77 research outputs found

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    Intelligent System For Brain Disease Diagnosis Using Rotation Invariant Features And Fuzzy Neural Network

    Get PDF
    The characteristic features of the magnetic resonant image (MRI) for Alzheimer’s patient’s brain image and normal image can be distinguished in terms of dimensional features with the help of wavelet decomposition. From the literature review, it is observed that when datasets used are a combination of the MR images having a very mild cognitive impairment and mild cognitive impairment, the performance of the classifier reduces. Because the features of this kind of MR image are difficult to distinguish from normal brain images. To solve this problem, the lossless feature extraction method along with the feature reduction method having a selection approach is suggested as a solution here. In this paper, the 12 directional, rotation invariant two-dimensional discrete-time continuous wavelet transform (R-DTCWT) and a genetic algorithm (GA) are used for feature selection and feature vector size reduction. The fuzzy neural network (FNN) which is suitable for pattern recognition is used here. The FNN with and without feature reduction is evaluated for identification of combinational dataset, shows satisfactory performance over an artificial neural network (ANN), probabilistic neural network (PNN) classifiers. This method is compared with other state of algorithm to prove the enhanced performanc

    A Survey of Data Mining Techniques for Steganalysis

    Get PDF

    Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012

    Full text link

    A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence

    Get PDF
    In this work, we present a decision fusion strategy for image forensics. We define a framework that exploits information provided by available forensic tools to yield a global judgment about the authenticity of an image. Sources of information are modeled and fused using Dempster-Shafer Theory of Evidence, since this theory allows us to handle uncertain answers from tools and lack of knowledge about prior probabilities better than the classical Bayesian approach. The proposed framework permits us to exploit any available information about tools reliability and about the compatibility between the traces the forensic tools look for. The framework is easily extendable: new tools can be added incrementally with a little effort. Comparison with logical disjunction- and SVM-based fusion approaches shows an improvement in classification accuracy, particularly when strong generalization capabilities are neede

    Cyber Security and Critical Infrastructures

    Get PDF
    This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues
    • …
    corecore