首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
A primer on insider threats in cybersecurity 网络安全内部威胁入门
Pub Date : 2021-09-07 DOI: 10.1080/19393555.2021.1971802
Sunitha Prabhu, Nik Thompson
ABSTRACT Though human factors are increasingly being acknowledged as a contributor to cybersecurity incidents, this domain is not widely understood by those in technical and applied disciplines. Humans can be influenced, are not always rational or predictable, and must be studied through psychology rather than technology. Consequently, this domain may represent uncharted territory for the technical practitioner leaving many promising areas of research and practice unexplored. This paper provides a broad primer on human factors in cybersecurity, specifically focusing on the threat posed by organizational insiders. We emphasize the pivotal role that users play in determining overall system security and aim to introduce non-experts to this field, stimulating new interest in this intersection of humans and computers.
尽管人们越来越多地认识到人为因素是网络安全事件的一个促成因素,但技术和应用学科的人对这一领域的理解并不广泛。人类会受到影响,并不总是理性或可预测的,必须通过心理学而不是技术来研究。因此,对于技术从业者来说,这个领域可能代表了未知的领域,留下了许多有前途的研究和实践领域。本文提供了网络安全中的人为因素的广泛入门,特别关注组织内部人员构成的威胁。我们强调用户在确定整个系统安全性方面所起的关键作用,并旨在将非专家引入该领域,激发人们对这一人类和计算机交叉领域的新兴趣。
{"title":"A primer on insider threats in cybersecurity","authors":"Sunitha Prabhu, Nik Thompson","doi":"10.1080/19393555.2021.1971802","DOIUrl":"https://doi.org/10.1080/19393555.2021.1971802","url":null,"abstract":"ABSTRACT Though human factors are increasingly being acknowledged as a contributor to cybersecurity incidents, this domain is not widely understood by those in technical and applied disciplines. Humans can be influenced, are not always rational or predictable, and must be studied through psychology rather than technology. Consequently, this domain may represent uncharted territory for the technical practitioner leaving many promising areas of research and practice unexplored. This paper provides a broad primer on human factors in cybersecurity, specifically focusing on the threat posed by organizational insiders. We emphasize the pivotal role that users play in determining overall system security and aim to introduce non-experts to this field, stimulating new interest in this intersection of humans and computers.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model 应用自动机模型,提出了一种针对RPL路由攻击的智能轻量级入侵检测机制
Pub Date : 2021-09-07 DOI: 10.1080/19393555.2021.1971803
D. Gothawal, S. Nagaraj
ABSTRACT Routing Protocol for Low power and Lossy network (RPL) offers a set of mechanisms to attain efficient communication over resource-limited heterogeneous IoT environments. RPL attacks downgrade the network performance by disrupting the optimal protocol structure. So it is crucial to develop lightweight security solutions to detect such attacks and maximize the RPL performance. This paper designs an intelligent and lightweight IDS model named RPL Attacks based on Intrusion Detection for Efficient Routing (RAIDER) to reinforce security of RPL routing mechanism. RAIDER addresses the lack of security over RPL by analyzing the impacts of four RPL attacks using simulation, incorporates an automata theory with the IDS nodes to scrutinize the node behavior and to diminish the impact of such attacks. The IDS nodes monitor the network and periodically transplant the observed information as different states based on the finite automata theory. RAIDAR takes attack decisions based on the state transitions pre-estimated threshold of context-aware attack decision-making model and detects RPL attacks. RAIDER improves the RPL routing performance with minimum energy consumption. The Contiki Cooja-based simulation results demonstrate the efficiency of the RAIDER in terms of the packet delivery ratio, energy consumption, delay, overhead, attack detection accuracy, and network lifetime.
低功耗和损耗网络路由协议(RPL)提供了一套机制,以在资源有限的异构物联网环境中实现高效通信。RPL攻击通过破坏最优协议结构来降低网络性能。因此,开发轻量级安全解决方案来检测此类攻击并最大限度地提高RPL性能至关重要。为了增强RPL路由机制的安全性,本文设计了一种基于高效路由入侵检测(RAIDER)的智能轻量级入侵检测模型——RPL攻击。RAIDER通过模拟分析四种RPL攻击的影响,解决了RPL缺乏安全性的问题,将自动机理论与IDS节点结合起来,仔细检查节点行为并减少此类攻击的影响。IDS节点基于有限自动机理论对网络进行监测,并周期性地将观察到的信息移植为不同的状态。RAIDAR基于情境感知攻击决策模型的状态转移预估阈值进行攻击决策,检测RPL攻击。RAIDER以最小的能耗提高了RPL路由性能。基于Contiki cooja的仿真结果证明了RAIDER在数据包传输率、能量消耗、延迟、开销、攻击检测精度和网络生命周期等方面的效率。
{"title":"An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model","authors":"D. Gothawal, S. Nagaraj","doi":"10.1080/19393555.2021.1971803","DOIUrl":"https://doi.org/10.1080/19393555.2021.1971803","url":null,"abstract":"ABSTRACT Routing Protocol for Low power and Lossy network (RPL) offers a set of mechanisms to attain efficient communication over resource-limited heterogeneous IoT environments. RPL attacks downgrade the network performance by disrupting the optimal protocol structure. So it is crucial to develop lightweight security solutions to detect such attacks and maximize the RPL performance. This paper designs an intelligent and lightweight IDS model named RPL Attacks based on Intrusion Detection for Efficient Routing (RAIDER) to reinforce security of RPL routing mechanism. RAIDER addresses the lack of security over RPL by analyzing the impacts of four RPL attacks using simulation, incorporates an automata theory with the IDS nodes to scrutinize the node behavior and to diminish the impact of such attacks. The IDS nodes monitor the network and periodically transplant the observed information as different states based on the finite automata theory. RAIDAR takes attack decisions based on the state transitions pre-estimated threshold of context-aware attack decision-making model and detects RPL attacks. RAIDER improves the RPL routing performance with minimum energy consumption. The Contiki Cooja-based simulation results demonstrate the efficiency of the RAIDER in terms of the packet delivery ratio, energy consumption, delay, overhead, attack detection accuracy, and network lifetime.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Jack pandemus – Cyber incident and emergency response during a pandemic 大流行期间的网络事件和紧急响应
Pub Date : 2021-09-03 DOI: 10.1080/19393555.2021.1980159
Erik B. Korn, Douglas M. Fletcher, Erica M. Mitchell, Aryn A. Pyke, Steven M. Whitham
ABSTRACT COVID-19 quickly gave rise to a newly expansive space wrought with unforeseen vulnerabilities. Cyber threat actors swiftly identified this space and immediately began seizing targets of opportunity amid chaotic conditions. Recognizing this emerging challenge, our goal was to find a mechanism that would support better understanding of holistic cyber incident response in the context of emergency management amid pandemic circumstances. Therefore, we conducted Jack Pandemus, a distributed event that simulated concurrent cyber and emergency incident response challenges. This event first occurred with Charleston, South Carolina followed by Savannah, Georgia. Each iteration included public and private sector entities whose positions corresponded with real-world cyber incident and/or emergency response. Jack Pandemus introduced a cascading multisector cyber incident under pandemic conditions with a focus on identifying cross-sector gaps, dependencies, constraints, strengths, and lessons learned. Jack Pandemus ultimately revealed: that physical pandemic stressors can significantly impact cyber incident response; that emergency response remains primarily focused on pandemic impacts despite concurrent cyber consequences; that locally shared resources are quickly exhausted during a multisector crisis; that significant confusion remains between public and private sectors regarding how and when to request additional support; and that cybersecurity is not treated as an operational problem despite considerable cascading potential.
2019冠状病毒病(COVID-19)迅速催生了一个新的广阔空间,其中蕴含着不可预见的脆弱性。网络威胁行为者迅速发现了这个空间,并立即开始在混乱的环境中抓住机会。认识到这一新出现的挑战,我们的目标是找到一种机制,以支持在大流行情况下的应急管理背景下更好地理解整体网络事件响应。因此,我们进行了Jack Pandemus,这是一个模拟并发网络和紧急事件响应挑战的分布式事件。这一事件首先发生在南卡罗来纳州的查尔斯顿,然后是佐治亚州的萨凡纳。每次迭代都包括公共和私营部门实体,其立场与现实世界的网络事件和/或应急响应相对应。Jack Pandemus介绍了流行病条件下的级联多部门网络事件,重点是确定跨部门的差距、依赖关系、限制、优势和经验教训。Jack Pandemus最终揭示:物理流行病压力源可以显著影响网络事件响应;尽管同时存在网络后果,应急反应仍主要侧重于大流行的影响;在多部门危机中,地方共享资源会迅速枯竭;公共部门和私营部门在如何以及何时要求额外支持方面仍然存在严重的混乱;尽管网络安全具有巨大的连锁效应,但它并没有被视为一个操作问题。
{"title":"Jack pandemus – Cyber incident and emergency response during a pandemic","authors":"Erik B. Korn, Douglas M. Fletcher, Erica M. Mitchell, Aryn A. Pyke, Steven M. Whitham","doi":"10.1080/19393555.2021.1980159","DOIUrl":"https://doi.org/10.1080/19393555.2021.1980159","url":null,"abstract":"ABSTRACT COVID-19 quickly gave rise to a newly expansive space wrought with unforeseen vulnerabilities. Cyber threat actors swiftly identified this space and immediately began seizing targets of opportunity amid chaotic conditions. Recognizing this emerging challenge, our goal was to find a mechanism that would support better understanding of holistic cyber incident response in the context of emergency management amid pandemic circumstances. Therefore, we conducted Jack Pandemus, a distributed event that simulated concurrent cyber and emergency incident response challenges. This event first occurred with Charleston, South Carolina followed by Savannah, Georgia. Each iteration included public and private sector entities whose positions corresponded with real-world cyber incident and/or emergency response. Jack Pandemus introduced a cascading multisector cyber incident under pandemic conditions with a focus on identifying cross-sector gaps, dependencies, constraints, strengths, and lessons learned. Jack Pandemus ultimately revealed: that physical pandemic stressors can significantly impact cyber incident response; that emergency response remains primarily focused on pandemic impacts despite concurrent cyber consequences; that locally shared resources are quickly exhausted during a multisector crisis; that significant confusion remains between public and private sectors regarding how and when to request additional support; and that cybersecurity is not treated as an operational problem despite considerable cascading potential.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain 采用Hartley域混沌映射的RSA密码系统进行彩色图像加密
Pub Date : 2021-08-24 DOI: 10.1080/19393555.2021.1963018
Umar Hussain Mir, Deep Singh, Parveiz Nazir Lone
ABSTRACT This paper proposes an asymmetric encryption scheme for color images by introducing a new efficient triple-layered encryption scheme based on the RSA cryptosystem along with a chaotic map in the discrete Hartley domain. The present approach encrypts the image independently using the RSA cryptosystem and afterward transforms them into discrete Hartley domains to diffuse the image pixels. Further, the pixel positions are dislocated by applying a non-linear chaotic map to provide a complex structure of the scheme. The hardness of prime factorization of integers is intricacy in the RSA algorithm. The massive pixel confusion by a non-linear Hénon map gives rise to an efficient and robust system. Simulation results with performance analysis and the detailed comparison with extant systems assure robustness, validity, and security of the proposed scheme against various cryptanalytic attacks.
摘要:本文提出了一种基于RSA密码系统的彩色图像非对称加密方案,并在离散Hartley域上引入混沌映射。该方法使用RSA密码系统对图像进行独立加密,然后将其转换为离散的哈特利域以扩散图像像素。此外,通过应用非线性混沌映射使像素位置错位,以提供该方案的复杂结构。整数质因数分解的难度是RSA算法的复杂性。非线性hsamnon图的大量像素混淆产生了一个高效和鲁棒的系统。仿真结果与性能分析以及与现有系统的详细比较,保证了该方案对各种密码分析攻击的鲁棒性、有效性和安全性。
{"title":"Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain","authors":"Umar Hussain Mir, Deep Singh, Parveiz Nazir Lone","doi":"10.1080/19393555.2021.1963018","DOIUrl":"https://doi.org/10.1080/19393555.2021.1963018","url":null,"abstract":"ABSTRACT This paper proposes an asymmetric encryption scheme for color images by introducing a new efficient triple-layered encryption scheme based on the RSA cryptosystem along with a chaotic map in the discrete Hartley domain. The present approach encrypts the image independently using the RSA cryptosystem and afterward transforms them into discrete Hartley domains to diffuse the image pixels. Further, the pixel positions are dislocated by applying a non-linear chaotic map to provide a complex structure of the scheme. The hardness of prime factorization of integers is intricacy in the RSA algorithm. The massive pixel confusion by a non-linear Hénon map gives rise to an efficient and robust system. Simulation results with performance analysis and the detailed comparison with extant systems assure robustness, validity, and security of the proposed scheme against various cryptanalytic attacks.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130460535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A multi-stage chaotic encryption technique for medical image 医学图像的多阶段混沌加密技术
Pub Date : 2021-08-18 DOI: 10.1080/19393555.2021.1934197
Md. Siddiqur Rahman Tanveer, K. R. Alam, Y. Morimoto
ABSTRACT Usually, medical image relates to the disease. Its pixel distortion may cause an erroneous diagnosis. The multiple chaos-based encryptions can protect it significantly due to high sensitive control parameters. This paper proposes a multi-stage chaotic encryption technique by consecutively adopting Logistic map and Lorenz attractor to enrich the security level. At first, the usage of the Logistic map converts the plain medical image into a confusing image. Now, a confusion key encrypts this blur image. Later on, the involvement of the Lorenz attractor generates the final cipher image. Lastly, different security and statistical analyses including the National Institute of Standards and Technology (NIST) randomness test and comparisons ensure the strength of the cipher.
医学影像通常与疾病有关。其像素畸变可能导致错误诊断。由于控制参数的高灵敏度,基于混沌的多重加密可以对其进行有效的保护。本文提出了一种连续采用Logistic映射和Lorenz吸引子的多级混沌加密技术,以提高加密的安全性。首先,Logistic图的使用将普通的医学图像转换成混乱的图像。现在,一个混淆密钥加密了这个模糊的图像。稍后,洛伦兹吸引子的参与产生了最终的密码图像。最后,不同的安全和统计分析,包括美国国家标准与技术研究所(NIST)的随机性测试和比较,确保了密码的强度。
{"title":"A multi-stage chaotic encryption technique for medical image","authors":"Md. Siddiqur Rahman Tanveer, K. R. Alam, Y. Morimoto","doi":"10.1080/19393555.2021.1934197","DOIUrl":"https://doi.org/10.1080/19393555.2021.1934197","url":null,"abstract":"ABSTRACT Usually, medical image relates to the disease. Its pixel distortion may cause an erroneous diagnosis. The multiple chaos-based encryptions can protect it significantly due to high sensitive control parameters. This paper proposes a multi-stage chaotic encryption technique by consecutively adopting Logistic map and Lorenz attractor to enrich the security level. At first, the usage of the Logistic map converts the plain medical image into a confusing image. Now, a confusion key encrypts this blur image. Later on, the involvement of the Lorenz attractor generates the final cipher image. Lastly, different security and statistical analyses including the National Institute of Standards and Technology (NIST) randomness test and comparisons ensure the strength of the cipher.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PAC: Privacy preserving proxy re-encryption for access control in public cloud PAC:用于公共云访问控制的隐私保护代理重新加密
Pub Date : 2021-08-15 DOI: 10.1080/19393555.2021.1959679
Payal Chaudhari, M. Das
ABSTRACT Proxy re-encryption is an essential prerequisite that facilitates a foreign entity (e.g., cloud server) to enforce the access of provisions of a document extended by one user to another user. While performing this task it is essential that the foreign entity does not learn any information about the actual document inside the encrypted envelop. In this paper, we present a scheme on Privacy-preserving Proxy Re-encryption for Access Control in Public Cloud, termed as PAC, that provides the proxy re-encryption of attribute-based encrypted data with receiver privacy. The proposed PAC scheme enables a proxy server to perform the re-encryption operation without learning anything about the data or the access policy. The PAC provides data confidentiality, and preserves receiver privacy. We show the PAC scheme adaptively secure against indistinguishability of ciphertext policy and chosen-plaintext attack (IND-CP-CPA) under the 2-Decisional Bilinear Diffie-Hellman Inversion assumption. The scheme is implemented on Google cloud instance and the experimental results show that the PAC scheme is storage and computation-efficient when compared to other related schemes.
代理重新加密是促进外部实体(例如云服务器)强制访问由一个用户扩展到另一个用户的文档条款的必要先决条件。在执行此任务时,必须确保外部实体不了解加密信封内实际文档的任何信息。本文提出了一种用于公共云访问控制的保护隐私的代理重加密方案,称为PAC,该方案提供了基于属性的加密数据的代理重加密,并且具有接收者的隐私。所提出的PAC方案使代理服务器能够在不了解数据或访问策略的情况下执行重新加密操作。PAC提供数据机密性,并保护接收方的隐私。在2- decision双线性Diffie-Hellman反演假设下,我们展示了PAC方案对密文策略不可分辨性和选择明文攻击(IND-CP-CPA)的自适应安全性。该方案在Google云实例上实现,实验结果表明,与其他相关方案相比,PAC方案具有较高的存储效率和计算效率。
{"title":"PAC: Privacy preserving proxy re-encryption for access control in public cloud","authors":"Payal Chaudhari, M. Das","doi":"10.1080/19393555.2021.1959679","DOIUrl":"https://doi.org/10.1080/19393555.2021.1959679","url":null,"abstract":"ABSTRACT Proxy re-encryption is an essential prerequisite that facilitates a foreign entity (e.g., cloud server) to enforce the access of provisions of a document extended by one user to another user. While performing this task it is essential that the foreign entity does not learn any information about the actual document inside the encrypted envelop. In this paper, we present a scheme on Privacy-preserving Proxy Re-encryption for Access Control in Public Cloud, termed as PAC, that provides the proxy re-encryption of attribute-based encrypted data with receiver privacy. The proposed PAC scheme enables a proxy server to perform the re-encryption operation without learning anything about the data or the access policy. The PAC provides data confidentiality, and preserves receiver privacy. We show the PAC scheme adaptively secure against indistinguishability of ciphertext policy and chosen-plaintext attack (IND-CP-CPA) under the 2-Decisional Bilinear Diffie-Hellman Inversion assumption. The scheme is implemented on Google cloud instance and the experimental results show that the PAC scheme is storage and computation-efficient when compared to other related schemes.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127593656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new DCT based robust image watermarking scheme using cellular automata 一种新的基于元胞自动机的DCT鲁棒图像水印方案
Pub Date : 2021-08-09 DOI: 10.1080/19393555.2021.1956023
Manasi Jana, Biswapati Jana
ABSTRACT Modern research in image watermarking focuses not only on security but also increasing the payload without having any detectable signature within the media. In this paper, a new Discrete Cosine Transform (DCT)-based image watermarking scheme has been proposed using Cellular Automata (CA). Here, a color cover image is split into three color channels: Red, Green and Blue. Then, DCT is applied on 8 x 8 non-overlapping blocks of each channel followed by a ZigZag scanning. Before embedding, the watermark is encrypted by applying CA rule-15 to make it more secure and robust. The encrypted watermark logo is embedded through DCT coefficients modification using CA rule-340 and mapping table. The proposed scheme is compared with existing state-of-the-art algorithms with respect to embedding capacity, imperceptibility and robustness. Results of the simulation show good imperceptibility measured in terms of Peak Signal-to-Noise Ratio (PSNR) with an average value of 54 dB and simultaneously having high payload of 1.48 bpp. Experimental results under different standard attacks show the superiority of the proposed algorithm as compared with other schemes in the field of image watermarking.
现代图像水印的研究不仅关注安全性,而且还关注在媒体中不具有任何可检测签名的情况下增加有效载荷。提出了一种基于元胞自动机(CA)的离散余弦变换(DCT)图像水印算法。在这里,一个彩色封面图像被分成三个颜色通道:红色,绿色和蓝色。然后,DCT应用于每个通道的8 × 8非重叠块上,然后进行z字形扫描。在水印嵌入之前,采用CA规则15对水印进行加密,增强了水印的安全性和鲁棒性。利用CA规则340和映射表修改DCT系数,嵌入加密水印。在嵌入容量、不可感知性和鲁棒性方面,与现有的先进算法进行了比较。仿真结果表明,该系统的峰值信噪比(PSNR)平均值为54 dB,同时具有1.48 bpp的高负载,具有良好的不可感知性。在不同标准攻击下的实验结果表明了该算法在图像水印领域的优越性。
{"title":"A new DCT based robust image watermarking scheme using cellular automata","authors":"Manasi Jana, Biswapati Jana","doi":"10.1080/19393555.2021.1956023","DOIUrl":"https://doi.org/10.1080/19393555.2021.1956023","url":null,"abstract":"ABSTRACT Modern research in image watermarking focuses not only on security but also increasing the payload without having any detectable signature within the media. In this paper, a new Discrete Cosine Transform (DCT)-based image watermarking scheme has been proposed using Cellular Automata (CA). Here, a color cover image is split into three color channels: Red, Green and Blue. Then, DCT is applied on 8 x 8 non-overlapping blocks of each channel followed by a ZigZag scanning. Before embedding, the watermark is encrypted by applying CA rule-15 to make it more secure and robust. The encrypted watermark logo is embedded through DCT coefficients modification using CA rule-340 and mapping table. The proposed scheme is compared with existing state-of-the-art algorithms with respect to embedding capacity, imperceptibility and robustness. Results of the simulation show good imperceptibility measured in terms of Peak Signal-to-Noise Ratio (PSNR) with an average value of 54 dB and simultaneously having high payload of 1.48 bpp. Experimental results under different standard attacks show the superiority of the proposed algorithm as compared with other schemes in the field of image watermarking.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128589387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Public attitudes towards privacy in COVID-19 times in the Republic of Ireland: A pilot study 2019冠状病毒病时期爱尔兰共和国公众对隐私的态度:一项试点研究
Pub Date : 2021-08-08 DOI: 10.1080/19393555.2021.1956650
Malika Bendechache, P. Lohar, G. Xie, Rob Brennan, R. Trestian, Edoardo Celeste, K. Kapanova, E. Jayasekera, Irina Tal
ABSTRACT This research focuses on designing methods aimed at assessing Irish public attitudes regarding privacy in COVID-19 times and their influence on the adoption of COVID-19 spread control technology such as the COVID tracker app. The success of such technologies is dependent on their adoption rate and privacy concerns may be a factor delaying or preventing thus adoption. An online questionnaire was built to collect: demographic data, participant’s general privacy profile using the Privacy Segmentation Index (PSI) which classifies individuals into 3 groups (privacy fundamentalists, pragmatists, and unconcerned), and the attitudes toward privacy in COVID-19 times. The questionnaire was shared via websites and social networks. The data was collected between 27/08/2020 to 27/9/2020. We received and analyzed 258 responses. The initial pilot study found that almost 73% of the respondents were pragmatists or unconcerned about privacy when it came to sharing their private data. Comparable results were obtained with other privacy studies that have employed PSI. The pilot indicates a huge increase, from 12% pre-pandemic to 61% during the pandemic, of people willing to share their data. The questionnaire developed following this study is further used in a national survey on privacy in COVID-19 times.
本研究的重点是设计方法,旨在评估爱尔兰公众对COVID-19时代隐私的态度及其对COVID-19传播控制技术(如COVID跟踪应用程序)采用的影响。此类技术的成功取决于其采用率,隐私问题可能是延迟或阻止采用的因素。建立了一份在线问卷,收集人口统计数据,使用隐私分割指数(PSI)将个人分为3组(隐私原教旨主义者,实用主义者和漠不关心者)的参与者的一般隐私概况,以及COVID-19时期对隐私的态度。调查问卷通过网站和社交网络分享。数据收集时间为27/08/2020至27/9/2020。我们收到并分析了258份回复。最初的试点研究发现,在分享私人数据时,近73%的受访者是实用主义者或不关心隐私。与使用PSI的其他隐私研究获得了可比的结果。试点表明,愿意分享数据的人数大幅增加,从大流行前的12%增加到大流行期间的61%。本研究后编制的问卷进一步用于COVID-19时期的全国隐私调查。
{"title":"Public attitudes towards privacy in COVID-19 times in the Republic of Ireland: A pilot study","authors":"Malika Bendechache, P. Lohar, G. Xie, Rob Brennan, R. Trestian, Edoardo Celeste, K. Kapanova, E. Jayasekera, Irina Tal","doi":"10.1080/19393555.2021.1956650","DOIUrl":"https://doi.org/10.1080/19393555.2021.1956650","url":null,"abstract":"ABSTRACT This research focuses on designing methods aimed at assessing Irish public attitudes regarding privacy in COVID-19 times and their influence on the adoption of COVID-19 spread control technology such as the COVID tracker app. The success of such technologies is dependent on their adoption rate and privacy concerns may be a factor delaying or preventing thus adoption. An online questionnaire was built to collect: demographic data, participant’s general privacy profile using the Privacy Segmentation Index (PSI) which classifies individuals into 3 groups (privacy fundamentalists, pragmatists, and unconcerned), and the attitudes toward privacy in COVID-19 times. The questionnaire was shared via websites and social networks. The data was collected between 27/08/2020 to 27/9/2020. We received and analyzed 258 responses. The initial pilot study found that almost 73% of the respondents were pragmatists or unconcerned about privacy when it came to sharing their private data. Comparable results were obtained with other privacy studies that have employed PSI. The pilot indicates a huge increase, from 12% pre-pandemic to 61% during the pandemic, of people willing to share their data. The questionnaire developed following this study is further used in a national survey on privacy in COVID-19 times.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125646766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BYOD security issues: a systematic literature review BYOD安全问题:系统的文献综述
Pub Date : 2021-07-22 DOI: 10.1080/19393555.2021.1923873
Melva M. Ratchford, O. El-Gayar, C. Noteboom, Yong Wang
ABSTRACT Organizations are exposed to new security risks when they allow employees’ personal mobile devices to access the network and the corporate data (a phenomenon called ‘Bring Your Own Device’ or BYOD). They are confronted with inherent security issues that need to be addressed in order to protect the organization and its information. What are the security issues and considerations associated with BYOD environments? With this in mind, the objective of this paper is to present a systematic literature review of scholarly literature (2010–2019) with respect to BYOD security, and to suggest a classification scheme that depicts a holistic approach to securing BYOD environments. The results of this review include the analysis of 38 scholarly articles, where 22 security issues were identified. Based on the proposed classification scheme, the analysis of the findings shows that 86% of the articles identified security issues and considerations associated with the IT domain, 51% identified security issues related to the Management domain, 45% related to the Users domain, and 19% related to the Mobile Device domain. The results also show that BYOD security issues corresponding to policies are among the most frequently addressed concerns, followed by network security, data protection, user’s attitude/behavior and governance.
当企业允许员工的个人移动设备访问网络和企业数据时(这种现象被称为“自带设备”或BYOD),企业就面临着新的安全风险。他们面临着固有的安全问题,为了保护组织及其信息,需要解决这些问题。与BYOD环境相关的安全问题和注意事项是什么?考虑到这一点,本文的目标是对2010-2019年有关BYOD安全的学术文献进行系统的文献综述,并提出一种描述保护BYOD环境的整体方法的分类方案。本次审查的结果包括对38篇学术文章的分析,其中确定了22个安全问题。根据提出的分类方案,对调查结果的分析表明,86%的文章确定了与IT领域相关的安全问题和注意事项,51%确定了与管理领域相关的安全问题,45%与用户领域相关,19%与移动设备领域相关。调查结果还显示,与政策相对应的BYOD安全问题是最常被关注的问题,其次是网络安全、数据保护、用户态度/行为和治理。
{"title":"BYOD security issues: a systematic literature review","authors":"Melva M. Ratchford, O. El-Gayar, C. Noteboom, Yong Wang","doi":"10.1080/19393555.2021.1923873","DOIUrl":"https://doi.org/10.1080/19393555.2021.1923873","url":null,"abstract":"ABSTRACT Organizations are exposed to new security risks when they allow employees’ personal mobile devices to access the network and the corporate data (a phenomenon called ‘Bring Your Own Device’ or BYOD). They are confronted with inherent security issues that need to be addressed in order to protect the organization and its information. What are the security issues and considerations associated with BYOD environments? With this in mind, the objective of this paper is to present a systematic literature review of scholarly literature (2010–2019) with respect to BYOD security, and to suggest a classification scheme that depicts a holistic approach to securing BYOD environments. The results of this review include the analysis of 38 scholarly articles, where 22 security issues were identified. Based on the proposed classification scheme, the analysis of the findings shows that 86% of the articles identified security issues and considerations associated with the IT domain, 51% identified security issues related to the Management domain, 45% related to the Users domain, and 19% related to the Mobile Device domain. The results also show that BYOD security issues corresponding to policies are among the most frequently addressed concerns, followed by network security, data protection, user’s attitude/behavior and governance.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes 一种基于超混沌系统和多特定s盒的图像加密新方案
Pub Date : 2021-07-02 DOI: 10.1080/19393555.2021.1943572
A. H. Brahim, A. Ali-Pacha, N. Hadj-Said
ABSTRACT This paper studies a new image encryption scheme based on a hyperchaotic system & multi-specific S-boxes. First, the hyperchaotic system generates a sequence that is used to create a specific S-box. The S-box is obtained by sorting the values of the sequence of hyperchaotics of increasing sort, and then taking their index as a new sequence to create the S-box. The number of specific S-boxes needed to encrypt the image depends on the rows of the plain image. Second, each row of the plain image is substituted by a different S-box to obtain the rows of the pre-encrypted image. Third, to increase the level of security, each specific S-box is considered as a column of the mask matrix. Then, a permutation is applied to the mask matrix, which used the last sequence of the hyperchaotic to permuted the rows of the mask matrix to obtain the permuted mask matrix. Finally, the XOR operation is applied between the permuted mask matrix and the pre-encrypted image to obtain the final cipher image. Experimental and analysis results show that the proposed algorithm has a good performance in terms of security, high sensitivity, as well as low time complexity.
研究了一种基于超混沌系统和多特定s盒的图像加密方案。首先,超混沌系统生成用于创建特定s盒的序列。s盒是通过对递增排序的超混沌序列的值进行排序得到的,然后将它们的索引作为一个新的序列来创建s盒。加密图像所需的特定s -box的数量取决于普通图像的行数。其次,将普通图像的每一行替换为不同的s盒,以获得预加密图像的行。第三,为了提高安全级别,将每个特定的S-box视为掩码矩阵的一列。然后,对掩模矩阵进行置换,利用超混沌的最后一个序列对掩模矩阵的行进行置换,得到置换后的掩模矩阵。最后,在置换后的掩码矩阵与预加密图像之间进行异或运算,得到最终的密码图像。实验和分析结果表明,该算法具有较好的安全性、较高的灵敏度和较低的时间复杂度。
{"title":"A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes","authors":"A. H. Brahim, A. Ali-Pacha, N. Hadj-Said","doi":"10.1080/19393555.2021.1943572","DOIUrl":"https://doi.org/10.1080/19393555.2021.1943572","url":null,"abstract":"ABSTRACT This paper studies a new image encryption scheme based on a hyperchaotic system & multi-specific S-boxes. First, the hyperchaotic system generates a sequence that is used to create a specific S-box. The S-box is obtained by sorting the values of the sequence of hyperchaotics of increasing sort, and then taking their index as a new sequence to create the S-box. The number of specific S-boxes needed to encrypt the image depends on the rows of the plain image. Second, each row of the plain image is substituted by a different S-box to obtain the rows of the pre-encrypted image. Third, to increase the level of security, each specific S-box is considered as a column of the mask matrix. Then, a permutation is applied to the mask matrix, which used the last sequence of the hyperchaotic to permuted the rows of the mask matrix to obtain the permuted mask matrix. Finally, the XOR operation is applied between the permuted mask matrix and the pre-encrypted image to obtain the final cipher image. Experimental and analysis results show that the proposed algorithm has a good performance in terms of security, high sensitivity, as well as low time complexity.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114835769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1