Understanding Techniques for Hiding and Scrambling Information
February 22nd, 2023 (CST)
ITM Department, Illinois Institute of Technology, USA
Dr. Omar’s Academic career has consistently focused on applied, industry-relevant cyber security, Data Analytics, machine learning, application of AI to cyber security and digital forensics research and education that delivers real-world results. He brings a unique combination of industry experience as well as teaching experience gained from teaching across different cultures and parts of the world. He has an established self-supporting program in machine learning application to cyber security. He has established a respectable research record in AI and cyber security exemplified in the dozens of published papers and book chapters that have gained recognition among researchers and practitioners (more than 272 Google scholar citations thus far). He is actively involved in graduate as well as undergraduate machine learning education including curriculum development and assessment.
Dr. Omar has recently published two books with Springer on Machine Learning and Cyber Security and has also published research with IEEE conference on Sematic Computing. Additionally, Dr. Omar holds numerous industry certifications including Comptia Sec+, ISACA CDPSE, EC-Council Certified Ethical Hacker, and SANS Advanced Smartphone Forensics Analyst.
Dr. Omar has been very active and productive in both academia as well as the industry and he is currently serving as an associate professor of cyber security at Illinois Institute of Technology.
A workshop on techniques for hiding and scrambling information would typically focus on methods for making information difficult to access or understand for unauthorized users while still allowing authorized users to access it.
The need for such techniques arises in various scenarios, including information security, privacy protection, and intellectual property protection. For example, in information security, sensitive information such as financial data or personal information needs to be protected from unauthorized access or theft. In privacy protection, individuals may want to hide or scramble personal information to prevent identity theft or other privacy violations. In intellectual property protection, companies may want to hide or scramble trade secrets or proprietary information from competitors.
The workshop may cover a range of topics related to hiding and scrambling information, including encryption, steganography, watermarking, and obfuscation techniques. Encryption involves transforming plaintext into ciphertext using an algorithm and a key, making it unreadable without the key. Steganography involves hiding information within other information, such as embedding text within an image or audio file. Watermarking involves adding a unique identifier to a digital file to prove ownership or authenticity. Obfuscation techniques involve intentionally making code or information difficult to understand or reverse-engineer.
Participants in the workshop may include information security professionals, privacy advocates, cryptography researchers, software developers, and other experts in related fields. The workshop may consist of presentations, hands-on exercises, and discussions of best practices and real-world applications. By the end of the workshop, participants should have a better understanding of various techniques for hiding and scrambling information and how to apply them to their specific needs.
The goal of a workshop on techniques for hiding and scrambling information is to provide participants with knowledge and skills related to various methods for protecting sensitive or valuable information from unauthorized access or theft. By learning about encryption, steganography, watermarking, and obfuscation techniques, participants can better understand how to protect their own data or the data of their clients or organizations.
The workshop may also have the aim of promoting discussion and collaboration among experts in the field of information security, privacy protection, and intellectual property protection. Through hands-on exercises and discussions of best practices, participants can learn from each other and share their experiences and insights. Ultimately, the goal of the workshop is to improve the overall level of understanding and expertise in the area of information protection and to provide participants with practical tools and techniques that they can apply in their work.
Scope and Information for participants
1. The scope of a workshop on techniques for hiding and scrambling information would typically cover various methods and technologies for protecting information from unauthorized access or theft. This would include:
2. Encryption: The workshop may cover the basics of encryption, including symmetric and asymmetric key algorithms, hashing functions, and digital signatures. Participants may learn how to implement encryption in their own applications or systems and understand the strengths and weaknesses of different encryption methods.
3. Steganography: The workshop may cover the principles of steganography, including how to embed hidden messages within digital media such as images, videos, or audio files. Participants may learn how to detect and prevent steganography in their own systems or applications.
4. Watermarking: The workshop may cover the principles of digital watermarking, including how to add a unique identifier to a digital file to prove ownership or authenticity. Participants may learn how to apply watermarking techniques to protect their own digital assets or verify the authenticity of digital media.
5. Obfuscation: The workshop may cover the principles of code or data obfuscation, including how to intentionally make code or information difficult to understand or reverse-engineer. Participants may learn how to apply obfuscation techniques to protect their intellectual property or proprietary information.
Overall, the workshop aims to provide participants with practical tools and techniques that they can apply in their work to better protect sensitive or valuable information from unauthorized access or theft, thereby enhancing their ability to ensure the security, privacy, and intellectual property rights of themselves, their clients, or their organizations.
ITMS-438-01 on 2/22/2023 (Wed) (panopto.com)
Illinois Institute of Technology, 10 W 35th St, Chicago, IL 60616
In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. This page just gave some general information of the visa application.
The B-1/B-2 visitor visa is for people traveling to the United States temporarily for business (B-1) or for pleasure or medical treatment (B-2). Generally, the B-1 visa is for travelers consulting with business associates; attending scientific, educational, professional, or business conventions/conferences; settling an estate; or negotiating contracts. The B-2 visa is for travel that is recreational in nature, including tourism; visits with friends or relatives; medical treatment; and activities of a fraternal, social, or service nature. Often, the B-1 and B-2 visas are combined and issued as one visa: the B-1/B-2.
If you apply for a business/tourist visa, you must pay your $160 application fee and submit the following:
In addition to these items, you must present an interview appointment letter confirming that you booked an appointment through this service. You may also bring whatever supporting documents you believe support the information provided to the consular officer.
Should your application be denied, the organizing committee cannot change the decision of visa officer, nor will CONF-CIAP engage in discussion or correspondence with the visa application center on behalf of the applicant. The registration fee CANNOT be refunded when the VISA application of individual being denied.