|
|
|
Luis Parrilla, Antonio García, Encarnación Castillo, Salvador Rodríguez-Bolívar and Juan Antonio López-Villanueva
Power noise generation for masking power traces is a powerful countermeasure against Simple Power Analysis (SPA), and it has also been used against Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) in the case of cryptographic circuit...
ver más
|
|
|
|
|
|
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ...
ver más
|
|
|
|
|
|
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di...
ver más
|
|
|
|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang and Peter Nimbe
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ranso...
ver más
|
|
|