首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Enhancing Perceptron Constancy for Real-World Dynamic Hand Gesture Authentication 增强感知器恒常性的真实世界动态手势认证
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-25 DOI: 10.1109/TIFS.2025.3648567
Yufeng Zhang;Xilai Wang;Wenwei Song;Wenxiong Kang
Dynamic hand gesture authentication (DHGA) has emerged as a promising biometric technology, offering enhanced theoretical security over conventional unimodal systems by combining both physiological and behavioral characteristics. Existing DHGA research predominantly focuses on controlled lab conditions, therefore showing low generalizability to uncontrolled application conditions. To bridge this gap, we propose a novel Skeleton-assistant Standardization and Authentication Framework (SSAF) that incorporates a generic data preprocessing method before authentication. First, we introduce a Geometry-Environment Standardization (GE-Stan) method to standardize five primary geometric and environmental factors inducing data distribution discrepancy, significantly improving robustness across different sessions and scenarios. Notably, the GE-Stan method can be applied to most existing algorithms and brings substantial improvement. Second, we design an Appearance and Motion Network (AM-Net) to fully leverage standardized video and skeleton data. It decouples appearance and motion features using specialized representation and processing strategies. Therefore, our SSAF achieves a flexible balance between accuracy and efficiency, enabling up to $3.6times $ efficiency boost with only minor accuracy trade-offs. Finally, to support real-world evaluation, we also contribute a new challenging dataset, SCUT-RealDHGA, captured under uncontrolled practical conditions with diverse backgrounds and illuminations. Extensive experiments across three DHGA datasets demonstrate that SSAF outperforms existing methods in terms of accuracy, efficiency, and robustness. The code and dataset are available at https://github.com/SCUT-BIP-Lab/SSAF
动态手势认证(DHGA)已经成为一种很有前途的生物识别技术,通过结合生理和行为特征,提供了比传统单峰系统更高的理论安全性。现有的DHGA研究主要集中在受控的实验室条件下,因此对非受控应用条件的通用性较低。为了弥补这一差距,我们提出了一种新的骨架辅助标准化和认证框架(SSAF),该框架在认证之前包含了通用的数据预处理方法。首先,我们引入了一种几何-环境标准化(GE-Stan)方法,对导致数据分布差异的五个主要几何和环境因素进行标准化,显著提高了不同会话和场景的鲁棒性。值得注意的是,GE-Stan方法可以应用于大多数现有算法,并带来了实质性的改进。其次,我们设计了一个外观和运动网络(AM-Net)来充分利用标准化的视频和骨架数据。它使用专门的表示和处理策略来解耦外观和运动特征。因此,我们的SSAF在精度和效率之间实现了灵活的平衡,在只有很小的精度权衡的情况下,实现了高达3.6倍的效率提升。最后,为了支持现实世界的评估,我们还提供了一个新的具有挑战性的数据集SCUT-RealDHGA,该数据集是在具有不同背景和照明的不受控制的实际条件下捕获的。在三个DHGA数据集上进行的大量实验表明,SSAF在准确性、效率和鲁棒性方面优于现有方法。代码和数据集可从https://github.com/SCUT-BIP-Lab/SSAF获得
{"title":"Enhancing Perceptron Constancy for Real-World Dynamic Hand Gesture Authentication","authors":"Yufeng Zhang;Xilai Wang;Wenwei Song;Wenxiong Kang","doi":"10.1109/TIFS.2025.3648567","DOIUrl":"10.1109/TIFS.2025.3648567","url":null,"abstract":"Dynamic hand gesture authentication (DHGA) has emerged as a promising biometric technology, offering enhanced theoretical security over conventional unimodal systems by combining both physiological and behavioral characteristics. Existing DHGA research predominantly focuses on controlled lab conditions, therefore showing low generalizability to uncontrolled application conditions. To bridge this gap, we propose a novel Skeleton-assistant Standardization and Authentication Framework (SSAF) that incorporates a generic data preprocessing method before authentication. First, we introduce a Geometry-Environment Standardization (GE-Stan) method to standardize five primary geometric and environmental factors inducing data distribution discrepancy, significantly improving robustness across different sessions and scenarios. Notably, the GE-Stan method can be applied to most existing algorithms and brings substantial improvement. Second, we design an Appearance and Motion Network (AM-Net) to fully leverage standardized video and skeleton data. It decouples appearance and motion features using specialized representation and processing strategies. Therefore, our SSAF achieves a flexible balance between accuracy and efficiency, enabling up to <inline-formula> <tex-math>$3.6times $ </tex-math></inline-formula> efficiency boost with only minor accuracy trade-offs. Finally, to support real-world evaluation, we also contribute a new challenging dataset, SCUT-RealDHGA, captured under uncontrolled practical conditions with diverse backgrounds and illuminations. Extensive experiments across three DHGA datasets demonstrate that SSAF outperforms existing methods in terms of accuracy, efficiency, and robustness. The code and dataset are available at <uri>https://github.com/SCUT-BIP-Lab/SSAF</uri>","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"886-899"},"PeriodicalIF":8.0,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Patch-Based Noise Compression for Adversarial Attack Against Transformer-Based Visual Tracking 基于patch的噪声压缩对抗基于变压器的视觉跟踪
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-25 DOI: 10.1109/TIFS.2025.3648551
Peng Gao;Long Xu;Wen-Jia Tang;Fei Wang;Hamido Fujita;Hanan Aljuaid;Ru-Yue Yuan
In recent years, with the widespread application of Vision Transformer (ViT) in visual trackers, their robustness has received increasing attention. However, by focusing on global interactions between image patches, ViT reduces sensitivity to local noise, posing new challenges for adversarial attacks. Meanwhile, existing decision-based adversarial attack methods often overlook the differences in noise sensitivity between different patches, further limiting the compression efficiency of adversarial noise, especially in ViT. In visual tracking, existing adversarial attack methods primarily target Siamese network-based trackers, and research on adversarial attacks against Transformer-based trackers, particularly decision-based black-box attacks, is still relatively limited. To implement effective black-box attacks on Transformer-based trackers, this paper innovatively proposes patch-based adversarial noise compression (PANC), a decision-based adversarial attack method. This method effectively compresses adversarial noise patch by patch, significantly improving compression efficiency and attack concealment. PANC also introduces a noise sensitivity matrix that dynamically adds and reduces adversarial noise, optimizing the spatial distribution of noise while decreasing the number of queries. We validated the effectiveness of the proposed PANC attack method on several Transformer-based trackers, including OSTrack, STARK, TransT, and MixformerV2, and three public large-scale benchmark datasets: GOT-10k, TrackingNet, and LaSOT. Experimental results show that compared to the existing state-of-the-art adversarial attack method, the IoU attack, PANC compresses the noise level to 10%, improving the attack effectiveness by 162% with the number of queries of only 45.7%. Furthermore, PANC can serve as an initialization or post-processing optimization strategy for other adversarial attack methods, providing a more flexible and efficient mechanism for adversarial example generation. Our work reveals the vulnerabilities of existing Transformer-based visual trackers and offers new ideas for further improving the efficiency and concealment of adversarial attacks.
近年来,随着视觉变压器(Vision Transformer, ViT)在视觉跟踪器中的广泛应用,其鲁棒性受到越来越多的关注。然而,通过关注图像补丁之间的全局相互作用,ViT降低了对局部噪声的敏感性,为对抗性攻击提出了新的挑战。同时,现有的基于决策的对抗攻击方法往往忽略了不同斑块之间噪声敏感性的差异,进一步限制了对抗噪声的压缩效率,特别是在ViT中。在视觉跟踪中,现有的对抗性攻击方法主要针对基于Siamese网络的跟踪器,而针对基于transformer的跟踪器的对抗性攻击,特别是基于决策的黑箱攻击的研究还比较有限。为了对基于变压器的跟踪器实施有效的黑盒攻击,本文创新性地提出了一种基于决策的对抗攻击方法——基于补丁的对抗噪声压缩(PANC)。该方法有效地对对抗噪声进行逐块压缩,显著提高了压缩效率和攻击隐蔽性。PANC还引入了一个噪声灵敏度矩阵,该矩阵可以动态地添加和减少对抗性噪声,优化噪声的空间分布,同时减少查询次数。我们在几个基于transformer的跟踪器(包括OSTrack、STARK、TransT和MixformerV2)以及三个公共大规模基准数据集(GOT-10k、TrackingNet和LaSOT)上验证了所提出的PANC攻击方法的有效性。实验结果表明,与现有最先进的对抗性攻击方法IoU攻击相比,PANC将噪声水平压缩到10%,攻击效率提高了162%,查询次数仅为45.7%。此外,PANC还可以作为其他对抗性攻击方法的初始化或后处理优化策略,为对抗性示例生成提供更灵活有效的机制。我们的工作揭示了现有的基于变形器的视觉跟踪器的漏洞,并为进一步提高对抗性攻击的效率和隐蔽性提供了新的思路。
{"title":"Towards Patch-Based Noise Compression for Adversarial Attack Against Transformer-Based Visual Tracking","authors":"Peng Gao;Long Xu;Wen-Jia Tang;Fei Wang;Hamido Fujita;Hanan Aljuaid;Ru-Yue Yuan","doi":"10.1109/TIFS.2025.3648551","DOIUrl":"10.1109/TIFS.2025.3648551","url":null,"abstract":"In recent years, with the widespread application of Vision Transformer (ViT) in visual trackers, their robustness has received increasing attention. However, by focusing on global interactions between image patches, ViT reduces sensitivity to local noise, posing new challenges for adversarial attacks. Meanwhile, existing decision-based adversarial attack methods often overlook the differences in noise sensitivity between different patches, further limiting the compression efficiency of adversarial noise, especially in ViT. In visual tracking, existing adversarial attack methods primarily target Siamese network-based trackers, and research on adversarial attacks against Transformer-based trackers, particularly decision-based black-box attacks, is still relatively limited. To implement effective black-box attacks on Transformer-based trackers, this paper innovatively proposes patch-based adversarial noise compression (PANC), a decision-based adversarial attack method. This method effectively compresses adversarial noise patch by patch, significantly improving compression efficiency and attack concealment. PANC also introduces a noise sensitivity matrix that dynamically adds and reduces adversarial noise, optimizing the spatial distribution of noise while decreasing the number of queries. We validated the effectiveness of the proposed PANC attack method on several Transformer-based trackers, including OSTrack, STARK, TransT, and MixformerV2, and three public large-scale benchmark datasets: GOT-10k, TrackingNet, and LaSOT. Experimental results show that compared to the existing state-of-the-art adversarial attack method, the IoU attack, PANC compresses the noise level to 10%, improving the attack effectiveness by 162% with the number of queries of only 45.7%. Furthermore, PANC can serve as an initialization or post-processing optimization strategy for other adversarial attack methods, providing a more flexible and efficient mechanism for adversarial example generation. Our work reveals the vulnerabilities of existing Transformer-based visual trackers and offers new ideas for further improving the efficiency and concealment of adversarial attacks.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"854-869"},"PeriodicalIF":8.0,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coffer: An Efficient and Scalable TEE on RISC-V 保险箱:基于RISC-V的高效可扩展TEE
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-25 DOI: 10.1109/tifs.2025.3648190
Mingde Ren, Jiatong Chen, Ziquan Wang, Fengwei Zhang, Zhenyu Ning, Heming Cui
{"title":"Coffer: An Efficient and Scalable TEE on RISC-V","authors":"Mingde Ren, Jiatong Chen, Ziquan Wang, Fengwei Zhang, Zhenyu Ning, Heming Cui","doi":"10.1109/tifs.2025.3648190","DOIUrl":"https://doi.org/10.1109/tifs.2025.3648190","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"126 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing the Potential of Tracklets for Unsupervised Video Person Re-Identification 释放追踪器在无监督视频人员再识别中的潜力
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/TIFS.2025.3648202
Nanxing Meng;Qizao Wang;Bin Li;Xiangyang Xue
With rich temporal-spatial information, video-based person re-identification methods have shown broad prospects. Although tracklets can be easily obtained with ready-made tracking models, annotating identities is still expensive and impractical. Therefore, some video-based methods propose using only a few identity annotations or camera labels to facilitate feature learning. They also simply average the frame features of each tracklet, overlooking unexpected variations and inherent identity consistency within tracklets. In this paper, we propose the Self-Supervised Refined Clustering (SSR-C) framework without relying on any annotation or auxiliary information to promote unsupervised video person re-identification. Specifically, we first propose the Noise-Filtered Tracklet Partition (NFTP) module to reduce the feature bias of tracklets caused by noisy tracking results, and sequentially partition the noise-filtered tracklets into “sub-tracklets”. Then, we cluster and further merge sub-tracklets using the self-supervised signal from the tracklet partition, which is enhanced through a progressive strategy to generate reliable pseudo labels, facilitating intra-class cross-tracklet aggregation. Moreover, we propose the Class Smoothing Classification (CSC) loss to efficiently promote model learning. Extensive experiments on the MARS and DukeMTMC-VideoReID datasets demonstrate that our proposed SSR-C for unsupervised video person re-identification achieves state-of-the-art results and is comparable to advanced supervised methods. The code is available at https://github.com/Darylmeng/SSRC-Reid
基于视频的人物再识别方法具有丰富的时空信息,具有广阔的应用前景。虽然tracklet可以很容易地获得现成的跟踪模型,但标注身份仍然是昂贵和不切实际的。因此,一些基于视频的方法提出仅使用少量身份注释或相机标签来促进特征学习。它们也简单地平均每个轨道的框架特征,忽略了意想不到的变化和轨道内部固有的身份一致性。在本文中,我们提出了不依赖任何注释或辅助信息的自监督精细化聚类(SSR-C)框架来促进无监督视频人物的再识别。具体来说,我们首先提出了噪声滤波轨道分割(NFTP)模块,以减少噪声跟踪结果引起的轨道特征偏差,并将噪声滤波后的轨道依次划分为“子轨道”。然后,我们利用来自tracklet分区的自监督信号对子tracklet进行聚类和进一步合并,并通过渐进策略生成可靠的伪标签来增强子tracklet,从而促进类内交叉tracklet聚合。此外,我们提出了类平滑分类(CSC)损失来有效地促进模型学习。在MARS和DukeMTMC-VideoReID数据集上进行的大量实验表明,我们提出的用于无监督视频人员再识别的SSR-C达到了最先进的结果,可与先进的监督方法相媲美。代码可在https://github.com/Darylmeng/SSRC-Reid上获得
{"title":"Unleashing the Potential of Tracklets for Unsupervised Video Person Re-Identification","authors":"Nanxing Meng;Qizao Wang;Bin Li;Xiangyang Xue","doi":"10.1109/TIFS.2025.3648202","DOIUrl":"10.1109/TIFS.2025.3648202","url":null,"abstract":"With rich temporal-spatial information, video-based person re-identification methods have shown broad prospects. Although tracklets can be easily obtained with ready-made tracking models, annotating identities is still expensive and impractical. Therefore, some video-based methods propose using only a few identity annotations or camera labels to facilitate feature learning. They also simply average the frame features of each tracklet, overlooking unexpected variations and inherent identity consistency within tracklets. In this paper, we propose the Self-Supervised Refined Clustering (SSR-C) framework without relying on any annotation or auxiliary information to promote unsupervised video person re-identification. Specifically, we first propose the Noise-Filtered Tracklet Partition (NFTP) module to reduce the feature bias of tracklets caused by noisy tracking results, and sequentially partition the noise-filtered tracklets into “sub-tracklets”. Then, we cluster and further merge sub-tracklets using the self-supervised signal from the tracklet partition, which is enhanced through a progressive strategy to generate reliable pseudo labels, facilitating intra-class cross-tracklet aggregation. Moreover, we propose the Class Smoothing Classification (CSC) loss to efficiently promote model learning. Extensive experiments on the MARS and DukeMTMC-VideoReID datasets demonstrate that our proposed SSR-C for unsupervised video person re-identification achieves state-of-the-art results and is comparable to advanced supervised methods. The code is available at <uri>https://github.com/Darylmeng/SSRC-Reid</uri>","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"431-445"},"PeriodicalIF":8.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stinger: A Light-weight Website Fingerprinting Defense through Poisoning Packet Sequences 毒刺:通过毒化包序列的轻量级网站指纹防御
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/tifs.2025.3646493
Lihai Nie, Xiaodong Dong, Lili Shi, Laiping Zhao, Zheli Liu
{"title":"Stinger: A Light-weight Website Fingerprinting Defense through Poisoning Packet Sequences","authors":"Lihai Nie, Xiaodong Dong, Lili Shi, Laiping Zhao, Zheli Liu","doi":"10.1109/tifs.2025.3646493","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646493","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"4 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iAudit: Toward Efficient Pixel-Level Dynamic Image Auditing in Decentralized Storage iAudit:在分散存储中实现高效的像素级动态图像审计
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/TIFS.2025.3648191
Haiyang Yu;Yinglong Gao;Shen Su;Zhen Yang;Yuwen Chen;Shui Yu
Decentralized storage auditing approaches are designed to ensure data security in dishonest decentralized storage providers. However, the need for data updates introduces new challenges to the design of decentralized storage auditing approaches. Existing approaches can support dynamic auditing for updated files. Unfortunately, they can only deal with block-level updating, which is counter-intuitive and requires conversion from semantic changes to binary changes. Furthermore, existing dynamic auditing approaches require the recalculation of auxiliary auditing information (e.g., auditing authenticators) in data owners, which imposes unnecessary additional burdens on data owners, particularly those with constrained resources in decentralized storage environments. In this paper, we focus on image files and propose $textsf {iAudit}$ , an efficient pixel-level dynamic image auditing approach in decentralized storage. We first design a novel image authenticator with image pixels for efficient dynamic auditing, which combines convolution operations and polynomial commitment in authenticator construction. Additionally, we build an owner-free dynamic mechanism in dynamic decentralized storage auditing approach by utilizing zero-knowledge proof techniques. In this way, the dynamic operation overheads incurred by auditing can be completely eliminated from the data owners. A prototype of $textsf {iAudit}$ is implemented, and extensive experimental results demonstrate that $textsf {iAudit}$ outperforms state-of-the-art works, achieving over a $210 times $ speedup for data owner in dynamic update phase.
分散存储审计方法旨在确保不诚实的分散存储提供商的数据安全。然而,数据更新的需求给分散存储审计方法的设计带来了新的挑战。现有的方法可以支持对更新的文件进行动态审计。不幸的是,它们只能处理块级更新,这是违反直觉的,并且需要从语义更改转换为二进制更改。此外,现有的动态审计方法需要重新计算数据所有者的辅助审计信息(例如审计验证器),这给数据所有者带来了不必要的额外负担,特别是那些在分散存储环境中资源受限的数据所有者。在本文中,我们专注于图像文件,并提出了$textsf {iAudit}$,这是一种在分散存储中高效的像素级动态图像审计方法。我们首先设计了一种新的图像像素图像认证器,该图像认证器将卷积运算和多项式承诺相结合,用于高效的动态审计。此外,我们利用零知识证明技术在动态分散存储审计方法中构建了无所有者动态机制。通过这种方式,审计产生的动态操作开销可以从数据所有者那里完全消除。实现了$textsf {iAudit}$的原型,大量的实验结果表明$textsf {iAudit}$优于最先进的作品,在动态更新阶段为数据所有者实现了超过210倍的$加速。
{"title":"iAudit: Toward Efficient Pixel-Level Dynamic Image Auditing in Decentralized Storage","authors":"Haiyang Yu;Yinglong Gao;Shen Su;Zhen Yang;Yuwen Chen;Shui Yu","doi":"10.1109/TIFS.2025.3648191","DOIUrl":"10.1109/TIFS.2025.3648191","url":null,"abstract":"Decentralized storage auditing approaches are designed to ensure data security in dishonest decentralized storage providers. However, the need for data updates introduces new challenges to the design of decentralized storage auditing approaches. Existing approaches can support dynamic auditing for updated files. Unfortunately, they can only deal with block-level updating, which is counter-intuitive and requires conversion from semantic changes to binary changes. Furthermore, existing dynamic auditing approaches require the recalculation of auxiliary auditing information (e.g., auditing authenticators) in data owners, which imposes unnecessary additional burdens on data owners, particularly those with constrained resources in decentralized storage environments. In this paper, we focus on image files and propose <inline-formula> <tex-math>$textsf {iAudit}$ </tex-math></inline-formula>, an efficient pixel-level dynamic image auditing approach in decentralized storage. We first design a novel image authenticator with image pixels for efficient dynamic auditing, which combines convolution operations and polynomial commitment in authenticator construction. Additionally, we build an owner-free dynamic mechanism in dynamic decentralized storage auditing approach by utilizing zero-knowledge proof techniques. In this way, the dynamic operation overheads incurred by auditing can be completely eliminated from the data owners. A prototype of <inline-formula> <tex-math>$textsf {iAudit}$ </tex-math></inline-formula> is implemented, and extensive experimental results demonstrate that <inline-formula> <tex-math>$textsf {iAudit}$ </tex-math></inline-formula> outperforms state-of-the-art works, achieving over a <inline-formula> <tex-math>$210 times $ </tex-math></inline-formula> speedup for data owner in dynamic update phase.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"913-928"},"PeriodicalIF":8.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HySpeFAS: A Hyperspectral Face Anti-spoofing Dataset based on Snapshot Compressive Imaging HySpeFAS:基于快照压缩成像的高光谱人脸抗欺骗数据集
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/tifs.2025.3648158
Shijie Rao, Yidong Huang, Xueqian Zhang, Hao Fang, Ajian Liu, Jun Wan, Kaiyu Cui, Yali Li
{"title":"HySpeFAS: A Hyperspectral Face Anti-spoofing Dataset based on Snapshot Compressive Imaging","authors":"Shijie Rao, Yidong Huang, Xueqian Zhang, Hao Fang, Ajian Liu, Jun Wan, Kaiyu Cui, Yali Li","doi":"10.1109/tifs.2025.3648158","DOIUrl":"https://doi.org/10.1109/tifs.2025.3648158","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"45 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy 通过混合关联和冗余加速三方布尔电路
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/tifs.2025.3648188
Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jin-Song Dong
{"title":"ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy","authors":"Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jin-Song Dong","doi":"10.1109/tifs.2025.3648188","DOIUrl":"https://doi.org/10.1109/tifs.2025.3648188","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Search Me in the Dark: Access Pattern-Hidden Range Query Over Encrypted Spatial Data 在黑暗中搜索我:加密空间数据的访问模式隐藏范围查询
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/TIFS.2025.3648161
Yinbin Miao;Xin Wang;Guijuan Wang;Yibing Wang;Kaifa Zheng;Xinghua Li;Zhiquan Liu;Robert H. Deng
With the widespread use of encrypted spatial data, many range query schemes emerge to address potential security risks caused by access pattern leakage. However, most existing schemes rely on a dual-server model to hide access patterns and often involve complex spatial relation judgments during range comparisons, leading to low query efficiency. To address these issues, we propose a novel Fast and Access Hidden Range Query (FAHRQ) scheme. First, we introduce an efficient range membership verification technique based on Bloom filters and Lagrange interpolation function, combine homomorphic encryption to ensure the confidentiality of spatial data and the computational flexibility of related operations, and realize the access pattern hidden under single server. Then, we construct an index using R-tree and employ Bloom filters and prefix 0-1 encoding to accelerate the minimum bounding rectangle intersection judgment, enabling secure and efficient range queries over encrypted spatial data while maintaining retrieval accuracy. Finally, we give a formal security analysis to show that our scheme achieves access pattern hidden while protecting data security, and conduct extensive experiments to demonstrate that our scheme improves query efficiency by $5-7times $ compared to existing schemes.
随着加密空间数据的广泛使用,为了解决访问模式泄露带来的安全风险,出现了许多范围查询方案。然而,现有方案大多依赖于双服务器模型来隐藏访问模式,并且在范围比较时往往涉及复杂的空间关系判断,导致查询效率较低。为了解决这些问题,我们提出了一种新的快速访问隐藏范围查询(FAHRQ)方案。首先,引入基于布卢姆滤波器和拉格朗日插值函数的有效距离隶属度验证技术,结合同态加密保证空间数据的保密性和相关操作的计算灵活性,实现隐藏在单个服务器下的访问模式;然后,我们使用R-tree构造索引,并使用Bloom过滤器和前缀0-1编码来加速最小边界矩形交集的判断,在保证检索精度的同时,对加密空间数据进行安全高效的范围查询。最后,我们给出了一个正式的安全性分析,表明我们的方案在保护数据安全的同时实现了访问模式隐藏,并进行了大量的实验,证明我们的方案与现有方案相比,查询效率提高了5-7倍。
{"title":"Search Me in the Dark: Access Pattern-Hidden Range Query Over Encrypted Spatial Data","authors":"Yinbin Miao;Xin Wang;Guijuan Wang;Yibing Wang;Kaifa Zheng;Xinghua Li;Zhiquan Liu;Robert H. Deng","doi":"10.1109/TIFS.2025.3648161","DOIUrl":"10.1109/TIFS.2025.3648161","url":null,"abstract":"With the widespread use of encrypted spatial data, many range query schemes emerge to address potential security risks caused by access pattern leakage. However, most existing schemes rely on a dual-server model to hide access patterns and often involve complex spatial relation judgments during range comparisons, leading to low query efficiency. To address these issues, we propose a novel Fast and Access Hidden Range Query (FAHRQ) scheme. First, we introduce an efficient range membership verification technique based on Bloom filters and Lagrange interpolation function, combine homomorphic encryption to ensure the confidentiality of spatial data and the computational flexibility of related operations, and realize the access pattern hidden under single server. Then, we construct an index using R-tree and employ Bloom filters and prefix 0-1 encoding to accelerate the minimum bounding rectangle intersection judgment, enabling secure and efficient range queries over encrypted spatial data while maintaining retrieval accuracy. Finally, we give a formal security analysis to show that our scheme achieves access pattern hidden while protecting data security, and conduct extensive experiments to demonstrate that our scheme improves query efficiency by <inline-formula> <tex-math>$5-7times $ </tex-math></inline-formula> compared to existing schemes.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"784-797"},"PeriodicalIF":8.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BAPTISM: A Robust Framework for Encrypted Malicious Traffic Identification With Low-Quality Training Data 洗礼:一个基于低质量训练数据的加密恶意流量识别鲁棒框架
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1109/TIFS.2025.3648170
Xiang Luo;Chang Liu;Gang Xiong;Gaopeng Gou;Zhen Li;Junzheng Shi;Li Guo;Binxing Fang
Machine learning (ML) is highly effective for accurate encrypted malicious traffic identification by using high-quality training data. In fact, obtaining such data is costly and challenging. As a result, many ML-based models are inevitably trained on low-quality data and perform poorly. To enhance performance, some methods utilize various sample selection techniques to choose confident samples for model training. However, they often rely on a single metric for this selection, which restricts their adaptability across diverse datasets and noise conditions. In this paper, we propose a robust framework BAPTISM for identifying encrypted malicious traffic with low-quality training data. Particularly, BAPTISM selects a suitable base model for each task, and trains it with early stopping to generate traffic representation before overfitting occurs. Then, we devise an adaptive metric selection strategy to select confident samples. By employing two metrics (JSD and CSD) to assess the characteristic of traffic representation from distinct perspectives, we find the more proper metric for each class and apply it for confident sample selection. According to the confident samples and selected metric for each class, we develop a label correction tactic which adapts to class nature to improve the quality of training data. Finally, we employ parallel training strategy to train the base model with the corrected data, further mitigating the impact of low-quality data. We conduct experiments across three real-world malicious traffic datasets with various noise settings. The results demonstrate that BAPTISM is compatible with different base models and outperforms across noise ratios ranging from 20% to 90%. Meanwhile, BAPTISM consistently selects the confident samples with the highest purity and volume under each setting.
机器学习(ML)通过使用高质量的训练数据,对准确的加密恶意流量识别非常有效。事实上,获得这样的数据既昂贵又具有挑战性。因此,许多基于ml的模型不可避免地在低质量数据上进行训练,并且表现不佳。为了提高性能,一些方法利用各种样本选择技术来选择可信样本进行模型训练。然而,它们通常依赖于单一指标进行选择,这限制了它们在不同数据集和噪声条件下的适应性。在本文中,我们提出了一个鲁棒的洗礼框架来识别具有低质量训练数据的加密恶意流量。其中,BAPTISM为每个任务选择合适的基模型,并在过拟合发生前对其进行早期停车训练,生成交通表示。然后,我们设计了一种自适应度量选择策略来选择可信样本。通过采用两个度量(JSD和CSD)从不同的角度评估流量表示的特征,我们为每个类找到了更合适的度量,并将其应用于自信样本选择。根据每个类别的置信样本和选择的度量,我们开发了一种适应类别性质的标签校正策略,以提高训练数据的质量。最后,我们采用并行训练策略,用修正后的数据训练基础模型,进一步减轻低质量数据的影响。我们在三个具有不同噪声设置的真实世界恶意流量数据集上进行实验。结果表明,该方法与不同的基本模型兼容,并且在噪声比为20% ~ 90%的范围内表现优异。同时,在每一种设置下,洗礼始终如一地选择纯度和体积最高的有信心的样品。
{"title":"BAPTISM: A Robust Framework for Encrypted Malicious Traffic Identification With Low-Quality Training Data","authors":"Xiang Luo;Chang Liu;Gang Xiong;Gaopeng Gou;Zhen Li;Junzheng Shi;Li Guo;Binxing Fang","doi":"10.1109/TIFS.2025.3648170","DOIUrl":"10.1109/TIFS.2025.3648170","url":null,"abstract":"Machine learning (ML) is highly effective for accurate encrypted malicious traffic identification by using high-quality training data. In fact, obtaining such data is costly and challenging. As a result, many ML-based models are inevitably trained on low-quality data and perform poorly. To enhance performance, some methods utilize various sample selection techniques to choose confident samples for model training. However, they often rely on a single metric for this selection, which restricts their adaptability across diverse datasets and noise conditions. In this paper, we propose a robust framework BAPTISM for identifying encrypted malicious traffic with low-quality training data. Particularly, BAPTISM selects a suitable base model for each task, and trains it with early stopping to generate traffic representation before overfitting occurs. Then, we devise an adaptive metric selection strategy to select confident samples. By employing two metrics (JSD and CSD) to assess the characteristic of traffic representation from distinct perspectives, we find the more proper metric for each class and apply it for confident sample selection. According to the confident samples and selected metric for each class, we develop a label correction tactic which adapts to class nature to improve the quality of training data. Finally, we employ parallel training strategy to train the base model with the corrected data, further mitigating the impact of low-quality data. We conduct experiments across three real-world malicious traffic datasets with various noise settings. The results demonstrate that BAPTISM is compatible with different base models and outperforms across noise ratios ranging from 20% to 90%. Meanwhile, BAPTISM consistently selects the confident samples with the highest purity and volume under each setting.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"960-975"},"PeriodicalIF":8.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1