{"title":"数据隐藏:安全和隐私的新机遇?","authors":"D. Megías","doi":"10.1145/3424954.3425511","DOIUrl":null,"url":null,"abstract":"Data hiding provides a collection of techniques that can be used within a wider cybersecurity or privacy framework, making it possible, for example, to protect the users' privacy in streaming or broadcasting of multimedia contents or to detect cyberattacks in IoT networks when combined with machine learning solutions. However, criminals and terrorists are also aware and these techniques and can exploit them for malicious purposes. This contribution provides an overview of the traditional data hiding applications and the current trends in this field, pointing out prospective uses of data hiding in the context of information security and privacy, but also introducing potential threats for users and the society as a whole when they are applied for evil.","PeriodicalId":166844,"journal":{"name":"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Data hiding: New opportunities for security and privacy?\",\"authors\":\"D. Megías\",\"doi\":\"10.1145/3424954.3425511\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data hiding provides a collection of techniques that can be used within a wider cybersecurity or privacy framework, making it possible, for example, to protect the users' privacy in streaming or broadcasting of multimedia contents or to detect cyberattacks in IoT networks when combined with machine learning solutions. However, criminals and terrorists are also aware and these techniques and can exploit them for malicious purposes. This contribution provides an overview of the traditional data hiding applications and the current trends in this field, pointing out prospective uses of data hiding in the context of information security and privacy, but also introducing potential threats for users and the society as a whole when they are applied for evil.\",\"PeriodicalId\":166844,\"journal\":{\"name\":\"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3424954.3425511\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3424954.3425511","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data hiding: New opportunities for security and privacy?
Data hiding provides a collection of techniques that can be used within a wider cybersecurity or privacy framework, making it possible, for example, to protect the users' privacy in streaming or broadcasting of multimedia contents or to detect cyberattacks in IoT networks when combined with machine learning solutions. However, criminals and terrorists are also aware and these techniques and can exploit them for malicious purposes. This contribution provides an overview of the traditional data hiding applications and the current trends in this field, pointing out prospective uses of data hiding in the context of information security and privacy, but also introducing potential threats for users and the society as a whole when they are applied for evil.