Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
Digital Watermarking and Steganography
Digital Watermarking and Steganography
A Methodology of Steganalysis for Images
CONIELECOMP '09 Proceedings of the 2009 International Conference on Electrical, Communications, and Computers
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The paper presents an innovative usage of the modular data hiding methods [5], [6] for the prevention of phishing attempts. The main idea is to use the multimedia content of corporate portals for the enhancement of their security. This is achieved by a combination of modular data hiding, cloud-based software services and suitable add-ons on the sides of the corporate portals and their end users. Among the additional benefits are the adaptability of the modular data hiding to different security needs and the full backward compatibility with already existing security solutions.