Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure [PDF]
In our previous researches, a new digital watermarking scheme based on chaotic iterations has been introduced. This scheme was both stego-secure and topologically secure. The stego-security is to face an attacker in the "watermark only attack" category, whereas the topological security concerns other categories of attacks.
Bahi, Jacques M.+2 more
arxiv +4 more sources
Digital Twins and Blockchain for IoT Management [PDF]
Security and privacy are primary concerns in IoT management. Security breaches in IoT resources, such as smart sensors, can leak sensitive data and compromise the privacy of individuals. Effective IoT management requires a comprehensive approach to prioritize access security and data privacy protection.
arxiv +1 more source
EFEKTIVITAS KERJASAMA UNITED KINGDOM DAN INDONESIA DALAM MENINGKATKAN DIGITAL SECURITY DI INDONESIA MELALUI UK-INDONESIA TECH HUB [PDF]
The digital ecosystem in Indonesia has been growing in recent years. The Covid-19 pandemic was the point where the number of online application users rose rapidly to 442%.
Feryzal, Mochammad
core
Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario+2 more
core +2 more sources
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources
Security Attributes Based Digital Rights Management [PDF]
Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security.
C. N. Chong+6 more
core +6 more sources
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms
This work studies the power of adversarial attacks against machine learning algorithms that use differentially private mechanisms as their weapon.
Ayşe Ünsal, Melek Önen
doaj +1 more source
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this
Joan Daemen+2 more
doaj +1 more source
Promising Areas of Cooperation on Digital Security and Media Policy Between Russia and Africa [PDF]
rom the perspective of current political and military confrontation, many world nations are challenged to balance independence and development. It is the digital and informational defense that has raised a special attention when the world market of IT ...
ULANOVA Natalya Sergeevna
doaj +1 more source
Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection [PDF]
The last decades have been characterized by unprecedented technological advances, many of them powered by modern technologies such as Artificial Intelligence (AI) and Machine Learning (ML). The world has become more digitally connected than ever, but we face major challenges.
arxiv +1 more source