scholarly journals Information-theoretic data-hiding for public network security, services control and secure communications

Author(s):  
S. Voloshynovskiy ◽  
F. Deguillaume ◽  
O. Koval ◽  
T. Pun
2005 ◽  
Vol 05 (01) ◽  
pp. 5-35 ◽  
Author(s):  
SVIATOSLAV VOLOSHYNOVSKIY ◽  
FREDERIC DEGUILLAUME ◽  
OLEKSIY KOVAL ◽  
THIERRY PUN

In this paper we introduce and develop a framework for visual data-hiding technologies that aim at resolving emerging problems of modern multimedia networking. First, we introduce the main open issues of public network security, quality of services control and secure communications. Secondly, we formulate digital data-hiding into visual content as communications with side information and advocate an appropriate information-theoretic framework for the analysis of different data-hiding methods in various applications. In particular, Gel'fand-Pinsker channel coding with side information at the encoder and Wyner-Ziv source coding with side information at the decoder are used for this purpose. Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications.


Author(s):  
Yassine Maleh ◽  
Abdelkbir Sahid ◽  
Abdellah Ezzati ◽  
Mustapha Belaissaoui

To deliver security services (integrity, confidentiality, authentication, availability), it is necessary that the communicating nodes share cryptographic keys for encryption and authentication. However, it is well known that the encryption systems represent the first line of defense against all types of attacks. Furthermore, cryptographic techniques must be designed to detect the execution of the most dangerous attacks. In addition, these techniques must be small to fit the limited resources of the WSN. The aims of this chapter are to discuss the mechanisms used to secure communications; to show their main adaptations required for adoption in smart sensors, which are described in the literature, particularly in terms of key management and distribution; and finally, to detail the different solutions proposed in the literature to secure the communication of smart and constrained sensor networks in the internet of things based on cryptography and intrusion detection systems.


Author(s):  
Divya J Nair

Abstract: Cryptography is a tool that guards a network and data transmission over a network. Data Security is the core aspect of secure data transmission over untrustworthy network. Network security encompasses the authorization of access to data in a network, which is organized by the network administrator. Users select or are assigned an ID and password or other authenticating information that permits them access to information and programs within their control. Network security covers a wide range of computer networks, both public and private, that are used in ordinary jobs performing transactions and communications among businesses, government agencies and individuals. Networks may be private, such as within a company, or private which allow access to the public. Network security is involved in every type of institutions. In this article we concisely outlined Network security and cryptography along with its basic principles. Keywords: Network, Network Security, Cryptography, Asymmetric Cryptosystems, Symmetric Cryptosystems


10.29007/5945 ◽  
2019 ◽  
Author(s):  
Tarek Sobh ◽  
Awad Khalil

Nowadays, with the wide applications of distributed systems, web-based applications, and communications systems over the Internet for carrying data between users such as terminal client and computer/server or communications between different devices using a computer network, network security has become crucial requirement to ensure authentic received data during transmission. Authentication and encryption are basic procedures to ensure secure communications over a public network due to tamper-resistance and convenience in dealing with a password file. Most of the used protocols; HTTP, FTP, and SMTP of the Internet applications use text stream that is more and more vulnerable to attacks. Encryption represents the main security for the most computer applications.This work proposes enhanced secure actions for transferring data using FTP protocol by using a smart token. A smart token has the capabilities of the smart card, but more secured beside some interesting operations. A practical and secure user scheme, based on a smart token device, is proposed. A Secure Platform has been developed using implemented APIs and PKCS#11 as RSA standard interface. The proposed API is called SAFEST (Secure Actions for FTP Environment with Smart Token). SAFEST API wraps a standard protocol for implementing the communication between a token and the application using it. This API is a platform independent, scalable to support more functionality, optimizing token usage and adding more security for accessing token objects. The smart token can process the cryptographic key operations on its own rather than on the host computer, which supports high-level platform independence. In addition, through the proposed SAFEST API, standard interfacing to such token devices from any vendor can be implemented through using PKCS#11 interfaces, developed by RSA labs.


Sign in / Sign up

Export Citation Format

Share Document