The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a method to hide information in audio. The proposed method modifies at most one bit in a segment containing 256 samples to hide eight bits of the secret message. To increase the security of the proposed scheme, we use permutation to scramble the secret message before hiding. Experimental results show that the inserted message is inaudible and the proposed method is suitable for...
A novel spectral phase encoding scheme by using ±π/2 phase shift in the en/decoding is proposed. The scheme can submerge the code information in the encoded signals well, improving the security against code extraction from the encoded signals. Furthermore, based on the theoretical analysis, the coding performance of the proposed scheme is guaranteed.
Agility among the software is searching concern during the development phase, as it boost adaptive planning, incremental and evolutionary development with many other features that are lightweight in nature. Security is one of the considerable concern in today's highly agile software development industry. More assertion is on to produce a protected software, so as to lessen the amount of risk and damage...
Shellcodes are widely used to exploit applications. Shellcodes can breach security and privacy to an unimaginable extent. Poor Programming results in various bugs that give attacker a chance to exploit an application. Exploiting an application allows attacker to inject a malicious code and transfer control of program to the injected code. The malicious code injected during exploitation is usually...
Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent...
Response Code (QR code) is widely used in daily life in recent years because it has high capacity encoding of data, damage resistance, fast decoding and other good characteristics. Since it is popular, people can use it to transmit secret information without inspection. The development of steganography in QR code lead to many problems arising. How to keep the original content of QR code and embed...
Research shows that commonly accepted security requirements are not generally applied in practice. Instead of relying on requirements checklists, security experts rely on their expertise and background knowledge to identify security vulnerabilities. To understand the gap between available checklists and practice, we conducted a series of interviews to encode the decision-making process of security...
In this paper, we propose a new encoding method for converting an electroencephalogram (EEG) signal into binary sequences which use for supplying the random numbers. We focus on low-cost EEG signal since it can be used in real applications that require true random number generator, such as gaming, gambling, and some complex model simulations. Our encoding method uses fluctuations that lie in EEG data...
The police digital soldier equipment system has been a hot spot of police equipment development areas. But the speed of development cannot keep up with the pace of information age to match of eager need of police. In this paper, the concept of integration design is given to the development of PDSES. The overall development schema and framework is been discussed. Four key technologies: digital module...
Software Maintainability is the business issue in large scale applications and it must be given adequate focus during software development process to minimize the downtime. Inculcating the maintainability features in the software application during its development can minimize the maintainability efforts during its real time use. In that view, this paper presents a new, Maintainable-Software Development...
Covert channels enable communicating parties to exchange messages without being detected by an external observer. We propose a novel covert channel mechanism based on BitTorrent trackers. The proposed mechanism uses common HTTP commands, thus having the appearance of genuine web traffic and consists of communications that are both indirect and asynchronous: no messages are directly exchanged between...
The perception of risk has been established as an important part of the study of human aspects of security research. Similarly, risk awareness is often considered a central precursor for the adoption of security mechanisms and how people use them and interact with them. However, the state of risk awareness in users during their everyday use of the modern Internet has not been studied in detail. While...
Multimedia security can be foiled thanks to Slepian's permutation modulation. Originally proposed in 1965 for standard problems of channel and source coding in communications, permutation codes can also provide optimum solutions in two relevant fields: steganography (foiling hidden information detection tests) and counterforensics (foiling forensic detection tests). In the first scenario, permutation...
As silicon-based technology feature sizes continue to decrease and designs remain susceptible to novel attacks designers face competing goals when creating secure, low power, integrated circuits (ICs). Often, low power designs rely on heavy minimization and optimization procedures while many secure designs use low-level duplication mechanisms to thwart attacks. An area that requires special attention,...
In this paper, we consider quantum key distribution (QKD) using pulse-position modulation (PPM) and propose the PPM-based BB84 QKD protocol. With the adoption of PPM, the efficiency of utilizing weak laser pulses can be improved and hence the key rate. We first analyse the potential of using PPM from the perspective of raw key rate. We then provide detailed description of the proposed protocol, the...
Due to the wide usage of biometrics, its security issues deserve more attention. Many of biometric protection systems require the biometric templates to be presented in a binary form. Therefore, extracting binary templates from real-valued biometric data is a key step in biometric data protection systems. In addition to meeting the security and privacy requirements, binary biometric templates allow...
A Java Card Virtual Machine applet running on smart cards may be subject to tampering. We protect existing applets by encoding additional lists representing specific instructions which may be the targets of a variety of attacks. The lists are specifically encoded to be a viable solution in limited smart cards hardware. Our modified virtual machine before executing a fetched instruction checks the...
The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we...
We consider the problem of securing distributed storage systems (DSS) against an eavesdropper Eve that can observe any subset of nodes of bounded size. The goal is to construct a weakly secure DSS that leaks no meaningful information to Eve. More specifically, Eve should not be able to get any information about any individual data file or a small group of files. The key benefit of the weak security...
The idea of automatic software diversity is at least two decades old. The deficiencies of currently deployed defenses and the transition to online software distribution (the "App store" model) for traditional and mobile computers has revived the interest in automatic software diversity. Consequently, the literature on diversity grew by more than two dozen papers since 2008. Diversity offers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.