Information Hiding
2,754 Followers
Recent papers in Information Hiding
In this paper, a new multi-attribute and high capacity imagebased watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the... more
In this survey paper we consider the class of protocols for information-hiding which use randomization to obfuscate the link between the observables and the information to be protected. We focus on the problem of formalizing the notion of... more
A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to... more
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and are quite difficult to achieve in a single algorithm.... more
In comparison to 1D barcodes, a two-dimensional matrix is regarded as a Quick-Response (QR) code which is a programme that contains a vast quantity of data. QR codes offer quick scanning, omnidirectional reading, and a variety of other... more
Nowadays, the information processing system plays crucial part in the internet. Online information security has become the top priority in all sectors. Failing to provide online information security may cause loss of critical information... more
13th International Conference on Communications Security & Information Assurance (CSIA 2022) focuses on all technical and practical aspects of communications security & information assurance for wired and wireless networks. The goal of... more
Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing the ''classical'' crimes. One of the major components that leads to the successful compromising... more
The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, many different data hiding techniques have been... more
Security has always been a basic necessity. In the meantime, the most important systems of information security, cryptography and steganography are more noticeable than the others. In recent years Steganography, specially steganography in... more
Multiple methods of information hiding can be used by criminals to conceal incriminating data. The FAT and NTFS file systems are the most commonly used file systems in operating systems today, and therefore are the most exploited. Most... more
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital... more
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number... more
This paper presents a new model for exception handling, called the replacement model. The replacement model, in contrast to other exception-handling proposals, supports all the handler responses of resumption, termination, retry, and... more