Skip to Content - Skip to Navigation

Multimedia Data Security: Current Status and Future Directions

Waleed Farag and Sanwar Ali
Department of Computer Science
Indiana University of Pennsylvania
Indiana, PA 15701, USA
 
farag@iup.edu and sanwar@iup.edu

Abstract

With the greater than ever rates of generating, consuming and storing multimedia data, the need to ensure the security of these data whether they are in transit or in stored format proved to be inevitable. This paper discusses the challenges involved in securing multimedia data due to some of their inherit characteristics. It emphasizes the need for novel techniques and models to ensure Multimedia Data Security. The voluminous amount of data found on almost all Multimedia streams render the use of traditional encryption techniques very inefficient. In this paper, the main two techniques in information hiding, namely Steganography and Watermarking, are also reviewed. A framework for secret communication using steganography is expounded along with a practical example of image steganography. The paper concludes by a discussion of some of the future directions in this interesting area of research.

View the full paper here.

Performance Evaluation of Intrusion Detection Systems

Waleed Farag and Sanwar Ali
Department of Computer Science
Indiana University of Pennsylvania
Indiana, PA 15701, USA

farag@iup.edu and sanwar@iup.edu 

Abstract

Securing computer systems is a major concern of both the governmental and the industrial sectors. With the ever-increasing rate of exploiting systems’ vulnerabilities with the objective of either penetrating these systems or rendering them unavailable, the need for automated security monitoring solutions proved to be a necessity. Although firewalls are an effective solution to some of the security issues, many attacks can go undetected even with their use. The need for proactive tools that can provide continuous monitoring of a computer system in order to detect attacks and prevent
their manifestations is inevitable. Intrusion Detection Systems (IDSs) were introduced to monitor network traffic, detect unauthorized access, and take appropriate countermeasures. In this paper, the general concept of intrusion detection is discussed highlighting common approaches and techniques. Components of a typical intrusion detection system and the steps involved in their deployment are presented. Various categorizations of IDSs based on their placement in a computer system or their detection strategy are expounded. The rising concerns of the research community with respect to the importance of evaluating IDSs performance will be addressed. The paper also discusses several approaches to assess the performance of intrusion detection systems.

View the full paper here.

  • Institute for Information Assurance
  • Stright Hall, Room 319
    210 South Tenth Street
    Indiana, PA 15705
  • Phone: 724-357-2524
  • Fax: 724-357-2724
  • Office Hours
  • Monday through Friday
  • 8:00 a.m. – 12:00 p.m.
  • 1:00 p.m. – 4:30 p.m.