Now showing 1 - 5 of 5
  • Some of the metrics are blocked by your 
    Item type:Publication,
    StegIm: Image in Image Steganography
    (Springer, Cham, 2022)
    Tasevski, Ivo
    ;
    Dobreva, Jovana
    ;
    Andonov, Stefan
    ;
    ;
    Popovska-Mitrovikj, Aleksandra
    Today, data security is a significant problem in data communication. Sometimes we do not realize how susceptible we are to cyberattacks and the theft of critical information, including everything, from social network passwords to complete identities. Any system, no matter how sophisticated it is, is vulnerable and susceptible to attack. Steganography is a technique for hiding secret information by adding it in a non-secret file. Also, it can be used in combination with encryption to further conceal or safeguard data. Therefore, in this paper, we present the StegIm model for hiding, retrieving, and detecting images using variants of LSB Encoding Steganography. We present the implementation of the model with different algorithms for hiding the image in another image (shape steganography algorithm and standard delimiter-based steganography algorithm) and give comparison analysis of used algorithms. To further …
  • Some of the metrics are blocked by your 
    Item type:Publication,
    StegIm: Image in Image Steganography
    (Springer Nature Switzerland, 2022)
    Tasevski, Ivo
    ;
    Dobreva, Jovana
    ;
    Andonov, Stefan
    ;
    ;
    Popovska-Mitrovikj, Aleksandra
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model
    (IEEE, 2022-11-15)
    ;
    The serverless pay-as-you-go model in the cloud enables payment of services during execution and resources used at the smallest, most granular level, as was the initial idea when setting the foundations and concepts of the pay-as-you-go model in the cloud. The disadvantage of this method of payment during execution and the resources used is that it is subject to financial damage if we have an attack on serverless services. This paper defines notions for three types of attacks that can cause financial damage to the serverless pay-as-you-go model and are experimentally validated. The first attack is Blast DDoW - Distributed Denial of Wallet, the second attack is Continual Inconspicuous DDoW, and the third one is Background Chained DDoW. We discussed financial damages and the consequences of each type of attack.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Applications of Quasigroups in Cryptography and Coding Theory
    (Springer International Publishing, 2023)
    ;
    ;
    ;
    ;
    This survey article discusses some applications of quasigroups in cryptography and coding theory. Here mainly results obtained by the authors of this article are considered and obtained in the last quarter of the century. Not all of their results are presented; emphasis is given to those that were interested for the wider community. Security of the modern world is dependent on the many cryptographic products like block ciphers, stream ciphers, digital signatures and encryption schemes, hash functions, pseudo-random number generators, ... These products are mainly produced by using associative structures (number theory, group and finite field theory, Boolean algebras, etc.) The development of quantum computers questioned security based on associative structures. So, nowadays, the use of quasigroups for building cryptographic products is becoming more important. This short survey presents how quasigroups can be exploited for building suitable cryptographic primitives. For that aim, we define some types of quasigroups that are suitable for that purpose, we give the definitions of several kinds of quasigroup transformations, and we explain the constructions of some types of cryptographic primitives obtained by quasigroup transformations. (We notice that cryptographic properties are not discussed in this survey. The efficiency and security of the crypto products based on quasigroups is an open research problem for cryptographers and cryptanalysts.) The quasigroups are also suitable algebraic structures for building error detecting and error correcting code. We give one type of error detecting code based on quasigroups. Error correcting codes resistant to an intruder attack, so called RCBQ (Random Codes Based on Quasigroups) are given in details, as well as some of their applications in processing images and audio signals.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Advancing Image Spam Detection: Evaluating Machine Learning Models Through Comparative Analysis
    (MDPI AG, 2025-05-30)
    Jamil, Mahnoor
    ;
    ;
    ;
    Creutzburg, Reiner
    ;