1,174 research outputs found

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Big Data Security (Volume 3)

    Get PDF
    After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

    Secure-Medishare: A Comprehensive Secure Medical Data-Sharing System Using Blockchain, Watermarking, Steganography, And Optimized Hybrid Cryptography

    Get PDF
    Medical data plays a crucial role in healthcare, enabling accurate diagnosis, treatment planning, and research. However, the secure sharing of sensitive medical data and images remains a significant challenge. Existing techniques often fall short in terms of protecting data integrity, confidentiality, and authenticity. To address these limitations, this paper introduces Secure-Medishare, a novel secure medical data-sharing system that integrates blockchain technology, watermarking, steganography, and enhanced cryptography. The proposed Secure-Medishare system aims to provide robust security mechanisms for medical data sharing. Unlike centralized systems, which are susceptible to single points of failure and unauthorized access, Secure-Medishare utilizes blockchain technology to ensure decentralized and tamper-resistant storage and sharing of medical data. Secure-Medishare employs watermarking for data integrity and authentication and steganography for confidential transmission of metadata, ensuring authenticity, privacy, and confidentiality of medical data. Furthermore, an optimized hybrid cryptography technique is implemented to secure the transmission and storage of medical data, safeguarding confidentiality and privacy. Secure-Medishare offers several advantages over existing techniques. It provides enhanced security and privacy protection, efficient data sharing and retrieval, and improved trust among healthcare providers. The system ensures the integrity and authenticity of medical data, preventing unauthorized modifications or tampering. Additionally, the decentralized nature of blockchain technology reduces the risk of data breaches and single points of failure. Experimental results show that Secure-Medishare generates hashes quickly, taking only 65 milliseconds for 100 blocks. Optimized hybrid cryptography used in Secure-Medishare also outperforms other cryptography combinations, with encryption and decryption times of 5.635 seconds for 96-bit data. These findings highlight the efficiency and effectiveness of Secure-Medishare for secure medical data and image sharing. The experimental evaluation confirms that Secure-Medishare is a reliable and robust solution for secure medical data sharing in healthcare environments

    The Serums Tool-Chain:Ensuring Security and Privacy of Medical Data in Smart Patient-Centric Healthcare Systems

    Get PDF
    Digital technology is permeating all aspects of human society and life. This leads to humans becoming highly dependent on digital devices, including upon digital: assistance, intelligence, and decisions. A major concern of this digital dependence is the lack of human oversight or intervention in many of the ways humans use this technology. This dependence and reliance on digital technology raises concerns in how humans trust such systems, and how to ensure digital technology behaves appropriately. This works considers recent developments and projects that combine digital technology and artificial intelligence with human society. The focus is on critical scenarios where failure of digital technology can lead to significant harm or even death. We explore how to build trust for users of digital technology in such scenarios and considering many different challenges for digital technology. The approaches applied and proposed here address user trust along many dimensions and aim to build collaborative and empowering use of digital technologies in critical aspects of human society

    Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data

    Full text link
    In a traditional cloud storage system, users benefit from the convenience it provides but also take the risk of certain security and privacy issues. To ensure confidentiality while maintaining data sharing capabilities, the Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme can be used to achieve fine-grained access control in cloud services. However, existing approaches are impaired by three critical concerns: illegal authorization, key disclosure, and privacy leakage. To address these, we propose a blockchain-based data governance system that employs blockchain technology and attribute-based encryption to prevent privacy leakage and credential misuse. First, our ABE encryption system can handle multi-authority use cases while protecting identity privacy and hiding access policy, which also protects data sharing against corrupt authorities. Second, applying the Advanced Encryption Standard (AES) for data encryption makes the whole system efficient and responsive to real-world conditions. Furthermore, the encrypted data is stored in a decentralized storage system such as IPFS, which does not rely on any centralized service provider and is, therefore, resilient against single-point failures. Third, illegal authorization activity can be readily identified through the logged on-chain data. Besides the system design, we also provide security proofs to demonstrate the robustness of the proposed system.Comment: 23 pages, 19 algorithms, 1 figur

    Zephyrus: An information hiding mechanism leveraging Ethereum data fields

    Get PDF
    Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a particular blockchain technology called Bitcoin. However, Ethereum cryptocurrency is gaining momentum as a means to build distributed apps. The novelty of this paper relies on the use of Ethereum to establish a covert channel considering all transaction fields and smart contracts. No previous work has explored this issue. Thus, a mechanism called Zephyrus, an information hiding mechanism based on steganography, is developed. Moreover, its capacity, cost and stealthiness are assessed both theoretically, and empirically through a prototype implementation that is publicly released. Disregarding the time taken to send the transaction to the blockchain, its retrieval and the mining time, experimental results show that, in the best case, 40 Kbits can be embedded in 0.57 s. for US$ 1.64, and retrieved in 2.8
    • …
    corecore