首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification 基于Arnold置乱和直方图修正的DCT域鲁棒可逆图像水印方案
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012576
Soumitra Roy, Arup Kumar Pal
Among the various watermarking schemes, the reversible watermarking scheme has drawn extensive attention in the recent years for its application in sensitive issues like medical, military and typical law-enforcement images. Cover image dependent embedding capacity and lack of robustness are the most crucial concerns of the reversible watermarking methods. To overcome these issues, a discrete cosine transform (DCT) and histogram shifting based robust reversible image watermarking scheme using Arnold scrambling is presented in this paper. Initially, the image is decomposed into non-overlapping blocks and consequently DCT are applied to each block to embed a binary bit of watermark into each transformed block by modifying one pair of middle significant AC coefficients. In this initial step, location map is also generated for the cover image restoration purpose in the extracting side. Then, this location map is embedded in the cover image using histogram modification technique. In the receiver side, at first location map is generated from an image using histogram modification method and watermark is recovered from the corresponding image. Using location map reversible image is reversed in the following extracting phase of the proposed method. The proposed reversible watermarking scheme has also been experimented to verify the robustness property against several image processing attacks and satisfactory results are achieved.
在各种水印方案中,可逆水印方案由于在医疗、军事和典型执法图像等敏感问题上的应用,近年来受到了广泛的关注。基于覆盖图像的嵌入能力和鲁棒性不足是可逆水印方法最主要的问题。为了克服这些问题,本文提出了一种基于离散余弦变换(DCT)和直方图移位的阿诺德置乱鲁棒可逆图像水印方案。首先,将图像分解为互不重叠的块,然后通过修改一对中间有效AC系数对每个块进行DCT,在每个变换后的块中嵌入一个二值位的水印。在这一初始步骤中,在提取端还生成了用于覆盖图像恢复的地形图。然后,利用直方图修改技术将该地形图嵌入到封面图像中。在接收端,首先使用直方图修改方法从图像中生成位置地图,并从相应图像中恢复水印。在该方法的下一阶段,利用位置图对可逆图像进行反向提取。实验还验证了所提出的可逆水印方案对多种图像处理攻击的鲁棒性,取得了令人满意的结果。
{"title":"A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification","authors":"Soumitra Roy, Arup Kumar Pal","doi":"10.1504/IJICS.2018.10012576","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012576","url":null,"abstract":"Among the various watermarking schemes, the reversible watermarking scheme has drawn extensive attention in the recent years for its application in sensitive issues like medical, military and typical law-enforcement images. Cover image dependent embedding capacity and lack of robustness are the most crucial concerns of the reversible watermarking methods. To overcome these issues, a discrete cosine transform (DCT) and histogram shifting based robust reversible image watermarking scheme using Arnold scrambling is presented in this paper. Initially, the image is decomposed into non-overlapping blocks and consequently DCT are applied to each block to embed a binary bit of watermark into each transformed block by modifying one pair of middle significant AC coefficients. In this initial step, location map is also generated for the cover image restoration purpose in the extracting side. Then, this location map is embedded in the cover image using histogram modification technique. In the receiver side, at first location map is generated from an image using histogram modification method and watermark is recovered from the corresponding image. Using location map reversible image is reversed in the following extracting phase of the proposed method. The proposed reversible watermarking scheme has also been experimented to verify the robustness property against several image processing attacks and satisfactory results are achieved.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique 利用自适应多级直方图移位技术实现绝对矩块截断编码压缩图像的可逆数据隐藏
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012572
Amita, A. Kaur, Marut Kumar
Due to advancement in communication technology, data are transmitted over the network which is either confidential or private. So, the information security is one of the most critical factors considered when secret data is transmitted between two parties. Another important issue is the bandwidth utilisation for data transmission. Image steganography is a widely used technique for data hiding. It is used in critical applications like military and medical areas. Most of the work is done in uncompressed images, which leads to high storage and large bandwidth required for transmission. Keeping these two factors in mind, this paper presents the multilevel histogram shifting technique in the compressed domain with the addition of adaptive block division scheme to improve the embedding capacity as well as reduce the utilisation of the bandwidth. In this method, absolute moment block truncation coding (AMBTC) compression technique has been used for compression because of its good compression ratio.
由于通信技术的进步,在网络上传输的数据要么是机密的,要么是私有的。因此,信息安全是保密数据在双方之间传输时要考虑的最关键因素之一。另一个重要的问题是数据传输的带宽利用率。图像隐写是一种应用广泛的数据隐藏技术。它被用于军事和医疗领域等关键应用。大多数工作是在未压缩的图像中完成的,这导致传输所需的高存储和大带宽。考虑到这两个因素,本文提出了在压缩域的多级直方图移位技术,并增加了自适应块分割方案,以提高嵌入容量并降低带宽利用率。该方法采用绝对矩块截断编码(AMBTC)压缩技术进行压缩,具有良好的压缩比。
{"title":"Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique","authors":"Amita, A. Kaur, Marut Kumar","doi":"10.1504/IJICS.2018.10012572","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012572","url":null,"abstract":"Due to advancement in communication technology, data are transmitted over the network which is either confidential or private. So, the information security is one of the most critical factors considered when secret data is transmitted between two parties. Another important issue is the bandwidth utilisation for data transmission. Image steganography is a widely used technique for data hiding. It is used in critical applications like military and medical areas. Most of the work is done in uncompressed images, which leads to high storage and large bandwidth required for transmission. Keeping these two factors in mind, this paper presents the multilevel histogram shifting technique in the compressed domain with the addition of adaptive block division scheme to improve the embedding capacity as well as reduce the utilisation of the bandwidth. In this method, absolute moment block truncation coding (AMBTC) compression technique has been used for compression because of its good compression ratio.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks 针对在线社交网络中XSS漏洞的现代应用程序健壮的基于注入点的框架
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012568
Shashank Gupta, B. Gupta
The authors introduced a universal and an automated server-side flexible framework, XSS-explorer, which automatically scrutinises the web applications in order to discover XSS attack vectors. XSS-explorer is capable enough for exploring and recognising all the injection points of web application and produces explicit XSS attack injection investigations for all such injection points. Our approach is based on methods permitting precise filling of injection points of forms with usable info. The identification of such injection points permits our technique to retrieve each possible web page of application, allowing a wider exploration and accelerating the discovery frequency of XSS attack vectors. We evaluate efficiency of our scheme on a suite of open source multimedia applications by applying F-test hypothesis and F-measure. These evaluations indorse that precise filling of the injection points by only usable info confirms an enhanced efficiency of the tests, thus accelerating the recognition rate of XSS attacks.
作者介绍了一个通用且自动化的服务器端灵活框架XSS-explorer,它可以自动检查web应用程序以发现XSS攻击向量。XSS-explorer有足够的能力探索和识别web应用程序的所有注入点,并为所有这些注入点产生显式的XSS攻击注入调查。我们的方法是基于允许使用可用信息精确填充表单注入点的方法。这些注入点的识别使我们的技术能够检索每个可能的应用程序网页,从而允许更广泛的探索并加快XSS攻击向量的发现频率。我们通过f检验假设和f度量来评估我们的方案在一套开源多媒体应用程序上的效率。这些评估表明,仅用可用信息精确填充注入点可以提高测试的效率,从而提高XSS攻击的识别率。
{"title":"Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks","authors":"Shashank Gupta, B. Gupta","doi":"10.1504/IJICS.2018.10012568","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012568","url":null,"abstract":"The authors introduced a universal and an automated server-side flexible framework, XSS-explorer, which automatically scrutinises the web applications in order to discover XSS attack vectors. XSS-explorer is capable enough for exploring and recognising all the injection points of web application and produces explicit XSS attack injection investigations for all such injection points. Our approach is based on methods permitting precise filling of injection points of forms with usable info. The identification of such injection points permits our technique to retrieve each possible web page of application, allowing a wider exploration and accelerating the discovery frequency of XSS attack vectors. We evaluate efficiency of our scheme on a suite of open source multimedia applications by applying F-test hypothesis and F-measure. These evaluations indorse that precise filling of the injection points by only usable info confirms an enhanced efficiency of the tests, thus accelerating the recognition rate of XSS attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A new statistical attack resilient steganography scheme for hiding messages in audio files 一种新的统计攻击抗隐写方案,用于隐藏音频文件中的消息
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012578
Dulal C. Kar, Anusha Madhuri Nakka, A. Katangur
We present a novel approach for audio steganography that preserves first-order statistical properties of cover audio after embedding a secret message. This approach can avoid detection by histogram-based or similar statistical attacks. This approach partitions the audio samples in the cover audio, which is followed by reordering of the samples in each partition through an encoding process for embedding the secret message. Partitioning of samples is governed by a specified error limit on individual samples, and the error limit is determined from signal-to-noise ratio that needs to be maintained in the stego audio to avoid detection by an automated system or human auditory system. Experimental results on effectiveness as well as on capacity are presented using 8-bit and 16-bit audio as covers. It is shown that the proposed approach can achieve high capacity while maintaining its effectiveness against attacks.
我们提出了一种新的音频隐写方法,该方法在嵌入秘密信息后保留掩蔽音频的一阶统计属性。这种方法可以避免基于直方图或类似统计攻击的检测。该方法对覆盖音频中的音频样本进行分区,然后通过嵌入秘密消息的编码过程对每个分区中的样本进行重新排序。样本的划分是由单个样本的指定误差限制来控制的,而误差限制是由隐写音频中需要保持的信噪比确定的,以避免被自动化系统或人类听觉系统检测到。以8位和16位音频为例,给出了有效性和容量的实验结果。结果表明,该方法在保持抗攻击有效性的同时,可以实现高容量。
{"title":"A new statistical attack resilient steganography scheme for hiding messages in audio files","authors":"Dulal C. Kar, Anusha Madhuri Nakka, A. Katangur","doi":"10.1504/IJICS.2018.10012578","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012578","url":null,"abstract":"We present a novel approach for audio steganography that preserves first-order statistical properties of cover audio after embedding a secret message. This approach can avoid detection by histogram-based or similar statistical attacks. This approach partitions the audio samples in the cover audio, which is followed by reordering of the samples in each partition through an encoding process for embedding the secret message. Partitioning of samples is governed by a specified error limit on individual samples, and the error limit is determined from signal-to-noise ratio that needs to be maintained in the stego audio to avoid detection by an automated system or human auditory system. Experimental results on effectiveness as well as on capacity are presented using 8-bit and 16-bit audio as covers. It is shown that the proposed approach can achieve high capacity while maintaining its effectiveness against attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D reconstruction of human face from an input image under random lighting condition 随机光照条件下输入图像的人脸三维重建
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012569
Yujuan Sun, Xiaofeng Zhang, Muwei Jian
The three-dimensional reconstruction from single input image is quite difficult due to many unknown parameters, such as the light conditions, the surface normal and albedo of the object. However, there are overall similar characteristics for different human faces, such as the shapes and the positions of the eyes, nose; mouth and ears are generally identical. The similar characteristics has been used in this paper to relax the numbers of the input face images, and reconstruct the 3D shape based on a couple statistical model. Moreover, the light condition of the single input image can be different from that of training database. The experiment results show the effectiveness of the proposed method.
由于光照条件、物体表面法线和反照率等未知参数的存在,单输入图像的三维重建非常困难。然而,不同的人脸总体上有相似的特征,比如眼睛、鼻子的形状和位置;嘴巴和耳朵通常是一样的。本文利用相似特征对输入的人脸图像放宽数量,并基于一对统计模型重建三维形状。此外,单个输入图像的光照条件可能与训练库的光照条件不同。实验结果表明了该方法的有效性。
{"title":"3D reconstruction of human face from an input image under random lighting condition","authors":"Yujuan Sun, Xiaofeng Zhang, Muwei Jian","doi":"10.1504/IJICS.2018.10012569","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012569","url":null,"abstract":"The three-dimensional reconstruction from single input image is quite difficult due to many unknown parameters, such as the light conditions, the surface normal and albedo of the object. However, there are overall similar characteristics for different human faces, such as the shapes and the positions of the eyes, nose; mouth and ears are generally identical. The similar characteristics has been used in this paper to relax the numbers of the input face images, and reconstruct the 3D shape based on a couple statistical model. Moreover, the light condition of the single input image can be different from that of training database. The experiment results show the effectiveness of the proposed method.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques 基于LGXP和人工神经网络技术的人脸生理特征生物认证
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012575
R. Raja, T. S. Sinha, Rajkumar Patra, S. Tiwari
In the recent times, it has been found from the literature that, only front-view of human-face images are used for the authentication of the human being. Very little amount of work has been carried out using side-view and temporal-view of the human-face for the authentication of the human being. The main fact lies in the mentality of present youth, who are very busy in taking the photographs with different poses. Generally the poses are taken from side-view. Hence in the present paper, the main focus has been kept, in the authentication process using methods of recent trends in the field of engineering. The main objective is to handle the variability in human-face appearances due to changes in the viewing direction. Poses, illumination conditions, and expressions are considered as three main parameters, which are processed for the overall authentication process. For the overall processing, extensive feature set like texture, contrast, correlation and shape are extracted by employing modified region growing algorithm and texture feature by local Gabor XOR pattern (LGXP) and artificial neural network (ANN) technique. The present work has been analysed using the data of different subjects with varying ages.
近年来,从文献中发现,只有正面的人脸图像被用于人的身份验证。利用人脸侧面图和时间图对人进行身份验证的工作很少。主要原因在于现在年轻人的心态,他们忙着拍各种各样的照片。一般来说,这些姿势都是从侧面拍摄的。因此,在本文中,主要的焦点一直保持在认证过程中使用的方法在工程领域的最新趋势。主要目标是处理由于观看方向的变化而导致的人脸外观的可变性。姿态、光照条件和表情被认为是三个主要参数,它们将被处理用于整个认证过程。在整体处理方面,采用改进的区域生长算法提取纹理、对比度、相关性和形状等广泛的特征集,采用局部Gabor异或模式(LGXP)和人工神经网络(ANN)技术提取纹理特征。目前的工作是使用不同年龄的不同受试者的数据进行分析的。
{"title":"Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques","authors":"R. Raja, T. S. Sinha, Rajkumar Patra, S. Tiwari","doi":"10.1504/IJICS.2018.10012575","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012575","url":null,"abstract":"In the recent times, it has been found from the literature that, only front-view of human-face images are used for the authentication of the human being. Very little amount of work has been carried out using side-view and temporal-view of the human-face for the authentication of the human being. The main fact lies in the mentality of present youth, who are very busy in taking the photographs with different poses. Generally the poses are taken from side-view. Hence in the present paper, the main focus has been kept, in the authentication process using methods of recent trends in the field of engineering. The main objective is to handle the variability in human-face appearances due to changes in the viewing direction. Poses, illumination conditions, and expressions are considered as three main parameters, which are processed for the overall authentication process. For the overall processing, extensive feature set like texture, contrast, correlation and shape are extracted by employing modified region growing algorithm and texture feature by local Gabor XOR pattern (LGXP) and artificial neural network (ANN) technique. The present work has been analysed using the data of different subjects with varying ages.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Node authentication algorithm for securing static wireless sensor networks from node clone attack 保护静态无线传感器网络免受节点克隆攻击的节点认证算法
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012571
Vandana Mohindru, Yashwant Singh
Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing, processing, communication, and storage capabilities. These sensor nodes are vulnerable to the node clone attack where the attacker compromises the node and extracts secret information from the node and replicate the large numbers of clones of captured node throughout the sensor network. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution energy efficient so that it is feasible to implement in such resource constrained nodes in WSN. In this paper, an energy efficient algorithm is proposed for node authentication. The aim of node authentication algorithm is to authenticate the sensor nodes before message communication within WSN so that cloned nodes are identified in the initial step of the communication. This algorithm uses encryption decryption operations and also XOR, extraction, bitwise shift operations. The performance of the proposed algorithm is analysed in terms of communication, storage, and computation overheads metrics. Finally, performance of the proposed algorithm is analysed with the other node authentication algorithms.
无线传感器网络(WSN)由小尺寸传感器节点组成,其传感、处理、通信和存储能力有限。这些传感器节点容易受到节点克隆攻击,即攻击者入侵节点,从节点中提取秘密信息,并在整个传感器网络中复制大量捕获节点的克隆。因此,在这样的网络中提供安全性是至关重要的。实现这一目标的主要挑战是使安全解决方案节能,使其能够在WSN中资源受限的节点中实现。本文提出了一种高效节能的节点认证算法。节点认证算法的目的是在WSN内部进行消息通信之前对传感器节点进行认证,以便在通信的初始阶段识别出克隆节点。该算法使用加密解密操作以及异或、提取、位移位操作。从通信、存储和计算开销等方面分析了该算法的性能。最后,与其他节点认证算法进行了性能分析。
{"title":"Node authentication algorithm for securing static wireless sensor networks from node clone attack","authors":"Vandana Mohindru, Yashwant Singh","doi":"10.1504/IJICS.2018.10012571","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012571","url":null,"abstract":"Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing, processing, communication, and storage capabilities. These sensor nodes are vulnerable to the node clone attack where the attacker compromises the node and extracts secret information from the node and replicate the large numbers of clones of captured node throughout the sensor network. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution energy efficient so that it is feasible to implement in such resource constrained nodes in WSN. In this paper, an energy efficient algorithm is proposed for node authentication. The aim of node authentication algorithm is to authenticate the sensor nodes before message communication within WSN so that cloned nodes are identified in the initial step of the communication. This algorithm uses encryption decryption operations and also XOR, extraction, bitwise shift operations. The performance of the proposed algorithm is analysed in terms of communication, storage, and computation overheads metrics. Finally, performance of the proposed algorithm is analysed with the other node authentication algorithms.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
WeChat traffic classification using machine learning algorithms and comparative analysis of datasets 微信流量分类采用机器学习算法和数据集对比分析
Pub Date : 2018-05-03 DOI: 10.1504/IJICS.2018.10012574
M. Shafiq, Xiangzhan Yu, A. Laghari
In this research paper, we present the first classification study to classify WeChat application service flow traffic (text messages, picture messages, audio call and video call traffic) classification and secondly to find out the effectiveness of big dataset and small dataset as well as to find out effective machine learning classifiers. We firstly capture WeChat traffic and then extract 44 features then we combine capture traffic to make full instance of dataset. Then we make reduce instances of dataset from the full instance of dataset to show the effectiveness of large dataset and small dataset. Then we execute well known machine learning classifiers. Using statistical test, we use Wilcoxon and Friedman statistical test for the datasets and ML classifiers to find more deeply its effectiveness. Experimental results show that reduce instance dataset show high accuracy result compared to full instance and C4.5 classifier perform effectively as compared to other classifiers.
在本文中,我们首先进行了分类研究,对微信应用服务流量(短信、图片消息、音频通话和视频通话流量)进行分类,然后进行了大数据集和小数据集的有效性研究,找到了有效的机器学习分类器。我们首先捕获微信流量,然后提取44个特征,然后将捕获的流量组合成数据集的完整实例。然后,我们从数据集的完整实例中进行数据集的约简,以显示大数据集和小数据集的有效性。然后我们执行众所周知的机器学习分类器。使用统计检验,我们对数据集和ML分类器使用Wilcoxon和Friedman统计检验,以更深入地发现其有效性。实验结果表明,与全实例相比,减少实例数据集具有较高的准确率,C4.5分类器与其他分类器相比具有较好的性能。
{"title":"WeChat traffic classification using machine learning algorithms and comparative analysis of datasets","authors":"M. Shafiq, Xiangzhan Yu, A. Laghari","doi":"10.1504/IJICS.2018.10012574","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10012574","url":null,"abstract":"In this research paper, we present the first classification study to classify WeChat application service flow traffic (text messages, picture messages, audio call and video call traffic) classification and secondly to find out the effectiveness of big dataset and small dataset as well as to find out effective machine learning classifiers. We firstly capture WeChat traffic and then extract 44 features then we combine capture traffic to make full instance of dataset. Then we make reduce instances of dataset from the full instance of dataset to show the effectiveness of large dataset and small dataset. Then we execute well known machine learning classifiers. Using statistical test, we use Wilcoxon and Friedman statistical test for the datasets and ML classifiers to find more deeply its effectiveness. Experimental results show that reduce instance dataset show high accuracy result compared to full instance and C4.5 classifier perform effectively as compared to other classifiers.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reliable and secure communication using fundamental cut-sets and fundamental circuits 可靠和安全的通信使用基本切割集和基本电路
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10010648
C. P. Kumar, R. Selvakumar, R. K. Bhattar
Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.
在现代通信系统中,确保可靠性和安全性一直是一个挑战。为了解决这些问题,本文设计了一种可靠、安全的新型通信系统。可靠性是通过构造一类称为串联内核码的纠错码来实现的。源认证方面的安全性是利用图论中的基本割集和基本电路技术,利用网格的图性质来实现的。实验结果表明,在考虑信道噪声和密码分析攻击的情况下,所提出的通信框架达到了可靠性和安全性的目标。通过仿真验证了该框架的理论基础,并对其性能进行了评价。
{"title":"Reliable and secure communication using fundamental cut-sets and fundamental circuits","authors":"C. P. Kumar, R. Selvakumar, R. K. Bhattar","doi":"10.1504/IJICS.2018.10010648","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10010648","url":null,"abstract":"Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114831857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures 一种面向未来互联网体系结构的基于混合RSA的端到端用户双向认证双重加密消息传递方案
Pub Date : 2018-02-02 DOI: 10.1504/IJICS.2018.10005506
A. Bhattacharjya, Xiaofeng Zhong, J. Wang
In future internet architectures, end-to-end (E2E) secured personal messaging is essential. So here an E2E user two-way authenticated double encrypted messaging architecture based on hybrid RSA for private messaging is proposed. Our P2P protocol works over TCP protocol for creating direct connections in between, with IPv4 broadcast options to discover peers on the same LAN. Our protocol implements perfect forward secrecy using Diffie-Hellman key exchange with renegotiation capability in every session with optimal asymmetric encryption padding and random salts. For making hybrid RSA with double encryption, in encryption level, main RSA is integrated with efficient RSA to give more statistical complexity. In the decryption process, the CRT is used for very high efficiency with integration with shared RSA. Our architecture also gives a hassle-free, secure, peer-to-peer, strong and reliable platform with E2E encryption for private messaging and it can also work with future internet architectures.
在未来的互联网架构中,端到端(E2E)安全的个人消息传递至关重要。为此,本文提出了一种基于混合RSA的端到端用户双向认证双加密私有消息传递体系结构。我们的P2P协议在TCP协议上工作,用于在两者之间创建直接连接,使用IPv4广播选项来发现同一局域网上的对等体。我们的协议使用Diffie-Hellman密钥交换实现了完美的前向保密,在每个会话中使用最优的非对称加密填充和随机盐,具有重新协商能力。为了制作双重加密的混合型RSA,在加密层面上,将主RSA与高效RSA集成在一起,提高了统计复杂度。在解密过程中,CRT与共享RSA集成,具有很高的效率。我们的架构还提供了一个无麻烦,安全,点对点,强大和可靠的平台,为私人消息提供端到端加密,它也可以与未来的互联网架构一起工作。
{"title":"An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures","authors":"A. Bhattacharjya, Xiaofeng Zhong, J. Wang","doi":"10.1504/IJICS.2018.10005506","DOIUrl":"https://doi.org/10.1504/IJICS.2018.10005506","url":null,"abstract":"In future internet architectures, end-to-end (E2E) secured personal messaging is essential. So here an E2E user two-way authenticated double encrypted messaging architecture based on hybrid RSA for private messaging is proposed. Our P2P protocol works over TCP protocol for creating direct connections in between, with IPv4 broadcast options to discover peers on the same LAN. Our protocol implements perfect forward secrecy using Diffie-Hellman key exchange with renegotiation capability in every session with optimal asymmetric encryption padding and random salts. For making hybrid RSA with double encryption, in encryption level, main RSA is integrated with efficient RSA to give more statistical complexity. In the decryption process, the CRT is used for very high efficiency with integration with shared RSA. Our architecture also gives a hassle-free, secure, peer-to-peer, strong and reliable platform with E2E encryption for private messaging and it can also work with future internet architectures.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1