3 research outputs found

    High Capacity Signature Hiding Technique in Higher Depth of LSB Layer

    Get PDF
    Today Signature is very popular authentication information. Here we try to hide this confidential information by Steganography. This security technique prevents discovery of the very existence of communication through digital media. In our proposed work the LSB replacement technique of Steganography is used. Here we able to increase imperceptibility as well as capacity of stego image by considering higher LSB layer for hiding the target data and replacing multiple bits

    A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO)

    Get PDF
    The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed framework offers an approach of secure data hiding technique in digital images. Novel scheme presented encrypts meaningful secret data using nonlinear dynamics (chaos theory) before embedding into host or cover image. A basic LSB embedding method is used for encrypting data into cover image. Genetic Algorithm based pixel adjustment process is used to reduce the difference of error between the host image and its stego version with low distortions. The results of proposed scheme are compared with other steganographic algorithm using Peak Signal to Noise Ratio (PSNR) and Structural Similarity (SSIM) index, color frequency test and StirMark analysis

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
    corecore