scholarly journals Multimedia Concealed Data Detection Using Quantitative Steganalysis

2021 ◽  
Vol 13 (5) ◽  
pp. 101-113
Author(s):  
Rupa Ch. ◽  
Sumaiya Shaikh ◽  
Mukesh Chinta

In current days, there is a constant evolution in modern technology. The most predominant usage of technology by society is the internet. There are many ways and means on the internet through which data is transmitted. Having such rapid and fast growth of communicating media also increases the exposure to security threats, causing unintellectual information ingress. Steganography is the main aspect of communicating in an aspect that hides the extent of communication. Steganalysis is another essential concern in data concealing, which is the art of identifying the existence of steganography. A framework has been designed to identify the concealed data in the multimedia file in the proposed system. This work's main strength is analyzing concealed data images without embedding and extracting the image's payloads. A quantitative steganalysis approach was considered to accomplish the proposed objective. By using this approach, the results were achieved with 98% accuracy.

2021 ◽  
pp. 5-16
Author(s):  
Parth Rustagi ◽  
◽  
◽  
◽  
◽  
...  

As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.


Author(s):  
Andrzej Wilczyński ◽  
Adrian Widłak

Data integration and fast effective data processing are the primary challenges in today’s high-performance computing systems used for Big Data processing and analysis in practical scenarios. Blockchain (BC) is a hot, modern technology that ensures high security of data processes stored in highly distributed networks and ICT infrastructures. BC enables secure data transfers in distributed systems without the need for all operations and processes in the network to be initiated and monitored by any central authority (system manager). This paper presents the background of a generic architectural model of a BC system and explains the concept behind the consensus models used in BC transactions. Security is the main aspect of all defined operations and BC nodes. The paper presents also specific BC use cases to illustrate the performance of the system in practical scenarios..


2021 ◽  
Author(s):  
William Urquhart

While copyright legally protects the ownership of created works, fair dealing with copyrighted content has become a problematic topic with the rise of user-generated content. User-generated content can be easily produced with modern technology and shared on the internet. This has resulted in websites having complicated processes for dealing with copyrighted content and many have introduced automated copyright detection systems to limit their liabilities of copyright infringement. Since automated copyright detection systems have been introduced, they have fundamentally changed the way copyright infringement is managed online. However, a problem arises with automated copyright detection systems as they are incapable of detecting fair dealing. Fair dealing is a provision under New Zealand’s Copyright Act 1994 that allows the use of copyrighted content in certain cases. Consequently, this has turned into a controversial area between content creators and copyright holders as most user-generated content usually contains copyrighted content. Copyright laws also favour mass media companies as they control significant copyright properties, and this plays a key role in the economy. For this reason, copyright genuinely tends to focus on the rights of copyright holders and not so much for users of copyrighted content. Furthermore, New Zealand's Copyright Act 1994 has not been updated since 2011 and has become unsuitable for modern forms of creation on the internet. This research portfolio investigates the problematic issues concerning New Zealand’s Copyright Act 1994 with its application to user-generated content and YouTube’s automated copyright detection system called ‘Content ID’. To express research findings, this research portfolio contains a user-generated documentary and several other proposed methods of bypassing Content ID.


2021 ◽  
Vol 38 (38) ◽  
pp. 122-137
Author(s):  
Darko Trifunovic ◽  
Juliusz Piwowarski

This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a unique definition of the concept of security science is given, without which it is not possible to properly perceive or investigate security threats and risks within which terrorism is one of the significant threats. The second part deals with models of terrorist activities with special attention to the webspace and the significant role that terrorists attach to the increasing use of the Internet for their purposes. The theoretical part leads to the conclusion that there are five essential elements whose presence, if detected in one territory or state, indicates the existence of a mechanism that produces or creates new jihad warriors. The paper also gives a unique forecast of the degree of endangerment on the example of a territory, which gives scientists who investigate these threats a new direction of research.


Author(s):  
Loo Seng Neo

The growing pervasiveness of the internet and the rise of social media have revolutionised how individuals communicate and interact with one another. Serving as an effective conduit for communication, these technological advancements have also been exploited by individuals with malicious intent (e.g., criminals, violent extremists). As the world witnesses an upward trend of such crime and security concerns in the online sphere, it places the ‘responsibility' on intelligence and law enforcement agencies to respond with the appropriate technological interventions. Thus, this article will discuss how digital footprints can be leveraged to identify potential security threats, particularly for crime and security issues that will result in negative repercussion at the national level, such as acts of violent extremism and hate crimes.


Author(s):  
Mohammad Tariq Banday

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.


Author(s):  
Bill Ag. Drougas

Internet today is one of the most useful tools for information, education and business or entertainment. It is one of the modern technology tools giving us many applications world wide in various fields. One of the most important applications of the Internet is the e-commerce for quality health and medical products. There are an enormous number of Web sites offering health products with the method of E-commerce but still there are many problems with the quality of these products. To the other side many individuals are not able to choice and to know about the quality of these health products that offered today on line with the Internet companies. There are many serious proposals today in to the direction of the quality of the products in health. In this paper summarized many informations about the on line commerce for health products, some of the most popular products and the methodology to train individuals in to the direction to buy and choose quality products. In this paper also presented and analyzed the characteristics and criteria of one serious Internet health company and its Web site. Also how the different scientific organizations can help people and the electronic health commerce to be more effective in to various fields in the division of the popular health. This will be more effective after training and giving criteria and or educating Internet users for a serious choice in to their on line commerce with the E-Health Commerce Web Organizations.


2011 ◽  
pp. 1254-1265
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


2008 ◽  
pp. 1806-1821 ◽  
Author(s):  
Ahmed Ali

This case study examined the effectiveness and significance of the Internet and interactive video broadcasting as instructional and communication media in a global virtual learning system. The study explored how differences in students’ technology experiences, curriculum, cultures, and access to technology influence learning and student attitude in a technology-based distance education environment. The research also investigated whether the use of online references and materials is adequate and appropriate for successful distance learning. The setting was a virtual campus that linked universities in the U.S., Australia, and Canada with learning centers in different African countries. E-mail and face-to-face interviews, observations, and Web-based surveys were utilized to collect the data. The study reveals that students had mixed perceptions about the effectiveness of technology, with positive attitudes exhibited towards interactive video and some anxiety and dissatisfaction with the use of the Internet.


Sign in / Sign up

Export Citation Format

Share Document