85 Chapters
Medium 9781601323279

Session - Security Applications

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF
Medium 9781601323279

Reversible image watermarking scheme with perfect watermark and host restoration after a content replacement attack

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'14 |

385

Reversible image watermarking scheme with perfect watermark and host restoration after a content replacement attack

Alejandra Men´endez-Ortiz∗ , Claudia Feregrino-Uribe∗ and Jos´e Juan Garc´ıa-Hern´andez†

∗ Coordinaci´ on

de Ciencias Computacionales, INAOE

Luis Enrique Erro #1, Sta. Ma. Tonantzintla, Puebla, CP. 72840, M´exico

{m.menendez, cferegrino}@inaoep.mx

† Laboratorio de Tecnolog´ıas de Informaci´ on, CINVESTAV

Parque Cient´ıfico y Tecnol´ogico TECNOTAM - Km. 5.5 carretera Cd. Victoria-Solo La Marina

Cd. Victoria, Tamps. CP. 87130, M´exico jjuan@tamps.cinvestav.mx

Abstract—Robust reversible watermarking schemes (RWS) were designed to increase the robustness of RWS; when no attacks occur they are able to reconstruct the host signal and to extract a watermark; under attacks they only extract the watermark or reconstruct the host signal. This work proposes a robust RWS that can both extract a watermark and reconstruct an image even under attacks. The solution chains a fragile reversible stage with a self-recovery stage in order to achieve robustness for both watermark and image. The results obtained with this construction show that it can correctly extract the watermarks and perfectly reconstruct the images after modifications, so the scheme is robust against content replacement attack. Future efforts are aimed towards the reduction of perceptual impact and robustness improvement. This investigation sets the foundation on a first robust RWS that can restore both watermark and image after attacks.

See All Chapters
Medium 9781601323279

Privacy Incongruity: An analysis of a survey of mobile end-users

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

�����

�������� 7 �

����� �� &������

�� �!�� 89:

����� ���(

$ ������ ��

� ������ ��� ������� ��

����� �������� � �

���

;: !��� ��(�� � ����!�� +<-# 4

���� ��� 4

���� �

���

� �!��

�� �� ����� �

������ ����

� �!��� ����!��� �

������� �!��

�!� �����

����� �!�� ���� �

�( ��� � ����

� +=-# ����!��� ����

���

�� � �

�� �������� �

���

� �� ����� �

����

��! ���!

�!���

����� ��� ���� ��� ������� �

������ ��� > ����

��#

� ���������� ������� �� ������

� ���$ �

���� �

�� ���$ �� �

�������$ ����������

� ��� �

� ���� �

����

� ���

� �������

��� �� +8-# 4����� �������! !�� �!

�� !

� ������� �� ����

� ���

�� ����������� ����$����� �� � �

���

� �� �

� ��� �� �!�

����$��� ��� ����� +?-� +;-� �� ���� �� ��

����

� �!� $��� ���

����� +,9-# 3������ �� � �

��� ��� �� ���� �

��

� �!� � ������ �

����$����

�� ����

��� �!��(��$ ���

�!� $������ �� ����

� ���� � �� ������� �

�!� ����

��! �� +,,-# � ������ ������� ��

������ ��������

���� ���������

� �

����� ��$�������$

���������� � ���(

� �������

�� ������$ ���! ������� �������

See All Chapters
Medium 9781601323279

Email Encryption

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

124

Int'l Conf. Security and Management | SAM'14 |

Email Encryption

Discovering Reasons Behind its Lack of Acceptance

Kendal Stephens LaFleur

Lei Chen

Department of Computer Science

Sam Houston State University

Huntsville, TX, United States kks016@shsu.edu

Department of Computer Science

Sam Houston State University

Huntsville, TX, United States shsu.chen@gmail.com

Abstract— Email encryption is a critical component of data security and privacy, yet many people fail to use it. Prior studies have been performed to find ways to improve existing encryption methods and to develop new ones, in the attempt of providing a program that more people will utilize. Despite these efforts, email encryption is still not widely adopted. Our study uses a survey to collect data about users’ views of email encryption and provide us with insight on why many choose not to use it. After analyzing these results, we found that this is not only due to a lack of usability of the encryption programs, but it’s also due to the fact that many people do not fully understand encryption. There is a substantial lack of knowledge of what exactly should be encrypted, how to operate encryption programs, and the many threats associated with unencrypted emails. Our results are based on the responses of thirty people answering a multiple-choice survey we designed, made up of ten questions dealing with email encryption. All survey participants came from a variety of different backgrounds and careers. To the best of our knowledge, this research study is unique and our findings represent the true viewpoints of our participants.

See All Chapters
Medium 9781601323279

Security Considerations in WSN-Based SmartGrids

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'14 |

29

Security Considerations in WSN-Based Smart

Grids

1

2

Hanen Idoudi , Mustafa Saed

1

National School of Computer Science, University of Manouba, Tunisia

1

hanen.idoudi@ensi.rnu.tn

2

Electrical and Computer Engineering, University of Detroit Mercy, USA

2 saedma@udmercy.edu

Abstract—Wireless Sensor Networks (WSNs), which are composed of battery powered devices, are attracting a tremendous attention owing to their wide range of applications. Recently, their use in the smart grid to respond to several communication needs was stressed. A Smart Grid is an innovative paradigm to enhance the power grid system with communication capabilities in order to perform several tasks of monitoring and surveillance. Despite their advantages, there are several challenges facing WSN applications in the Smart Grid. Security is one of the most critical challenges. In this paper, the application of WSNs in smart grid is reviewed, and the security issues accompanying their use are discussed.

See All Chapters

See All Chapters