submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Ashutosh Dutta, AT&T, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Associate Editor:
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 5   Issue: 3

Published In:   July 2016

Publication Frequency: Quarterly

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data Communication

doi: 10.13052/jcsm2245-1439.531
Ramadhan J. Mstafa and Khaled M. Elleithy

Department of Computer Science and Engineering, University of Bridgeport, Bridgeport, CT 06604, USA

Abstract: [+]    |    Download File [ 2012KB ]   |    Read Article Online

Abstract: Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganographic algorithm relies on the embedding efficiency, embedding payload, and robustness against attackers. Low hidden ratio, less security, and low quality of stego videos are the major issues of many existing steganographic methods. In this paper, we propose a novel video steganography method in discrete cosine transform (DCT) domain based on error correcting codes (ECC). To improve the security of the proposed algorithm, a secret message is first encrypted and encoded by using Hamming and BCH codes. Then, it is embedded into the DCT coefficients of video frames. The hidden message is embedded into DCT coefficients of each Y, U, and V planes excluding DC coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast moving objects. The experiential results of the proposed algorithm are compared with three existing methods. The comparison results show that our proposed algorithm outperformed other algorithms. The hidden ratio of the proposed algorithm is approximately 27.53%, which is considered as a high hiding capacity with a minimal tradeoff of the visual quality. The robustness of the proposed algorithm was tested under different attacks.

Keywords: Video steganography, ECC, DCT, embedding efficiency, embedding payload, robustness.

Variety of Scalable Shuffling Countermeasures against Side Channel Attacks

doi: 10.13052/jcsm2245-1439.532
Nikita Veshchikov, Stephane Fernandes Medeiros and Liran Lerman

Department of Computer Sciences, UniversitĀ“e libre de Bruxelles, Brussel, Belgium

Abstract: [+]    |    Download File [ 1183KB ]   |    Read Article Online

Abstract: IoT devices have very strong requirements on all the resources such as memory, randomness, energy and execution time. This paper proposes a number of scalable shuffling techniques as countermeasures against side channel analysis. Some extensions of an existing technique called Random Start Index (RSI) are suggested in this paper. Moreover, two new shuffling techniques Reverse Shuffle (RS) and Sweep Swap Shuffle (SSS) are described within their possible extensions. Extensions of RSI, RS and SSS might be implemented in a constrained environment with a small data and time overhead. Each of them might be implemented using different amount of randomness and thus, might be fine-tuned according to requirements and constraints of a cryptographic system such as time, memory, available number of random bits, etc. RSI, RS, SSS and their extensions are described using SubBytes operation of AES-128 block cipher as an example, but they might be used with different operations of AES as well as with other algorithms. This paper also analyses RSI, RS and SSS by comparing their properties such as number of total permutations that might be generated using a fixed number of random bits, data complexity, time overhead and evaluates their resistance against some known side-channel attacks such as correlation power analysis and template attack. Several of proposed shuffling schemes are implemented on a 8-bit microcontroller that uses them to shuffle the first and the last rounds of AES-128.

Keywords: Side channel analysis, countermeasures, hiding techniques, shuffling countermeasure, microcontroller, AES, lightweight shuffling.

End-to-End Reliability and Optimization of Intra and Inter-Domain IMS-based Communication Networks

doi: 10.13052/jcsm2245-1439.533
Chayapol Kamyod1, Rasmus Hjorth Nielsen2, Neeli Rashmi Prasad3, Ramjee Prasad4 and Nattapol Aunsri5

1Future Technologies for Business Ecosystem Innovation (FT4BI) in the Department of Business Development and Technology, Aarhus University, Herning, Denmark
2Movimento, USA
3International Technological University, San Jose, USA
4Professor of Future Technologies for Business Ecosystem Innovation (FT4BI) in the Department of Business Development and Technology, Aarhus University, Herning, Denmark
5School of Information Technology, Mae Fah Luang University, Chiang Rai, Thailand

Abstract: [+]    |    Download File [ 3121KB ]   |    Read Article Online

Abstract: End-to-end system reliability and availability of different IMS-based network communication scenarios have been simulated and analyzed by using the combination of effective stochastic processes and models. Besides, both system reliability and availability characteristics of Intra and Inter IP multimedia subsystem (IMS) domain communication networks have been simulated and compared with different redundancy conditions. Moreover, parallel redundancies of the core IMS units were optimized at different availability or reliability standard conditions. The results demonstrate interesting system reliability characteristics of different communication scenarios and the results reveal possibility to create high reliability and availability system for the Next Generation Networks.

Keywords: Reliability, Redundancy, IMS, Optimization.

River Publishers: Journal of Cyber Security and Mobility