Skip to main content
In this paper, a new multi-attribute and high capacity imagebased watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the... more
In this survey paper we consider the class of protocols for information-hiding which use randomization to obfuscate the link between the observables and the information to be protected. We focus on the problem of formalizing the notion of... more
A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to... more
Steganography is the field of research that provides innovative solutions to the problem of secure data communication. In this paper, a non-blind data hiding technique is proposed which is based on data fusion between both the cover and... more
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and are quite difficult to achieve in a single algorithm.... more
In comparison to 1D barcodes, a two-dimensional matrix is regarded as a Quick-Response (QR) code which is a programme that contains a vast quantity of data. QR codes offer quick scanning, omnidirectional reading, and a variety of other... more
Nowadays, the information processing system plays crucial part in the internet. Online information security has become the top priority in all sectors. Failing to provide online information security may cause loss of critical information... more
13th International Conference on Communications Security & Information Assurance (CSIA 2022) focuses on all technical and practical aspects of communications security & information assurance for wired and wireless networks. The goal of... more
In this paper, information about steganographic methods and tools which are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as achievement on data hiding, used methods,... more
Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing the ''classical'' crimes. One of the major components that leads to the successful compromising... more
The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, many different data hiding techniques have been... more
Security has always been a basic necessity. In the meantime, the most important systems of information security, cryptography and steganography are more noticeable than the others. In recent years Steganography, specially steganography in... more
Multiple methods of information hiding can be used by criminals to conceal incriminating data. The FAT and NTFS file systems are the most commonly used file systems in operating systems today, and therefore are the most exploited. Most... more
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital... more
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number... more
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information... more
During recent years, information security plays major roles with the wide use and development in communications networks. Stronger encryption and decryption represent the important demand in most applications. This strength can be... more
This paper presents a new model for exception handling, called the replacement model. The replacement model, in contrast to other exception-handling proposals, supports all the handler responses of resumption, termination, retry, and... more