Visible to the public Science of Security VO

The 8th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 31, April 15, 2020. We look forward to receiving your nominations.
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
50th IEEE/IFIP Int. Conference on Dependable Systems and Networks Valencia, Spain June 29 - July 2, 2020 On behalf of the Organizing Committee, it is our pleasure to invite you to the 50th edition of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), to be held in Valencia, a...
The lastest information on all upcoming science of security related events.
The National Security Agency on January 23 highlighted the agency's work with University of Illinois Urbana Champaign. "As one of the initial schools to be designated to host an NSA Science of Security (SoS) Lablet, Illinois has been instrumental in stimulating basic research to create scientific underpinnings for...
2020 27th Annual Network and Distributed System Security Symposium February 23-26, 2020 San Diego, CA The Network and Distributed System Security Symposium is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those...
Human Factors and Ergonomics Society (HFES) - Call for Papers HFES is looking for submissions of research and practice related to the human and cybersecurity! HFES is interested in building a broad community between human and cyber experts. The HFES society has added a CyberTechnical Group which will be accepting papers...





  • Abstract: This article shows the possibility of detection of the hidden information in images. This is the approach to steganalysis than the basic data about the image and the information about the hiding method of the information are unknown. The architecture of the convolutional neural network makes it... more
  • Abstract: There has been a growing expansion in the use of steganography, due to the evolution in using internet technology and multimedia technology. Hence, nowadays, the information is not secured sufficiently while transmitting it over the network. Therefore, information security has taken an important... more
  • Abstract: Video Steganography is an extension of image steganography where any kind of file in any extension is hidden into a digital video. The video content is dynamic in nature and this makes the detection of hidden data difficult than other steganographic techniques. The main motive of using video... more
  • Abstract: In this paper, we develop a statistical framework for image steganography in which the cover and stego messages are modeled as multivariate Gaussian random variables. By minimizing the detection error of an optimal detector within the generalized adopted statistical model, we propose a novel... more
  • Abstract: Now-a-days, video steganography has developed for a secured communication among various users. The two important factor of steganography method are embedding potency and embedding payload. Here, a Multiple Object Tracking (MOT) algorithmic programs used to detect motion object, also shows... more