Advancements in Steganography Inspired by the Kuznetsov Tsybakov Problem

Exploring new possibilities in steganography techniques rooted in the Kuznetsov Tsybakov problem, presented at CERIAS symposium.

All Hacking Cons10 views43:29

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in India under the topic 'ad'.

About this video

#CERIAS https://www.cerias.purdue.edu/site/symposium/ The Center for Education and Research in Information Assurance and Security (CERIAS), a cross-cutting institute at Purdue University, is the world’s foremost interdisciplinary academic center for cyber and cyber-physical systems; more than a hundred researchers addressing issues of security, privacy, resiliency, trusted electronics, autonomy and explainable artificial intelligence. CERIAS brings together world-class faculty, students and industry partners to design, build and maintain trusted cyber/cyber-physical systems. CERIAS serves as an unbiased resource to the worldwide community. The Research conducted through CERIAS includes faculty from six different colleges and 20+ departments across campus. The six areas below summarize the research focus areas for the faculty involved with the center: Assured Identity and Privacy End System Security Human Centric Security Network Security Policy, Law and Management Prevention, Detection and Response Policy, Law and Management This area includes tools and methods for understanding the context of security, and how to best allocate resources for protection of assets. This includes research into risk assessment and mitigation methodologies, policy development, the role of law and social pressure on security, economic aspects of security, cross-cultural issues governing security, cyberethics, simulation and modeling of security, and policy languages and proofs. Associated personnel: B. Alge, J. Anderson, M. Bernstein, A. Chaturvedi, H. Cho, J. Goldman, K. Kannan, R. Mislan, J.Rees, J. Richardson, D. Schoorman, E. Spafford, L. Tsoukalas Departments: Communication, Computer Science, Education, ITaP, Management, Nuclear Engineering, Philosophy, Sociology, Computer & Information Technology Human Centric Security How does IT change our interactions, and how can more trustworthy IT change them further? This includes studies of on-line trust, ecommerce (business-to-business and business-to-consumer), digital government services, e-conferencing, on-line personae and anonymity, online news, on-line research and the ephemeral nature of information, on-line propaganda, and spam. Associated faculty: J. Boyd, H. Cho, M. Dutta, A. Elmagarmid, J. Hahn, K. Kannan, S. Matei, P. Meunier, J. Mills, S. Offenbach, M. Rogers, E. Spafford, H. Sypher Departments: Communication, CERIAS Staff, Computer Science, Hospitality & Tourism Management, Management, Psychology, Computer & Information Technology, Linguistics End System Security This area includes tools and methods for building software artifacts, servers, and networks that are resistant to attacks and failures. This includes research into vulnerability assessment and identification, programming languages and tools for secure programming, mobile code and “sandboxes,” proof-carrying systems, trusted embedded systems, resilient server architectures, protection against malicious software, dynamic reconfiguration of systems, hardware architecture design, fault-tolerance, code tamperproofing, and penetration testing. Research into more secure operating systems and database systems falls in this area, as does research into better human-computer interfaces for security (HCI). Associated personnel: W. Aref, M. Atallah, E. Bertino, B. Bhargava, C. Clifton, R. Eigenmann, A. Elmagarmid, A. Ghafoor, A. Grama, A. Hosking, E. Houstis, C. Justice, P. Meunier, N. Li, C. Nita-Rotaru, K. Park, S. Prabhakar, R. Proctor, J. Rice, G. Salvendy, M. Salvo, L. Si, T.N. Vijaykumar, J. Vitek, K. Watson, D. Xu Departments: CERIAS staff, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, Linguistics, Psychology Network Security Security becomes more complex when participating entities are physically separated from the current location; knowing who and what is communicating from a remote location complicates security decisions. Research in this area includes wireless computing, communication protocol design and verification, agent computation, quality-of-service protection, firewall design and testing, SCADA security, dynamic and protective routing, security for grid computing, and sensor net security. Associated personnel: S. Bagchi, W. Cleveland, E. Coyle, R. Dejoie, P. Eugster, S. Fahmy, J. T., Korb, S. Ksander, J. Lehnert, S. Matei, P. Meunier, C. Nita-Rotaru, S. Nof, S. Rao, P. Rawles, A. Schroll, N. Shroff, E. Spafford, K. Watson, D. Xu, D. Yau, M. Zhu, M. Zoltowski Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, ITaP CERIAS - 2013 Hacking conference #hacking, #hackers, #infosec, #opsec, #IT, #security

Video Information

Views
10

Total views since publication

Duration
43:29

Video length

Published
Jan 20, 2022

Release date

Quality
sd

Video definition