganography through a directed weighted graph cover media.

Patent
12 Mar 2014
TL;DR: A mobile device case or cover can include a display module that can display notifications or other useful data to users as discussed by the authors, which can communicate wirelessly with the mobile device to obtain notifications.
Abstract: A mobile device case or cover can include a display module that can display notifications or other useful data to users. The display module can communicate wirelessly with the mobile device to obtain notifications. In addition, in some embodiments, the display module can communicate with a secondary mobile device (such as a phone in a user's pocket) to obtain notifications or other data.

Proceedings ArticleDOI
26 May 2014
TL;DR: This paper proposes a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method and compares the performance of the approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR).
Abstract: With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of the researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape. The dimensions of the geometric shape are variable pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR). The contribution of our approach was immensely impressive.

Patent
Li-Wen Tien1
23 Sep 2014

Proceedings ArticleDOI
01 May 2014
TL;DR: A new scheme for digital audio steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio, providing high audio quality, robustness and lossless recovery from the cover Audio.
Abstract: Steganography is the art and science of secret communication. In this paper a new scheme for digital audio steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion of a secret bit is selected from the 0th (Least Significant Bit) to 7th LSB based on the upper three MSB (Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the cover Audio.

Patent
Hao Xu1, Wanshi Chen1, Tingfang Ji1
16 Apr 2014
TL;DR: In this paper, the authors propose methods and apparatus for signaling information via the selection of resources used for an uplink transmission, which may include selecting one or more cyclic shifts or orthogonal cover codes.
Abstract: Certain aspects of the present disclosure propose methods and apparatus for signaling information via the selection of resources used for an uplink transmission. The aspects may include selecting one or more cyclic shifts or orthogonal cover codes used to transmit an uplink channel. The one or more cyclic shifts or orthogonal cover codes may be selected to convey information. The information may be conveyed by transmitting the uplink channel using the selected cyclic shifts or orthogonal cover codes.

01 Jan 2014
TL;DR: Existing important image steganography techniques like Least Significant Bit (LSB), Pixel Value Differencing (PVD), and Modified Kekre Algorithm (MKA) etc. are discussed.
Abstract: Steganography is hiding the secret data into a cover object to protect it from unauthorized access. It is a technique of invisible communication which hides the existence of the message. If the cover object used is an image, the steganography is known as image steganography. It has many applications like Online transactions, military communication etc. In this paper we are discussing Existing important image steganography techniques like Least Significant Bit (LSB), Pixel Value Differencing (PVD), and Modified Kekre Algorithm (MKA) etc.

Journal ArticleDOI
TL;DR: During this year's World Cup, several innovative IT applications were deployed for the first time, reshaping how officials make decisions, how broadcasters cover live events, and how fans immerse themselves in the game.
Abstract: During this year's World Cup, several innovative IT applications were deployed for the first time, reshaping how officials make decisions, how broadcasters cover live events, and how fans immerse themselves in the game.

Proceedings ArticleDOI
27 Mar 2014
TL;DR: A Steganographic scheme using Sudoku puzzle so that nobody could be able to modify the cover image during transmission as well as the message is embedded using a Sudoku reference matrix.
Abstract: The word `Steganography' is derived from Greek words `stegos' meaning `cover' and `graphia' meaning `writing'. Steganography conceptually implies that the message to be transmitted is not visible to the normal eye. It is an art of hiding information inside a medium. The main objective of Steganography is mainly concerned with the protection of contents of the hidden information. A message in cipher text may arouse suspicion while an invisible message is not. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. In this paper, we have proposed a Steganographic scheme using Sudoku puzzle. The novelties of the work lies that nobody could be able to modify the cover image during transmission as well as the message is embedded using a Sudoku reference matrix.

Patent
03 Dec 2014
TL;DR: The smart well cover card can monitor the opening state of a well cover and the water level condition in a well, and the warning information processed by the MCU module is uploaded to the server over the cloud through the wireless gateway.
Abstract: The utility model provides a smart well cover monitor system, comprising a smart well cover card, a wireless gateway, a network, a server and hand-held equipment. The smart well cover card comprises an MCU module, a displacement detection module, a water level detection module, a wireless communication module, a power supply module and an RFID module. The smart well cover card can monitor the opening state of a well cover and the water level condition in a well. Warning information processed by the MCU module is uploaded to the server over the cloud through the wireless gateway. The server is a city well cover monitor platform server which provides unified monitor and management of well covers in an area under administration. The smart well cover monitor system prevents shift and loss of well covers of city streets, and is helpful for eliminating street pits and improving the modern management level of a city.

Patent
22 Jul 2014
TL;DR: In this paper, a wireless power receiver for charging a chargeable device is described, which includes a plurality of receiving antennas disposed on a cover of the chargeable devices, wherein at least one of the plurality of receive antennas is configured to wirelessly receive power according to a wireless charging protocol different from one other of the receive antennas.
Abstract: Systems and methods for converting voltages between different voltage levels in a receiver are disclosed. In an aspect, a wireless power receiver apparatus for charging a chargeable device is provided. The apparatus includes a plurality of receive antennas disposed on a cover of the chargeable device, wherein at least one of the plurality of receive antennas is configured to wirelessly receive power according to a wireless charging protocol different from at least one other of the plurality of receive antennas. The apparatus includes a switching circuit disposed on the cover and configured to receive the wireless power from at least one of the plurality of receive antennas and selectively provide a respective voltage from a corresponding one of the plurality of receive antennas across an output configured to be connected to an input of the chargeable device.

Proceedings ArticleDOI
09 May 2014
TL;DR: A new steganographic technique for secret data communication based on Public Key Digital Image steganography by combining public key cryptography with Digital Image Steganography that provides high Steganographic capacity, faster speed and can prevent visual and statistical attacks.
Abstract: This paper introduces a new steganographic technique for secret data communication based on Public Key Digital Image steganography by combining public key cryptography with Digital Image Steganography. The proposed scheme employs RSA algorithm with 1024 bits key size for secret data encryption before inserting it into cover image and F5 steganographic technique to hide the encrypted message inside the cover image imperceptibly. The F5 algorithm embeds the message into randomly chosen Discrete Courier Transform (DCT) coefficients. By employing matrix embedding which minimizes the changes to be made to the length of certain message, it provides high Steganographic capacity, faster speed and can prevent visual and statistical attacks. The encryption key used in message encryption is big enough to thwart known cryptanalytic attacks. Experiments suggest that the stego image and cover images are perceptually similar. Further, the stego images are robust against image processing distortions.

Posted Content
TL;DR: This paper will discuss few irreversible data hiding techniques and also, some recently proposed reversible data hiding approach using images.
Abstract: Steganography (literally meaning covered writing) is the art and science of embedding secret message into seemingly harmless message. Stenography is practice from olden days where in ancient Greece people used wooden blocks to inscribe secret data and cover the date with wax and write normal message on it. Today stenography is used in various field like multimedia, networks, medical, military etc. With increasing technology trends steganography is becoming more and more advanced where people not only interested on hiding messages in multimedia data (cover data) but also at the receiving end they are willing to obtain original cover data without any distortion after extracting secret message. This paper will discuss few irreversible data hiding techniques and also, some recently proposed reversible data hiding approach using images.

Patent
Yu-Su Kim1, Sung-Jin Park1, Kyu-Suk Lee1
31 Mar 2014
TL;DR: In this paper, a portable electronic device and a flip-type cover of the portable electronic devices are provided, which includes a front cover, a rear cover configured to detachably engage with a rear surface of the device, a connection cover connected between the front cover and the rear cover, and a display screen disposed in front cover.
Abstract: A portable electronic device and a flip-type cover of the portable electronic device are provided. The flip-type cover includes a front cover, a rear cover configured to be detachably engaged with a rear surface of the portable electronic device, a connection cover configured to connect the front cover to the rear cover, a display screen disposed in the front cover, and a rear-cover Printed Circuit Board (PCB) mounted to the rear cover and connected to the portable electronic device, to receive data from the portable electronic device. If the flip-type cover is engaged with the portable electronic device, the rear-cover PCB transmits data received from the portable electronic device to the display screen.

Patent
27 Jan 2014
TL;DR: In this article, a durable, weather resistant, and light weight apparatus for covering a vehicle and providing protection from objects that might strike and damage the exterior surfaces of the vehicle is presented.
Abstract: The present invention includes a durable, weather resistant, and light weight apparatus for covering a vehicle and providing protection from objects that might strike and damage the exterior surfaces of the vehicle. The object of this invention is to provide a vehicle cover which covers both the horizontal and vertical surfaces of a vehicle, which can deployed by a single person, folded for easy deployment, retrieval and storage, and which can be stretched or compressed to fit various sizes of automobiles while maintaining its protective effectiveness.