首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter 基于道路结构和扩展卡尔曼滤波的车道检测算法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-04-01 DOI: 10.4018/ijdcf.2020040101
Jinsheng Xiao, Wenxin Xiong, Yuan Yao, Liang Li, R. Klette
Lane detection still demonstrates low accuracy and missing robustness when recorded markings are interrupted by strong light or shadows or missing marking. This article proposes a new algorithm using a model of road structure and an extended Kalman filter. The region of interest is set according to the vanishing point. First, an edge-detection operator is used to scan horizontal pixels and calculate edge-strength values. The corresponding straight line is detected by line parameters voted by edge points. From the edge points and lane mark candidates extracted above, and other constraints, these points are treated as the potential lane boundary. Finally, the lane parameters are estimated using the coordinates of the lane boundary points. They are updated by an extended Kalman filter to ensure the stability and robustness. Results indicate that the proposed algorithm is robust for challenging road scenes with low computational complexity.
当记录的标记被强光或阴影或缺失标记打断时,车道检测仍然表现出较低的准确性和缺乏鲁棒性。本文提出了一种利用道路结构模型和扩展卡尔曼滤波的新算法。根据消失点设置感兴趣的区域。首先,使用边缘检测算子扫描水平像素并计算边缘强度值。对应的直线由边缘点投票的线参数检测。从上述提取的边缘点和车道标记候选点以及其他约束条件中,将这些点作为潜在的车道边界。最后,利用车道边界点的坐标估计车道参数。通过扩展卡尔曼滤波对其进行更新,保证了系统的稳定性和鲁棒性。结果表明,该算法对于具有较低计算复杂度的挑战性道路场景具有较强的鲁棒性。
{"title":"Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter","authors":"Jinsheng Xiao, Wenxin Xiong, Yuan Yao, Liang Li, R. Klette","doi":"10.4018/ijdcf.2020040101","DOIUrl":"https://doi.org/10.4018/ijdcf.2020040101","url":null,"abstract":"Lane detection still demonstrates low accuracy and missing robustness when recorded markings are interrupted by strong light or shadows or missing marking. This article proposes a new algorithm using a model of road structure and an extended Kalman filter. The region of interest is set according to the vanishing point. First, an edge-detection operator is used to scan horizontal pixels and calculate edge-strength values. The corresponding straight line is detected by line parameters voted by edge points. From the edge points and lane mark candidates extracted above, and other constraints, these points are treated as the potential lane boundary. Finally, the lane parameters are estimated using the coordinates of the lane boundary points. They are updated by an extended Kalman filter to ensure the stability and robustness. Results indicate that the proposed algorithm is robust for challenging road scenes with low computational complexity.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"20 5 1","pages":"1-20"},"PeriodicalIF":0.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87678747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning 使用上下文感知像素周期性和深度学习读取单个和多个数字视频时钟
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-04-01 DOI: 10.4018/ijdcf.2020040102
Xinguo Yu, Wu Song, Xiaopan Lyu, Bin He, Nan Ye
This article presents an algorithm for reading both single and multiple digital video clocks by using a context-aware pixel periodicity method and a deep learning technique. Reading digital video clocks in real time is a very challenging problem. The first challenge is the clock digit localization. The existing pixel periodicity is not applicable to localizing multiple second-digit places. This article proposes a context-aware pixel periodicity method to identify the second-pixels of each clock. The second challenge is clock-digit recognition. For this task, the algorithms based a domain knowledge and deep learning technique is proposed to recognize clock digits. The proposed algorithm is better than the existing best one in two aspects. The first one is that it can read not only single digit video clock but also multiple digit video clocks. The other is that it requires a short length of a video clip. The experimental results show that the proposed algorithm can achieve 100% of accuracy in both localization and recognition for both single and multiple clocks.
本文提出了一种使用上下文感知像素周期性方法和深度学习技术读取单个和多个数字视频时钟的算法。实时读取数字视频时钟是一个非常具有挑战性的问题。第一个挑战是时钟数字定位。现有的像素周期性不适用于定位多个第二位数字位置。本文提出了一种上下文感知的像素周期性方法来识别每个时钟的第二像素。第二个挑战是时钟数字识别。为此,提出了基于领域知识和深度学习技术的时钟数字识别算法。该算法在两个方面优于现有的最佳算法。首先,它不仅可以读取个位数视频时钟,还可以读取多位数视频时钟。另一个是它需要一个很短的视频剪辑。实验结果表明,该算法对单时钟和多时钟的定位和识别准确率均达到100%。
{"title":"Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning","authors":"Xinguo Yu, Wu Song, Xiaopan Lyu, Bin He, Nan Ye","doi":"10.4018/ijdcf.2020040102","DOIUrl":"https://doi.org/10.4018/ijdcf.2020040102","url":null,"abstract":"This article presents an algorithm for reading both single and multiple digital video clocks by using a context-aware pixel periodicity method and a deep learning technique. Reading digital video clocks in real time is a very challenging problem. The first challenge is the clock digit localization. The existing pixel periodicity is not applicable to localizing multiple second-digit places. This article proposes a context-aware pixel periodicity method to identify the second-pixels of each clock. The second challenge is clock-digit recognition. For this task, the algorithms based a domain knowledge and deep learning technique is proposed to recognize clock digits. The proposed algorithm is better than the existing best one in two aspects. The first one is that it can read not only single digit video clock but also multiple digit video clocks. The other is that it requires a short length of a video clip. The experimental results show that the proposed algorithm can achieve 100% of accuracy in both localization and recognition for both single and multiple clocks.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"39 1","pages":"21-39"},"PeriodicalIF":0.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77395182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification 基于关联概念的掌纹表征深度分析人体生物特征识别
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-04-01 DOI: 10.4018/ijdcf.2020040103
Raouia Mokni, Hassen Drira, M. Kherallah
The security of people requires a beefy guarantee in our society, particularly, with the spread of terrorism throughout the world. In this context, palmprint identification based on texture analysis is amongst the pattern recognition applications to recognize people. In this article, the researchers investigated a deep texture analysis for the palmprint texture pattern representation based on a fusion between several texture information extractions through multiple descriptors, such as HOG and Gabor Filters, Fractal dimensions and GLCM corresponding respectively to the frequency, model, and statistical methodologies-based texture features. They assessed the proposed deep texture analysis method as well as the applicability of the dimensionality reduction techniques and the correlation concept between the features-based fusion on the challenging PolyU, CASIA and IIT-Delhi Palmprint databases. The experimental results show that the fusion of different texture types using the correlation concept for palmprint modality identification leads to promising results.
人民的安全需要我们社会的有力保障,特别是在恐怖主义在世界各地蔓延的情况下。在此背景下,基于纹理分析的掌纹识别是识别人的模式识别应用之一。本文研究了基于HOG和Gabor滤波器、分形维数和GLCM等多个描述符分别对应频率、模型和统计方法的纹理特征,将多个纹理信息提取融合在一起,实现掌纹纹理模式表示的深度纹理分析。他们在具有挑战性的理大、CASIA和IIT-Delhi掌纹数据库上评估了提出的深度纹理分析方法,以及降维技术和基于特征的融合之间的相关性概念的适用性。实验结果表明,利用相关概念融合不同纹理类型进行掌纹模态识别具有良好的效果。
{"title":"Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification","authors":"Raouia Mokni, Hassen Drira, M. Kherallah","doi":"10.4018/ijdcf.2020040103","DOIUrl":"https://doi.org/10.4018/ijdcf.2020040103","url":null,"abstract":"The security of people requires a beefy guarantee in our society, particularly, with the spread of terrorism throughout the world. In this context, palmprint identification based on texture analysis is amongst the pattern recognition applications to recognize people. In this article, the researchers investigated a deep texture analysis for the palmprint texture pattern representation based on a fusion between several texture information extractions through multiple descriptors, such as HOG and Gabor Filters, Fractal dimensions and GLCM corresponding respectively to the frequency, model, and statistical methodologies-based texture features. They assessed the proposed deep texture analysis method as well as the applicability of the dimensionality reduction techniques and the correlation concept between the features-based fusion on the challenging PolyU, CASIA and IIT-Delhi Palmprint databases. The experimental results show that the fusion of different texture types using the correlation concept for palmprint modality identification leads to promising results.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"20 1","pages":"40-58"},"PeriodicalIF":0.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81774881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video-Based Person Re-Identification With Unregulated Sequences 基于视频的非规范序列人物再识别
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-04-01 DOI: 10.4018/ijdcf.2020040104
Wenjun Huang, Chao Liang, Chunxia Xiao, Zhen Han
Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person re-id. Most existing approaches equally treat person video images, ignoring their individual discrepancy. However, in real scenarios, captured images are usually contaminated by various noises, especially occlusions, resulting in a series of unregulated sequences. Through investigating the impact of unregulated sequences to feature representation of video-based person re-id, the authors find a remarkable promotion by eliminating noisy sub sequences. Based on this interesting finding, an adaptive unregulated sub sequence detection and refinement method is proposed to purify original video sequence and obtain a more effective and discriminative feature representation for video-based person re-id. Experimental results on two public datasets demonstrate that the proposed method outperforms the state-of-the-art work.
基于视频的人物再识别(re-id)近年来受到广泛关注,因为可以利用视频中额外的时空信息和更多的外观线索来提高基于图像的人物再识别的性能。大多数现有的方法都是平等对待个人视频图像,忽略了他们的个体差异。然而,在实际场景中,捕获的图像通常受到各种噪声的污染,特别是遮挡,导致一系列不规范的序列。通过研究非规范序列对基于视频的人物身份识别特征表示的影响,作者发现通过消除噪声子序列可以显著提高特征表示。基于这一有趣的发现,提出了一种自适应非规范子序列检测和细化方法,对原始视频序列进行净化,获得更有效、更有区别的基于视频的人物身份特征表示。在两个公共数据集上的实验结果表明,该方法优于目前的研究。
{"title":"Video-Based Person Re-Identification With Unregulated Sequences","authors":"Wenjun Huang, Chao Liang, Chunxia Xiao, Zhen Han","doi":"10.4018/ijdcf.2020040104","DOIUrl":"https://doi.org/10.4018/ijdcf.2020040104","url":null,"abstract":"Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person re-id. Most existing approaches equally treat person video images, ignoring their individual discrepancy. However, in real scenarios, captured images are usually contaminated by various noises, especially occlusions, resulting in a series of unregulated sequences. Through investigating the impact of unregulated sequences to feature representation of video-based person re-id, the authors find a remarkable promotion by eliminating noisy sub sequences. Based on this interesting finding, an adaptive unregulated sub sequence detection and refinement method is proposed to purify original video sequence and obtain a more effective and discriminative feature representation for video-based person re-id. Experimental results on two public datasets demonstrate that the proposed method outperforms the state-of-the-art work.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"19 1","pages":"59-76"},"PeriodicalIF":0.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79712231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study 网络犯罪调查中尸检和波动性的评估:一个清晰的法医案例研究
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-01-01 DOI: 10.4018/ijdcf.2020010104
Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov
In this article, the authors successfully created two new plugins one for Autopsy Forensic Tool, and the other for Volatility Framework. Both plugins are useful for encoding digital evidences in Forensic Lucid which is the goal of this work. The first plugin was integrated in Autopsy to generate a report for the case of a Brute Force Authentication attack by looking for evidence in server logs based on a key search. On the other hand, the second plugin named ForensicLucidDeviceTree aims to find whether a device stack has been infected by a root-kit or not expression is implied by the previous statement. The results of both plugins are shown in Forensic Lucid Format and were successfully compiled using GIPC compiler.
在本文中,作者成功地创建了两个新的插件,一个用于尸检法医工具,另一个用于波动性框架。这两个插件都有助于在Forensic Lucid中编码数字证据,这是本工作的目标。第一个插件集成在尸检中,通过在服务器日志中查找基于密钥搜索的证据,为暴力验证攻击的情况生成报告。另一方面,第二个名为ForensicLucidDeviceTree的插件旨在查找设备堆栈是否已被根工具包感染,或者前面的语句是否暗示了表达式。这两个插件的结果都以Forensic Lucid格式显示,并使用GIPC编译器成功编译。
{"title":"Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study","authors":"Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov","doi":"10.4018/ijdcf.2020010104","DOIUrl":"https://doi.org/10.4018/ijdcf.2020010104","url":null,"abstract":"In this article, the authors successfully created two new plugins one for Autopsy Forensic Tool, and the other for Volatility Framework. Both plugins are useful for encoding digital evidences in Forensic Lucid which is the goal of this work. The first plugin was integrated in Autopsy to generate a report for the case of a Brute Force Authentication attack by looking for evidence in server logs based on a key search. On the other hand, the second plugin named ForensicLucidDeviceTree aims to find whether a device stack has been infected by a root-kit or not expression is implied by the previous statement. The results of both plugins are shown in Forensic Lucid Format and were successfully compiled using GIPC compiler.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"49 1","pages":"58-89"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77850746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible Data Hiding Based on Adaptive Block Selection Strategy 基于自适应块选择策略的可逆数据隐藏
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-01-01 DOI: 10.4018/ijdcf.2020010108
Dan-E Huang, Fangjun Huang
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry the message bits. Since the peak bin keeps unchanged during the embedding process, the neighboring bins can be easily identified at the receiver end, and the original image can be restored completely while extracting the embedded data. In this article, as an extension of the algorithm, the authors propose an RDH scheme based on adaptive block selection strategy. Via a new block selection strategy, those blocks of the carrier image may carry more message bits whereas introducing less distortion will take precedence over data hiding. Experimental results demonstrate that higher visual quality can be obtained compared with the original method, especially when the embedding rate is low.
最近,areversibledatahiding(RDH)methodwasproposedbasedonlocalhistogramshifting。This methodselectsthepeakbinofthelocalhistogramasareferenceandexpandsthetwoneighboringbins ofthepeakbintocarrythemessagebits。Sincethepeakbinkeepsunchangedduringtheembedding进程,theneighboringbinscanbeeasilyidentifiedatthereceiverend,andtheoriginalimagecan berestoredcompletelywhileextractingtheembeddeddata。Inthisarticle,asanextensionofthe算法,theauthorsproposeanRDHschemebasedonadaptiveblockselectionstrategy。Viaa newblockselectionstrategy,thoseblocksofthecarrierimagemaycarrymoremessagebitswhereas introducinglessdistortionwilltakeprecedenceoverdatahiding。Experimentalresultsdemonstrate thathighervisualqualitycanbeobtainedcomparedwiththeoriginalmethod,especiallywhenthe embeddingrateislow。关键词:块选择,直方图移位,定位,可逆数据隐藏,视觉质量介绍Reversibledatahiding(RDH)techniqueaimstoembedmessagebitsintoacarrierimagebyslightly modifyingitspixels,andmoreimportantly,itcancompletelyrestoretheoriginalcarrierimagewhile extractingtheembeddeddatafromthemarkedimage。Asaspecialcaseofinformationhiding、RDH canbeappliedtosomeareaswhenthereversibilityisdesirable、suchasmedicalandmilitaryimage加工。ManyRDHalgorithmshavebeenproposedsofar。,三个基本策略:无损压缩(侯赛因·夏尔马Tekalp,&军刀,2005;Fridrich,Goljan,&杜2002),区别扩张(,Lee &,2009;Sachnev,,,苏雷什,&施2009;Tai,,&,2009;,2003),,直方图转移(黄,,,&黄2016;,,安萨里,&苏2006;宣,,,柴,崔,&,2007)。Thelosslesscompression-basedmethodsapplylossless compressiontothecarrierimage,andutilizethestatisticalredundancytocreateafreespacefordata躲藏。Thisstrategyhasreceivedlessattentionrecently,sinceitcannotprovidelargeembedding capacityandmayleadtoseveredegradationinimagevisualquality.Thedifferenceexpansion(DE) strategywasfirstlyproposedbyTian(田,2003),wherethecarrierimageisdividedintopixelpairs andthedifferencevalueoftwopixelsinapairisexpandedtocarryonemessagebit。Thehistogram shifting_ (HS)strategywasproposedbyNietal.(Ni,Shi,Ansari,&Su,2006)。Themethodutilizes thepeakbinoftheoriginalhistogramofthecarrierimagefordatahiding。Afterthat,manyRDH algorithmsbasedonHSstrategyhavebeenproposed。最近研究,演示的HS国际期刊数字犯罪和取证卷12•问题1•1 2020 158战略也可以应用区别直方图,预测误差直方图(李,李,&杨2013;,,&曾2011;,,Gui,&杨2013;,,,&杨2013;,,Gui,&杨2017;你,,,,&施2013;,,&杨2014;,&太阳,2014;Huang,Huang,&Shi,2016),whichcanachievelargerembeddingcapacityandbetterimage visualquality。In2015,Panetal.(Pan,Hu,Ma,&Wang,2015)proposedanovelRDHalgorithmbasedonlocal histogramshifting。Inthismethod,thepeakbinofthelocalhistogramoftheca
{"title":"Reversible Data Hiding Based on Adaptive Block Selection Strategy","authors":"Dan-E Huang, Fangjun Huang","doi":"10.4018/ijdcf.2020010108","DOIUrl":"https://doi.org/10.4018/ijdcf.2020010108","url":null,"abstract":"Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting. This method selects the peak bin of the local histogram as a reference and expands the two neighboring bins of the peak bin to carry the message bits. Since the peak bin keeps unchanged during the embedding process, the neighboring bins can be easily identified at the receiver end, and the original image can be restored completely while extracting the embedded data. In this article, as an extension of the algorithm, the authors propose an RDH scheme based on adaptive block selection strategy. Via a new block selection strategy, those blocks of the carrier image may carry more message bits whereas introducing less distortion will take precedence over data hiding. Experimental results demonstrate that higher visual quality can be obtained compared with the original method, especially when the embedding rate is low.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"4 1","pages":"157-168"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75248089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources 资源受限的物联网应用混合入侵检测系统
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-01-01 DOI: 10.4018/ijdcf.2020010106
Chao Wu, Yuan’an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, B. Tang
NetworksecurityandnetworkforensicstechnologiesfortheInternetofThings(IoT)needspecial considerationduetoresource-constraints.CybercrimesconductedinIoTfocusonnetworkinformation andenergy sources.Graph theory is adopted to analyze the IoTnetworkandahybrid Intrusion DetectionSystem(IDS)isproposed.ThehybridIDSconsistsofCentralizedandActiveMalicious NodeDetection(CAMD)andDistributedandPassiveEEA(EnergyExhaustionAttack)Resistance (DPER).CAMDisintegratedinthegeneticalgorithm-baseddatagatheringscheme.CAMDdetects maliciousnodesmanipulatedbycybercriminalsandprovidesdigitalevidenceforforensics.DPERis implementedinasetofcommunicationprotocolstoalleviatetheimpactofEEAattacks.Simulation experiments conducted on NS-3 platform showed the hybrid IDS proposed detected and traced maliciousnodespreciselywithoutcompromisingenergyefficiency.Besides, the impactofEEA attacksconductedbycybercriminalswaseffectivelyalleviated. KeywoRDS Cybercrime, Energy Efficiency, Genetic Algorithm, Graph Theory, Internet Of Things, Network Forensics
NetworksecurityandnetworkforensicstechnologiesfortheInternetofThings(IoT)needspecial considerationduetoresource-constraints。CybercrimesconductedinIoTfocusonnetworkinformation andenergy来源。Graph采用理论来分析IoTnetworkandahybrid intrusion_ DetectionSystem(IDS)isproposed。ThehybridIDSconsistsofCentralizedandActiveMalicious NodeDetection(CAMD)andDistributedandPassiveEEA(EnergyExhaustionAttack)Resistance (DPER).CAMDisintegratedinthegeneticalgorithm-baseddatagatheringscheme。CAMDdetects maliciousnodesmanipulatedbycybercriminalsandprovidesdigitalevidenceforforensics。DPERis implementedinasetofcommunicationprotocolstoalleviatetheimpactofEEAattacks。Simulation在ns -3平台上进行的实验显示了所提出的混合ids,并进行了检测和跟踪maliciousnodespreciselywithoutcompromisingenergyefficiency。Besides, the impactofEEA attacksconductedbycybercriminalswaseffectivelyalleviated。关键词:网络犯罪,能效,遗传算法,图论,物联网,网络取证
{"title":"A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources","authors":"Chao Wu, Yuan’an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, B. Tang","doi":"10.4018/ijdcf.2020010106","DOIUrl":"https://doi.org/10.4018/ijdcf.2020010106","url":null,"abstract":"NetworksecurityandnetworkforensicstechnologiesfortheInternetofThings(IoT)needspecial considerationduetoresource-constraints.CybercrimesconductedinIoTfocusonnetworkinformation andenergy sources.Graph theory is adopted to analyze the IoTnetworkandahybrid Intrusion DetectionSystem(IDS)isproposed.ThehybridIDSconsistsofCentralizedandActiveMalicious NodeDetection(CAMD)andDistributedandPassiveEEA(EnergyExhaustionAttack)Resistance (DPER).CAMDisintegratedinthegeneticalgorithm-baseddatagatheringscheme.CAMDdetects maliciousnodesmanipulatedbycybercriminalsandprovidesdigitalevidenceforforensics.DPERis implementedinasetofcommunicationprotocolstoalleviatetheimpactofEEAattacks.Simulation experiments conducted on NS-3 platform showed the hybrid IDS proposed detected and traced maliciousnodespreciselywithoutcompromisingenergyefficiency.Besides, the impactofEEA attacksconductedbycybercriminalswaseffectivelyalleviated. KeywoRDS Cybercrime, Energy Efficiency, Genetic Algorithm, Graph Theory, Internet Of Things, Network Forensics","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"58 1","pages":"109-130"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81572480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Deep Learning Framework for Malware Classification 恶意软件分类的深度学习框架
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-01-01 DOI: 10.4018/ijdcf.2020010105
Mahmoud Kalash, Mrigank Rochan, N. Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal
In this article, the authors propose a deep learning framework for malware classification. There has been a huge increase in the volume of malware in recent years which poses serious security threats to financial institutions, businesses, and individuals. In order to combat the proliferation of malware, new strategies are essential to quickly identify and classify malware samples. Nowadays, machine learning approaches are becoming popular for malware classification. However, most of these approaches are based on shallow learning algorithms (e.g. SVM). Recently, convolutional neural networks (CNNs), a deep learning approach, have shown superior performance compared to traditional learning algorithms, especially in tasks such as image classification. Inspired by this, the authors propose a CNN-based architecture to classify malware samples. They convert malware binaries to grayscale images and subsequently train a CNN for classification. Experiments on two challenging malware classification datasets, namely Malimg and Microsoft, demonstrate that their method outperforms competing state-of-the-art algorithms.
在本文中,作者提出了一个用于恶意软件分类的深度学习框架。近年来,恶意软件的数量急剧增加,对金融机构、企业和个人构成了严重的安全威胁。为了对抗恶意软件的扩散,必须采用新的策略来快速识别和分类恶意软件样本。如今,机器学习方法在恶意软件分类中越来越流行。然而,这些方法大多是基于浅学习算法(例如SVM)。最近,卷积神经网络(cnn)作为一种深度学习方法,与传统的学习算法相比,表现出了优越的性能,特别是在图像分类等任务中。受此启发,作者提出了一种基于cnn的恶意软件样本分类架构。他们将恶意软件二进制文件转换为灰度图像,然后训练CNN进行分类。在两个具有挑战性的恶意软件分类数据集(即Malimg和Microsoft)上的实验表明,他们的方法优于竞争最先进的算法。
{"title":"A Deep Learning Framework for Malware Classification","authors":"Mahmoud Kalash, Mrigank Rochan, N. Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal","doi":"10.4018/ijdcf.2020010105","DOIUrl":"https://doi.org/10.4018/ijdcf.2020010105","url":null,"abstract":"In this article, the authors propose a deep learning framework for malware classification. There has been a huge increase in the volume of malware in recent years which poses serious security threats to financial institutions, businesses, and individuals. In order to combat the proliferation of malware, new strategies are essential to quickly identify and classify malware samples. Nowadays, machine learning approaches are becoming popular for malware classification. However, most of these approaches are based on shallow learning algorithms (e.g. SVM). Recently, convolutional neural networks (CNNs), a deep learning approach, have shown superior performance compared to traditional learning algorithms, especially in tasks such as image classification. Inspired by this, the authors propose a CNN-based architecture to classify malware samples. They convert malware binaries to grayscale images and subsequently train a CNN for classification. Experiments on two challenging malware classification datasets, namely Malimg and Microsoft, demonstrate that their method outperforms competing state-of-the-art algorithms.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"12 1","pages":"90-108"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85219744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification 基于三角极性特征分类的视频伪造检测模型
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-01-01 DOI: 10.4018/ijdcf.2020010102
Chee Cheun Huang, Chien Eao Lee, V. Thing
Videoforgeryhasbeenincreasingovertheyearsduetothewideaccessibilityofsophisticatedvideo editingsoftware.Ahighlyaccurateandautomatedvideoforgerydetectionsystemwillthereforebe vitallyimportantinensuringtheauthenticityofforensicvideoevidences.Thisarticleproposesanovel TriangularPolarityFeatureClassification(TPFC)videoforgerydetectionframeworkforvideoframe insertionanddeletionforgeries.TheTPFCframeworkhashighprecisionandrecallrateswithasimple andthreshold-lessalgorithmdesignedforreal-worldapplications.Systemrobustnessevaluationsbased oncrossvalidationanddifferentdatabaserecordingconditionswerealsoperformedandvalidated. EvaluationontheperformanceoftheTPFCframeworkdemonstratedtheefficacyoftheproposed frameworkbyachievingarecallrateofupto98.26%andprecisionrateofupto95.76%,aswellas highlocalizationaccuracyondetectedforgedvideos.TheTPFCframeworkisfurtherdemonstrated tobecapableofoutperformingothermodernvideoforgerydetectiontechniquesavailabletoday. KeywoRDS Frame Deletion, Frame Insertion, Inter-frame Forgery Detection, Precision Rate, Recall Rate, Video Forensic
Videoforgeryhasbeenincreasingovertheyearsduetothewideaccessibilityofsophisticatedvideo editingsoftware。Ahighlyaccurateandautomatedvideoforgerydetectionsystemwillthereforebe vitallyimportantinensuringtheauthenticityofforensicvideoevidences。Thisarticleproposesanovel TriangularPolarityFeatureClassification(TPFC)videoforgerydetectionframeworkforvideoframe insertionanddeletionforgeries。TheTPFCframeworkhashighprecisionandrecallrateswithasimple andthreshold-lessalgorithmdesignedforreal-worldapplications。Systemrobustnessevaluationsbased oncrossvalidationanddifferentdatabaserecordingconditionswerealsoperformedandvalidated。EvaluationontheperformanceoftheTPFCframeworkdemonstratedtheefficacyoftheproposed frameworkbyachievingarecallrateofupto98.26%andprecisionrateofupto95.76%,aswellas highlocalizationaccuracyondetectedforgedvideos。TheTPFCframeworkisfurtherdemonstrated tobecapableofoutperformingothermodernvideoforgerydetectiontechniquesavailabletoday。关键词:帧删除,帧插入,帧间伪造检测,准确率,召回率,视频取证
{"title":"A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification","authors":"Chee Cheun Huang, Chien Eao Lee, V. Thing","doi":"10.4018/ijdcf.2020010102","DOIUrl":"https://doi.org/10.4018/ijdcf.2020010102","url":null,"abstract":"Videoforgeryhasbeenincreasingovertheyearsduetothewideaccessibilityofsophisticatedvideo editingsoftware.Ahighlyaccurateandautomatedvideoforgerydetectionsystemwillthereforebe vitallyimportantinensuringtheauthenticityofforensicvideoevidences.Thisarticleproposesanovel TriangularPolarityFeatureClassification(TPFC)videoforgerydetectionframeworkforvideoframe insertionanddeletionforgeries.TheTPFCframeworkhashighprecisionandrecallrateswithasimple andthreshold-lessalgorithmdesignedforreal-worldapplications.Systemrobustnessevaluationsbased oncrossvalidationanddifferentdatabaserecordingconditionswerealsoperformedandvalidated. EvaluationontheperformanceoftheTPFCframeworkdemonstratedtheefficacyoftheproposed frameworkbyachievingarecallrateofupto98.26%andprecisionrateofupto95.76%,aswellas highlocalizationaccuracyondetectedforgedvideos.TheTPFCframeworkisfurtherdemonstrated tobecapableofoutperformingothermodernvideoforgerydetectiontechniquesavailabletoday. KeywoRDS Frame Deletion, Frame Insertion, Inter-frame Forgery Detection, Precision Rate, Recall Rate, Video Forensic","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"22 1","pages":"14-34"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82133575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics 物联网:网络犯罪调查和数字取证的挑战和考虑
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-01-01 DOI: 10.4018/ijdcf.2020010101
Áine MacDermott, T. Baker, Paul Buck, Farkhund Iqbal, Qi Shi
The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers with new security, capacity, and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This article explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.
物联网(IoT)代表了现实世界和数字世界的无缝融合,创造了存储和传递数据的新设备。处理大量物联网数据将相应地增加数据中心的工作负载,给提供商带来新的安全、容量和分析挑战。方便地处理这些数据是一个关键的挑战,因为整个应用程序的性能高度依赖于数据管理服务的属性。本文探讨了网络犯罪调查和数字取证所带来的挑战,这些挑战涉及犯罪格局的转变-物联网和明显的调查复杂性-移动到任何物联网(IoA)/万物互联(IoE)时代。物联网取证需要多方面的方法,从传感器设备、通信设备、冰箱、汽车和无人机等各种来源收集证据,到智能蜂群和智能建筑。
{"title":"The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics","authors":"Áine MacDermott, T. Baker, Paul Buck, Farkhund Iqbal, Qi Shi","doi":"10.4018/ijdcf.2020010101","DOIUrl":"https://doi.org/10.4018/ijdcf.2020010101","url":null,"abstract":"The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers with new security, capacity, and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This article explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"14 1","pages":"1-13"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82384290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1