首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
Performance analysis of image steganalysis techniques and future research directives 图像隐写技术的性能分析及未来的研究方向
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10010646
Sanchita Pathak, Ratnakirti Roy, S. Changder
Steganography is a technique of hiding information imperceptibly inside other medium so that the very fact of communication taking place remains hidden. Recently, the reach of internet has extensively widened through social networking and blogging websites and a high amount of digital media interchange, especially in the form of digital images is being witnessed. This poses a huge threat to security from hackers and terrorists, as this medium can be used for covert communication, thus justifying the need for good steganalysis techniques to detect the existence of hidden messages in digital images. This paper analyses some steganalysis techniques which attack various kinds of spatial domain steganography techniques. Some of them are chi-square attack, triples analysis, sample pair analysis, TPVD steganalysis and analysis of adjacent pixel pair steganalysis. This paper also identifies the current research challenges and discusses possible directions for future research in this field.
隐写术是一种将信息隐藏在其他媒介中而不被察觉的技术,从而使通信发生的事实被隐藏起来。近年来,通过社交网络和博客网站,互联网的覆盖范围广泛扩大,大量的数字媒体交换,特别是以数字图像的形式出现。这对黑客和恐怖分子的安全构成了巨大的威胁,因为这种媒介可以用于秘密通信,因此证明需要良好的隐写分析技术来检测数字图像中隐藏信息的存在。本文分析了几种针对各种空间域隐写技术的隐写技术。其中包括卡方攻击、三元组分析、样本对分析、TPVD隐写分析和相邻像素对隐写分析。本文还指出了当前的研究挑战,并讨论了该领域未来可能的研究方向。
{"title":"Performance analysis of image steganalysis techniques and future research directives","authors":"Sanchita Pathak, Ratnakirti Roy, S. Changder","doi":"10.1504/IJICS.2018.10010646","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10010646","url":null,"abstract":"Steganography is a technique of hiding information imperceptibly inside other medium so that the very fact of communication taking place remains hidden. Recently, the reach of internet has extensively widened through social networking and blogging websites and a high amount of digital media interchange, especially in the form of digital images is being witnessed. This poses a huge threat to security from hackers and terrorists, as this medium can be used for covert communication, thus justifying the need for good steganalysis techniques to detect the existence of hidden messages in digital images. This paper analyses some steganalysis techniques which attack various kinds of spatial domain steganography techniques. Some of them are chi-square attack, triples analysis, sample pair analysis, TPVD steganalysis and analysis of adjacent pixel pair steganalysis. This paper also identifies the current research challenges and discusses possible directions for future research in this field.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121339323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of an efficient classifier using proposed sensitivity-based feature selection technique for intrusion detection system 基于提出的基于灵敏度特征选择技术的入侵检测系统高效分类器的开发
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10010649
H. Hota, Dinesh K. Sharma, A. Shrivas
Intrusion detection system protects an individual computer or network computer from suspicious data and protects the system from unauthorized access. In this paper, we propose a feature selection technique (FST) known as sensitivity based feature selection technique (SBFST) which selects relevant features from intrusion data based on the value of sensitivity. We compare various existing FSTs with the proposed SBFST from three different categories of NSL-KDD data set. Experimental results reveal that C4.5 with SBFST performs better than other existing FSTs and produce a high accuracy of 99.68% with 11 features and 99.95% accuracy with nine features for the multiclass and binary class problems respectively. It has also produced 99.64% accuracy for both multiclass and binary class problems respectively with six and seven features. The performance of proposed SBFST is also verified using the intersection of features, segment by segment with other FSTs and found to be better.
入侵检测系统保护个人计算机或网络计算机免受可疑数据的侵害,保护系统免受未经授权的访问。本文提出了一种基于灵敏度的特征选择技术,即基于灵敏度的特征选择技术(SBFST),该技术基于灵敏度值从入侵数据中选择相关特征。我们比较了来自三种不同类别NSL-KDD数据集的各种现有fst与提出的SBFST。实验结果表明,基于SBFST的C4.5算法在多类和二类问题上的准确率分别达到99.68%和99.95%,分别达到11个特征和9个特征。对于6个特征的多类问题和7个特征的二分类问题,准确率均达到99.64%。通过与其他fst的特征段逐段相交,验证了所提出的SBFST的性能,发现其更好。
{"title":"Development of an efficient classifier using proposed sensitivity-based feature selection technique for intrusion detection system","authors":"H. Hota, Dinesh K. Sharma, A. Shrivas","doi":"10.1504/IJICS.2018.10010649","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10010649","url":null,"abstract":"Intrusion detection system protects an individual computer or network computer from suspicious data and protects the system from unauthorized access. In this paper, we propose a feature selection technique (FST) known as sensitivity based feature selection technique (SBFST) which selects relevant features from intrusion data based on the value of sensitivity. We compare various existing FSTs with the proposed SBFST from three different categories of NSL-KDD data set. Experimental results reveal that C4.5 with SBFST performs better than other existing FSTs and produce a high accuracy of 99.68% with 11 features and 99.95% accuracy with nine features for the multiclass and binary class problems respectively. It has also produced 99.64% accuracy for both multiclass and binary class problems respectively with six and seven features. The performance of proposed SBFST is also verified using the intersection of features, segment by segment with other FSTs and found to be better.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling a secure support vector machine classifier for private data 对私有数据的安全支持向量机分类器建模
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10010647
M. Sumana, K. Hareesha
Privacy preserving data mining engrosses in drawing out information from distributed data without disclosing sensitive information to collaborating sites. This paper aims on the construction of a vertically distributed privacy preserving support vector machine classifier. The learning model is build for datasets, where one of the collaborating parties comprises the dependent attribute. Furthermore, the amount of privacy, computation speed and the accuracy of our classifier outperform other benchmark algorithms. Privacy of the perceptive attributes values of the cooperating sites are retained while performing secure computations. Collaborative classification is performed using these attributes. The site with the dependent attribute is the master site that initiates the process of secure computation to identify support vectors. Homomorphic property is used to protectively compute the data matrix on records/tuples available at sites. The recommended nonlinear privacy preserving classifier provides an accuracy equivalent to the non-privacy undistributed SVM classifier which uses all the attributes directly.
保护隐私的数据挖掘专注于从分布式数据中提取信息,而不会向协作站点泄露敏感信息。本文旨在构建一个垂直分布的隐私保护支持向量机分类器。学习模型是为数据集构建的,其中一个协作方包含依赖属性。此外,我们的分类器在隐私量、计算速度和准确性方面都优于其他基准算法。在执行安全计算的同时,保留了协作站点的感知属性值的私密性。协作分类是使用这些属性执行的。具有依赖属性的站点是启动安全计算过程以识别支持向量的主站点。同态属性用于保护性地计算站点可用的记录/元组的数据矩阵。推荐的非线性隐私保护分类器提供了与直接使用所有属性的非隐私非分布SVM分类器相当的精度。
{"title":"Modelling a secure support vector machine classifier for private data","authors":"M. Sumana, K. Hareesha","doi":"10.1504/IJICS.2018.10010647","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10010647","url":null,"abstract":"Privacy preserving data mining engrosses in drawing out information from distributed data without disclosing sensitive information to collaborating sites. This paper aims on the construction of a vertically distributed privacy preserving support vector machine classifier. The learning model is build for datasets, where one of the collaborating parties comprises the dependent attribute. Furthermore, the amount of privacy, computation speed and the accuracy of our classifier outperform other benchmark algorithms. Privacy of the perceptive attributes values of the cooperating sites are retained while performing secure computations. Collaborative classification is performed using these attributes. The site with the dependent attribute is the master site that initiates the process of secure computation to identify support vectors. Homomorphic property is used to protectively compute the data matrix on records/tuples available at sites. The recommended nonlinear privacy preserving classifier provides an accuracy equivalent to the non-privacy undistributed SVM classifier which uses all the attributes directly.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on forensic event reconstruction systems 法庭事件重建系统综述
Pub Date : 2017-10-20 DOI: 10.1504/IJICS.2017.10008447
A. Dabir, A. Abdou, A. Matrawy
Security related incidents such as unauthorised system access, data tampering and theft have been noticeably rising. Tools such as firewalls, intrusion detection systems and anti-virus software strive to prevent these incidents. Since these tools only prevent an attack, once an illegal intrusion occurs, they cease to provide useful information beyond this point. Consequently, system administrators are interested in identifying the vulnerability in order to: 1) avoid future exploitation; 2) recover corrupted data; 3) present the attacker to law enforcement where possible. As such, forensic event reconstruction systems are used to provide the administrators with possible information. We present a survey on the current approaches towards forensic event reconstruction systems proposed over the past few years. Technical details are discussed, as well as analysis to their effectiveness, advantages and limitations. The presented tools are compared and assessed based on the primary principles that a forensic technique is expected to follow.
与安全有关的事件,如未经授权的系统访问、数据篡改和盗窃,已明显上升。诸如防火墙、入侵检测系统和防病毒软件等工具可有效防止此类事件发生。由于这些工具只能防止攻击,一旦发生非法入侵,它们就不再提供有用的信息。因此,系统管理员对识别漏洞很感兴趣,以便:1)避免将来的利用;2)恢复损坏的数据;3)尽可能将袭击者交给执法部门。因此,使用取证事件重建系统向管理员提供可能的信息。我们对过去几年提出的法医事件重建系统的当前方法进行了调查。讨论了技术细节,并分析了它们的有效性、优点和局限性。提出的工具是比较和评估的基础上,法医技术预计将遵循的主要原则。
{"title":"A survey on forensic event reconstruction systems","authors":"A. Dabir, A. Abdou, A. Matrawy","doi":"10.1504/IJICS.2017.10008447","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10008447","url":null,"abstract":"Security related incidents such as unauthorised system access, data tampering and theft have been noticeably rising. Tools such as firewalls, intrusion detection systems and anti-virus software strive to prevent these incidents. Since these tools only prevent an attack, once an illegal intrusion occurs, they cease to provide useful information beyond this point. Consequently, system administrators are interested in identifying the vulnerability in order to: 1) avoid future exploitation; 2) recover corrupted data; 3) present the attacker to law enforcement where possible. As such, forensic event reconstruction systems are used to provide the administrators with possible information. We present a survey on the current approaches towards forensic event reconstruction systems proposed over the past few years. Technical details are discussed, as well as analysis to their effectiveness, advantages and limitations. The presented tools are compared and assessed based on the primary principles that a forensic technique is expected to follow.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130523315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network 基于多agent模型的分布式网络智能自共享入侵检测系统
Pub Date : 2017-10-20 DOI: 10.1504/IJICS.2017.10008448
K. Anusha, E. Sathiyamoorthy
Intrusion detection system (IDS) is essential for protecting the computer networks from various threats and attacks. The autonomous multi-agent model (MAM) architecture is a scalable and smart alternative to leverage the strengths of the host and network based IDS. This paper proposes MAM-based intelligent and self-sharing IDS (MAM-ISSIDS) for distributed network to detect the host, network and web service attacks. Feature selection is performed by using the integrated particle swarm optimisation-genetic algorithm (PSO-GA) approach. The intuitionistic fuzzy rules are used to formulate the rules of the existing attackers for the benchmark dataset. The ontology structure is used to share the rules in network. The MAM is used for detecting the occurrence of abnormal traffic resulting due to the intrusion attacks. The proposed system achieves higher attack detection rate, accuracy and lower false positive rate due to the distributed sharing strategy of the MAM.
入侵检测系统是保护计算机网络免受各种威胁和攻击的重要手段。自主多代理模型(MAM)体系结构是一种可扩展的智能替代方案,可以利用基于主机和网络的IDS的优势。本文提出了一种基于mam的分布式网络智能自共享入侵检测系统(mam - isids),用于检测主机、网络和web服务攻击。采用粒子群优化与遗传算法(PSO-GA)相结合的方法进行特征选择。利用直觉模糊规则对现有攻击者的规则进行制定。采用本体结构实现规则在网络中的共享。MAM用于检测由于入侵攻击导致的异常流量。由于MAM的分布式共享策略,该系统实现了更高的攻击检测率、准确率和更低的误报率。
{"title":"MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network","authors":"K. Anusha, E. Sathiyamoorthy","doi":"10.1504/IJICS.2017.10008448","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10008448","url":null,"abstract":"Intrusion detection system (IDS) is essential for protecting the computer networks from various threats and attacks. The autonomous multi-agent model (MAM) architecture is a scalable and smart alternative to leverage the strengths of the host and network based IDS. This paper proposes MAM-based intelligent and self-sharing IDS (MAM-ISSIDS) for distributed network to detect the host, network and web service attacks. Feature selection is performed by using the integrated particle swarm optimisation-genetic algorithm (PSO-GA) approach. The intuitionistic fuzzy rules are used to formulate the rules of the existing attackers for the benchmark dataset. The ontology structure is used to share the rules in network. The MAM is used for detecting the occurrence of abnormal traffic resulting due to the intrusion attacks. The proposed system achieves higher attack detection rate, accuracy and lower false positive rate due to the distributed sharing strategy of the MAM.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131805308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel quantum distributed key management protocol for ring-organised group 一种新的环组织群量子分布式密钥管理协议
Pub Date : 2017-10-20 DOI: 10.1504/IJICS.2017.10004329
Rima Djellab, M. Benmohammed
Key distribution is a core building block for secure communication. In group communication, key distribution is not a simple extension of two-party communication. Many approaches were proposed in the classical field. Nevertheless, they are still based on the assumption that some computational problems are hard. Based on quantum mechanics lows, new field emerges allowing to generate and share a secret and secure key between two, or more, participants. In this paper, we propose new multiparty key distribution protocol in ring-organised communication group based on the well-known quantum key distribution protocol BB84. The security of the proposed solution is based on the unconditional security of the BB84 allowed by the mechanics lows and the mathematical proved secure operation XOR. In our proposed solution, each participant collaborates with a partial key in order to obtain at the end of the protocol the same group key that can be used for encryption aims. We also analyse and verify security properties of the proposed protocol. This is done using a probabilistic symbolic model-checker, the PRISM tool.
密钥分发是安全通信的核心组成部分。在群通信中,密钥分发不是双方通信的简单扩展。古典领域提出了许多方法。然而,它们仍然是基于一些计算问题很难的假设。基于量子力学原理,出现了一个新的领域,允许在两个或更多参与者之间生成和共享一个秘密和安全的密钥。本文在著名量子密钥分发协议BB84的基础上,提出了新的环组织通信组多方密钥分发协议。该方案的安全性是基于力学下限和数学证明的安全操作XOR所允许的BB84的无条件安全性。在我们提出的解决方案中,每个参与者都使用部分密钥进行协作,以便在协议结束时获得可用于加密目的的相同组密钥。我们还分析和验证了所提议协议的安全属性。这是使用概率符号模型检查器PRISM工具完成的。
{"title":"A novel quantum distributed key management protocol for ring-organised group","authors":"Rima Djellab, M. Benmohammed","doi":"10.1504/IJICS.2017.10004329","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10004329","url":null,"abstract":"Key distribution is a core building block for secure communication. In group communication, key distribution is not a simple extension of two-party communication. Many approaches were proposed in the classical field. Nevertheless, they are still based on the assumption that some computational problems are hard. Based on quantum mechanics lows, new field emerges allowing to generate and share a secret and secure key between two, or more, participants. In this paper, we propose new multiparty key distribution protocol in ring-organised communication group based on the well-known quantum key distribution protocol BB84. The security of the proposed solution is based on the unconditional security of the BB84 allowed by the mechanics lows and the mathematical proved secure operation XOR. In our proposed solution, each participant collaborates with a partial key in order to obtain at the end of the protocol the same group key that can be used for encryption aims. We also analyse and verify security properties of the proposed protocol. This is done using a probabilistic symbolic model-checker, the PRISM tool.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125552685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Update enabled multi-keyword searchable encryption scheme for secure data outsourcing 更新启用了多关键字可搜索的加密方案,用于安全数据外包
Pub Date : 2017-10-20 DOI: 10.1504/IJICS.2017.10008445
Vasudha Arora, Shyam Sunder Tyagi
Over the last decade, cloud computing has emerged as a distinct IT environment that is provisioned to provide remote access to a set of decentralised IT resources. Cloud computing enables the data owner to outsource their data and applications so that users could access the data from anywhere and at any time without any concern about local hardware and software management. However, concerns about outsourcing sensitive data cause privacy problems. Encrypting data before outsourcing protects data to some extent but searching on encrypted data may lead to compromised efficiency. Searchable encryption allows the cloud data to be retrieved efficiently based on certain relevance criterion. Our proposed scheme enables the dynamically updating already existing searchable encryption schemes with a high-level accuracy and security so that information leakage can be eliminated.
在过去的十年中,云计算已经成为一种独特的IT环境,它提供了对一组分散的IT资源的远程访问。云计算使数据所有者能够将其数据和应用程序外包,以便用户可以随时随地访问数据,而无需担心本地硬件和软件管理。然而,对外包敏感数据的担忧会引发隐私问题。在外包前对数据进行加密可以在一定程度上保护数据,但对加密后的数据进行搜索可能会降低效率。可搜索加密允许基于一定的相关性标准对云数据进行高效检索。我们提出的方案能够动态更新现有的可搜索加密方案,具有较高的准确性和安全性,从而消除信息泄漏。
{"title":"Update enabled multi-keyword searchable encryption scheme for secure data outsourcing","authors":"Vasudha Arora, Shyam Sunder Tyagi","doi":"10.1504/IJICS.2017.10008445","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10008445","url":null,"abstract":"Over the last decade, cloud computing has emerged as a distinct IT environment that is provisioned to provide remote access to a set of decentralised IT resources. Cloud computing enables the data owner to outsource their data and applications so that users could access the data from anywhere and at any time without any concern about local hardware and software management. However, concerns about outsourcing sensitive data cause privacy problems. Encrypting data before outsourcing protects data to some extent but searching on encrypted data may lead to compromised efficiency. Searchable encryption allows the cloud data to be retrieved efficiently based on certain relevance criterion. Our proposed scheme enables the dynamically updating already existing searchable encryption schemes with a high-level accuracy and security so that information leakage can be eliminated.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115985868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data hiding using lifting scheme and genetic algorithm 采用提升方案和遗传算法进行数据隐藏
Pub Date : 2017-10-20 DOI: 10.1504/IJICS.2017.10008444
Geeta Kasana, Kulbir Singh, S. S. Bhatia
In this paper, data hiding algorithm by using lifting scheme and genetic algorithm (GA) has been proposed. Arnold transform has been used to scramble the secret image to secure the extraction of secret image. Lifting scheme is applied on the cover image to get the wavelet subbands. In this algorithm, scrambled secret image is embedded into significant wavelet coefficients of subbands of cover image. Scaling factor (SF) parameter is used in embedding and extracting process of the proposed algorithm and GA is used to optimise this parameter. This optimisation is used to maximise the value of peak signal to noise ratio (PSNR) of composite image and similarity index modulation (SIM) of extracted secret image. Experimental results reveal that proposed algorithm provides high embedding capacity and better quality of composite images than the existing data hiding techniques. To show the effectiveness of the proposed algorithm, statistical tests have been performed to show that the imperceptibility is maintained.
提出了一种基于提升方案和遗传算法的数据隐藏算法。利用阿诺德变换对秘密图像进行置乱,保证了秘密图像的提取。对封面图像采用提升方案得到小波子带。该算法将加密后的秘密图像嵌入到覆盖图像子带的有效小波系数中。在该算法的嵌入和提取过程中使用比例因子参数,并使用遗传算法对该参数进行优化。利用这种优化方法最大限度地提高合成图像的峰值信噪比(PSNR)和提取的秘密图像的相似指数调制(SIM)。实验结果表明,与现有的数据隐藏技术相比,该算法具有较高的嵌入容量和更好的合成图像质量。为了证明所提出算法的有效性,进行了统计测试,以表明保持了不可感知性。
{"title":"Data hiding using lifting scheme and genetic algorithm","authors":"Geeta Kasana, Kulbir Singh, S. S. Bhatia","doi":"10.1504/IJICS.2017.10008444","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10008444","url":null,"abstract":"In this paper, data hiding algorithm by using lifting scheme and genetic algorithm (GA) has been proposed. Arnold transform has been used to scramble the secret image to secure the extraction of secret image. Lifting scheme is applied on the cover image to get the wavelet subbands. In this algorithm, scrambled secret image is embedded into significant wavelet coefficients of subbands of cover image. Scaling factor (SF) parameter is used in embedding and extracting process of the proposed algorithm and GA is used to optimise this parameter. This optimisation is used to maximise the value of peak signal to noise ratio (PSNR) of composite image and similarity index modulation (SIM) of extracted secret image. Experimental results reveal that proposed algorithm provides high embedding capacity and better quality of composite images than the existing data hiding techniques. To show the effectiveness of the proposed algorithm, statistical tests have been performed to show that the imperceptibility is maintained.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"13 1-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A trust-based approach for securing data communication in delay tolerant networks 延迟容忍网络中数据通信安全的一种基于信任的方法
Pub Date : 2017-10-20 DOI: 10.1504/IJICS.2017.10008446
Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, A. Bouabdallah
The proliferation of network technologies drives many different network architectures to provide huge variety of services and contents to end clients. This task becomes more difficult when we are in networks with intermittent connections, called delay tolerant networks (DTN) where security is an important issue. In this paper, we propose a trust-based approach to secure data transfer in DTN in the presence of malicious transporters. Our proposal is intended to a DTN architecture which includes several sub-networks geographically dispersed in isolated regions and having an intermittent access to an infrastructure-based network (like internet). Our approach is based on a particular web-of-trust, which is formed based on existing social relationship among clients and transporters. We conducted intensive simulations and the obtained results show that it offers high packet delivery rate and resists against malicious transporter's behaviour.
网络技术的发展推动了许多不同的网络体系结构向终端客户提供各种各样的服务和内容。当我们处于具有间歇性连接的网络时,这项任务变得更加困难,称为延迟容忍网络(DTN),其中安全性是一个重要问题。在本文中,我们提出了一种基于信任的方法来保护DTN中存在恶意传输者的数据传输。我们的建议是一个DTN架构,它包括地理上分散在孤立区域的几个子网,并且可以间歇性地访问基于基础设施的网络(如互联网)。我们的方法是基于一个特定的信任网络,它是基于客户和运输商之间现有的社会关系而形成的。仿真结果表明,该算法具有较高的数据包传输率,并能抵抗恶意传输者的攻击。
{"title":"A trust-based approach for securing data communication in delay tolerant networks","authors":"Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, A. Bouabdallah","doi":"10.1504/IJICS.2017.10008446","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10008446","url":null,"abstract":"The proliferation of network technologies drives many different network architectures to provide huge variety of services and contents to end clients. This task becomes more difficult when we are in networks with intermittent connections, called delay tolerant networks (DTN) where security is an important issue. In this paper, we propose a trust-based approach to secure data transfer in DTN in the presence of malicious transporters. Our proposal is intended to a DTN architecture which includes several sub-networks geographically dispersed in isolated regions and having an intermittent access to an infrastructure-based network (like internet). Our approach is based on a particular web-of-trust, which is formed based on existing social relationship among clients and transporters. We conducted intensive simulations and the obtained results show that it offers high packet delivery rate and resists against malicious transporter's behaviour.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"9 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A standardised data acquisition process model for digital forensic investigations 用于数字取证调查的标准化数据采集过程模型
Pub Date : 2017-07-17 DOI: 10.1504/IJICS.2017.10005908
R. Montasari
Similar to traditional evidence, courts of law do not assume that digital evidence is reliable if there is no evidence of some empirical testing regarding the theories and techniques pertaining to its production. Courts take a careful notice of the way in which digital evidence has been acquired and stored. In contrast with traditional crimes for which there are well-established standards and procedures upon which courts can rely, there are no formal procedures or models for digital data acquisition to which courts of law can refer. A standardised data acquisition process model is needed to enable digital forensic investigators to follow a uniform approach, and to assist courts of law in determining the reliability of digital evidence presented to them. This paper proposes a model that is standardised in that it can enable digital forensic investigators in following a uniform approach, and that is generic in that it can be applied in both law enforcement and corporate investigations. To carry out the research presented in the paper, the design science research process (DSRP) methodology proposed by Peffers et al. (2006) has been followed.
与传统证据类似,如果没有证据表明与数字证据的产生有关的理论和技术进行了一些经验检验,法院就不会假设数字证据是可靠的。法院会仔细注意数字证据的获取和存储方式。传统犯罪有法院可以依赖的既定标准和程序,与之相反,没有法院可以参考的数字数据获取的正式程序或模型。需要一个标准化的数据采集过程模型,使数字法医调查员能够采用统一的方法,并协助法院确定提交给他们的数字证据的可靠性。本文提出的模型是标准化的,因为它可以使数字法医调查员遵循统一的方法,并且是通用的,因为它可以应用于执法和公司调查。为了开展本文中提出的研究,遵循了Peffers等人(2006)提出的设计科学研究过程(DSRP)方法。
{"title":"A standardised data acquisition process model for digital forensic investigations","authors":"R. Montasari","doi":"10.1504/IJICS.2017.10005908","DOIUrl":"https://doi.org/10.1504/IJICS.2017.10005908","url":null,"abstract":"Similar to traditional evidence, courts of law do not assume that digital evidence is reliable if there is no evidence of some empirical testing regarding the theories and techniques pertaining to its production. Courts take a careful notice of the way in which digital evidence has been acquired and stored. In contrast with traditional crimes for which there are well-established standards and procedures upon which courts can rely, there are no formal procedures or models for digital data acquisition to which courts of law can refer. A standardised data acquisition process model is needed to enable digital forensic investigators to follow a uniform approach, and to assist courts of law in determining the reliability of digital evidence presented to them. This paper proposes a model that is standardised in that it can enable digital forensic investigators in following a uniform approach, and that is generic in that it can be applied in both law enforcement and corporate investigations. To carry out the research presented in the paper, the design science research process (DSRP) methodology proposed by Peffers et al. (2006) has been followed.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116447857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1