Steganography Training: a Case Study from University of Shumen in Bulgaria
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 3
Abstract
This paper summarizes the experience and the learning outcomes of students of the "Informatics" specialty at the Episkop Konstantin Preslavsky University of Shumen (Bulgaria) on the problems of computer and network security as a component of their professional training. It is a continuous process starting from the "Computer steganography" course and turning into diploma papers, masters programs, specializations and PhDs in computer and network steganography. The outcome of this training would be bachelors and masters theses, practical activities of experimentation of stego software and steganology in a parallel computing environment, joint scientific publications of lecturers and students.
Authors and Affiliations
Stanimir Stanev, Krzysztof Szczypiorski
The Idea of Enhancing Directional Energy Radiation by a Phased Antenna Array in UHF RFID System
The interrogation zone IZ is the most important parameter when RFID systems are considered. Its predictability is determined by the construction and parameters of antenna built in a read/write device. The IZ should be of...
StegHash: New Method for Information Hiding in Open Social Networks
In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like imag...
Heart-rate Monitoring System Design and Analysis Using a Nios II Soft-core Processor
The heart rate of a person is able to tell whether they are healthy. A heart-rate monitoring device is able to measure or record the heart rate of a person in real time, whether it is an electrocardiogram (ECG) or a phot...
Mathematical Model of Communication Delays in Wireless Networks
The paper presents a new conception of building probabilistic models of communication delays in wireless networks that basis on using a delta function sequence to describe retransmissions between a transmitter and a rece...
Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs)
Virtualization of operating systems and network infrastructure plays an important role in current IT projects. With the number of services running on different hardware resources it is easy to provide availability, secur...