scholarly journals An Insight of Information Security: A Skeleton

2019 ◽  
Vol 8 (3) ◽  
pp. 2600-2605

In this age of growing and developing information and technology, data security, integrity and confidentiality are essential aspects related to shared data over some network or medium. Many techniques over the years have been developed for securing the messages from attack or theft or breach of very sensible and essential data when shared over a network. The security threats to data have been ascending, so are the data hiding or securing techniques. This is where Information Security has a role to play. Development of techniques and methods that prevents the essential and secret data being stolen and thus providing security to the data. This paper discusses the significance of Information Security, its evolution since its infant stage and study about various subdomains of the same. This paper also shows a comparative study of various Information Security Techniques, their pros and cons and the applications in various domains. This paper analyses various Information Security methods or techniques based on their various characteristics and effectiveness on securing the data from any adversaries. This includes a study of some benchmark techniques and their subsidiaries along with it. The techniques under focus for analyzing were Watermarking, Digital Signatures, Fingerprinting, Cryptography, Steganography and latest being CryptoSteganography Information Security Technique. The characteristics focused were security-related properties, data or message-related properties, their objectives, drawbacks, applications and algorithms.

Author(s):  
Nasim Talebi ◽  
Emmanuel Ayaburi ◽  
Suhail Chakravarty

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization's probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type.


Author(s):  
Mohammed Hatem Ali Al-Hooti ◽  
Tohari Ahmad ◽  
Supeno Djanali

Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this case, data hiding exists to protect such data. Some methods which have been proposed, however, are not yet optimal concerning the amount of the secret and the quality of the resulted stego data. In this paper, we explore an audio file as the medium to carry the secret data which has been extracted into binary. Before the process begins, the cover is converted to binary and each sample’s bits are divided into two groups, one is used as the location of the embedded 4 bits whereas the second part locates the two bits that are randomly selected as the key. The experimental results have validated that the capacity is high and there is no much impact on the quality. Moreover, compared to the current LSB methods the security is exceedingly enhanced.


Internet offers bunch of services and resources, one of them is cloud computing. The centers which provide these services are located all around the world and this service has its own mainstream pros and cons. Cloud computing consists of taking cloud services from the internet and taking them away from the considerable firewall. This paper aims in enhancing specifications of cloud computing, review its security threats and address security concerns along with the cloud operations that needs security. Also, this paper addresses basic security models, qualities and prerequisites for cloud Computing


2018 ◽  
Vol 3 (2) ◽  
pp. 85
Author(s):  
Chicherov K.A. ◽  
Norkina A. N.

This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.


Cryptography ◽  
2020 ◽  
pp. 355-372
Author(s):  
V. Lokeswara Reddy

Information security using data hiding in video provides high embedding capacity and security. Steganography is one of the oldest data protecting methodologies deals with the embedding of data. Video Steganography hides secret information file within a video. Present day communications are treated to be “un-trusted” in terms of security, i.e. they are relatively easy to be hacked. The proposed technique is invented to hide secret information into a video file keeping two considerations in mind which are size and security of the cover video file. At the sender side, the secret information which is to be hidden is encoded into cover video file. Double layered security for the secret data can be achieved by encrypting confidential information and by embedding confidential information into cover video file frames using encrypted embedding technique.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2355
Author(s):  
Juan Lin ◽  
Chin-Chen Chang ◽  
Ji-Hwei Horng

Hiding secret data in digital images is an attractive topic in the information security research area. Because the data-embedded stego image looks exactly the same as a regular image, transmitting secret data with stego images does not draw the attention of eavesdroppers, thus fulfilling the goal of information security. Many reversible data hiding (RDH) methods for absolute moment block truncation coding (AMBTC) compressed images have been proposed. These methods hide secret data in an AMBTC-compressed image to produce a stego image and transmit it to the recipient. Upon receiving the stego image, the recipient can extract the secret data and recover the AMBTC-compressed image. In this paper, we propose an RDH scheme for AMBTC-compressed images with an asymmetric embedding rule. Using the AMBTC-compressed version as the basis, the proposed embedding scheme always modifies a pixel value toward its original value with a step size (bitrate) proportional to the gap width. Therefore, the visual quality of the stego image is better than the referred AMBTC version. Additionally, as a result of the adaptive bitrate strategy, the data embedding capacity of the proposed scheme outperforms that of state-of-the-art methods. The security of the resulting stego images was also tested by RS-steganalysis. Experimental results show that the overall performance of the proposed scheme is satisfactory. We revised it, please confirm.


2018 ◽  
Vol 5 (2) ◽  
pp. 185
Author(s):  
Hendro Eko Prabowo ◽  
Tohari Ahmad

<p class="Abstrak">ebutuhan komunikasi yang terus bertambah dan ditandai dengan meningkatnya jumlah <em>IP traffic</em> dari 744 EB menjadi 1.164 EB menjadikan keamanan sebagai salah satu kebutuhan utama dalam menjaga kerahasiaan data. <em>Adaptive Pixel Block Grouping Reduction Error Expansion (APBG-REE)</em> sebagai salah satu metode data hiding dapat diterapkan untuk memenuhi kebutuhan tersebut. Metode ini akan membagi citra carrier menjadi blok-blok dan membentuknya menjadi kelompok-kelompok piksel. Hasil dari proses ini akan dimanfaatkan untuk menyembunyikan data rahasia. Namun, metode ini memiliki kekurangan, yaitu belum diketahuinya metode <em>scanning</em> terbaik dalam pembentukan kelompok piksel untuk menciptakan citra <em>stego</em> dengan kualitas tinggi. Untuk mengatasi masalah ini, kami mengusulkan 4 mode (cara) <em>scanning</em> berdasarkan arah <em>scanning</em> tersebut. Mode <em>scanning</em> tersebut memberikan hasil yang berbeda-beda untuk masing-masing citra <em>stego</em> yang diujikan. Namun berdasarkan hasil uji coba, setiap mode <em>scanning</em> mampu menjaga kualitas citra stego diatas 57,5 dB. Hasil ini akan meningkat seiring dengan berkurangnya jumlah <em>shifted pixel</em> yang terbentuk.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstrak"><em>The need of communication has increased continously which is represented by the rise of number of IP traffic, from 744 EB to 1.164 EB. This has made data security one of the main requirements in terms of securing secret data. Adaptive Pixel Block Grouping Reduction Error Expansion (APBG-REE) as one of data hiding methods can be implemented to meet that requirement. It divides the carrier image into blocks which are then used as pixel groups. The result of this process is to be a space for secret data. However, this method has a problem in the scanning when creating pixel groups to generate a high quality stego image. To handle this problem, we propose four scanning models base on its direction. This means that the scanning can be done row-by-row or column-by-column. Base on the experiment, we find that those modes deliver various results and each of them is able to maintain the stego quality of more than 57,5 dB. This result increases along with the decreasing the number of shifted pixels.</em></p>


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


Sign in / Sign up

Export Citation Format

Share Document