首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
A robust and blind image watermarking scheme in DCT domain 一种基于DCT域的鲁棒盲图像水印方案
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10016376
Arup Kumar Pal, Soumitra Roy
In this paper, the authors have presented a robust and blind watermarking scheme based on discrete cosine transform (DCT) for protecting the copyright ownership of digital images. Initially, the image is decomposed into non-overlapping blocks and subsequently DCT is employed on each block to embed a binary bit of watermark into each transformed block by modifying some middle significant AC coefficients using repetition code. During the embedding phase of the proposed method, DC and some higher AC coefficients are kept intact after zigzag scanning of each DCT block to ensure the high visual quality of watermarked image. This scheme is suitable to protect the copyright information even in compressed form of the watermarked image since it exploits middle bands of DCT coefficients for embedding the watermark bits. The proposed scheme is also tested to verify the withstand capability against several image processing attacks and satisfactory results are achieved.
本文提出了一种基于离散余弦变换(DCT)的鲁棒盲水印方案,用于数字图像版权保护。首先将图像分解为互不重叠的块,然后在每个块上使用DCT,通过重复编码修改一些中间有效的AC系数,在每个变换后的块中嵌入一个二进制的水印位。在该方法的嵌入阶段,对每个DCT块进行之字形扫描后,DC和一些较高的AC系数保持不变,以保证水印图像的高视觉质量。该方案利用离散余弦变换系数的中间带嵌入水印位,适用于水印图像压缩后的版权信息保护。本文还对该方案进行了测试,验证了该方案对多种图像处理攻击的抵御能力,取得了令人满意的结果。
{"title":"A robust and blind image watermarking scheme in DCT domain","authors":"Arup Kumar Pal, Soumitra Roy","doi":"10.1504/IJICS.2018.10016376","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10016376","url":null,"abstract":"In this paper, the authors have presented a robust and blind watermarking scheme based on discrete cosine transform (DCT) for protecting the copyright ownership of digital images. Initially, the image is decomposed into non-overlapping blocks and subsequently DCT is employed on each block to embed a binary bit of watermark into each transformed block by modifying some middle significant AC coefficients using repetition code. During the embedding phase of the proposed method, DC and some higher AC coefficients are kept intact after zigzag scanning of each DCT block to ensure the high visual quality of watermarked image. This scheme is suitable to protect the copyright information even in compressed form of the watermarked image since it exploits middle bands of DCT coefficients for embedding the watermark bits. The proposed scheme is also tested to verify the withstand capability against several image processing attacks and satisfactory results are achieved.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123635384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Innovative data security model using forensic audio video steganography for improving hidden data security and robustness 采用法医音视频隐写技术的创新数据安全模型,提高隐藏数据的安全性和鲁棒性
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10007844
S. K. Moon, R. Raut
Data embedding using steganography is not a major issue but recovery of hidden data in a secured way without degradation of both original and secret data are the major problem. To the best of our knowledge many researchers are working on image steganography using exploited modified direction (EMD) algorithm to improve the hiding capacity and security. But nowadays internet is mostly popular due to Facebook, YouTube and WhatsApp which consists of videos; hence in this paper we have proposed a combination of video crypto-steganography and digital forensic technique using modified general EMD (MGEMD) algorithm for enhancing the embedding capacity and security of secret data. We have embedded the secret data as an image and audio behind the selected frames of video and obtained the key security parameters using forensic technique to improve the hiding capacity and the data security which is found to be better than any other existing methods.
使用隐写术的数据嵌入不是主要问题,但以安全的方式恢复隐藏数据而不降低原始数据和秘密数据是主要问题。据我们所知,许多研究者都在研究利用改进方向(EMD)算法来提高图像隐写的隐藏能力和安全性。但如今,由于Facebook、YouTube和WhatsApp由视频组成,互联网最受欢迎;因此,本文提出了一种基于改进通用EMD (MGEMD)算法的视频隐写与数字取证技术的结合,以提高秘密数据的嵌入容量和安全性。我们将秘密数据以图像和音频的形式嵌入到选定的视频帧后,并利用取证技术获得关键的安全参数,提高了隐藏能力和数据安全性,优于现有的任何方法。
{"title":"Innovative data security model using forensic audio video steganography for improving hidden data security and robustness","authors":"S. K. Moon, R. Raut","doi":"10.1504/IJICS.2018.10007844","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10007844","url":null,"abstract":"Data embedding using steganography is not a major issue but recovery of hidden data in a secured way without degradation of both original and secret data are the major problem. To the best of our knowledge many researchers are working on image steganography using exploited modified direction (EMD) algorithm to improve the hiding capacity and security. But nowadays internet is mostly popular due to Facebook, YouTube and WhatsApp which consists of videos; hence in this paper we have proposed a combination of video crypto-steganography and digital forensic technique using modified general EMD (MGEMD) algorithm for enhancing the embedding capacity and security of secret data. We have embedded the secret data as an image and audio behind the selected frames of video and obtained the key security parameters using forensic technique to improve the hiding capacity and the data security which is found to be better than any other existing methods.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129745830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices 加密哈希函数Keccak-512在FPGA器件上的高频实现
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10016384
Soufiane El Moumni, M. Fettach, A. Tragha
Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions, NIST expressed its need to a new resistant hash function by announcing a public competition, this competition made Keccak hash function the new secure hash algorithm SHA-3. This new SHA-3 proved its strengths against recent attacks. However it has to be implemented efficiently in order to keep its resistance. In other words, an efficient FPGA design of hash functions is needed be it increasing frequency, minimising area consumption, or increasing throughput. In this paper we have focused on increasing frequency of the Keccak-512, and we have achieved 401.2 MHz as a maximum frequency, and 9.62 Gbps as a throughput. The proposed design has been implemented in Xilinx Virtex-5 and Virtex-6 FPGA devices and compared to existing FPGA implementations.
密码学哈希函数在计算数字签名、检查数据完整性、存储密码和生成随机数等众多密码学机制中发挥着重要作用。由于对哈希函数的密码分析攻击,NIST通过宣布公开竞赛来表达对新的抗哈希函数的需求,这次竞赛使Keccak哈希函数成为新的安全哈希算法SHA-3。这种新的SHA-3证明了它对抗最近攻击的能力。然而,它必须有效地实施,以保持其阻力。换句话说,无论是增加频率、最小化面积消耗还是增加吞吐量,都需要高效的哈希函数FPGA设计。在本文中,我们专注于提高Keccak-512的频率,我们已经实现了401.2 MHz作为最大频率,9.62 Gbps作为吞吐量。提出的设计已经在Xilinx Virtex-5和Virtex-6 FPGA器件中实现,并与现有的FPGA实现进行了比较。
{"title":"High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices","authors":"Soufiane El Moumni, M. Fettach, A. Tragha","doi":"10.1504/IJICS.2018.10016384","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10016384","url":null,"abstract":"Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions, NIST expressed its need to a new resistant hash function by announcing a public competition, this competition made Keccak hash function the new secure hash algorithm SHA-3. This new SHA-3 proved its strengths against recent attacks. However it has to be implemented efficiently in order to keep its resistance. In other words, an efficient FPGA design of hash functions is needed be it increasing frequency, minimising area consumption, or increasing throughput. In this paper we have focused on increasing frequency of the Keccak-512, and we have achieved 401.2 MHz as a maximum frequency, and 9.62 Gbps as a throughput. The proposed design has been implemented in Xilinx Virtex-5 and Virtex-6 FPGA devices and compared to existing FPGA implementations.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126463393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme 基于混合rsa的高效、可靠、强大的个人全网状网络消息传递方案
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10010256
A. Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li
Efficient balancing of privacy and strong authentication in end-to-end (E2E) security constitutes a challenging task in the field of personal messaging. Since RSA is a ubiquitous approach, we here propose a hybrid RSA-based, highly efficient, reliable and strong personal full mesh networked messaging scheme. M-prime RSA and CRT-RSA with shared RSA makes our hybrid RSA decryption much more secure and efficient and protects our users with complete privacy. However, computational modular exponentiation complexity and partial key exposure vulnerability of RSA present two major obstacles. Low modular complexity and asymptotic very slow speed of decryption of RSA, with the ease and speed problem in encryption of RSA are also problems to be solved. Our hybrid RSA cipher resolves all of the above issues and provides protection against exploitation of multiplicative property and homomorphic property of RSA. Our full mesh networking scheme also ensures E2E encryption for all peers. So, our three-way authenticated hybrid RSA messaging scheme achieves a perfect balance of efficiency, security, authentication, reliability and privacy. Consequently, our scheme offers a smarter choice for private messaging in existing, as well as future, internet architectures.
在个人消息传递领域,有效地平衡端到端(E2E)安全中的隐私和强身份验证是一项具有挑战性的任务。由于RSA是一种无处不在的方法,我们在这里提出了一种基于RSA的混合、高效、可靠和强大的个人全网状网络消息传递方案。m -素数RSA和CRT-RSA共享RSA,使我们的混合RSA解密更加安全高效,保护用户完全的隐私。然而,RSA算法的计算模幂复杂度和部分密钥暴露漏洞是其实现的两大障碍。RSA的低模复杂度和渐近极慢的解密速度,与此同时,RSA加密中的易用性和速度问题也是亟待解决的问题。我们的混合RSA密码解决了上述所有问题,并提供了防止利用RSA的乘法性质和同态性质的保护。我们的全网状网络方案还确保所有对等端端到端加密。因此,我们的三向认证混合RSA消息传递方案实现了效率、安全性、认证、可靠性和隐私性的完美平衡。因此,我们的方案为现有和未来的互联网体系结构中的私有消息传递提供了更明智的选择。
{"title":"Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme","authors":"A. Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li","doi":"10.1504/IJICS.2018.10010256","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10010256","url":null,"abstract":"Efficient balancing of privacy and strong authentication in end-to-end (E2E) security constitutes a challenging task in the field of personal messaging. Since RSA is a ubiquitous approach, we here propose a hybrid RSA-based, highly efficient, reliable and strong personal full mesh networked messaging scheme. M-prime RSA and CRT-RSA with shared RSA makes our hybrid RSA decryption much more secure and efficient and protects our users with complete privacy. However, computational modular exponentiation complexity and partial key exposure vulnerability of RSA present two major obstacles. Low modular complexity and asymptotic very slow speed of decryption of RSA, with the ease and speed problem in encryption of RSA are also problems to be solved. Our hybrid RSA cipher resolves all of the above issues and provides protection against exploitation of multiplicative property and homomorphic property of RSA. Our full mesh networking scheme also ensures E2E encryption for all peers. So, our three-way authenticated hybrid RSA messaging scheme achieves a perfect balance of efficiency, security, authentication, reliability and privacy. Consequently, our scheme offers a smarter choice for private messaging in existing, as well as future, internet architectures.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133598072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters 信息隐藏:一种利用unicode字符增强封面文本容量的新算法
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10012517
Muhammad Azeem, Yongquan Cai, A. Ditta, Khurram Gulzar Rana, Faheem Akhtar Rajpoot
From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders.
几个世纪以来,信息安全一直是世界各地安全官员、入侵者、黑客和其他通信部门的一个有吸引力的话题。密码学和隐写术被广泛用于互联网上的安全通信。在隐写术中,数据隐藏能力对研究团体和安全官员来说是一个巨大的挑战。本文提出了一种利用零宽度拼接、零宽度非拼接和零宽度字符三种不同的unicode字符来隐藏具有较高覆盖文本容量的秘密数据的新算法。以英语文本为信息载体。在将密文嵌入封面文本之前,对密文中特定字符的二进制值进行补码。此外,为实现所设计的算法,还开发了“Steger”。结果表明,新设计的算法具有更高的数据隐藏容量、安全性和大小效率。这是载体文本数据隐藏能力的惊人提升。unicode方法被有效地用于减少入侵者的注意力。
{"title":"Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters","authors":"Muhammad Azeem, Yongquan Cai, A. Ditta, Khurram Gulzar Rana, Faheem Akhtar Rajpoot","doi":"10.1504/IJICS.2018.10012517","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012517","url":null,"abstract":"From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessing cyber-incidents using machine learning 使用机器学习评估网络事件
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10016383
Ross Gore, S. Diallo, J. Padilla, B. Ezell
One of the difficulties in effectively analysing and combating cyber attacks is an inability to identify when, why and how they occur. Victim organisations do not reveal this data for fear of disclosing vulnerabilities and attackers do not reveal themselves for fear of being prosecuted. In this paper, we employ two machine-learning algorithms to identify: 1) if a text-based report is related to a cyber-incident; 2) the topic within the field of cyber-security the incident report addresses. First, we evaluate the effectiveness of our approach using a benchmark set of cyber-incident reports from 2006. Then, we assess the current state of cyber-security by applying our approach to a 2014 set of cyber-incident reports we gathered. Ultimately, our results show that the combination of automatically gathering and organising cyber-security reports in close to real-time yields an assessment technology with actionable results for intelligence and security analysts.
有效分析和打击网络攻击的困难之一是无法确定它们何时、为何以及如何发生。受害者组织不会透露这些数据,因为害怕暴露漏洞,攻击者也不会透露自己,因为害怕被起诉。在本文中,我们采用了两种机器学习算法来识别:1)基于文本的报告是否与网络事件相关;2)事件报告所涉及的网络安全领域的主题。首先,我们使用2006年网络事件报告的基准集来评估我们方法的有效性。然后,我们通过将我们的方法应用于我们收集的2014年网络事件报告集来评估当前的网络安全状况。最终,我们的结果表明,自动收集和组织接近实时的网络安全报告的组合产生了一种评估技术,为情报和安全分析师提供了可操作的结果。
{"title":"Assessing cyber-incidents using machine learning","authors":"Ross Gore, S. Diallo, J. Padilla, B. Ezell","doi":"10.1504/IJICS.2018.10016383","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10016383","url":null,"abstract":"One of the difficulties in effectively analysing and combating cyber attacks is an inability to identify when, why and how they occur. Victim organisations do not reveal this data for fear of disclosing vulnerabilities and attackers do not reveal themselves for fear of being prosecuted. In this paper, we employ two machine-learning algorithms to identify: 1) if a text-based report is related to a cyber-incident; 2) the topic within the field of cyber-security the incident report addresses. First, we evaluate the effectiveness of our approach using a benchmark set of cyber-incident reports from 2006. Then, we assess the current state of cyber-security by applying our approach to a 2014 set of cyber-incident reports we gathered. Ultimately, our results show that the combination of automatically gathering and organising cyber-security reports in close to real-time yields an assessment technology with actionable results for intelligence and security analysts.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation 基于链接和视觉相似关系的金融和电子银行网站钓鱼攻击检测
Pub Date : 2018-10-04 DOI: 10.1504/IJICS.2018.10016392
A. Jain, B. Gupta
Today, phishing is one of the biggest problems faced by the cyber-world. In this paper, we present an approach that can detect phishing attacks in commercial and e-banking websites using the link and visual similarity relations. Phisher always tries to mimic the visual design of the webpage and the fake webpage contains identity keywords and hyperlinks that point to the corresponding legitimate webpage to trap internet users. Therefore, our proposed approach analyse the keywords, hyperlinks and CSS layout of the webpage to detect phishing attack. In the proposed approach, we make a set of associate domains with the suspicious webpage and explore the link and similarity relation to identifying phishing webpages. Also, we use the login form and whitelist based filtering to increase the running time of the proposed approach. Our proposed approach is not only able to detect phishing webpages accurately but its source webpage also. Moreover, it does not require any prior training to detect zero hour phishing attack. Experiments are conducted over a 6,616 phishing and legitimate webpages and the proposed approach gives approximately 99.72% true positive rate and less than 1.89% false negative rate.
今天,网络钓鱼是网络世界面临的最大问题之一。本文提出了一种利用链接和视觉相似关系检测商业和电子银行网站钓鱼攻击的方法。仿冒者总是试图模仿网页的视觉设计,虚假网页包含身份关键字和指向相应合法网页的超链接,以诱骗互联网用户。因此,我们提出的方法通过分析网页的关键词、超链接和CSS布局来检测网络钓鱼攻击。在该方法中,我们为可疑网页建立一组关联域,并探索链接和相似关系来识别网络钓鱼网页。此外,我们还使用登录表单和基于白名单的过滤来增加所提出方法的运行时间。我们提出的方法不仅能够准确地检测出网络钓鱼网页,而且能够准确地检测出其源网页。此外,它不需要任何事先的培训来检测零小时网络钓鱼攻击。在6,616个钓鱼和合法网页上进行了实验,该方法的真阳性率约为99.72%,假阴性率小于1.89%。
{"title":"Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation","authors":"A. Jain, B. Gupta","doi":"10.1504/IJICS.2018.10016392","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10016392","url":null,"abstract":"Today, phishing is one of the biggest problems faced by the cyber-world. In this paper, we present an approach that can detect phishing attacks in commercial and e-banking websites using the link and visual similarity relations. Phisher always tries to mimic the visual design of the webpage and the fake webpage contains identity keywords and hyperlinks that point to the corresponding legitimate webpage to trap internet users. Therefore, our proposed approach analyse the keywords, hyperlinks and CSS layout of the webpage to detect phishing attack. In the proposed approach, we make a set of associate domains with the suspicious webpage and explore the link and similarity relation to identifying phishing webpages. Also, we use the login form and whitelist based filtering to increase the running time of the proposed approach. Our proposed approach is not only able to detect phishing webpages accurately but its source webpage also. Moreover, it does not require any prior training to detect zero hour phishing attack. Experiments are conducted over a 6,616 phishing and legitimate webpages and the proposed approach gives approximately 99.72% true positive rate and less than 1.89% false negative rate.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The research of reputation incentive mechanism of P2P network file sharing system P2P网络文件共享系统的声誉激励机制研究
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012570
Shaojing Li, Wanli Su
In the digital information age, data sharing and security are important research topics, data sharing technology and information security technology have developed rapidly. The reputation incentive mechanism based on interest of nodes is important in P2P file sharing system. This mechanism can reduce the transaction risk in P2P file sharing system, improve the success rate of transaction and maintain the sound development of network. In addition, in this paper, two typical security problems (naive attack and sybil attack) are studied to minimise the damage to the network. The simulation and analysis of the success rate of resource location and transaction show that the reputation incentive mechanism is correct, feasible and effective. Furthermore, it has significant improvements in security and simplicity.
在数字信息时代,数据共享与安全是重要的研究课题,数据共享技术和信息安全技术得到了迅速发展。基于节点利益的声誉激励机制是P2P文件共享系统的重要组成部分。该机制可以降低P2P文件共享系统中的交易风险,提高交易成功率,维护网络的健康发展。此外,本文还研究了两种典型的安全问题(naive attack和sybil attack),以尽量减少对网络的损害。通过对资源配置和交易成功率的仿真分析,验证了声誉激励机制的正确性、可行性和有效性。此外,它在安全性和简单性方面有重大改进。
{"title":"The research of reputation incentive mechanism of P2P network file sharing system","authors":"Shaojing Li, Wanli Su","doi":"10.1504/IJICS.2018.10012570","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012570","url":null,"abstract":"In the digital information age, data sharing and security are important research topics, data sharing technology and information security technology have developed rapidly. The reputation incentive mechanism based on interest of nodes is important in P2P file sharing system. This mechanism can reduce the transaction risk in P2P file sharing system, improve the success rate of transaction and maintain the sound development of network. In addition, in this paper, two typical security problems (naive attack and sybil attack) are studied to minimise the damage to the network. The simulation and analysis of the success rate of resource location and transaction show that the reputation incentive mechanism is correct, feasible and effective. Furthermore, it has significant improvements in security and simplicity.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"32 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120920330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved pixel relevance based on Mahalanobis distance for image segmentation 基于马氏距离的改进像素相关性图像分割
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012573
Lihua Song, Xiaofeng Zhang
Image segmentation is to partition one given image into different regions. In essence, the procedure of image segmentation is to cluster the pixels into different groups according to the retrieved features. However, artefacts in the given images make the features be contaminated, resulting in poor performance of current segmentation algorithms. Therefore, how to reduce the effect of image artefacts is one hot topic in image processing. In current algorithms, neighbour information is adopted to resist the effect of image artefacts. However, when the image is contaminated with high-level noise, current algorithms also perform poor. Recently, non-local information is introduced to improve the quality of segmentation results, in which pixel relevance between pixels is crucial. In this paper, pixel relevance is measured based on Mahalanobis distance. More specifically, we consider the distribution of different samples and relevance interference between samples in the procedure of computing pixel relevance. Then, a new algorithm based on the novel pixel relevance is proposed, where non-local information can be incorporated into fuzzy clustering for image segmentation. The new algorithm can improve the robustness of corresponding algorithms greatly. Experiments on different noisy images show that the proposed algorithm can retrieve better results than conventional algorithms.
图像分割就是将给定的图像分割成不同的区域。本质上,图像分割的过程是根据检索到的特征将像素聚类成不同的组。然而,给定图像中的伪影会使特征受到污染,导致当前分割算法的性能不佳。因此,如何降低图像伪影的影响是图像处理中的一个热点问题。目前的算法采用邻域信息来抵抗图像伪影的影响。然而,当图像被高水平噪声污染时,现有算法的性能也很差。近年来,为了提高分割结果的质量,引入了非局部信息,其中像素间的相关性至关重要。本文基于马氏距离测量像素相关性。更具体地说,我们在计算像素相关性的过程中考虑了不同样本的分布和样本之间的相关干扰。然后,提出了一种新的基于像素相关性的算法,将非局部信息纳入模糊聚类中进行图像分割。新算法可以大大提高相应算法的鲁棒性。在不同噪声图像上的实验表明,该算法的检索效果优于传统算法。
{"title":"Improved pixel relevance based on Mahalanobis distance for image segmentation","authors":"Lihua Song, Xiaofeng Zhang","doi":"10.1504/IJICS.2018.10012573","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012573","url":null,"abstract":"Image segmentation is to partition one given image into different regions. In essence, the procedure of image segmentation is to cluster the pixels into different groups according to the retrieved features. However, artefacts in the given images make the features be contaminated, resulting in poor performance of current segmentation algorithms. Therefore, how to reduce the effect of image artefacts is one hot topic in image processing. In current algorithms, neighbour information is adopted to resist the effect of image artefacts. However, when the image is contaminated with high-level noise, current algorithms also perform poor. Recently, non-local information is introduced to improve the quality of segmentation results, in which pixel relevance between pixels is crucial. In this paper, pixel relevance is measured based on Mahalanobis distance. More specifically, we consider the distribution of different samples and relevance interference between samples in the procedure of computing pixel relevance. Then, a new algorithm based on the novel pixel relevance is proposed, where non-local information can be incorporated into fuzzy clustering for image segmentation. The new algorithm can improve the robustness of corresponding algorithms greatly. Experiments on different noisy images show that the proposed algorithm can retrieve better results than conventional algorithms.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127754221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A nonlinear two dimensional logistic-tent map for secure image communication 一种用于安全图像通信的非线性二维物流帐篷图
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012577
S. Rajendran, Manivannan Doraipandian
In recent technology development, images are playing a vital role in different applications such as social network, biometrics, medical, military and satellite fields. It is essential to protect these images from intruders during transmission on insecure networks. This paper proposes a new chaotic map for image cryptosystem by combining tent map and 2D logistic map in different form. The proposed 2D Logistic-Tent map (2DLT) generates two chaotic series. These chaotic series are used to perform the confusion and diffusion phases of image cryptosystem. A comparison between existing standard 2D logistic map and proposed 2D logistic-tent map shows that the proposed map has high random chaotic series than the existing one. In order to evaluate the strength of the proposed image cryptosystem, the developed chaos cryptosystem was subjected to different analysis such as differential, key size and sensitivity, chosen plain text and cipher text attack analyses. All the analysed results proved that the proposed cipher has good security level and can be used for different secure image communication applications.
在最近的技术发展中,图像在社交网络、生物识别、医疗、军事和卫星领域等不同应用中发挥着至关重要的作用。在不安全的网络传输过程中,保护这些图像免受入侵者的侵害是至关重要的。将不同形式的帐篷映射与二维逻辑映射相结合,提出了一种新的用于图像密码系统的混沌映射。提出的二维物流帐篷图(2DLT)产生两个混沌序列。这些混沌序列用于图像密码系统的混淆和扩散阶段。将现有的二维标准物流图与本文提出的二维物流帐篷图进行比较,发现本文提出的二维物流帐篷图比现有的二维物流帐篷图具有更高的随机混沌序列。为了评估所提出的图像密码系统的强度,对所开发的混沌密码系统进行了差分、密钥大小和灵敏度、选择明文和密文攻击分析等不同的分析。分析结果表明,该密码具有良好的安全水平,可用于各种安全的图像通信应用。
{"title":"A nonlinear two dimensional logistic-tent map for secure image communication","authors":"S. Rajendran, Manivannan Doraipandian","doi":"10.1504/IJICS.2018.10012577","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012577","url":null,"abstract":"In recent technology development, images are playing a vital role in different applications such as social network, biometrics, medical, military and satellite fields. It is essential to protect these images from intruders during transmission on insecure networks. This paper proposes a new chaotic map for image cryptosystem by combining tent map and 2D logistic map in different form. The proposed 2D Logistic-Tent map (2DLT) generates two chaotic series. These chaotic series are used to perform the confusion and diffusion phases of image cryptosystem. A comparison between existing standard 2D logistic map and proposed 2D logistic-tent map shows that the proposed map has high random chaotic series than the existing one. In order to evaluate the strength of the proposed image cryptosystem, the developed chaos cryptosystem was subjected to different analysis such as differential, key size and sensitivity, chosen plain text and cipher text attack analyses. All the analysed results proved that the proposed cipher has good security level and can be used for different secure image communication applications.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1