首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification 图像取证工具(IFT):图像检索、篡改检测和分类
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.287606
Digambar Pawar, Mayank Gajpal
Images now-a-days are often used as an authenticated proof for any cyber-crime. Images that do not remain genuine can mislead the court of law. The fast and dynamically growing technology doubts the trust in the integrity of images. Tampering mostly refers to adding or removing important features from an image without leaving any obvious trace. In earlier days, digital signatures were used to preserve the integrity, but now a days various tools are available to tamper digital signatures as well. Even in various state-of-the-art works in tamper detection, there are various restrictions in the type of inputs and the type of tampering detection. In this paper, the researchers propose a prototype model in the form of a tool that will retrieve all the image files from given digital evidence and detect tampering in the images. For various types of tampering, different tampering detection algorithms have been used. The proposed prototype will detect if tampering has been done or not and will classify the image files into groups based on the type of tampering.
如今,图像经常被用作任何网络犯罪的认证证据。不能保持真实的图像可能会误导法庭。快速和动态发展的技术质疑对图像完整性的信任。篡改主要是指在不留下任何明显痕迹的情况下增加或删除图像的重要特征。在早期,数字签名被用来保持完整性,但是现在有各种各样的工具可以篡改数字签名。即使在各种最先进的篡改检测工作中,在输入类型和篡改检测类型方面也存在各种限制。在本文中,研究人员提出了一种工具形式的原型模型,该工具将从给定的数字证据中检索所有图像文件并检测图像中的篡改。对于不同类型的篡改,使用了不同的篡改检测算法。该原型将检测图像文件是否被篡改,并根据篡改类型对图像文件进行分组。
{"title":"Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification","authors":"Digambar Pawar, Mayank Gajpal","doi":"10.4018/ijdcf.287606","DOIUrl":"https://doi.org/10.4018/ijdcf.287606","url":null,"abstract":"Images now-a-days are often used as an authenticated proof for any cyber-crime. Images that do not remain genuine can mislead the court of law. The fast and dynamically growing technology doubts the trust in the integrity of images. Tampering mostly refers to adding or removing important features from an image without leaving any obvious trace. In earlier days, digital signatures were used to preserve the integrity, but now a days various tools are available to tamper digital signatures as well. Even in various state-of-the-art works in tamper detection, there are various restrictions in the type of inputs and the type of tampering detection. In this paper, the researchers propose a prototype model in the form of a tool that will retrieve all the image files from given digital evidence and detect tampering in the images. For various types of tampering, different tampering detection algorithms have been used. The proposed prototype will detect if tampering has been done or not and will classify the image files into groups based on the type of tampering.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"128 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82264842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures 基于汉字成分结构编码的无盖文本隐写
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.302135
Kaixi Wang, Xiangmei Yu, Ziyi Zou
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component structures. Its main idea is that a binary bit string can be conveyed by the Chinese characters’ component structures. The positions of Chinese characters that carry a secret message will be expressed in two systems of the linear remainder equations, whose solutions will be secretly sent to the receiver to extract the secret message. In the method, a single Chinese character can express p bits. The analyses and statistics show that its capacity will be much higher when the same Chinese character is used more than once than existing methods, and it can conceal any message successfully. In addition, this method can also be employed in other languages.
现有的无盖文本隐写方法的隐写能力较低,而且有些方法不能保证信息被隐藏。如何实现较高的隐写容量已成为文本隐写的研究热点。提出了一种对汉字组成结构进行编码的文本无覆盖隐写方法。其主要思想是利用汉字的组成结构来传递二进制位串。将携带秘密信息的汉字的位置表示为两组线性剩余方程,将其解秘密地发送给接收者以提取秘密信息。在这种方法中,一个汉字可以表示p位。分析和统计表明,该方法在多次使用同一汉字时,其容量比现有方法大得多,并且可以成功地隐藏任何信息。此外,这种方法也适用于其他语言。
{"title":"A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures","authors":"Kaixi Wang, Xiangmei Yu, Ziyi Zou","doi":"10.4018/ijdcf.302135","DOIUrl":"https://doi.org/10.4018/ijdcf.302135","url":null,"abstract":"The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component structures. Its main idea is that a binary bit string can be conveyed by the Chinese characters’ component structures. The positions of Chinese characters that carry a secret message will be expressed in two systems of the linear remainder equations, whose solutions will be secretly sent to the receiver to extract the secret message. In the method, a single Chinese character can express p bits. The analyses and statistics show that its capacity will be much higher when the same Chinese character is used more than once than existing methods, and it can conceal any message successfully. In addition, this method can also be employed in other languages.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"13 1","pages":"1-17"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81854810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications 人体步态分析和识别的医学和法医应用综述
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.289432
Shantanu Jana, N. Das, Subhadip Basu, M. Nasipuri
Gait is a behavioural biometric which sometimes changes due to diseases but it is still a strong identification metric that is widely used in forensic works, state biometric preserve sectors, and medical laboratories. Gait analysis sometimes helps to identify person’s present mental state which reflects on physiological therapy for improved biological system. There are various gait measurement forms which expand the research area from crime detection to medical enhancement. Many research works have been done so far for gait recognition. Many researchers focused on skeleton image of people to extract gait features and many worked on stride length. Various sensors have been used to detect gait in various light forms. This paper is a brief survey of works on gait recognition, collected from various sources of science and technology literature. We have discussed few efficient models that worked best as well as we have discussed about few data sets available.
步态是一种行为生物特征,有时会因疾病而发生变化,但它仍然是一种强有力的识别指标,广泛应用于法医工作、国家生物特征保存部门和医学实验室。步态分析有时有助于识别人目前的精神状态,反映生理治疗,以改善生物系统。步态测量的形式多种多样,将研究领域从犯罪侦查扩展到医学增强。到目前为止,步态识别的研究工作已经完成了很多。许多研究人员将重点放在人体骨骼图像上提取步态特征,并对步长进行研究。各种传感器已被用于检测各种光形式的步态。本文是对步态识别工作的简要概述,收集了各种来源的科技文献。我们已经讨论了一些最有效的模型,我们也讨论了一些可用的数据集。
{"title":"Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications","authors":"Shantanu Jana, N. Das, Subhadip Basu, M. Nasipuri","doi":"10.4018/ijdcf.289432","DOIUrl":"https://doi.org/10.4018/ijdcf.289432","url":null,"abstract":"Gait is a behavioural biometric which sometimes changes due to diseases but it is still a strong identification metric that is widely used in forensic works, state biometric preserve sectors, and medical laboratories. Gait analysis sometimes helps to identify person’s present mental state which reflects on physiological therapy for improved biological system. There are various gait measurement forms which expand the research area from crime detection to medical enhancement. Many research works have been done so far for gait recognition. Many researchers focused on skeleton image of people to extract gait features and many worked on stride length. Various sensors have been used to detect gait in various light forms. This paper is a brief survey of works on gait recognition, collected from various sources of science and technology literature. We have discussed few efficient models that worked best as well as we have discussed about few data sets available.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"23 1","pages":"1-20"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86747359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Incremental Acquisition Method for Web Forensics 一种用于网络取证的增量获取方法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/IJDCF.2021110116
Guangxuan Chen, Guangxiao Chen, Lei Zhang, Qiang Liu
Inordertosolvetheproblemsofrepeatedacquisition,dataredundancy,andlowefficiencyintheprocessofwebsiteforensics,thispaperproposesanincrementalacquisitionmethodorientedtodynamicwebsites.Thismethodrealizedtheincrementalcollectionondynamicallyupdatedwebsitesthroughacquiringandparsingwebpages,URLdeduplication,webpagedenoising,webpagecontentextraction,andhashing.Experimentsshowthatthealgorithmhasrelativehighacquisitionprecisionandrecallrateandcanbecombinedwithotherdatatoperformeffectivedigitalforensicsondynamicallyupdatedreal-timewebsites.
Inordertosolvetheproblemsofrepeatedacquisition,dataredundancy,andlowefficiencyintheprocessofwebsiteforensics,thispaperproposesanincrementalacquisitionmethodorientedtodynamicwebsites.Thismethodrealizedtheincrementalcollectionondynamicallyupdatedwebsitesthroughacquiringandparsingwebpages,URLdeduplication,webpagedenoising,webpagecontentextraction,andhashing.Experimentsshowthatthealgorithmhasrelativehighacquisitionprecisionandrecallrateandcanbecombinedwithotherdatatoperformeffectivedigitalforensicsondynamicallyupdatedreal-timewebsites。
{"title":"An Incremental Acquisition Method for Web Forensics","authors":"Guangxuan Chen, Guangxiao Chen, Lei Zhang, Qiang Liu","doi":"10.4018/IJDCF.2021110116","DOIUrl":"https://doi.org/10.4018/IJDCF.2021110116","url":null,"abstract":"Inordertosolvetheproblemsofrepeatedacquisition,dataredundancy,andlowefficiencyintheprocessofwebsiteforensics,thispaperproposesanincrementalacquisitionmethodorientedtodynamicwebsites.Thismethodrealizedtheincrementalcollectionondynamicallyupdatedwebsitesthroughacquiringandparsingwebpages,URLdeduplication,webpagedenoising,webpagecontentextraction,andhashing.Experimentsshowthatthealgorithmhasrelativehighacquisitionprecisionandrecallrateandcanbecombinedwithotherdatatoperformeffectivedigitalforensicsondynamicallyupdatedreal-timewebsites.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"102 1","pages":"1-13"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75882434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN 基于特征选择和深度学习技术的VCN网络入侵检测系统
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/IJDCF.20211101.OA10
P. Keserwani, M. C. Govil, E. Pilli, Prajjval Govil
In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks to virtual cloud network (VCN) are increased. The protection of VCN is required to maintain the faith of the cloud users. Intrusion detection is essential to secure any network. The existing approaches that use the conventional neural network cannot utilize all information for identifying the intrusions. In this paper, the anomaly-based NIDS for VCN is proposed. For feature selection, grey wolf optimization (GWO) is hybridized with a bald eagle search (BES) algorithm. For classification, a deep learning approach—deep sparse auto-encoder (DSAE)—is employed. In this way, this paper proposes a NIDS model for VCN named GWO-DES-DSAE. The proposed system is simulated in the python programming environment. The proposed NIDS model’s performance is compared with other recent approaches for both binary and multi-class classification on the considered datasets—NSL-KDD, UNSW-NB15, and CICIDS 2017—and found better than other methods. Deep Sparse Autoencoder (DSAE) has been utilized to learn the underlying traffic data structure. The proposed system improves performance and, hence producing reliable predictions. Evaluation of the results shows the quality and effectiveness of the proposed NIDS model, and the main contributions of this work are as follows:
在当今时代,由于业务对云环境的需求,对虚拟云网络(VCN)的攻击的规模、复杂性和机会都在增加。VCN的保护是维护云用户信任的必要条件。入侵检测对于任何网络的安全都是必不可少的。现有的基于传统神经网络的入侵识别方法无法利用所有信息进行入侵识别。本文提出了一种基于异常的VCN网络入侵检测方法。在特征选择方面,将灰狼优化算法(GWO)与白头鹰搜索算法(BES)相结合。在分类方面,采用了深度学习方法——深度稀疏自编码器(deep sparse auto-encoder, DSAE)。在此基础上,本文提出了一种VCN网络入侵检测模型GWO-DES-DSAE。该系统在python编程环境下进行了仿真。在考虑的数据集(nsl - kdd, UNSW-NB15和CICIDS 2017)上,将所提出的NIDS模型的性能与其他最近的二元和多类分类方法进行了比较,发现比其他方法更好。利用深度稀疏自编码器(Deep Sparse Autoencoder, DSAE)学习底层交通数据结构。所提出的系统提高了性能,从而产生了可靠的预测。对结果的评价表明了所提出的NIDS模型的质量和有效性,本工作的主要贡献如下:
{"title":"An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN","authors":"P. Keserwani, M. C. Govil, E. Pilli, Prajjval Govil","doi":"10.4018/IJDCF.20211101.OA10","DOIUrl":"https://doi.org/10.4018/IJDCF.20211101.OA10","url":null,"abstract":"In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks to virtual cloud network (VCN) are increased. The protection of VCN is required to maintain the faith of the cloud users. Intrusion detection is essential to secure any network. The existing approaches that use the conventional neural network cannot utilize all information for identifying the intrusions. In this paper, the anomaly-based NIDS for VCN is proposed. For feature selection, grey wolf optimization (GWO) is hybridized with a bald eagle search (BES) algorithm. For classification, a deep learning approach—deep sparse auto-encoder (DSAE)—is employed. In this way, this paper proposes a NIDS model for VCN named GWO-DES-DSAE. The proposed system is simulated in the python programming environment. The proposed NIDS model’s performance is compared with other recent approaches for both binary and multi-class classification on the considered datasets—NSL-KDD, UNSW-NB15, and CICIDS 2017—and found better than other methods. Deep Sparse Autoencoder (DSAE) has been utilized to learn the underlying traffic data structure. The proposed system improves performance and, hence producing reliable predictions. Evaluation of the results shows the quality and effectiveness of the proposed NIDS model, and the main contributions of this work are as follows:","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"23 1","pages":"1-25"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89231526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Anonymising Proxies Using Machine Learning 使用机器学习检测匿名代理
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.286756
Shane Miller, K. Curran, T. Lunney
Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst unintended userbases as tools that can be used to hide mask identities while using websites and web-services. Anonymising Proxies and/or VPNs act as an intermediary between a user and a web server with a Proxy and/or VPN IP address taking the place of the user’s IP address that is forwarded to the web server. This paper presents computational models based on intelligent machine learning techniques to address the limitations currently experienced by unauthorised user detection systems. A model to detect usage of anonymising proxies was developed using a Multi-layered perceptron neural network that was trained using data found in the Transmission Control Protocol (TCP) header of captured network packets
网络代理和虚拟专用网(VPN)是日常使用的工具,用于促进各种业务功能。然而,它们已经在意想不到的用户群中流行起来,作为在使用网站和网络服务时隐藏掩码身份的工具。匿名代理和/或VPN充当用户和web服务器之间的中介,代理和/或VPN IP地址代替用户转发给web服务器的IP地址。本文提出了基于智能机器学习技术的计算模型,以解决当前未经授权的用户检测系统所遇到的限制。使用多层感知器神经网络开发了一个检测匿名代理使用的模型,该网络使用捕获的网络数据包的传输控制协议(TCP)报头中的数据进行训练
{"title":"Detection of Anonymising Proxies Using Machine Learning","authors":"Shane Miller, K. Curran, T. Lunney","doi":"10.4018/ijdcf.286756","DOIUrl":"https://doi.org/10.4018/ijdcf.286756","url":null,"abstract":"Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst unintended userbases as tools that can be used to hide mask identities while using websites and web-services. Anonymising Proxies and/or VPNs act as an intermediary between a user and a web server with a Proxy and/or VPN IP address taking the place of the user’s IP address that is forwarded to the web server. This paper presents computational models based on intelligent machine learning techniques to address the limitations currently experienced by unauthorised user detection systems. A model to detect usage of anonymising proxies was developed using a Multi-layered perceptron neural network that was trained using data found in the Transmission Control Protocol (TCP) header of captured network packets","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"13 1","pages":"1-17"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74553389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications 结合插值备份和双重认证的高容量测试伪装方法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.295815
Haining Lu, Liping Shao, Qinglong Wang
To improve the hidden capacity of a single question, further avoid the absence of authentication and provide self-repair ability, this paper proposes a high capacity test disguise method combined with interpolation backup and double authentications. Firstly, secret byte sequence is backed up and further encoded to a backup index sequence by secret information backup and encoding strategy. Secondly, a test question database divided into eight sets is created. Finally, the backup index sequence is disguised as a stego test paper using 24 different candidate answer orders and 4-bit hash values. In restoration, double authentications are applied to authenticate candidate restored value, and the most reliable candidate restored values are obtained by the reliable calculation to reconstruct secret information. The experimental results and analysis show that the proposed method can distinguish error candidate restored values, and calculate the reliability of each restored byte. Moreover, it has excellent self-repair ability with a higher hidden capacity of a single question.
为了提高单题的隐藏容量,进一步避免认证缺失,提供自修复能力,本文提出了一种插值备份和双重认证相结合的高容量试题伪装方法。首先,通过秘密信息备份和编码策略对秘密字节序列进行备份,并将其编码为备份索引序列。其次,创建一个分为8个集的题库。最后,使用24个不同的候选答案顺序和4位哈希值将备份索引序列伪装成一个隐写试卷。在恢复过程中,采用双重认证对候选恢复值进行认证,通过可靠计算得到最可靠的候选恢复值,重构秘密信息。实验结果和分析表明,该方法能够区分出错误候选恢复值,并计算出每个恢复字节的可靠度。此外,它具有出色的自我修复能力,具有较高的单题隐藏能力。
{"title":"A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications","authors":"Haining Lu, Liping Shao, Qinglong Wang","doi":"10.4018/ijdcf.295815","DOIUrl":"https://doi.org/10.4018/ijdcf.295815","url":null,"abstract":"To improve the hidden capacity of a single question, further avoid the absence of authentication and provide self-repair ability, this paper proposes a high capacity test disguise method combined with interpolation backup and double authentications. Firstly, secret byte sequence is backed up and further encoded to a backup index sequence by secret information backup and encoding strategy. Secondly, a test question database divided into eight sets is created. Finally, the backup index sequence is disguised as a stego test paper using 24 different candidate answer orders and 4-bit hash values. In restoration, double authentications are applied to authenticate candidate restored value, and the most reliable candidate restored values are obtained by the reliable calculation to reconstruct secret information. The experimental results and analysis show that the proposed method can distinguish error candidate restored values, and calculate the reliability of each restored byte. Moreover, it has excellent self-repair ability with a higher hidden capacity of a single question.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"60 1","pages":"1-23"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80190728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow 运动补偿插框法识别插框-测量光流不均匀性
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.295813
Xiangling Ding, Yanming Huang, Dengyong Zhang, Junlin Ouyang
Motion-compensated frame-interpolation (MCFI), synthesize intermediate frames between input frames guided by estimated motion, can be employed to falsify high bit-rate videos or high frame-rate videos with different frame-rates. Although existing MCFI identification methods have obtained satisfactory results, they are seriously degraded by stronger compression. Therefore, to conquer this issue, a blind forensics method is proposed to identify the adopted MCFI methods by considering the irregularities of optical flow produced by various MCFIs. In this paper, a set of compact features are constructed from the motion-aligned frame difference-weighted histogram of local binary pattern on the basis of optical flow (MAFD-WHLBP). Experimental results show that the proposed approach outperforms existing MCFI detectors under stronger compression.
运动补偿帧插值(MCFI)是在估计运动的指导下合成输入帧之间的中间帧,可用于伪造高比特率视频或不同帧率的高帧率视频。现有的MCFI识别方法虽然取得了令人满意的结果,但由于受到较强的压缩,其性能下降严重。因此,为了解决这一问题,提出了一种盲取证方法,通过考虑各种MCFI产生的光流的不规则性来识别所采用的MCFI方法。本文利用基于光流的局部二值模式的运动对齐帧差分加权直方图(MAFD-WHLBP)构造了一组紧凑特征。实验结果表明,在较强的压缩条件下,该方法优于现有的MCFI检测器。
{"title":"Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow","authors":"Xiangling Ding, Yanming Huang, Dengyong Zhang, Junlin Ouyang","doi":"10.4018/ijdcf.295813","DOIUrl":"https://doi.org/10.4018/ijdcf.295813","url":null,"abstract":"Motion-compensated frame-interpolation (MCFI), synthesize intermediate frames between input frames guided by estimated motion, can be employed to falsify high bit-rate videos or high frame-rate videos with different frame-rates. Although existing MCFI identification methods have obtained satisfactory results, they are seriously degraded by stronger compression. Therefore, to conquer this issue, a blind forensics method is proposed to identify the adopted MCFI methods by considering the irregularities of optical flow produced by various MCFIs. In this paper, a set of compact features are constructed from the motion-aligned frame difference-weighted histogram of local binary pattern on the basis of optical flow (MAFD-WHLBP). Experimental results show that the proposed approach outperforms existing MCFI detectors under stronger compression.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"23 1","pages":"1-13"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87545649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set 基于生物统计特征集的分裂聚类和k近邻网络机器人检测系统
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.302136
Rizwan Ur Rahman, D. Tomar
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web traffic. An effective guard against the stealing of the data from web sites and automated web form is to identify and confirm the human user presence on web sites. In this paper, an efficient k-Nearest Neighbor algorithm using hierarchical clustering for web bot detection is proposed. Proposed technique exploits a novel taxonomy of web bot features known as Biostatistics Features. Numerous attack scenarios for web bot attacks such as automatic account registration, automatic form filling, bulk message posting, and web scrapping are created to imitate the zero-day web bot attacks. The proposed technique is evaluated with number of experiments using standard evaluation parameters. The experimental result analysis demonstrates that the proposed technique is extremely efficient in differentiating human users from web bots.
网络机器人是一种破坏性的程序,它会自动填写网页表单并从网站窃取数据。根据大量的网络机器人流量报告,网络机器人流量占网络总流量的50%以上。识别和确认网站上是否存在人类用户,是防止从网站和自动表单窃取数据的有效方法。本文提出了一种基于层次聚类的高效k近邻网络机器人检测算法。提出的技术利用了一种新的网络机器人特征分类,称为生物统计特征。为了模仿零日网络机器人攻击,创建了许多网络机器人攻击场景,如自动帐户注册、自动表单填写、批量消息发布和web废弃。采用标准评价参数对所提出的技术进行了多次实验评价。实验结果分析表明,该方法在区分人类用户和网络机器人方面非常有效。
{"title":"Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set","authors":"Rizwan Ur Rahman, D. Tomar","doi":"10.4018/ijdcf.302136","DOIUrl":"https://doi.org/10.4018/ijdcf.302136","url":null,"abstract":"Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web traffic. An effective guard against the stealing of the data from web sites and automated web form is to identify and confirm the human user presence on web sites. In this paper, an efficient k-Nearest Neighbor algorithm using hierarchical clustering for web bot detection is proposed. Proposed technique exploits a novel taxonomy of web bot features known as Biostatistics Features. Numerous attack scenarios for web bot attacks such as automatic account registration, automatic form filling, bulk message posting, and web scrapping are created to imitate the zero-day web bot attacks. The proposed technique is evaluated with number of experiments using standard evaluation parameters. The experimental result analysis demonstrates that the proposed technique is extremely efficient in differentiating human users from web bots.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"50 1","pages":"1-27"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84748660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ROP Defense Using Trie Graph for System Security 基于三图的系统安全ROP防御
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/IJDCF.20211101.OA7
Alex Zhu, W. Yan, R. Sinha
Most intrusion detection systems (IDS)/intrusion prevention systems (IPS) cannot defend the attacks from a return-oriented program (ROP) that applies code reusing and exploiting techniques without the need for code injection. Malicious attackers chain a short sequence as a gadget and execute this gadget as an arbitrary (Turing-complete) behavior in the target program. Lots of ROP defense tools have been developed with satisfactory performance and low costs overhead, but malicious attackers can evade ROP tools. Therefore, it needs security researchers to continually improve existing ROP defense tools because the defense ability of target devices such as smartphones is weak, and such devices are being increasingly targeted. The contribution in this paper is to propose an ROP defense method that has provided a better performance of defense against ROP attacks than existing ROP defense tools.
大多数入侵检测系统(IDS)/入侵防御系统(IPS)无法防御来自面向返回的程序(ROP)的攻击,该程序应用代码重用和利用技术而无需代码注入。恶意攻击者将一个短序列链接为一个小工具,并将该小工具作为目标程序中的任意(图灵完备)行为执行。目前已经开发了大量的ROP防御工具,具有良好的性能和较低的成本开销,但恶意攻击者可以避开ROP工具。因此,由于智能手机等目标设备的防御能力较弱,并且越来越多的目标设备被攻击,需要安全研究人员不断改进现有的ROP防御工具。本文的贡献是提出了一种ROP防御方法,该方法比现有的ROP防御工具提供了更好的防御ROP攻击的性能。
{"title":"ROP Defense Using Trie Graph for System Security","authors":"Alex Zhu, W. Yan, R. Sinha","doi":"10.4018/IJDCF.20211101.OA7","DOIUrl":"https://doi.org/10.4018/IJDCF.20211101.OA7","url":null,"abstract":"Most intrusion detection systems (IDS)/intrusion prevention systems (IPS) cannot defend the attacks from a return-oriented program (ROP) that applies code reusing and exploiting techniques without the need for code injection. Malicious attackers chain a short sequence as a gadget and execute this gadget as an arbitrary (Turing-complete) behavior in the target program. Lots of ROP defense tools have been developed with satisfactory performance and low costs overhead, but malicious attackers can evade ROP tools. Therefore, it needs security researchers to continually improve existing ROP defense tools because the defense ability of target devices such as smartphones is weak, and such devices are being increasingly targeted. The contribution in this paper is to propose an ROP defense method that has provided a better performance of defense against ROP attacks than existing ROP defense tools.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"20 1","pages":"1-12"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89541735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1