The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, voice over IP (VoIP) is rapidly replacing standard phone line as a telephony service of choices. However, VoIP can be exploited by an attacker using method such as eavesdropping, hijacking and etc. To ensure confidentiality and integrity of the conversation or messages sent in the network, a more secure protocol is needed. This research proposes a solution to enhance the security of VoIP...
We design and assess some practical low-density parity-check (LDPC) coded transmission schemes for the Gaussian broadcast channel with confidential messages (BCC). This channel model is different from the classical wiretap channel model as the unauthorized receiver (Eve) must be able to decode some part of the information. Hence, the reliability and security targets are different from those of the...
This paper presents an improved technique for hiding data in audio. The proposed method modifies the amplitude of the cover audio file to embed the secret message. To increase the security of the proposed scheme, we use a key to adjust the hiding technique. The suggested scheme does not need the original signal for extracting the hidden bits. Experimental results show that the proposed method is inaudible...
Recently, the IETF has generated a number of standards that are intended to be foundational for large networks of constrained devices, also known as the Internet of Things. Among these are a Web transfer protocol realizing the REST (Representational State Transfer) principles, the Constrained Application Protocol (CoAP), and the Concise Binary Object Representation (CBOR). As with the existing Internet,...
Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Steganographic algorithms can be characterized by a number of defining properties like Transparency, Capacity, Robustness. We have presented a high capacity and high stegosignal quality audio steganography scheme...
Concealing a message and ensuring its security is inevitable in data transmission. Among various concepts, one approach is steganography that encodes secret message in indiscernible way. In this paper, we present an audio steganographic technique and propose a novel approach to hide data in the least significant bit (LSB) of the stereo-audio samples with CD-quality. Here, on the basis of stego-key...
Binary file formats are regularly extended and modified, often unintentionally in the form of bugs in the implementations of applications and libraries that create files. Applications that need to read data from binary files created by other applications face the complicated task of supporting the resulting many variants. Lightweight implementation patterns to perform runtime reverse engineering can...
In the last few years Agile methodologies appeared as a reaction to traditional software development methodologies. In Agile environment the requirements from the client are always taken in the form of user-stories and prioritization of requirements is done by Moscow method, validate learning and walking skeleton methods. By literature survey it has been observed that these methods are not efficient...
This minitrack focuses on the research and automation techniques that can be applied to mobile platforms to ensure that software developed for these devices is secure without compromising other system properties such as performance or reliability.
Mobile devices have multiple network interfaces, some of which have security weaknesses, yet are used for sensitive data despite the risk of eavesdropping. We describe a data-splitting approach which, by design, maps exactly to a wiretap channel, thereby offering information theoretic security. Being based on the deletion channel, it perfectly hides block boundaries from the eavesdropper, which enhances...
Linear network coding provides a new communication diagram to significantly increase the network capacity by allowing the relay nodes to encode the incoming messages. However, this communication diagram is fragile to communication errors and node compromising attacks. How to combat errors while maintaining the network efficiency is a challenging research problem. In this paper, we characterize a linear...
Network coding (NC) has frequently been promoted as an approach for improving throughput in wireless networks. Existing work has mostly focused on the fundamental aspects of NC, while constraints arising in real-world network deployments have not received much attention. In particular, NC requires network nodes to overhear each other's packets, which oftentimes contradicts many security standards...
Regenerating Codes strip a file in several servers, such that it is possible to recover the file when at least a given number of them is online. The difference between these codes and traditional erasure codes such as Reed-Solomon (RS), is that they require less bandwidth to repair failed nodes. This property is meant to improve storage reliability in cloud storage data systems. In this article, we...
Error-correction coding techniques have been used to exploit imperfections in the physical layer of the communications protocol stack to obtain both reliability and security without the need for secret keys. In a multi-hop network, however, colluding eavesdropping nodes can share information to effectively reduce errors in the eavesdropping channels and, hence, overcome the secrecy offered through...
Public cloud storage services enable organizations to manage data with low operational expenses. However, the benefits come along with challenges and open issues such as security and reliability. In our work, we presented a system that improves availability, confidentiality and reliability of data stored in the cloud. To achieve this objective, we encrypt user's data and make use of erasure codes...
The emergent field of DNA data embedding has, in the past decade, seen the proposal of many methods to encode data in the genome of living organisms. These algorithms have primarily focused on incorporating error correction into encoded data. However the security aspects of data encoded in DNA have generally been overlooked. As with any data hiding method, information encoded in DNA can be protected...
This paper presents a method to hide information in audio based on CPT scheme. The proposed method is done by modifying CPT scheme used for hiding data in binary image. We do not use two matrices as key for embedding and extracting process to reduce the processing time. To ensure the security, we use Arnold transform to scramble the secret message. Experimental results show that the proposed method...
The traditional framework under which error-correcting codes can enable secrecy involves the use of nested codes. While this structure provide us with means to achieve weak secrecy, it is not clear how these codes can be applied to varying wiretap channels. In the spirit of rate-compatible codes, we propose a new framework for coding for the wiretap channel. The proposed scheme is based on random-puncturing,...
With the development of Web application, cross-site scripting attacks have been rapidly increasing, and the technique of those attacks is constantly updating. There has been some special advanced attacks such as the one based on encoding. In this paper we analyze two kinds of those attacks respectively based on the binary and N-ray alphabets encoding, then presents a dynamically access control method...
Optical code-division multiple-access (OCDMA) technique has been considered as a good candidate to provide optical layer security and regards as an important benefit to the enhanced security. In this paper, an enhanced security mechanism is structured over spectral-amplitude coding (SAC) scheme of OCDMA network coder/decoders (codecs). The network security is obtained through pseudo-noise (PN) type...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.