首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification 基于Arnold置乱和直方图修正的DCT域鲁棒可逆图像水印方案
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012576
Soumitra Roy, Arup Kumar Pal
Among the various watermarking schemes, the reversible watermarking scheme has drawn extensive attention in the recent years for its application in sensitive issues like medical, military and typical law-enforcement images. Cover image dependent embedding capacity and lack of robustness are the most crucial concerns of the reversible watermarking methods. To overcome these issues, a discrete cosine transform (DCT) and histogram shifting based robust reversible image watermarking scheme using Arnold scrambling is presented in this paper. Initially, the image is decomposed into non-overlapping blocks and consequently DCT are applied to each block to embed a binary bit of watermark into each transformed block by modifying one pair of middle significant AC coefficients. In this initial step, location map is also generated for the cover image restoration purpose in the extracting side. Then, this location map is embedded in the cover image using histogram modification technique. In the receiver side, at first location map is generated from an image using histogram modification method and watermark is recovered from the corresponding image. Using location map reversible image is reversed in the following extracting phase of the proposed method. The proposed reversible watermarking scheme has also been experimented to verify the robustness property against several image processing attacks and satisfactory results are achieved.
在各种水印方案中,可逆水印方案由于在医疗、军事和典型执法图像等敏感问题上的应用,近年来受到了广泛的关注。基于覆盖图像的嵌入能力和鲁棒性不足是可逆水印方法最主要的问题。为了克服这些问题,本文提出了一种基于离散余弦变换(DCT)和直方图移位的阿诺德置乱鲁棒可逆图像水印方案。首先,将图像分解为互不重叠的块,然后通过修改一对中间有效AC系数对每个块进行DCT,在每个变换后的块中嵌入一个二值位的水印。在这一初始步骤中,在提取端还生成了用于覆盖图像恢复的地形图。然后,利用直方图修改技术将该地形图嵌入到封面图像中。在接收端,首先使用直方图修改方法从图像中生成位置地图,并从相应图像中恢复水印。在该方法的下一阶段,利用位置图对可逆图像进行反向提取。实验还验证了所提出的可逆水印方案对多种图像处理攻击的鲁棒性,取得了令人满意的结果。
{"title":"A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification","authors":"Soumitra Roy, Arup Kumar Pal","doi":"10.1504/IJICS.2018.10012576","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012576","url":null,"abstract":"Among the various watermarking schemes, the reversible watermarking scheme has drawn extensive attention in the recent years for its application in sensitive issues like medical, military and typical law-enforcement images. Cover image dependent embedding capacity and lack of robustness are the most crucial concerns of the reversible watermarking methods. To overcome these issues, a discrete cosine transform (DCT) and histogram shifting based robust reversible image watermarking scheme using Arnold scrambling is presented in this paper. Initially, the image is decomposed into non-overlapping blocks and consequently DCT are applied to each block to embed a binary bit of watermark into each transformed block by modifying one pair of middle significant AC coefficients. In this initial step, location map is also generated for the cover image restoration purpose in the extracting side. Then, this location map is embedded in the cover image using histogram modification technique. In the receiver side, at first location map is generated from an image using histogram modification method and watermark is recovered from the corresponding image. Using location map reversible image is reversed in the following extracting phase of the proposed method. The proposed reversible watermarking scheme has also been experimented to verify the robustness property against several image processing attacks and satisfactory results are achieved.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A nonlinear two dimensional logistic-tent map for secure image communication 一种用于安全图像通信的非线性二维物流帐篷图
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012577
S. Rajendran, Manivannan Doraipandian
In recent technology development, images are playing a vital role in different applications such as social network, biometrics, medical, military and satellite fields. It is essential to protect these images from intruders during transmission on insecure networks. This paper proposes a new chaotic map for image cryptosystem by combining tent map and 2D logistic map in different form. The proposed 2D Logistic-Tent map (2DLT) generates two chaotic series. These chaotic series are used to perform the confusion and diffusion phases of image cryptosystem. A comparison between existing standard 2D logistic map and proposed 2D logistic-tent map shows that the proposed map has high random chaotic series than the existing one. In order to evaluate the strength of the proposed image cryptosystem, the developed chaos cryptosystem was subjected to different analysis such as differential, key size and sensitivity, chosen plain text and cipher text attack analyses. All the analysed results proved that the proposed cipher has good security level and can be used for different secure image communication applications.
在最近的技术发展中,图像在社交网络、生物识别、医疗、军事和卫星领域等不同应用中发挥着至关重要的作用。在不安全的网络传输过程中,保护这些图像免受入侵者的侵害是至关重要的。将不同形式的帐篷映射与二维逻辑映射相结合,提出了一种新的用于图像密码系统的混沌映射。提出的二维物流帐篷图(2DLT)产生两个混沌序列。这些混沌序列用于图像密码系统的混淆和扩散阶段。将现有的二维标准物流图与本文提出的二维物流帐篷图进行比较,发现本文提出的二维物流帐篷图比现有的二维物流帐篷图具有更高的随机混沌序列。为了评估所提出的图像密码系统的强度,对所开发的混沌密码系统进行了差分、密钥大小和灵敏度、选择明文和密文攻击分析等不同的分析。分析结果表明,该密码具有良好的安全水平,可用于各种安全的图像通信应用。
{"title":"A nonlinear two dimensional logistic-tent map for secure image communication","authors":"S. Rajendran, Manivannan Doraipandian","doi":"10.1504/IJICS.2018.10012577","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012577","url":null,"abstract":"In recent technology development, images are playing a vital role in different applications such as social network, biometrics, medical, military and satellite fields. It is essential to protect these images from intruders during transmission on insecure networks. This paper proposes a new chaotic map for image cryptosystem by combining tent map and 2D logistic map in different form. The proposed 2D Logistic-Tent map (2DLT) generates two chaotic series. These chaotic series are used to perform the confusion and diffusion phases of image cryptosystem. A comparison between existing standard 2D logistic map and proposed 2D logistic-tent map shows that the proposed map has high random chaotic series than the existing one. In order to evaluate the strength of the proposed image cryptosystem, the developed chaos cryptosystem was subjected to different analysis such as differential, key size and sensitivity, chosen plain text and cipher text attack analyses. All the analysed results proved that the proposed cipher has good security level and can be used for different secure image communication applications.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks 针对在线社交网络中XSS漏洞的现代应用程序健壮的基于注入点的框架
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012568
Shashank Gupta, B. Gupta
The authors introduced a universal and an automated server-side flexible framework, XSS-explorer, which automatically scrutinises the web applications in order to discover XSS attack vectors. XSS-explorer is capable enough for exploring and recognising all the injection points of web application and produces explicit XSS attack injection investigations for all such injection points. Our approach is based on methods permitting precise filling of injection points of forms with usable info. The identification of such injection points permits our technique to retrieve each possible web page of application, allowing a wider exploration and accelerating the discovery frequency of XSS attack vectors. We evaluate efficiency of our scheme on a suite of open source multimedia applications by applying F-test hypothesis and F-measure. These evaluations indorse that precise filling of the injection points by only usable info confirms an enhanced efficiency of the tests, thus accelerating the recognition rate of XSS attacks.
作者介绍了一个通用且自动化的服务器端灵活框架XSS-explorer,它可以自动检查web应用程序以发现XSS攻击向量。XSS-explorer有足够的能力探索和识别web应用程序的所有注入点,并为所有这些注入点产生显式的XSS攻击注入调查。我们的方法是基于允许使用可用信息精确填充表单注入点的方法。这些注入点的识别使我们的技术能够检索每个可能的应用程序网页,从而允许更广泛的探索并加快XSS攻击向量的发现频率。我们通过f检验假设和f度量来评估我们的方案在一套开源多媒体应用程序上的效率。这些评估表明,仅用可用信息精确填充注入点可以提高测试的效率,从而提高XSS攻击的识别率。
{"title":"Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks","authors":"Shashank Gupta, B. Gupta","doi":"10.1504/IJICS.2018.10012568","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012568","url":null,"abstract":"The authors introduced a universal and an automated server-side flexible framework, XSS-explorer, which automatically scrutinises the web applications in order to discover XSS attack vectors. XSS-explorer is capable enough for exploring and recognising all the injection points of web application and produces explicit XSS attack injection investigations for all such injection points. Our approach is based on methods permitting precise filling of injection points of forms with usable info. The identification of such injection points permits our technique to retrieve each possible web page of application, allowing a wider exploration and accelerating the discovery frequency of XSS attack vectors. We evaluate efficiency of our scheme on a suite of open source multimedia applications by applying F-test hypothesis and F-measure. These evaluations indorse that precise filling of the injection points by only usable info confirms an enhanced efficiency of the tests, thus accelerating the recognition rate of XSS attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A new statistical attack resilient steganography scheme for hiding messages in audio files 一种新的统计攻击抗隐写方案,用于隐藏音频文件中的消息
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012578
Dulal C. Kar, Anusha Madhuri Nakka, A. Katangur
We present a novel approach for audio steganography that preserves first-order statistical properties of cover audio after embedding a secret message. This approach can avoid detection by histogram-based or similar statistical attacks. This approach partitions the audio samples in the cover audio, which is followed by reordering of the samples in each partition through an encoding process for embedding the secret message. Partitioning of samples is governed by a specified error limit on individual samples, and the error limit is determined from signal-to-noise ratio that needs to be maintained in the stego audio to avoid detection by an automated system or human auditory system. Experimental results on effectiveness as well as on capacity are presented using 8-bit and 16-bit audio as covers. It is shown that the proposed approach can achieve high capacity while maintaining its effectiveness against attacks.
我们提出了一种新的音频隐写方法,该方法在嵌入秘密信息后保留掩蔽音频的一阶统计属性。这种方法可以避免基于直方图或类似统计攻击的检测。该方法对覆盖音频中的音频样本进行分区,然后通过嵌入秘密消息的编码过程对每个分区中的样本进行重新排序。样本的划分是由单个样本的指定误差限制来控制的,而误差限制是由隐写音频中需要保持的信噪比确定的,以避免被自动化系统或人类听觉系统检测到。以8位和16位音频为例,给出了有效性和容量的实验结果。结果表明,该方法在保持抗攻击有效性的同时,可以实现高容量。
{"title":"A new statistical attack resilient steganography scheme for hiding messages in audio files","authors":"Dulal C. Kar, Anusha Madhuri Nakka, A. Katangur","doi":"10.1504/IJICS.2018.10012578","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012578","url":null,"abstract":"We present a novel approach for audio steganography that preserves first-order statistical properties of cover audio after embedding a secret message. This approach can avoid detection by histogram-based or similar statistical attacks. This approach partitions the audio samples in the cover audio, which is followed by reordering of the samples in each partition through an encoding process for embedding the secret message. Partitioning of samples is governed by a specified error limit on individual samples, and the error limit is determined from signal-to-noise ratio that needs to be maintained in the stego audio to avoid detection by an automated system or human auditory system. Experimental results on effectiveness as well as on capacity are presented using 8-bit and 16-bit audio as covers. It is shown that the proposed approach can achieve high capacity while maintaining its effectiveness against attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D reconstruction of human face from an input image under random lighting condition 随机光照条件下输入图像的人脸三维重建
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012569
Yujuan Sun, Xiaofeng Zhang, Muwei Jian
The three-dimensional reconstruction from single input image is quite difficult due to many unknown parameters, such as the light conditions, the surface normal and albedo of the object. However, there are overall similar characteristics for different human faces, such as the shapes and the positions of the eyes, nose; mouth and ears are generally identical. The similar characteristics has been used in this paper to relax the numbers of the input face images, and reconstruct the 3D shape based on a couple statistical model. Moreover, the light condition of the single input image can be different from that of training database. The experiment results show the effectiveness of the proposed method.
由于光照条件、物体表面法线和反照率等未知参数的存在,单输入图像的三维重建非常困难。然而,不同的人脸总体上有相似的特征,比如眼睛、鼻子的形状和位置;嘴巴和耳朵通常是一样的。本文利用相似特征对输入的人脸图像放宽数量,并基于一对统计模型重建三维形状。此外,单个输入图像的光照条件可能与训练库的光照条件不同。实验结果表明了该方法的有效性。
{"title":"3D reconstruction of human face from an input image under random lighting condition","authors":"Yujuan Sun, Xiaofeng Zhang, Muwei Jian","doi":"10.1504/IJICS.2018.10012569","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012569","url":null,"abstract":"The three-dimensional reconstruction from single input image is quite difficult due to many unknown parameters, such as the light conditions, the surface normal and albedo of the object. However, there are overall similar characteristics for different human faces, such as the shapes and the positions of the eyes, nose; mouth and ears are generally identical. The similar characteristics has been used in this paper to relax the numbers of the input face images, and reconstruct the 3D shape based on a couple statistical model. Moreover, the light condition of the single input image can be different from that of training database. The experiment results show the effectiveness of the proposed method.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques 基于LGXP和人工神经网络技术的人脸生理特征生物认证
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012575
R. Raja, T. S. Sinha, Rajkumar Patra, S. Tiwari
In the recent times, it has been found from the literature that, only front-view of human-face images are used for the authentication of the human being. Very little amount of work has been carried out using side-view and temporal-view of the human-face for the authentication of the human being. The main fact lies in the mentality of present youth, who are very busy in taking the photographs with different poses. Generally the poses are taken from side-view. Hence in the present paper, the main focus has been kept, in the authentication process using methods of recent trends in the field of engineering. The main objective is to handle the variability in human-face appearances due to changes in the viewing direction. Poses, illumination conditions, and expressions are considered as three main parameters, which are processed for the overall authentication process. For the overall processing, extensive feature set like texture, contrast, correlation and shape are extracted by employing modified region growing algorithm and texture feature by local Gabor XOR pattern (LGXP) and artificial neural network (ANN) technique. The present work has been analysed using the data of different subjects with varying ages.
近年来,从文献中发现,只有正面的人脸图像被用于人的身份验证。利用人脸侧面图和时间图对人进行身份验证的工作很少。主要原因在于现在年轻人的心态,他们忙着拍各种各样的照片。一般来说,这些姿势都是从侧面拍摄的。因此,在本文中,主要的焦点一直保持在认证过程中使用的方法在工程领域的最新趋势。主要目标是处理由于观看方向的变化而导致的人脸外观的可变性。姿态、光照条件和表情被认为是三个主要参数,它们将被处理用于整个认证过程。在整体处理方面,采用改进的区域生长算法提取纹理、对比度、相关性和形状等广泛的特征集,采用局部Gabor异或模式(LGXP)和人工神经网络(ANN)技术提取纹理特征。目前的工作是使用不同年龄的不同受试者的数据进行分析的。
{"title":"Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques","authors":"R. Raja, T. S. Sinha, Rajkumar Patra, S. Tiwari","doi":"10.1504/IJICS.2018.10012575","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012575","url":null,"abstract":"In the recent times, it has been found from the literature that, only front-view of human-face images are used for the authentication of the human being. Very little amount of work has been carried out using side-view and temporal-view of the human-face for the authentication of the human being. The main fact lies in the mentality of present youth, who are very busy in taking the photographs with different poses. Generally the poses are taken from side-view. Hence in the present paper, the main focus has been kept, in the authentication process using methods of recent trends in the field of engineering. The main objective is to handle the variability in human-face appearances due to changes in the viewing direction. Poses, illumination conditions, and expressions are considered as three main parameters, which are processed for the overall authentication process. For the overall processing, extensive feature set like texture, contrast, correlation and shape are extracted by employing modified region growing algorithm and texture feature by local Gabor XOR pattern (LGXP) and artificial neural network (ANN) technique. The present work has been analysed using the data of different subjects with varying ages.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Node authentication algorithm for securing static wireless sensor networks from node clone attack 保护静态无线传感器网络免受节点克隆攻击的节点认证算法
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012571
Vandana Mohindru, Yashwant Singh
Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing, processing, communication, and storage capabilities. These sensor nodes are vulnerable to the node clone attack where the attacker compromises the node and extracts secret information from the node and replicate the large numbers of clones of captured node throughout the sensor network. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution energy efficient so that it is feasible to implement in such resource constrained nodes in WSN. In this paper, an energy efficient algorithm is proposed for node authentication. The aim of node authentication algorithm is to authenticate the sensor nodes before message communication within WSN so that cloned nodes are identified in the initial step of the communication. This algorithm uses encryption decryption operations and also XOR, extraction, bitwise shift operations. The performance of the proposed algorithm is analysed in terms of communication, storage, and computation overheads metrics. Finally, performance of the proposed algorithm is analysed with the other node authentication algorithms.
无线传感器网络(WSN)由小尺寸传感器节点组成,其传感、处理、通信和存储能力有限。这些传感器节点容易受到节点克隆攻击,即攻击者入侵节点,从节点中提取秘密信息,并在整个传感器网络中复制大量捕获节点的克隆。因此,在这样的网络中提供安全性是至关重要的。实现这一目标的主要挑战是使安全解决方案节能,使其能够在WSN中资源受限的节点中实现。本文提出了一种高效节能的节点认证算法。节点认证算法的目的是在WSN内部进行消息通信之前对传感器节点进行认证,以便在通信的初始阶段识别出克隆节点。该算法使用加密解密操作以及异或、提取、位移位操作。从通信、存储和计算开销等方面分析了该算法的性能。最后,与其他节点认证算法进行了性能分析。
{"title":"Node authentication algorithm for securing static wireless sensor networks from node clone attack","authors":"Vandana Mohindru, Yashwant Singh","doi":"10.1504/IJICS.2018.10012571","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012571","url":null,"abstract":"Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing, processing, communication, and storage capabilities. These sensor nodes are vulnerable to the node clone attack where the attacker compromises the node and extracts secret information from the node and replicate the large numbers of clones of captured node throughout the sensor network. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution energy efficient so that it is feasible to implement in such resource constrained nodes in WSN. In this paper, an energy efficient algorithm is proposed for node authentication. The aim of node authentication algorithm is to authenticate the sensor nodes before message communication within WSN so that cloned nodes are identified in the initial step of the communication. This algorithm uses encryption decryption operations and also XOR, extraction, bitwise shift operations. The performance of the proposed algorithm is analysed in terms of communication, storage, and computation overheads metrics. Finally, performance of the proposed algorithm is analysed with the other node authentication algorithms.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
WeChat traffic classification using machine learning algorithms and comparative analysis of datasets 微信流量分类采用机器学习算法和数据集对比分析
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012574
M. Shafiq, Xiangzhan Yu, A. Laghari
In this research paper, we present the first classification study to classify WeChat application service flow traffic (text messages, picture messages, audio call and video call traffic) classification and secondly to find out the effectiveness of big dataset and small dataset as well as to find out effective machine learning classifiers. We firstly capture WeChat traffic and then extract 44 features then we combine capture traffic to make full instance of dataset. Then we make reduce instances of dataset from the full instance of dataset to show the effectiveness of large dataset and small dataset. Then we execute well known machine learning classifiers. Using statistical test, we use Wilcoxon and Friedman statistical test for the datasets and ML classifiers to find more deeply its effectiveness. Experimental results show that reduce instance dataset show high accuracy result compared to full instance and C4.5 classifier perform effectively as compared to other classifiers.
在本文中,我们首先进行了分类研究,对微信应用服务流量(短信、图片消息、音频通话和视频通话流量)进行分类,然后进行了大数据集和小数据集的有效性研究,找到了有效的机器学习分类器。我们首先捕获微信流量,然后提取44个特征,然后将捕获的流量组合成数据集的完整实例。然后,我们从数据集的完整实例中进行数据集的约简,以显示大数据集和小数据集的有效性。然后我们执行众所周知的机器学习分类器。使用统计检验,我们对数据集和ML分类器使用Wilcoxon和Friedman统计检验,以更深入地发现其有效性。实验结果表明,与全实例相比,减少实例数据集具有较高的准确率,C4.5分类器与其他分类器相比具有较好的性能。
{"title":"WeChat traffic classification using machine learning algorithms and comparative analysis of datasets","authors":"M. Shafiq, Xiangzhan Yu, A. Laghari","doi":"10.1504/IJICS.2018.10012574","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012574","url":null,"abstract":"In this research paper, we present the first classification study to classify WeChat application service flow traffic (text messages, picture messages, audio call and video call traffic) classification and secondly to find out the effectiveness of big dataset and small dataset as well as to find out effective machine learning classifiers. We firstly capture WeChat traffic and then extract 44 features then we combine capture traffic to make full instance of dataset. Then we make reduce instances of dataset from the full instance of dataset to show the effectiveness of large dataset and small dataset. Then we execute well known machine learning classifiers. Using statistical test, we use Wilcoxon and Friedman statistical test for the datasets and ML classifiers to find more deeply its effectiveness. Experimental results show that reduce instance dataset show high accuracy result compared to full instance and C4.5 classifier perform effectively as compared to other classifiers.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reliable and secure communication using fundamental cut-sets and fundamental circuits 可靠和安全的通信使用基本切割集和基本电路
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10010648
C. P. Kumar, R. Selvakumar, R. K. Bhattar
Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.
在现代通信系统中,确保可靠性和安全性一直是一个挑战。为了解决这些问题,本文设计了一种可靠、安全的新型通信系统。可靠性是通过构造一类称为串联内核码的纠错码来实现的。源认证方面的安全性是利用图论中的基本割集和基本电路技术,利用网格的图性质来实现的。实验结果表明,在考虑信道噪声和密码分析攻击的情况下,所提出的通信框架达到了可靠性和安全性的目标。通过仿真验证了该框架的理论基础,并对其性能进行了评价。
{"title":"Reliable and secure communication using fundamental cut-sets and fundamental circuits","authors":"C. P. Kumar, R. Selvakumar, R. K. Bhattar","doi":"10.1504/IJICS.2018.10010648","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10010648","url":null,"abstract":"Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114831857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures 一种面向未来互联网体系结构的基于混合RSA的端到端用户双向认证双重加密消息传递方案
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10005506
A. Bhattacharjya, Xiaofeng Zhong, J. Wang
In future internet architectures, end-to-end (E2E) secured personal messaging is essential. So here an E2E user two-way authenticated double encrypted messaging architecture based on hybrid RSA for private messaging is proposed. Our P2P protocol works over TCP protocol for creating direct connections in between, with IPv4 broadcast options to discover peers on the same LAN. Our protocol implements perfect forward secrecy using Diffie-Hellman key exchange with renegotiation capability in every session with optimal asymmetric encryption padding and random salts. For making hybrid RSA with double encryption, in encryption level, main RSA is integrated with efficient RSA to give more statistical complexity. In the decryption process, the CRT is used for very high efficiency with integration with shared RSA. Our architecture also gives a hassle-free, secure, peer-to-peer, strong and reliable platform with E2E encryption for private messaging and it can also work with future internet architectures.
在未来的互联网架构中,端到端(E2E)安全的个人消息传递至关重要。为此,本文提出了一种基于混合RSA的端到端用户双向认证双加密私有消息传递体系结构。我们的P2P协议在TCP协议上工作,用于在两者之间创建直接连接,使用IPv4广播选项来发现同一局域网上的对等体。我们的协议使用Diffie-Hellman密钥交换实现了完美的前向保密,在每个会话中使用最优的非对称加密填充和随机盐,具有重新协商能力。为了制作双重加密的混合型RSA,在加密层面上,将主RSA与高效RSA集成在一起,提高了统计复杂度。在解密过程中,CRT与共享RSA集成,具有很高的效率。我们的架构还提供了一个无麻烦,安全,点对点,强大和可靠的平台,为私人消息提供端到端加密,它也可以与未来的互联网架构一起工作。
{"title":"An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures","authors":"A. Bhattacharjya, Xiaofeng Zhong, J. Wang","doi":"10.1504/IJICS.2018.10005506","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10005506","url":null,"abstract":"In future internet architectures, end-to-end (E2E) secured personal messaging is essential. So here an E2E user two-way authenticated double encrypted messaging architecture based on hybrid RSA for private messaging is proposed. Our P2P protocol works over TCP protocol for creating direct connections in between, with IPv4 broadcast options to discover peers on the same LAN. Our protocol implements perfect forward secrecy using Diffie-Hellman key exchange with renegotiation capability in every session with optimal asymmetric encryption padding and random salts. For making hybrid RSA with double encryption, in encryption level, main RSA is integrated with efficient RSA to give more statistical complexity. In the decryption process, the CRT is used for very high efficiency with integration with shared RSA. Our architecture also gives a hassle-free, secure, peer-to-peer, strong and reliable platform with E2E encryption for private messaging and it can also work with future internet architectures.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1