122 research outputs found
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper
shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the
Internet. In this study an Active Voice Period Detection algorithm is devised for PCM codec to detect whether a VoIP packet
carries active or inactive voice data, and the data embedding location in a VoIP stream is chosen randomly according to random
sequences generated from a logistic chaotic map. The initial parameters of the chaotic map and the selection of where to
embed the message are negotiated between the communicating parties. Steganography experiments on active and inactive
voice periods were carried out using a VoIP communications system. Performance evaluation and security analysis indicates
that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert
communications with high speech quality and negligible signal distortion
Preserving data integrity of encoded medical images: the LAR compression framework
International audienceThrough the development of medical imaging systems and their integration into a complete information system, the need for advanced joint coding and network services becomes predominant. PACS (Picture Archiving and Communication System) aims to acquire, store and compress, retrieve, present and distribute medical images. These systems have to be accessible via the Internet or wireless channels. Thus protection processes against transmission errors have to be added to get a powerful joint source-channel coding tool. Moreover, these sensitive data require confidentiality and privacy for both archiving and transmission purposes, leading to use cryptography and data embedding solutions. This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes. In particular, the LAR image coding method is defined together with advanced securization services
Solving the threat of LSB steganography within data loss prevention systems
With the recent spate of data loss breaches from industry and commerce, especially with the large
number of Advanced Persistent Threats, companies are increasing their network boundary security.
As network defences are enhanced through the use of Data Loss Prevention systems (DLP), attackers
seek new ways of exploiting and extracting confidential data. This is often done by internal parties in
large-scale organisations through the use of steganography. The successful utilisation of
steganography makes the exportation of confidential data hard to detect, equipped with the ability of
escaping even the most sophisticated DLP systems. This thesis provides two effective solutions to
prevent data loss from effective LSB image steganographic behaviour, with the potential to be applied
in industrial DLP systems
Cybersecurity: Past, Present and Future
The digital transformation has created a new digital space known as
cyberspace. This new cyberspace has improved the workings of businesses,
organizations, governments, society as a whole, and day to day life of an
individual. With these improvements come new challenges, and one of the main
challenges is security. The security of the new cyberspace is called
cybersecurity. Cyberspace has created new technologies and environments such as
cloud computing, smart devices, IoTs, and several others. To keep pace with
these advancements in cyber technologies there is a need to expand research and
develop new cybersecurity methods and tools to secure these domains and
environments. This book is an effort to introduce the reader to the field of
cybersecurity, highlight current issues and challenges, and provide future
directions to mitigate or resolve them. The main specializations of
cybersecurity covered in this book are software security, hardware security,
the evolution of malware, biometrics, cyber intelligence, and cyber forensics.
We must learn from the past, evolve our present and improve the future. Based
on this objective, the book covers the past, present, and future of these main
specializations of cybersecurity. The book also examines the upcoming areas of
research in cyber intelligence, such as hybrid augmented and explainable
artificial intelligence (AI). Human and AI collaboration can significantly
increase the performance of a cybersecurity system. Interpreting and explaining
machine learning models, i.e., explainable AI is an emerging field of study and
has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-
Solving the threat of LSB steganography within data loss prevention systems
With the recent spate of data loss breaches from industry and commerce, especially with the large
number of Advanced Persistent Threats, companies are increasing their network boundary security.
As network defences are enhanced through the use of Data Loss Prevention systems (DLP), attackers
seek new ways of exploiting and extracting confidential data. This is often done by internal parties in
large-scale organisations through the use of steganography. The successful utilisation of
steganography makes the exportation of confidential data hard to detect, equipped with the ability of
escaping even the most sophisticated DLP systems. This thesis provides two effective solutions to
prevent data loss from effective LSB image steganographic behaviour, with the potential to be applied
in industrial DLP systems
- …