首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
Fake profile detection in multimedia big data on online social networks 在线社交网络多媒体大数据虚假资料检测
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026785
Somya Ranjan Sahoo, B. Gupta
The popularity of online social networks like Facebook and Twitter has become the regular way of communication and interaction. Due to the popularity of such networks, the attackers try to reveal suspicious behaviour in the form of fake profile. To stop fake profile, various approaches are proposed in the recent years. The focus of recent work is to implement a machine learning technique to detect fake profile on Facebook platform by analysing public as well as private features. In this paper, a machine learning-based approach is proposed for detecting suspicious profiles for tapping and tainting multimedia big data on Facebook. Multimedia big data is a type of dataset in which the data is heterogeneous, human centric and has more media related contents with huge volumes like text, audio and video generated in different online social network. The experimental result of our work using content-based and profile-based features delivers first rate performance as compared to other approaches.
像Facebook和Twitter这样的在线社交网络的流行已经成为交流和互动的常规方式。由于此类网络的普及,攻击者试图以虚假个人资料的形式揭示可疑行为。为了阻止虚假资料,近年来提出了各种方法。最近的工作重点是实现一种机器学习技术,通过分析公开和私人特征来检测Facebook平台上的虚假个人资料。在本文中,提出了一种基于机器学习的方法来检测可疑的个人资料,以利用和污染Facebook上的多媒体大数据。多媒体大数据是一种数据异构的、以人为中心的、具有更多媒体相关内容的海量数据集,如不同在线社交网络产生的文本、音频、视频等。与其他方法相比,我们使用基于内容和基于配置文件的特性的实验结果提供了一流的性能。
{"title":"Fake profile detection in multimedia big data on online social networks","authors":"Somya Ranjan Sahoo, B. Gupta","doi":"10.1504/ijics.2020.10026785","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026785","url":null,"abstract":"The popularity of online social networks like Facebook and Twitter has become the regular way of communication and interaction. Due to the popularity of such networks, the attackers try to reveal suspicious behaviour in the form of fake profile. To stop fake profile, various approaches are proposed in the recent years. The focus of recent work is to implement a machine learning technique to detect fake profile on Facebook platform by analysing public as well as private features. In this paper, a machine learning-based approach is proposed for detecting suspicious profiles for tapping and tainting multimedia big data on Facebook. Multimedia big data is a type of dataset in which the data is heterogeneous, human centric and has more media related contents with huge volumes like text, audio and video generated in different online social network. The experimental result of our work using content-based and profile-based features delivers first rate performance as compared to other approaches.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"21 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Blind noise estimation-based CT image denoising in tetrolet domain 基于盲噪声估计的CT图像tetrolet域去噪
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026779
M. Diwakar, Pardeep Kumar
Recently in medical imaging, various cases of cancers have been explored because of high dose radiation in computed tomography (CT) scan examinations. These high radiation doses are given to patients to achieve good quality CT images. Instead of increasing radiation dose, an alternate method is required to get high quality images for diagnosis purpose. In this paper, we propose a method where, the noise of CT images will be estimated using patch-based gradient approximation. Further, estimated noise is used to denoise the CT images in tetrolet domain. In proposed scheme, a locally adaptive-based thresholding in tetrolet domain and non-local means filtering have been performed to suppress noise from CT images. Estimation noise from proposed method has been compared from added noise in CT images and it was observed that noise is almost correctly estimated by proposed method. To verify the strength of noise suppression in proposed scheme, comparison with recent other existing methods have been performed. The PSNR and visual quality of experimental results indicate that the proposed scheme gives excellent outcomes in compare to existing schemes.
近年来,在医学影像学中,由于计算机断层扫描(CT)扫描检查中的高剂量辐射,已经探讨了各种癌症病例。给予患者高剂量的辐射以获得高质量的CT图像。除了增加辐射剂量外,还需要另一种方法来获得高质量的图像以用于诊断。本文提出了一种基于patch的梯度近似估计CT图像噪声的方法。然后,利用估计的噪声对CT图像进行四小波域去噪。该方法采用局部自适应阈值法和非局部均值滤波来抑制CT图像中的噪声。将所提方法的估计噪声与CT图像中的附加噪声进行了比较,结果表明所提方法的估计噪声基本正确。为了验证所提方案的噪声抑制强度,并与其他现有方法进行了比较。实验结果的PSNR和视觉质量表明,与现有方案相比,该方案具有较好的效果。
{"title":"Blind noise estimation-based CT image denoising in tetrolet domain","authors":"M. Diwakar, Pardeep Kumar","doi":"10.1504/ijics.2020.10026779","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026779","url":null,"abstract":"Recently in medical imaging, various cases of cancers have been explored because of high dose radiation in computed tomography (CT) scan examinations. These high radiation doses are given to patients to achieve good quality CT images. Instead of increasing radiation dose, an alternate method is required to get high quality images for diagnosis purpose. In this paper, we propose a method where, the noise of CT images will be estimated using patch-based gradient approximation. Further, estimated noise is used to denoise the CT images in tetrolet domain. In proposed scheme, a locally adaptive-based thresholding in tetrolet domain and non-local means filtering have been performed to suppress noise from CT images. Estimation noise from proposed method has been compared from added noise in CT images and it was observed that noise is almost correctly estimated by proposed method. To verify the strength of noise suppression in proposed scheme, comparison with recent other existing methods have been performed. The PSNR and visual quality of experimental results indicate that the proposed scheme gives excellent outcomes in compare to existing schemes.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126625724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN 在基于云的OSN上的JavaScript蠕虫集群模板中嵌套上下文感知的清理和特性注入
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026776
Shashank Gupta, B. Gupta, Pooja Chaudhary
This article presents an enhanced JavaScript feature-injection based framework that obstructs the execution of cross-site scripting (XSS) worms from the virtual machines of cloud-based online social network (OSN). It calculates the features of clustered-sanitised compressed templates of JavaScript attack vectors embedded in the HTTP response messages. Any variation observed in such JavaScript feature set indicates the injection of XSS worms on the cloud-based OSN server. The injected worms will further undergo through the process of nested context-aware sanitisation for its safe interpretation on the web browser. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment. The experimental evaluation of our framework was performed on the platform of OSN-based web applications deployed in the cloud platform. The performance analysis done revealed that our framework detects the injection of malicious JavaScript code with low false negative rate and acceptable performance overhead.
本文介绍了一个增强的基于JavaScript特性注入的框架,它可以阻止来自基于云的在线社交网络(OSN)的虚拟机的跨站点脚本(XSS)蠕虫的执行。它计算嵌入在HTTP响应消息中的JavaScript攻击向量的聚类净化压缩模板的特性。在这种JavaScript特性集中观察到的任何变化都表明在基于云的OSN服务器上注入了XSS蠕虫。注入的蠕虫将进一步经历嵌套上下文感知的消毒过程,以确保其在web浏览器上的安全解释。我们的框架原型是用Java开发的,并安装在云环境的虚拟机上。我们的框架在部署在云平台的基于osn的web应用程序平台上进行了实验评估。性能分析表明,我们的框架检测恶意JavaScript代码注入,假阴性率低,性能开销可接受。
{"title":"Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN","authors":"Shashank Gupta, B. Gupta, Pooja Chaudhary","doi":"10.1504/ijics.2020.10026776","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026776","url":null,"abstract":"This article presents an enhanced JavaScript feature-injection based framework that obstructs the execution of cross-site scripting (XSS) worms from the virtual machines of cloud-based online social network (OSN). It calculates the features of clustered-sanitised compressed templates of JavaScript attack vectors embedded in the HTTP response messages. Any variation observed in such JavaScript feature set indicates the injection of XSS worms on the cloud-based OSN server. The injected worms will further undergo through the process of nested context-aware sanitisation for its safe interpretation on the web browser. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment. The experimental evaluation of our framework was performed on the platform of OSN-based web applications deployed in the cloud platform. The performance analysis done revealed that our framework detects the injection of malicious JavaScript code with low false negative rate and acceptable performance overhead.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique 利用等差数列技术实现八个相邻位交换加密的图像隐写
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026792
Srilekha Mukherjee, G. Sanyal
This paper presents a steganographic approach of concealing the secret data so as to facilitate secure communication. Eight neighbour bits swap (ENBS) encryption has been used on the chosen cover image in the first stage. This results in the scrambling of the data bits, thereby disrupting the normal pixel orientation. Finally data bits from the secret image are embedded within the scrambled cover using the technique of arithmetic progression. Lastly inverse eight neighbour bits swap (ENBS) transformation is applied on the above generated image. This results in a descrambling operation, i.e., reverting back the normal orientation. Henceforth the stego is generated. Several quantitative and qualitative benchmarks analysis pertaining to this approach is made. All the results show that the imperceptibility is well maintained. Also the payload is high with negligible distortion produced in the image.
本文提出了一种隐藏秘密数据的隐写方法,以促进安全通信。第一阶段对选定的封面图像采用8邻位交换(ENBS)加密。这将导致数据位的乱置,从而破坏正常的像素方向。最后,利用等差数列技术将秘密图像中的数据位嵌入到加扰的密文中。最后对生成的图像进行逆8邻位交换(ENBS)变换。这就导致了解扰操作,即恢复到正常方向。从此隐套就产生了。对这一方法进行了若干定量和定性基准分析。结果表明,该方法保持了较好的不可感知性。此外,有效载荷是高与可忽略不计的失真产生的图像。
{"title":"Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique","authors":"Srilekha Mukherjee, G. Sanyal","doi":"10.1504/ijics.2020.10026792","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026792","url":null,"abstract":"This paper presents a steganographic approach of concealing the secret data so as to facilitate secure communication. Eight neighbour bits swap (ENBS) encryption has been used on the chosen cover image in the first stage. This results in the scrambling of the data bits, thereby disrupting the normal pixel orientation. Finally data bits from the secret image are embedded within the scrambled cover using the technique of arithmetic progression. Lastly inverse eight neighbour bits swap (ENBS) transformation is applied on the above generated image. This results in a descrambling operation, i.e., reverting back the normal orientation. Henceforth the stego is generated. Several quantitative and qualitative benchmarks analysis pertaining to this approach is made. All the results show that the imperceptibility is well maintained. Also the payload is high with negligible distortion produced in the image.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"241 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121095997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unconstrained face recognition using deep convolution neural network 基于深度卷积神经网络的无约束人脸识别
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026788
A. K. Agrawal, Y. Singh
Different methods have been proposed for face recognition during the past decades that differ essentially on how to determine discriminant facial features for better recognition. Recently, very deep neural networks achieved great success on general object recognition because of their potential in learning capability. This paper presents convolution neural network (CNN)-based architecture for face recognition in unconstrained environment. The proposed architecture is based on a standard architecture of residual network. The recognition performance shows that the proposed framework of CNN achieves the state-of-art performance on publicly available challenging datasets LFW, face94, face95, face96 and Grimace.
在过去的几十年里,人们提出了不同的人脸识别方法,这些方法在如何确定判别性的面部特征以获得更好的识别方面存在本质上的差异。近年来,深度神经网络由于其潜在的学习能力在一般目标识别方面取得了巨大的成功。提出了一种基于卷积神经网络(CNN)的无约束环境下人脸识别体系结构。提出的结构是基于标准的残差网络结构。识别性能表明,提出的CNN框架在公开的挑战性数据集LFW、face94、face95、face96和Grimace上达到了最先进的性能。
{"title":"Unconstrained face recognition using deep convolution neural network","authors":"A. K. Agrawal, Y. Singh","doi":"10.1504/ijics.2020.10026788","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026788","url":null,"abstract":"Different methods have been proposed for face recognition during the past decades that differ essentially on how to determine discriminant facial features for better recognition. Recently, very deep neural networks achieved great success on general object recognition because of their potential in learning capability. This paper presents convolution neural network (CNN)-based architecture for face recognition in unconstrained environment. The proposed architecture is based on a standard architecture of residual network. The recognition performance shows that the proposed framework of CNN achieves the state-of-art performance on publicly available challenging datasets LFW, face94, face95, face96 and Grimace.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126925141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A coupled map lattice-based image encryption approach using DNA and bi-objective genetic algorithm 基于DNA和双目标遗传算法的耦合映射格图像加密方法
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026778
Shelza Suri, R. Vijay
The paper presents a coupled map lattice (CML) and deoxyribonucleic acid (DNA)-based image encryption algorithm that uses genetic algorithm (GA) to get the optimised results. The algorithm uses the chaotic method CML and DNA to create an initial population of DNA masks in its first stage. The GA is applied in the second stage to obtain the best mask for encrypting the given plain image. The paper also discusses the use of two more chaotic functions, i.e., logistic map (LM) and transformed logistic map (TLM) with DNA-GA-based hybrid combination. The paper evaluates and compares the performance of the proposed CML-DNA-GA algorithm with LM-DNA-GA, TLM-DNA-GA hybrid approaches. The results show that the proposed approach performs better than the other two. It also discusses the impact of using a bi-objective GA optimisation for image encryption and applies the same to the all three discussed techniques. The results show that bi-objective optimisation of the proposed algorithm gives balanced results with respect to the selected fitness functions.
本文提出了一种基于映射格(CML)和脱氧核糖核酸(DNA)的耦合图像加密算法,该算法使用遗传算法(GA)来获得优化结果。该算法在第一阶段使用CML和DNA的混沌方法创建DNA掩模的初始种群。第二阶段采用遗传算法对给定的平面图像进行加密,得到最佳掩码。本文还讨论了另外两个混沌函数的使用,即logistic映射(LM)和转换logistic映射(TLM)与dna - ga混合组合。本文对CML-DNA-GA算法与LM-DNA-GA、TLM-DNA-GA混合算法的性能进行了评价和比较。结果表明,该方法的性能优于其他两种方法。它还讨论了使用双目标遗传算法优化图像加密的影响,并将其应用于所有三种讨论的技术。结果表明,所提算法的双目标优化相对于所选的适应度函数给出了平衡的结果。
{"title":"A coupled map lattice-based image encryption approach using DNA and bi-objective genetic algorithm","authors":"Shelza Suri, R. Vijay","doi":"10.1504/ijics.2020.10026778","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026778","url":null,"abstract":"The paper presents a coupled map lattice (CML) and deoxyribonucleic acid (DNA)-based image encryption algorithm that uses genetic algorithm (GA) to get the optimised results. The algorithm uses the chaotic method CML and DNA to create an initial population of DNA masks in its first stage. The GA is applied in the second stage to obtain the best mask for encrypting the given plain image. The paper also discusses the use of two more chaotic functions, i.e., logistic map (LM) and transformed logistic map (TLM) with DNA-GA-based hybrid combination. The paper evaluates and compares the performance of the proposed CML-DNA-GA algorithm with LM-DNA-GA, TLM-DNA-GA hybrid approaches. The results show that the proposed approach performs better than the other two. It also discusses the impact of using a bi-objective GA optimisation for image encryption and applies the same to the all three discussed techniques. The results show that bi-objective optimisation of the proposed algorithm gives balanced results with respect to the selected fitness functions.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A hybrid generative-discriminative model for abnormal event detection in surveillance video scenes 一种用于监控视频场景异常事件检测的混合生成-判别模型
Pub Date : 2020-02-07 DOI: 10.1504/ijics.2020.10026782
P. S. A. Kumar, D. Kavitha, S. A. Kumar
Detecting anomalous events in densely pedestrian traffic video scenes remains challenging task, due to object's tracking difficulties and noise in the scene. In this paper, a Novel Hybrid Generative-Discriminative framework is proposed for detecting and localising the anomalous events of illegal vehicles present in the scene. This paper introduces a novelty in the application of Hybrid usage of latent Dirichlet allocation (LDA) and support vector machines (SVMs) over dynamic texture at sub-region level. The proposed HLDA-SVM model consists mainly of three steps: first local binary patterns from twelve orthogonal planes (LBP-TwP) technique is applied in each spatio-temporal video patch to extract dynamic texture; then LDA technique is applied to the extracted dynamic textures for finding the latent topic distribution and finally, training is done on the distribution of topic vector for each video sequence using multi way SVM classifier. The proposed HLDA-SVM model is validated on UCSD dataset data set and is compared with mixture of dynamic texture and motion context technique. Experimental results show that the HLDA-SVM approach performs well in par with current algorithms for anomaly detection.
在行人密集的交通视频场景中,由于物体的跟踪困难和场景中的噪声,异常事件的检测仍然是一项具有挑战性的任务。本文提出了一种新的混合生成-判别框架,用于检测和定位场景中存在的非法车辆异常事件。本文介绍了一种将潜在狄利克雷分配(latent Dirichlet allocation, LDA)和支持向量机(support vector machines, svm)混合应用于子区域级动态纹理的新方法。本文提出的HLDA-SVM模型主要包括三个步骤:首先,在每个时空视频patch中应用12个正交平面的局部二值模式(LBP-TwP)技术提取动态纹理;然后对提取的动态纹理应用LDA技术寻找潜在主题分布,最后利用多路SVM分类器对每个视频序列的主题向量分布进行训练。在UCSD数据集上对HLDA-SVM模型进行了验证,并与动态纹理和运动上下文混合技术进行了比较。实验结果表明,HLDA-SVM方法与现有的异常检测算法相当。
{"title":"A hybrid generative-discriminative model for abnormal event detection in surveillance video scenes","authors":"P. S. A. Kumar, D. Kavitha, S. A. Kumar","doi":"10.1504/ijics.2020.10026782","DOIUrl":"https://doi.org/10.1504/ijics.2020.10026782","url":null,"abstract":"Detecting anomalous events in densely pedestrian traffic video scenes remains challenging task, due to object's tracking difficulties and noise in the scene. In this paper, a Novel Hybrid Generative-Discriminative framework is proposed for detecting and localising the anomalous events of illegal vehicles present in the scene. This paper introduces a novelty in the application of Hybrid usage of latent Dirichlet allocation (LDA) and support vector machines (SVMs) over dynamic texture at sub-region level. The proposed HLDA-SVM model consists mainly of three steps: first local binary patterns from twelve orthogonal planes (LBP-TwP) technique is applied in each spatio-temporal video patch to extract dynamic texture; then LDA technique is applied to the extracted dynamic textures for finding the latent topic distribution and finally, training is done on the distribution of topic vector for each video sequence using multi way SVM classifier. The proposed HLDA-SVM model is validated on UCSD dataset data set and is compared with mixture of dynamic texture and motion context technique. Experimental results show that the HLDA-SVM approach performs well in par with current algorithms for anomaly detection.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126217561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reversible data hiding methods in integer wavelet transform 整数小波变换中的可逆数据隐藏方法
Pub Date : 2019-12-04 DOI: 10.1504/IJICS.2019.10014436
Amishi Mahesh Kapadia, N. Pandian
Reversible data hiding is art of concealing secret information such that cover media and secret information are both recovered without any information loss. In this paper high frequency sub-bands of integer wavelet transform are used for data embedding. All coefficients are used for embedding and to improve the security the embedding is carried out in frequency domain using spiral, sequential and random embedding method. The main objective of this research is to hide the maximum data with minimal distortion and to attain reversible hiding phenomenon both in cover and secret image. The experimental result shows the improved capacity, imperceptibility and complete reversibility attained on standard and medical images. The parameter of robustness has not been vastly studied for reversible data hiding and an attempt is made to check the same for basic attacks and results shows that it can withstand geometrical attack.
可逆数据隐藏是一种隐藏秘密信息的技术,可以在不丢失任何信息的情况下恢复覆盖介质和秘密信息。本文利用整数小波变换的高频子带进行数据嵌入。利用所有系数进行嵌入,并在频域采用螺旋嵌入、顺序嵌入和随机嵌入的方法进行嵌入,以提高安全性。本研究的主要目标是在最小失真的情况下隐藏最大的数据量,并在掩护图像和秘密图像中实现可逆的隐藏现象。实验结果表明,该方法提高了标准图像和医学图像的容纳量、隐蔽性和完全可逆性。对可逆数据隐藏的鲁棒性参数进行了大量的研究,并尝试对基本攻击进行了鲁棒性检验,结果表明它可以抵抗几何攻击。
{"title":"Reversible data hiding methods in integer wavelet transform","authors":"Amishi Mahesh Kapadia, N. Pandian","doi":"10.1504/IJICS.2019.10014436","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10014436","url":null,"abstract":"Reversible data hiding is art of concealing secret information such that cover media and secret information are both recovered without any information loss. In this paper high frequency sub-bands of integer wavelet transform are used for data embedding. All coefficients are used for embedding and to improve the security the embedding is carried out in frequency domain using spiral, sequential and random embedding method. The main objective of this research is to hide the maximum data with minimal distortion and to attain reversible hiding phenomenon both in cover and secret image. The experimental result shows the improved capacity, imperceptibility and complete reversibility attained on standard and medical images. The parameter of robustness has not been vastly studied for reversible data hiding and an attempt is made to check the same for basic attacks and results shows that it can withstand geometrical attack.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116069607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme VIKAS:一种新的基于虚拟键盘的简单高效的文本验证码验证方案
Pub Date : 2019-12-04 DOI: 10.1504/IJICS.2019.10018472
Ankit Thakkar, Kajol Patel
Nowadays online transactions are becoming ubiquitous that must be protected from bots using different techniques, and CAPTCHA is one of them. Text-CAPTCHA preferred due to its simplicity amongst different types of CAPTCHAs. Text-CAPTCHA can be strengthened by adding some distortion to prevent bot-attacks but cause usability issues for humans. This results in multiple attempts by a user to gain access to the required service and may give frustration to the user. Hence, there is a need to design CAPTCHA which is easy for humans to recognise but difficult for bots. This paper proposes virtual keyboard-based simple and efficient text-CAPTCHA verification scheme (VIKAS) that makes CAPTCHA verification easy for humans but difficult for bots. VIKAS uses simple text-CAPTCHA and verifies the same using positions of the keys pressed by the user using an image-based virtual keyboard. VIKAS is sustainable against segmentation scheme, replay attacks and possible attacks with keyloggers.
如今,在线交易变得无处不在,必须使用不同的技术来保护它们免受机器人的侵害,CAPTCHA就是其中之一。文本验证码首选,因为它在不同类型的验证码之间简单。文本验证码可以通过添加一些扭曲来加强,以防止机器人攻击,但会导致人类的可用性问题。这将导致用户多次尝试访问所需的服务,并可能使用户感到沮丧。因此,有必要设计CAPTCHA,这对人类来说很容易识别,但对机器人来说很难。本文提出了一种基于虚拟键盘的简单高效的文本验证方案(VIKAS),该方案使得验证CAPTCHA对人类来说很容易,而对机器人来说却很困难。VIKAS使用简单的文本验证码,并使用基于图像的虚拟键盘来验证用户按下的键的位置。VIKAS是可持续的分割方案,重放攻击和可能的攻击与键盘记录器。
{"title":"VIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme","authors":"Ankit Thakkar, Kajol Patel","doi":"10.1504/IJICS.2019.10018472","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10018472","url":null,"abstract":"Nowadays online transactions are becoming ubiquitous that must be protected from bots using different techniques, and CAPTCHA is one of them. Text-CAPTCHA preferred due to its simplicity amongst different types of CAPTCHAs. Text-CAPTCHA can be strengthened by adding some distortion to prevent bot-attacks but cause usability issues for humans. This results in multiple attempts by a user to gain access to the required service and may give frustration to the user. Hence, there is a need to design CAPTCHA which is easy for humans to recognise but difficult for bots. This paper proposes virtual keyboard-based simple and efficient text-CAPTCHA verification scheme (VIKAS) that makes CAPTCHA verification easy for humans but difficult for bots. VIKAS uses simple text-CAPTCHA and verifies the same using positions of the keys pressed by the user using an image-based virtual keyboard. VIKAS is sustainable against segmentation scheme, replay attacks and possible attacks with keyloggers.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on data fuzzy breakpoint detection in massive dynamic data flow 海量动态数据流中数据模糊断点检测研究
Pub Date : 2019-10-09 DOI: 10.1504/ijics.2019.10024487
Ma Yingying, Yuan Hao
The current method obtains the frequency of occurrence of abnormal data detected in the adjacent regions through reading between the sensor and the adjacent conversion data, and uses the frequency of occurrence of abnormal data to describe the spatial correlation, according to readings of sensor data using the Bayesian analysis method of sensor to determine whether the sensor is abnormal. But this method has the problem of low detection accuracy. For this reason, this paper proposes a method to detect the fuzzy breakpoint of data in the massive dynamic data flow. Firstly, this method used the amplitude difference method to determine the abnormal data amplitude and the discrete point difference of data fuzzy breakpoint, and then used the wavelet transform to extract the features of inflection point of the data fuzzy breakpoint. Combined with the features of inflection point of the extracted data fuzzy breakpoint, we carried out the support vector machine classification, and detected the data fuzzy breakpoints in the massive dynamic data flow. Experimental results show that the proposed method can effectively improve the accuracy of fuzzy breakpoint detection.
目前的方法是通过读取传感器与相邻转换数据之间的数据,得到相邻区域检测到的异常数据的发生频率,并用异常数据的发生频率来描述空间相关性,根据传感器数据的读数,利用传感器的贝叶斯分析方法来判断传感器是否异常。但该方法存在检测精度低的问题。为此,本文提出了一种在海量动态数据流中检测数据模糊断点的方法。该方法首先利用幅值差法确定异常数据幅值和数据模糊断点的离散点差,然后利用小波变换提取数据模糊断点的拐点特征。结合提取的数据模糊断点的拐点特征,进行支持向量机分类,在海量动态数据流中检测数据模糊断点。实验结果表明,该方法能有效提高模糊断点检测的精度。
{"title":"Study on data fuzzy breakpoint detection in massive dynamic data flow","authors":"Ma Yingying, Yuan Hao","doi":"10.1504/ijics.2019.10024487","DOIUrl":"https://doi.org/10.1504/ijics.2019.10024487","url":null,"abstract":"The current method obtains the frequency of occurrence of abnormal data detected in the adjacent regions through reading between the sensor and the adjacent conversion data, and uses the frequency of occurrence of abnormal data to describe the spatial correlation, according to readings of sensor data using the Bayesian analysis method of sensor to determine whether the sensor is abnormal. But this method has the problem of low detection accuracy. For this reason, this paper proposes a method to detect the fuzzy breakpoint of data in the massive dynamic data flow. Firstly, this method used the amplitude difference method to determine the abnormal data amplitude and the discrete point difference of data fuzzy breakpoint, and then used the wavelet transform to extract the features of inflection point of the data fuzzy breakpoint. Combined with the features of inflection point of the extracted data fuzzy breakpoint, we carried out the support vector machine classification, and detected the data fuzzy breakpoints in the massive dynamic data flow. Experimental results show that the proposed method can effectively improve the accuracy of fuzzy breakpoint detection.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125784102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1