1
objeto de conferencia
Publicado 2014
Enlace

Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, i...
2
objeto de conferencia
Publicado 2014
Enlace

Steganography is the art of concealing information within different types of media objects such as images or audio files. Its counterpart, Steganalysis, is the study of methods that uncover information in a suspicious file, which has being altered for stego purposes. Its techniques rely on the inspection of changes at the pixel information level. In this paper, we propose a method for Secret-key Steganography that uses a picture to conceal a message with unaltered pixel information, so it would be secure against Steganalysis inspection techniques. This is possible using a technique derived from code obfuscation using random numbers. In summary, we will modify the stego-key transmitted during the communication process, which maps the information in the unaltered cover image. So the original message will be reconstructed by the receiver using the seeds of Pseudo-Random Number Generators, i...
3
documento de trabajo
Publicado 2015
Enlace

Las dificultades a las que los estudiantes se enfrentan y su lucha por dominar los temas, podría aumentar como consecuencia de la inadecuada utilización de materiales de evaluación. Generalmente se encuentran en el aula alumnos que hacen buen uso del material de los cursos y de una manera rápida, mientras que otros presentan dificultades con el aprendizaje del material. Esta situación es fácilmente visto en los resultados de los exámenes, un grupo de estudiantes podrían obtener buenas calificaciones animándoles, mientras que otros obtendrían la mala percepción de que los temas son difíciles, y en algunos casos, obligándolos a abandonar el curso o en otros casos a cambiar de carrera. Creemos que mediante el uso de técnicas de aprendizaje automático, y en nuestro caso la utilización de redes neuronales, sería factible crear un entorno de evaluación que podrían ajustarse ...
4
artículo
Publicado 2015
Enlace

Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; by giving a more robust schema against brute force and shoulder-surfing attacks. In this research paper we present an alternative to a graphical password based on a modification of the Tangram game. We believe our proposal accomplishes the features of being an easy recognition-based system password giving the user enough security against common threats such as brute force attacks by dictionary means or OCR types, as well as shoulder-surfing attacks.
5
artículo
Publicado 2015
Enlace

Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; by giving a more robust schema against brute force and shoulder-surfing attacks. In this research paper we present an alternative to a graphical password based on a modification of the Tangram game. We believe our proposal accomplishes the features of being an easy recognition-based system password giving the user enough security against common threats such as brute force attacks by dictionary means or OCR types, as well as shoulder-surfing attacks.