115 research outputs found
Experimenting with the Novel Approaches in Text Steganography
As is commonly known, the steganographic algorithms employ images, audio,
video or text files as the medium to ensure hidden exchange of information
between multiple contenders to protect the data from the prying eyes. However,
using text as the target medium is relatively difficult as compared to the
other target media, because of the lack of available redundant information in a
text file. In this paper, in the backdrop of the limitations in the prevalent
text based steganographic approaches, we propose simple, yet novel approaches
that overcome the same. Our approaches are based on combining the random
character sequence and feature coding methods to hide a character. We also
analytically evaluate the approaches based on metrics viz. hiding strength,
time overhead and memory overhead entailed. As compared to other methods, we
believe the approaches proposed impart increased randomness and thus aid higher
security at lower overhead.Comment: 13 page
Programmable data gathering for detecting stegomalware
The 'arm race' against malware developers requires to collect a wide variety of performance measurements, for instance to face threats leveraging information hiding and steganography. Unfortunately, this process could be time-consuming, lack of scalability and cause performance degradations within computing and network nodes. Moreover, since the detection of steganographic threats is poorly generalizable, being able to collect attack-independent indicators is of prime importance. To this aim, the paper proposes to take advantage of the extended Berkeley Packet Filter to gather data for detecting stegomalware. To prove the effectiveness of the approach, it also reports some preliminary experimental results obtained as the joint outcome of two H2020 Projects, namely ASTRID and SIMARGL
The using of orthogonal basis for the steganographic coding of information in multimedia
This article discusses methods for steganographic encoding additional information using three different orthogonal bases. The bases are represented by the functions, which occupies a different bandwidth in the spectrum. There are comparison of the approach to the definition of DCT- coefficients with the approaches used in the methods of the spread spectrum and subband projections. The approaches of the coefficients of the implementation to ensure secrecy by adaptive determination of their value are considere
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and
popular way of communicating for Internet users. This also applies to
Peer-to-Peer (P2P) systems and merging these two have already proven to be
successful (e.g. Skype). Even the existing standards of VoIP provide an
assurance of security and Quality of Service (QoS), however, these features are
usually optional and supported by limited number of implementations. As a
result, the lack of mandatory and widely applicable QoS and security guaranties
makes the contemporary VoIP systems vulnerable to attacks and network
disturbances. In this paper we are facing these issues and propose the SecMon
system, which simultaneously provides a lightweight security mechanism and
improves quality parameters of the call. SecMon is intended specially for VoIP
service over P2P networks and its main advantage is that it provides
authentication, data integrity services, adaptive QoS and (D)DoS attack
detection. Moreover, the SecMon approach represents a low-bandwidth consumption
solution that is transparent to the users and possesses a self-organizing
capability. The above-mentioned features are accomplished mainly by utilizing
two information hiding techniques: digital audio watermarking and network
steganography. These techniques are used to create covert channels that serve
as transport channels for lightweight QoS measurement's results. Furthermore,
these metrics are aggregated in a reputation system that enables best route
path selection in the P2P network. The reputation system helps also to mitigate
(D)DoS attacks, maximize performance and increase transmission efficiency in
the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On
Computer Science - Research And Applications, Poland, Kazimierz Dolny
31.01-2.02 2008; 14 pages, 5 figure
Wright State University College of Engineering and Computer Science Bits and PCs newsletter, Volume 22, Number 8, June 2006
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.https://corescholar.libraries.wright.edu/bits_pcs/1153/thumbnail.jp
Wright State University College of Engineering and Computer Science Bits and PCs newsletter, Volume 22, Number 8, June 2006
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.https://corescholar.libraries.wright.edu/bits_pcs/1153/thumbnail.jp
Wright State University College of Engineering and Computer Science Bits and PCs newsletter, Volume 22, Number 7, May 2006
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.https://corescholar.libraries.wright.edu/bits_pcs/1152/thumbnail.jp
Wright State University College of Engineering and Computer Science Bits and PCs newsletter, Volume 22, Number 7, May 2006
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.https://corescholar.libraries.wright.edu/bits_pcs/1152/thumbnail.jp
A survey on security analysis of machine learning-oriented hardware and software intellectual property
Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship (viz., literary and artistic works), emblems, brands, images, etc. This property is intangible since it is pertinent to the human intellect. Therefore, IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent. IP protection regulations have been deployed and are still in practice, including patents, copyrights, contracts, trademarks, trade secrets, etc., to address these challenges. Unfortunately, these protections are insufficient to keep IP entities from being changed or stolen without permission. As for this, some IPs require hardware IP protection mechanisms, and others require software IP protection techniques. To secure these IPs, researchers have explored the domain of Intellectual Property Protection (IPP) using different approaches. In this paper, we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research; provide discussions on hardware IP and software IP attacks and defense techniques; summarize different applications of IP protection; and lastly, identify the challenges and future research prospects in hardware and software IP security
- …