The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information Hiding is a good method to transmit important information secretly. Video sequences usually include many frames, so they have more room to hide information. In the paper, in order to increase the amount of hiding information, we choose MPEG sequences as hosts, and we present a practical method to hide information in MPEG compressed video. Generally, there are many B-frames in each GOP...
Embedded system is a handheld computing device that suffers from increasing attacks. Therefore, more credible and secure embedded system is demanded. This paper proposes a new trusted embedded system based on TPM (Trusted Computing Platform Model) that could resolve the security problem of embedded system when it is boot up. The principle of new embedded system is described as follows: TPM is started...
With the increasing requirement of resource sharing, security has become a crucial item of application system. In order to improve the secure assurance of resource sharing, many researches have been carried out. Aiming at the efficiency and extreme ideal assumption problems of multi-party secure computation, this paper proposed a secure computation mechanism based on trusted computing platform. And...
Because of the excellent performance of the HMM (hidden Markov model), it has been widely used in pattern recognition. Due to the high false alarm rate in the classical intrusion detection system (IDS) based on HMM, a fuzzy approach for the HMM, called fuzzy hidden Markov models (FHMM) is proposed. it is introduced with the fuzzy logic to the HMM. The robustness and accurate rate of the IDS based...
The IP multimedia subsystem (IMS) is being deployed in the third generation (3G) networks since it supports many kinds of multimedia services. However, the security of IMS networks has not been fully examined. This paper presents a novel DoS attack against IMS. By congesting the presence service, a core service of IMS, a malicious attack can cause chained automatic reaction of the system, thus blocking...
Rough Set Theory has been widely used in pattern recognition. In this paper, the rough set theory has been applied to the intrusion detection. An effective method based rough set for anomaly intrusion detection with low overhead and high efficiency has been presented. The method is based on Rough Set Theory to extract a set of detection rules with a minimal size as the normal behavior model from the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.