Filters








4 Hits in 2.4 sec

Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

Jose Maria de Fuentes, Jorge Blasco, Ana Isabel González-Tablas, Lorena González-Manzano
2014 International Journal of Distributed Sensor Networks  
Information hiding techniques could be used to allow vehicles to transmit information covertly.  ...  Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs.  ...  Furthermore, authors would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1155/2014/120626 fatcat:gwgky45hl5donfsalld54dp4za

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments [article]

Luca Caviglione, Jean-Francois Lalande, Wojciech Mazurczyk, Steffen Wendzel
2015 arXiv   pre-print
Smart environments integrate Information and Communication Technologies (ICT) into devices, vehicles, buildings and cities to offer an increased quality of life, energy efficiency and economical sustainability  ...  In this perspective, the individual has a core role and so has networking, which enables such entities to cooperate.  ...  Thus, this scenario can be used to exploit data hiding, for instance to covertly orchestrate a botnet.  ... 
arXiv:1502.00868v1 fatcat:hzqnfopzwvhudhb63gfaipdnfa

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
INDEX TERMS Digital watermarking, information hiding, data mining, data security, big data.  ...  In this domain, the primary limitation to watermark strength has been in its visibility.  ...  For covertly reporting misbehaving vehicles within a VANET channel in real time, de Fuentes et al.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

Verifying Physical Endpoints to Secure Digital Systems

Ahren M. Studer
2018
is in a physical space to enable location-based access control, and verifying the source of information to protect Vehicle-to-Vehicle (V2V) applications.  ...  Often in these systems the physical source or destination of information is as important as the information itself.  ...  In a small number of words, I will try to express my gratitude. However, I apologize in advance for I will surely omit someone or fail to put into words how much many people mean to me.  ... 
doi:10.1184/r1/6724238.v1 fatcat:j7pc3gcivfcibaajdhzaxfulei