首页 > 最新文献

Journal of Internet Services and Information Security最新文献

英文 中文
A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video 一种用于H.264-AVC视频内容认证的脆弱水印方法
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.014
Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan
This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subsequently injected into the IPCM-Least block's Significant Bits (LSB) of some I-frames' luma and chroma pixel samples. To manage and regulate authentication data and watermark processes (embedding, detection, and verification), a key based on video footage and a secret key has been created. Intra prediction modes and motion vectors from the bitstream can be partially decoded to detect and confirm the hidden watermark data without the need for the original movie or complete video decoding. Several experiments were conducted to assess the sensitivity of the proposed method against signal processing, rate control and transcoding, conventional GOP-based and Frame-based attacks. Experimental simulations demonstrate that the implanted fragile watermark is sensitive to several low to harmful and content-preserving attacks. With only a modest bit-rate increase and hardly any perceptual quality deterioration, a large payload capacity is achieved. Experimental results show that the proposed method is suburb in term of imperceptibility, and lower effect on bit-rate. Applications like tamper-proofing, content-authentication, and covert communication are ideally suited for this technique. Based on achieved results, the devised method is capable of detecting any form of spatial and/or temporal manipulations which make it ideal for real-time applications.
本文提出了一种基于GOP的盲脆弱水印技术,以确保H.264-AVC视频的内容真实性。在H.264视频中,除了P帧和B帧的运动矢量之外,还通过安全地散列I帧的多个帧内预测模式来创建自认证码。所得到的认证码随后被注入到一些I帧的亮度和色度像素样本的IPCM最小块的有效位(LSB)中。为了管理和规范身份验证数据和水印过程(嵌入、检测和验证),创建了一个基于视频片段和密钥的密钥。来自比特流的帧内预测模式和运动矢量可以被部分解码以检测和确认隐藏的水印数据,而不需要原始电影或完整的视频解码。进行了几个实验来评估所提出的方法对信号处理、速率控制和转码、传统的基于GOP和基于帧的攻击的敏感性。实验仿真表明,嵌入的脆弱水印对几种低危害和内容保护的攻击都很敏感。在仅适度的比特率增加并且几乎没有任何感知质量恶化的情况下,实现了大的有效载荷容量。实验结果表明,该方法在不可见性方面是郊区的,对比特率的影响较小。防篡改、内容验证和秘密通信等应用程序非常适合这种技术。基于所获得的结果,所设计的方法能够检测任何形式的空间和/或时间操作,这使其成为实时应用的理想选择。
{"title":"A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video","authors":"Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan","doi":"10.58346/jisis.2023.i2.014","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.014","url":null,"abstract":"This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subsequently injected into the IPCM-Least block's Significant Bits (LSB) of some I-frames' luma and chroma pixel samples. To manage and regulate authentication data and watermark processes (embedding, detection, and verification), a key based on video footage and a secret key has been created. Intra prediction modes and motion vectors from the bitstream can be partially decoded to detect and confirm the hidden watermark data without the need for the original movie or complete video decoding. Several experiments were conducted to assess the sensitivity of the proposed method against signal processing, rate control and transcoding, conventional GOP-based and Frame-based attacks. Experimental simulations demonstrate that the implanted fragile watermark is sensitive to several low to harmful and content-preserving attacks. With only a modest bit-rate increase and hardly any perceptual quality deterioration, a large payload capacity is achieved. Experimental results show that the proposed method is suburb in term of imperceptibility, and lower effect on bit-rate. Applications like tamper-proofing, content-authentication, and covert communication are ideally suited for this technique. Based on achieved results, the devised method is capable of detecting any form of spatial and/or temporal manipulations which make it ideal for real-time applications.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49479176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN 基于分层簇的无线传感器网络的节能安全密钥管理方案
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.009
B.S. Venkatesh Prasad, Roopashree H.R
Advance development in wireless sensor network (WSN) has offered tremendous applications in various fields. WSN consists of tiny sensors with unique features, capable of processing the sensed data and are resource constrained. WSN provides robust connection between objects to share information via wireless medium. Despite the significance, WSN face several issues such as more energy consumption, bandwidth constrain and security. Due to open environment and wireless medium secure data transmission within WSN is a critical issue, thus to cope with WSN applications a robust security development is required. Cluster based hierarchical network guarantees energy efficient over flat network. However existing security scheme employs high computational cryptographic functions which consumes more energy and has higher computational overhead. In this work we propose energy efficient hybrid secure key management scheme (EEHSKM) for secure communication from cluster head to base station. This scheme aims to optimize public key cryptographic steps and utilizes symmetric key cryptographic operations which extensively reduce energy consumption and ensures secure communication. The simulation results are evaluated to achieve QoS metrics.
无线传感器网络(WSN)的发展在各个领域提供了巨大的应用。无线传感器网络由具有独特功能的微型传感器组成,能够处理传感数据,并且资源有限。WSN提供对象之间的健壮连接,以通过无线介质共享信息。尽管意义重大,但无线传感器网络面临着能源消耗、带宽限制和安全性等问题。由于开放环境和无线介质,WSN内的安全数据传输是一个关键问题,因此为了应对WSN应用,需要进行稳健的安全开发。基于集群的分层网络保证了平面网络的能效。然而,现有的安全方案采用了高计算密码函数,这消耗了更多的能量并且具有更高的计算开销。在这项工作中,我们提出了一种节能的混合安全密钥管理方案(EEHSKM),用于从簇头到基站的安全通信。该方案旨在优化公钥加密步骤,并利用对称密钥加密操作,从而大大降低能耗并确保安全通信。对仿真结果进行评估以实现QoS度量。
{"title":"Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN","authors":"B.S. Venkatesh Prasad, Roopashree H.R","doi":"10.58346/jisis.2023.i2.009","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.009","url":null,"abstract":"Advance development in wireless sensor network (WSN) has offered tremendous applications in various fields. WSN consists of tiny sensors with unique features, capable of processing the sensed data and are resource constrained. WSN provides robust connection between objects to share information via wireless medium. Despite the significance, WSN face several issues such as more energy consumption, bandwidth constrain and security. Due to open environment and wireless medium secure data transmission within WSN is a critical issue, thus to cope with WSN applications a robust security development is required. Cluster based hierarchical network guarantees energy efficient over flat network. However existing security scheme employs high computational cryptographic functions which consumes more energy and has higher computational overhead. In this work we propose energy efficient hybrid secure key management scheme (EEHSKM) for secure communication from cluster head to base station. This scheme aims to optimize public key cryptographic steps and utilizes symmetric key cryptographic operations which extensively reduce energy consumption and ensures secure communication. The simulation results are evaluated to achieve QoS metrics.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47415585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Project Management Using Genetic Algorithm for the Marketplace Administration 基于遗传算法的市场管理企业项目管理
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.004
Alaa Obeidat, Rola Yaqbeh
In the sales business, the ultimate goal is to derive more sales and increase the profits for interested stakeholders. Maximizing profit margins from highly demanding products is one of their major objectives. Nowadays, there are varieties of intelligent systems available, which can guide the business owners, entrepreneurs, or managers to make smart decision and lead their business towards success. Out of different options, this research study explores the possibility and elaborates on how their objectives can be achieved through a genetic algorithm? The proposed approach can be adopted by businesses to increase their profits by enhancing low profit yielding products sales using optimized Genetic Algorithm. Initially groups are defined by adding products with high and low sales. After applying the proposed genetic algorithm, a “bundle of three” offers are traced out, to promote the product with poor sales history This study helps the businesses with a decision support model to maximize sales resulting in high profits. In this research, optimization algorithm is used along with variety of operations and methods, by the businesses, in order to reach their respective target goals. This can be achieved by applying an optimization method that has stable and reliable functions, selection methods, population size and mutation rate. The final result is to improve the overall profit of different businesses in the marketplace.
在销售业务中,最终目标是获得更多的销售额,为利益相关者增加利润。从高要求的产品中最大化利润是他们的主要目标之一。如今,有各种各样的智能系统,可以指导企业主,企业家或管理者做出明智的决策,并带领他们的企业走向成功。在不同的选择中,本研究探索了可能性,并详细阐述了如何通过遗传算法实现他们的目标。该方法可用于企业通过优化遗传算法提高低利润产品的销售,从而提高企业的利润。最初,通过添加高销售额和低销售额的产品来定义组。应用所提出的遗传算法,追踪出“三个捆绑”的优惠,以推广销售历史不佳的产品,该研究有助于企业通过决策支持模型实现销售最大化,从而获得高利润。在本研究中,优化算法与各种操作和方法一起被企业使用,以达到各自的目标目标。这可以通过应用具有稳定可靠的函数、选择方法、种群大小和突变率的优化方法来实现。最终的结果是提高不同企业在市场上的整体利润。
{"title":"Business Project Management Using Genetic Algorithm for the Marketplace Administration","authors":"Alaa Obeidat, Rola Yaqbeh","doi":"10.58346/jisis.2023.i2.004","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.004","url":null,"abstract":"In the sales business, the ultimate goal is to derive more sales and increase the profits for interested stakeholders. Maximizing profit margins from highly demanding products is one of their major objectives. Nowadays, there are varieties of intelligent systems available, which can guide the business owners, entrepreneurs, or managers to make smart decision and lead their business towards success. Out of different options, this research study explores the possibility and elaborates on how their objectives can be achieved through a genetic algorithm? The proposed approach can be adopted by businesses to increase their profits by enhancing low profit yielding products sales using optimized Genetic Algorithm. Initially groups are defined by adding products with high and low sales. After applying the proposed genetic algorithm, a “bundle of three” offers are traced out, to promote the product with poor sales history This study helps the businesses with a decision support model to maximize sales resulting in high profits. In this research, optimization algorithm is used along with variety of operations and methods, by the businesses, in order to reach their respective target goals. This can be achieved by applying an optimization method that has stable and reliable functions, selection methods, population size and mutation rate. The final result is to improve the overall profit of different businesses in the marketplace.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45979884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning 基于android的增强现实:掌握Tajweed学生学习的另一种选择
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.002
Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita, Saiful Yeri, Ilian Ikhsan
Nowadays, the knowledge of recitation (Tajweed) is only seen as classical knowledge; it only needs to be memorized and practiced without needing to be understood. The purpose of this study is to design learning media in the science of recitation using Android-based augmented reality. The method used is Research and Development in application-based augmented reality technology which is applied in tajwid learning. The research design that was carried out was to create and develop an Android-based application by displaying various laws in the science of recitation used in reading the Qur'an., where the marker identified with the camera would produce a display of the Qur’anic verse and completed with the law of Tajweed and also equipped with an audio play menu. It can be concluded that this research found that the developed media can only provide knowledge about basic Tajweed, which can only be accessed through one platform, namely Android, so this learning media still needs additions and developments in the system. It can be in the form of additions in the discussion of the Tajweed and the development of the application system so that this application can be accessed not only using Android. Still, it can also be accessed using a laptop or computer.
如今,背诵知识(Tajweed)只被视为经典知识;它只需要记住和练习,而不需要被理解。本研究的目的是使用基于Android的增强现实设计背诵科学中的学习媒体。所使用的方法是基于应用程序的增强现实技术的研究与开发,该技术应用于tajwid学习。进行的研究设计是通过显示阅读《古兰经》时使用的背诵科学中的各种规律,创建和开发一个基于Android的应用程序。,在那里,用相机识别的标记将显示古兰经诗句,并配有Tajweed定律,还配有音频播放菜单。可以得出的结论是,本研究发现,开发的媒体只能提供基本的Tajweed知识,而这些知识只能通过一个平台访问,即Android,因此这种学习媒体仍然需要在系统中进行添加和开发。它可以在Tajweed的讨论和应用程序系统的开发中以添加的形式出现,这样不仅可以使用Android访问该应用程序。不过,它也可以使用笔记本电脑或电脑访问。
{"title":"Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning","authors":"Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita, Saiful Yeri, Ilian Ikhsan","doi":"10.58346/jisis.2023.i2.002","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.002","url":null,"abstract":"Nowadays, the knowledge of recitation (Tajweed) is only seen as classical knowledge; it only needs to be memorized and practiced without needing to be understood. The purpose of this study is to design learning media in the science of recitation using Android-based augmented reality. The method used is Research and Development in application-based augmented reality technology which is applied in tajwid learning. The research design that was carried out was to create and develop an Android-based application by displaying various laws in the science of recitation used in reading the Qur'an., where the marker identified with the camera would produce a display of the Qur’anic verse and completed with the law of Tajweed and also equipped with an audio play menu. It can be concluded that this research found that the developed media can only provide knowledge about basic Tajweed, which can only be accessed through one platform, namely Android, so this learning media still needs additions and developments in the system. It can be in the form of additions in the discussion of the Tajweed and the development of the application system so that this application can be accessed not only using Android. Still, it can also be accessed using a laptop or computer.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42783246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment 基于模糊小波神经网络的大数据挖掘特征子集选择
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.015
Varshavardhini S
Big data refers to the massive quality of data being generated at a drastic speed from various heterogeneous sources namely social media, mobile devices, internet transactions, networked devices, and sensors. Several data mining (DM) and machine learning (ML) models have been presented for the extraction of knowledge from Big Data. Since the big datasets include numerous features, feature selection techniques are essential to eliminate unwanted and unrelated features which degrade the classification efficiency. The adoption of DM tools for big data environments necessitates remodeling the algorithm. In this aspect, this paper presents an intelligent feature subset selection with fuzzy wavelet neural network (FSS-FWNN) for big data classification. The FSS-FWNN technique incorporates Hadoop Ecosystem tool for handling big data in an effectual way. Besides, the FSS-FWNN technique involves three processes namely preprocessing, feature selection, and classification. In addition, quasi-oppositional chicken swarm optimization (QOCSO) technique is employed for the feature selection process and the FWNN technique is applied for the classification process. The design of QOCSO algorithm as an FS technique for big data classification shows the novelty of the work and the feature subset selection process considerably enhances the classification performance. An extensive set of simulations is carried out and the results are reviewed in terms of several evaluation factors in order to analyse the improvement of the FSS-FWNN approach. The experimental findings demonstrated that the FSS-FWNN approach outperformed the most current algorithms.
大数据是指从各种异构来源(社交媒体、移动设备、互联网交易、联网设备和传感器)以极快的速度产生的海量数据。为了从大数据中提取知识,已经提出了几种数据挖掘(DM)和机器学习(ML)模型。由于大数据集包含大量的特征,特征选择技术对于消除不需要的和不相关的特征是必不可少的,这些特征会降低分类效率。在大数据环境中采用DM工具需要对算法进行重构。在这方面,本文提出了一种基于模糊小波神经网络(FSS-FWNN)的大数据分类智能特征子集选择方法。FSS-FWNN技术结合Hadoop生态系统工具,有效处理大数据。此外,FSS-FWNN技术涉及预处理、特征选择和分类三个过程。此外,在特征选择过程中采用准对立鸡群优化(QOCSO)技术,在分类过程中采用FWNN技术。QOCSO算法作为一种FS技术用于大数据分类的设计,显示了工作的新颖性,特征子集选择过程大大提高了分类性能。为了分析FSS-FWNN方法的改进,进行了一系列广泛的模拟,并根据几个评估因素对结果进行了审查。实验结果表明,FSS-FWNN方法优于目前大多数算法。
{"title":"An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment","authors":"Varshavardhini S","doi":"10.58346/jisis.2023.i2.015","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.015","url":null,"abstract":"Big data refers to the massive quality of data being generated at a drastic speed from various heterogeneous sources namely social media, mobile devices, internet transactions, networked devices, and sensors. Several data mining (DM) and machine learning (ML) models have been presented for the extraction of knowledge from Big Data. Since the big datasets include numerous features, feature selection techniques are essential to eliminate unwanted and unrelated features which degrade the classification efficiency. The adoption of DM tools for big data environments necessitates remodeling the algorithm. In this aspect, this paper presents an intelligent feature subset selection with fuzzy wavelet neural network (FSS-FWNN) for big data classification. The FSS-FWNN technique incorporates Hadoop Ecosystem tool for handling big data in an effectual way. Besides, the FSS-FWNN technique involves three processes namely preprocessing, feature selection, and classification. In addition, quasi-oppositional chicken swarm optimization (QOCSO) technique is employed for the feature selection process and the FWNN technique is applied for the classification process. The design of QOCSO algorithm as an FS technique for big data classification shows the novelty of the work and the feature subset selection process considerably enhances the classification performance. An extensive set of simulations is carried out and the results are reviewed in terms of several evaluation factors in order to analyse the improvement of the FSS-FWNN approach. The experimental findings demonstrated that the FSS-FWNN approach outperformed the most current algorithms.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45916441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Model for a Central Bank in Latin America using Blockchain 拉丁美洲中央银行使用区块链的安全模型
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.007
R. Romero, R. A. Sánchez-Ancajima, Javier A. López-Céspedes, M. Saavedra-López, Segundo Juan Sánchez Tarrillo, R. M. Hernández
Banking institutions in Latin America are the target of increasingly sophisticated and advanced cyber-attacks and threats, which increase every year and leave substantial economic losses, due to the high level of global interconnection and digitization of their operations. The objective of this work is to design a model to guarantee information security in a Central Bank in Latin America using Blockchain technology. Exploratory research, observation and inductive and deductive methods are used to propose Blockchain solutions in a Central Bank. The results are a model for secure transactions in Blockchain, Smart Contract functions and a data management process. It was concluded that the security model for a central bank provides high level of information management and storage of transactions in a secure and immutable way.
拉丁美洲的银行机构是越来越复杂和先进的网络攻击和威胁的目标,由于其业务的全球互联和数字化水平很高,这些攻击和威胁每年都在增加,并造成巨大的经济损失。这项工作的目的是设计一个使用区块链技术保证拉丁美洲中央银行信息安全的模型。探索性研究、观察以及归纳和演绎方法被用于在中央银行提出区块链解决方案。结果是区块链中的安全交易模型、智能合约功能和数据管理流程。得出的结论是,中央银行的安全模型以安全和不可变的方式提供了高水平的信息管理和交易存储。
{"title":"Security Model for a Central Bank in Latin America using Blockchain","authors":"R. Romero, R. A. Sánchez-Ancajima, Javier A. López-Céspedes, M. Saavedra-López, Segundo Juan Sánchez Tarrillo, R. M. Hernández","doi":"10.58346/jisis.2023.i2.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.007","url":null,"abstract":"Banking institutions in Latin America are the target of increasingly sophisticated and advanced cyber-attacks and threats, which increase every year and leave substantial economic losses, due to the high level of global interconnection and digitization of their operations. The objective of this work is to design a model to guarantee information security in a Central Bank in Latin America using Blockchain technology. Exploratory research, observation and inductive and deductive methods are used to propose Blockchain solutions in a Central Bank. The results are a model for secure transactions in Blockchain, Smart Contract functions and a data management process. It was concluded that the security model for a central bank provides high level of information management and storage of transactions in a secure and immutable way.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49279924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System 基于简单大暴雨前优化算法的电子健康系统敏感医疗数据隐藏
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.011
Madhavi M, S. Dr.T., K. Dr.G.
Privacy has become a significant factor of e-Health system in the area of data mining termed as Privacy preserving data mining (PPDM) as it can uncover underlying rules and hide sensitive data for data sanitization. Various algorithms and heuristics have been studied to hide sensitive data using transaction removal. However, they are facing challenges to attain the reasonable side effects. Thus, rain optimization algorithm (ROA) based sensitive data hiding techniques is proposed in this paper. Using this algorithm, suitable transactions to be removed are selected. Besides, in this work, ROA based two frameworks are designed for data sanitization that are simple ROA to remove transaction (sROA2RT) and pre-large ROA to remove transaction (pROA2RT). In this algorithm, fitness is evaluated based on four side effects such as hiding failure, artificial cost, missing cost and dissimilarity of database. The proposed frameworks are evaluated using three e-Health datasets. Compared to previous frameworks, the proposed frameworks attain reasonable side effects.
在被称为隐私保护数据挖掘(PPDM)的数据挖掘领域,隐私已成为电子健康系统的一个重要因素,因为它可以揭示潜在规则并隐藏敏感数据以进行数据净化。已经研究了使用事务移除来隐藏敏感数据的各种算法和启发式方法。然而,它们面临着获得合理副作用的挑战。因此,本文提出了基于降雨优化算法的敏感数据隐藏技术。使用该算法,可以选择要删除的合适事务。此外,在这项工作中,设计了两个基于ROA的数据净化框架,即简单的ROA2RT和预大型ROA2RT。在该算法中,基于隐藏失败、人工成本、丢失成本和数据库的不相似性四个副作用来评估适应度。使用三个电子健康数据集对拟议的框架进行了评估。与以前的框架相比,拟议的框架产生了合理的副作用。
{"title":"Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System","authors":"Madhavi M, S. Dr.T., K. Dr.G.","doi":"10.58346/jisis.2023.i2.011","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.011","url":null,"abstract":"Privacy has become a significant factor of e-Health system in the area of data mining termed as Privacy preserving data mining (PPDM) as it can uncover underlying rules and hide sensitive data for data sanitization. Various algorithms and heuristics have been studied to hide sensitive data using transaction removal. However, they are facing challenges to attain the reasonable side effects. Thus, rain optimization algorithm (ROA) based sensitive data hiding techniques is proposed in this paper. Using this algorithm, suitable transactions to be removed are selected. Besides, in this work, ROA based two frameworks are designed for data sanitization that are simple ROA to remove transaction (sROA2RT) and pre-large ROA to remove transaction (pROA2RT). In this algorithm, fitness is evaluated based on four side effects such as hiding failure, artificial cost, missing cost and dissimilarity of database. The proposed frameworks are evaluated using three e-Health datasets. Compared to previous frameworks, the proposed frameworks attain reasonable side effects.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49350827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mae Mai Muay Thai Style Classification in Movement Appling Long-Term Recurrent Convolution Networks 运用长期递归卷积网络对运动中的梅-迈-泰拳风格进行分类
Q2 Computer Science Pub Date : 2023-02-28 DOI: 10.58346/jisis.2023.i1.010
Shujaat Ali Zaidi
{"title":"Mae Mai Muay Thai Style Classification in Movement Appling Long-Term Recurrent Convolution Networks","authors":"Shujaat Ali Zaidi","doi":"10.58346/jisis.2023.i1.010","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.010","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46723372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of Intelligent Systems in Tourism: Relevant Methods 智能系统在旅游业中的应用:相关方法
Q2 Computer Science Pub Date : 2023-02-28 DOI: 10.58346/jisis.2023.i1.006
R. A. Sánchez-Ancajima
{"title":"Applications of Intelligent Systems in Tourism: Relevant Methods","authors":"R. A. Sánchez-Ancajima","doi":"10.58346/jisis.2023.i1.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.006","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42658384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN 面向提高集群无线传感器网络生存期的压缩数据感知节能方案
Q2 Computer Science Pub Date : 2023-02-28 DOI: 10.58346/jisis.2023.i1.007
Santhosh G
{"title":"Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN","authors":"Santhosh G","doi":"10.58346/jisis.2023.i1.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.007","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45792860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Internet Services and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1