مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

594
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

A New Method for Image Steganography Using Discrete Wavelet Transforms

Pages

  79-89

Abstract

 In Cyber security analysis, in addition to data and information obtained from machine-based sensors like intrusion detection systems, firewalls and vulnerability scanners (hard data), human observations and conclusions from world's state including problems reported by users and network administrators, and assessments made by security analysts about network security status (soft data), can be used to obtain more accurate and more reliable estimation and decision. Hard and soft data fusion in Cyber security analysis has many challenges such as framework design for problem modeling and representation of different types of uncertainty. This paper presents a new model based on Ontology for fusion of hard and soft data in Cyber security analysis. First, the concepts and problem variables are modeled and then the inference of assets’ security status is made by using a set of rules. Also, for fusion of data and unified modeling of different uncertainties, transferable belief model (TBM) and Dempster-Shafer combination rule are used. Results of applying the proposed model in a sample scenario of Cyber security analysis show its operability for Hard and soft data fusion. Considering the extensibility of Ontology and knowledge base, high flexibility and dynamism are characteristics of the proposed model.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Rashidi, A. J., SOBHANI, S., & HOSEINI, M.. (2020). A New Method for Image Steganography Using Discrete Wavelet Transforms. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 7(4 ), 79-89. SID. https://sid.ir/paper/361826/en

    Vancouver: Copy

    Rashidi A. J., SOBHANI S., HOSEINI M.. A New Method for Image Steganography Using Discrete Wavelet Transforms. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2020;7(4 ):79-89. Available from: https://sid.ir/paper/361826/en

    IEEE: Copy

    A. J. Rashidi, S. SOBHANI, and M. HOSEINI, “A New Method for Image Steganography Using Discrete Wavelet Transforms,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 7, no. 4 , pp. 79–89, 2020, [Online]. Available: https://sid.ir/paper/361826/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button