The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the rate at which digital data is generated continues to grow, so does the need to ensure that data can be stored securely. The use of an NSA-certified Inline Media Encryptor (IME) is often required to protect classified data, as its security properties can be fully analyzed and certified with minimal coupling to the environment in which it is embedded. However, these devices are historically purpose-built...
Visual Secret Sharing (VSS) is a type of cryptographic method used to secure digital media such as images by splitting it into n shares. Then, with k or more shares, the secret media can be reconstructed. Without the required number of shares, they are totally useless individually. The purpose of secret sharing methods is to reinforce the cryptographic approach from different points of failure as...
In this paper, an image steganography approach is presented dividing the cover image into 2×2 non-overlapping pixel blocks. The upper-left pixel of that block embeds a certain number of bits of the secret bit stream. Whereas, the remaining pixels of the same block embed the secret data using a modified version of the pixel-value-differencing (PVD) method that considers embedding secret data into both...
In Compressive Sensing (CS)-based cryptographic mechanisms, the measurement matrix is treated as a secret key (secret CS-matrix), so that the encryption and/or the generation of authentication codes are performed during the compressed sampling process. If the secret CS-matrix is used once for each signal, only the key management is required for the effective use of CS-based cryptographic operations...
The protection of confidential information from intruder has been a great matter of concern since ancient times. Nowadays use of internet has increased tremendously. As a result of it Digital media gathers maximum amount of confidential data. To maintain the secrecy over confidential data, different methods of hiding have been evolved. Steganography is one of the emergent area where maintaining the...
Image-based information hiding technology has been extensively studied in recent years. In order to ensure the security of information transmission, image information hiding technology must have the characteristics of transparency, security and robustness. In this paper, an improved image-based information hiding method is proposed, which utilizes the imperceptibility of the human eye to the change...
The Cloud Computing is a developing IT concept that faces some issues, which are slowing down its evolution and adoption by users across the world. The lack of security has been the main concern. Organizations and entities need to ensure, inter alia, the integrity and confidentiality of their outsourced sensible data within a cloud provider server. Solutions have been examined in order to strengthen...
Steganography is the science of embedding the secret messages inside other medium files in a way that hides the existence of the secret message at all. Steganography can be applied to text, audio, image, and video file types. In this study, we propose a new steganography approach for digital images in which the RGB coloring model was used. The efficiency of the proposed approach has been tested and...
Secrecy in communication is critical for people that have sensitive information. Steganography is a field that secures sensitive information by hiding it inside media files (such as images). What makes the concept of steganography powerful is that the secret message is hidden cleverly within the media file and thus carried around invisibly. Our paper proposed an automated method to secure a message...
Image based steganography utilize the images as cover media to hide secret data. So far several methods have been presented in image steganography. Many of these methods use embedding in least significant bits of pixels. Steganography should be strong enough to hide confidential data and does not cause major changes in the image. The use of least significant bits will not lead to major changes in...
Along with the development of information security, steganography has received increasingly attention. It has become a trend that more and more institutions offer steganography techniques in cybersecurity education. In this paper, we propose integrating steganography into cybersecurity curriculum. Stenography modules and hands-on labs are designed. It covers the principles of steganography, steganographic...
In today's world of digital communication it is must to provide the security to the digital media. As digital media is used in almost all types of communication, security of this media plays important role to keep the integrity the original media. One such technique used to provide the security of digital media is combination of visual cryptography with digital watermarking. This paper reviews the...
Cyber crime is the biggest shortcoming in this fully connected internetworking world. Third party attacks, phishing by intruder like hackers are always active to leak official, personal or legislative information in the form of a message using this public networks. This is why we call for Steganography where the sneaky message has been hiding the data/information firmly. Steganography is one of the...
Manipulation of digital images for the purpose of forgery is a rapidly growing phenomenon that poses a challenge for cyber-crime investigators. Distinguishing original images from duplicates and the number of original copies within the same media are some examples of challenges presented by duplicate digital images. In this paper, we present a new image-searching tool called, Magec, to detect duplicate...
Today's internetworking globe is full of busy roads for transferring data. Challenges on sending or receiving various kinds of hidden data, messages or information especially using this public networks. Hackers took place to leak this surreptitious data. That's the reason behind the need of a cover media where the furtive message has been hiding our information securely. Steganography, one of the...
Steganography is a data hiding technique that allows data to be hidden behind another data such as image, audio, and text. Among these three common media, text steganography that is referred to hiding the secret message behind other text, is known to be the most difficult approach. This is due to its lack of redundant information, comparing to the other media such as image, audio and video to hide...
Personal cloud services are emerging as a disruptive technology for tools and services that use digital media assets. As the shift to a bring-your-own-device and app workplace becomes commonplace, the opportunity exists to leverage these personal services to create enterprise scale approaches. However, a key limiting feature is the ability to provide private and secure assets, whether they are photos,...
Social media sharing is one of the most popular social interactions in online social networks (OSNs). Due to the diverse networking conditions and various privacy requirements of OSN users, scalable media sharing has become a promising paradigm. It allows a media data distributor to share a media content of different qualities with different data consumers. To guarantee user privacy in scalable media...
The IEEE Cybersecurity Initiative developed a user-friendly, cloud-based, interactive platform for hosting tools and demonstrations: Try-CybSI. The goal is to help practitioners and students gain practical familiarity with tools and widespread attacks' behavior.
The IEEE P1619 standard was developed to protect data in shared storage media. Most of the works that have been presented until now have adopted a no robust scheduling scheme to implement various architectures. At first, an exploration on P1619 applicability is being made and then a different scheduling approach, compared to the typical one which exists in literature, is being proposed. The architectures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.