首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Two-Step Image-in-Image Steganography via GAN 基于GAN的两步图像中隐写
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.295814
Guan-Zhong Wu, Xiangyu Yu, Hui-hua Liang, Minting Li
Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations. In previous works, the encoder-decoder structure is trained end-to-end, but in practice, encoder and decoder should be used separately. Therefore, end-to-end trained steganography networks are vulnerable to fluctuations and the secret decoded from those networks suffers from unpleasant noise. In this work, we present an image-in-image steganog- raphy method called TISGAN to achieve better results, both in image quality and security. In particular, we divide the training process into two parts. Moreover, perceptual loss is applied to encoder, to improve security in our work. We also append a denoising structure to the end of de- coder to achieve better image quality. Finally, the adversarial structure with useful techniques employed is also used in secret revealed process.
近年来,卷积神经网络被引入到信息隐藏中,深度网络在隐写中显示出巨大的潜力。然而,深度网络的一个缺点是它对微小的波动很敏感。在以往的工作中,编码器-解码器结构是端到端训练的,但在实践中,编码器和解码器应该分开使用。因此,端到端训练的隐写网络容易受到波动的影响,并且从这些网络中解码的秘密会受到令人不快的噪声的影响。在这项工作中,我们提出了一种称为TISGAN的图像中隐写方法,在图像质量和安全性方面都取得了更好的结果。特别地,我们将训练过程分为两个部分。此外,将感知损失应用到编码器中,提高了编码器工作的安全性。我们还在解码器的末端附加了去噪结构,以获得更好的图像质量。最后,在秘密披露过程中也采用了具有实用技术的对抗结构。
{"title":"Two-Step Image-in-Image Steganography via GAN","authors":"Guan-Zhong Wu, Xiangyu Yu, Hui-hua Liang, Minting Li","doi":"10.4018/ijdcf.295814","DOIUrl":"https://doi.org/10.4018/ijdcf.295814","url":null,"abstract":"Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations. In previous works, the encoder-decoder structure is trained end-to-end, but in practice, encoder and decoder should be used separately. Therefore, end-to-end trained steganography networks are vulnerable to fluctuations and the secret decoded from those networks suffers from unpleasant noise. In this work, we present an image-in-image steganog- raphy method called TISGAN to achieve better results, both in image quality and security. In particular, we divide the training process into two parts. Moreover, perceptual loss is applied to encoder, to improve security in our work. We also append a denoising structure to the end of de- coder to achieve better image quality. Finally, the adversarial structure with useful techniques employed is also used in secret revealed process.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"179 2 1","pages":"1-12"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77639729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding 基于内部预测和矩阵编码的HEVC信息隐藏算法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.20211101.oa11
Yong Liu, Dawen Xu
Aiming at the problem that the data hiding algorithm of high efficiency video coding (HEVC) has great influence on the video bit rate and visual quality, an information hiding algorithm based on intra prediction mode and matrix coding is proposed. Firstly, 8 prediction modes are selected from 4×4 luminance blocks in I frame to embed the hidden information. Then, the Least Significant Bit (LSB) algorithm is used to modulate the LSB of the last prediction mode. Finally, the modulated luminance block is re-encoded to embed 4 bits secret information. Experimental results show that the algorithm improves the embedding capacity, guarantees the subjective and objective quality of the video, and the bit rate increases by 1.14% on average.
针对高效视频编码(HEVC)中数据隐藏算法对视频码率和视觉质量影响较大的问题,提出了一种基于帧内预测模式和矩阵编码的信息隐藏算法。首先,从1帧的4×4亮度块中选择8种预测模式嵌入隐藏信息;然后,利用最小有效位(LSB)算法对最后一种预测模式的LSB进行调制。最后,对调制后的亮度块进行重新编码以嵌入4位保密信息。实验结果表明,该算法提高了嵌入容量,保证了视频的主客观质量,比特率平均提高了1.14%。
{"title":"HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding","authors":"Yong Liu, Dawen Xu","doi":"10.4018/ijdcf.20211101.oa11","DOIUrl":"https://doi.org/10.4018/ijdcf.20211101.oa11","url":null,"abstract":"Aiming at the problem that the data hiding algorithm of high efficiency video coding (HEVC) has great influence on the video bit rate and visual quality, an information hiding algorithm based on intra prediction mode and matrix coding is proposed. Firstly, 8 prediction modes are selected from 4×4 luminance blocks in I frame to embed the hidden information. Then, the Least Significant Bit (LSB) algorithm is used to modulate the LSB of the last prediction mode. Finally, the modulated luminance block is re-encoded to embed 4 bits secret information. Experimental results show that the algorithm improves the embedding capacity, guarantees the subjective and objective quality of the video, and the bit rate increases by 1.14% on average.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"22 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90073092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses 识别使用匿名代理隐藏源IP地址
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/IJDCF.20211101.OA8
Shane Miller, K. Curran, T. Lunney
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
如果恶意行为者使用匿名代理或虚拟专用网络(vpn)等身份隐藏工具,那么检测未经授权的用户对于目前可用的技术来说可能会有问题。这项工作提出了计算模型,以解决目前在检测VPN流量方面遇到的限制。对OpenVPN使用情况进行分类的实验发现,神经网络能够正确识别VPN流量,总体准确率为93.71%。这些结果表明,在检测未经授权的用户访问方面取得了重大进展,有证据表明,在这一领域的研究可能会有进一步的进展,特别是在检测VPN使用情况对组织很重要的商业安全应用方面。
{"title":"Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses","authors":"Shane Miller, K. Curran, T. Lunney","doi":"10.4018/IJDCF.20211101.OA8","DOIUrl":"https://doi.org/10.4018/IJDCF.20211101.OA8","url":null,"abstract":"The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"27 1","pages":"1-20"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88261248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing 基于压缩感知的云辅助图像加密和数据隐藏双重保护系统
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-11-01 DOI: 10.4018/ijdcf.295812
Di Xiao, Jia Liang, Y. Xiang, Jiaqi Zhou
In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for efficiency and security. After the data holder gets the sample of the raw data, he embeds watermark into sample and encrypts it, and then sends the protected sample to cloud for storage and recovery. Cloud cannot get any information about either the original data or watermark in the CS recovery process. Finally, users can extract the watermark and decrypt the data recovered by cloud directly in sparse domain. At the same time, after extracting the watermark, the image data of user will be closer to the original data compared with the data without extraction. Besides, the counter (CTR) mode is introduced to generate the measurement matrix of CS, which can improve security while avoiding the storage of measurement matrixes. The experimental results demonstrate that the scheme can provide both privacy protection and copyright protection with high efficiency.
在本文中,我们提出了一种基于压缩感知(CS)的方案,将加密和数据隐藏相结合,为云外包中的图像数据提供双重保护。为了提高效率和安全性,集成了不同的领域技术。数据持有者获得原始数据的样本后,将水印嵌入到样本中并进行加密,然后将保护后的样本发送到云端进行存储和恢复。在CS恢复过程中,Cloud无法获取原始数据或水印的任何信息。最后,用户可以提取水印,直接在稀疏域对云恢复的数据进行解密。同时,在水印提取后,用户的图像数据比未提取的数据更接近原始数据。此外,引入计数器(CTR)模式生成CS的测量矩阵,在避免测量矩阵存储的同时提高了安全性。实验结果表明,该方案能够高效地提供隐私保护和版权保护。
{"title":"Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing","authors":"Di Xiao, Jia Liang, Y. Xiang, Jiaqi Zhou","doi":"10.4018/ijdcf.295812","DOIUrl":"https://doi.org/10.4018/ijdcf.295812","url":null,"abstract":"In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for efficiency and security. After the data holder gets the sample of the raw data, he embeds watermark into sample and encrypts it, and then sends the protected sample to cloud for storage and recovery. Cloud cannot get any information about either the original data or watermark in the CS recovery process. Finally, users can extract the watermark and decrypt the data recovered by cloud directly in sparse domain. At the same time, after extracting the watermark, the image data of user will be closer to the original data compared with the data without extraction. Besides, the counter (CTR) mode is introduced to generate the measurement matrix of CS, which can improve security while avoiding the storage of measurement matrixes. The experimental results demonstrate that the scheme can provide both privacy protection and copyright protection with high efficiency.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"111 1","pages":"1-19"},"PeriodicalIF":0.7,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73953824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks 基于网络参数挖掘的无线传感器网络恶意节点检测
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA8
R. Sunitha, J. Chandrika
The exponential growth of the internet of things and united applications have renewed the scholarly world to grow progressively proficient routing strategies. Quality of service (QoS) and reduced power consumption are the major requirements for effective data transmission. The larger part of the applications nowadays including internet of things (IoT) communication request power effective and QoS-driven WSN configuration. In this paper, an exceptionally strong and effective evolutionary computing allied WSN routing convention is designed for QoS and power effectiveness. The proposed routing convention includes proficient capacity called network condition-based malicious node detection. It adventures or mines the dynamic node/network parameters to recognize malignant nodes. Experimentation is done using network simulator tool NS2. Results ensure that the proposed routing model accomplishes higher throughput, low energy utilization, and low delay that sustains its suitability for real-time WSN.
物联网和联合应用的指数级增长已经更新了学术界对日益精通的路由策略的需求。服务质量(QoS)和降低功耗是有效传输数据的主要要求。目前包括物联网(IoT)通信在内的大部分应用都要求功率有效和qos驱动的WSN配置。本文针对无线传感器网络的QoS和功率效率,设计了一种非常强大和有效的进化计算联合路由协议。所提出的路由约定包括称为基于网络状态的恶意节点检测的熟练能力。它冒险或挖掘动态节点/网络参数来识别恶性节点。实验使用网络模拟器工具NS2完成。结果表明,所提出的路由模型具有较高的吞吐量、较低的能量利用率和较低的延迟,保持了其对实时WSN的适用性。
{"title":"Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks","authors":"R. Sunitha, J. Chandrika","doi":"10.4018/IJDCF.20210901.OA8","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA8","url":null,"abstract":"The exponential growth of the internet of things and united applications have renewed the scholarly world to grow progressively proficient routing strategies. Quality of service (QoS) and reduced power consumption are the major requirements for effective data transmission. The larger part of the applications nowadays including internet of things (IoT) communication request power effective and QoS-driven WSN configuration. In this paper, an exceptionally strong and effective evolutionary computing allied WSN routing convention is designed for QoS and power effectiveness. The proposed routing convention includes proficient capacity called network condition-based malicious node detection. It adventures or mines the dynamic node/network parameters to recognize malignant nodes. Experimentation is done using network simulator tool NS2. Results ensure that the proposed routing model accomplishes higher throughput, low energy utilization, and low delay that sustains its suitability for real-time WSN.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"15 1","pages":"130-144"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82496891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model of Cloud Forensic Application With Assurance of Cloud Log 具有云日志保障的云取证应用模型
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA7
M. S. Das, A. Govardhan, D. Vijayalakshmi
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex process, where a set of activities are involved. The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. The proposed model used for forensic application with the assurance of cloud log that helps the digital and cloud forensic investigators for collecting forensic scientific evidences. The cloud preservation and cloud log data encryption method is implemented in java. The real-time dataset, network dataset results tell that attacks with the highest attack type are generic type, and a case conducted chat log will predict the attacks in advance by keywork antology learning process, NLP, and AI techniques.
云计算环境下数字取证的关键概念是检验和侦查。由于存在漏洞,网络罪犯瞄准了基于云的web应用程序。司法调查是一个复杂的过程,涉及一系列活动。云日志历史在调查取证中发挥着重要作用。现有的云日志信息模型对安全性要求更高。所提出的模型用于具有云日志保证的法医应用,帮助数字和云法医调查员收集法医科学证据。在java中实现了云保存和云日志数据加密方法。实时数据集、网络数据集的结果表明,攻击类型最高的攻击类型是泛型攻击,案例进行的聊天日志将通过keywork本体学习过程、NLP和AI技术提前预测攻击。
{"title":"A Model of Cloud Forensic Application With Assurance of Cloud Log","authors":"M. S. Das, A. Govardhan, D. Vijayalakshmi","doi":"10.4018/IJDCF.20210901.OA7","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA7","url":null,"abstract":"The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex process, where a set of activities are involved. The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. The proposed model used for forensic application with the assurance of cloud log that helps the digital and cloud forensic investigators for collecting forensic scientific evidences. The cloud preservation and cloud log data encryption method is implemented in java. The real-time dataset, network dataset results tell that attacks with the highest attack type are generic type, and a case conducted chat log will predict the attacks in advance by keywork antology learning process, NLP, and AI techniques.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"114-129"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89529590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics 行为证据分析:数字取证的范式转变
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA2
Barkha Shree, Parneeta Dhaliwal
Recent developments in digital forensics (DF) have emphasized that along with inspection of digital evidence, the study of behavioural clues based on behavioural evidence analysis (BEA) is vital for accurate and complete criminal investigation. This paper reviews the existing BEA approaches and process models and concludes the lack of standardisation in the BEA process. The research comprehends that existing BEA methodologies are restricted to specific characteristics of the forensic domain in question. To address these limitations, the paper proposes a standardised approach detailing the step-by-step implementation of BEA in the DF process. The proposed model presents a homogenous technique that can be practically applied to real-life cases. This standard BEA framework classifies digital evidence into categories to decipher associated offender characteristics. Unlike existing models, this new approach collects evidence from diverse sources and leaves no aspect unattended while probing criminal behavioural cues, thus facilitating its applicability across varied forensic domains.
数字取证(DF)的最新发展强调,随着对数字证据的检查,基于行为证据分析(BEA)的行为线索研究对于准确和完整的刑事调查至关重要。本文回顾了现有的BEA方法和过程模型,总结了BEA过程缺乏标准化的问题。该研究了解到,现有的BEA方法仅限于所讨论的法医领域的特定特征。为了解决这些限制,本文提出了一种标准化的方法,详细介绍了在DF过程中逐步实现BEA。所提出的模型提出了一种可以实际应用于实际案例的同质技术。该标准BEA框架将数字证据分类,以破译相关的罪犯特征。与现有的模型不同,这种新方法从不同的来源收集证据,在探索犯罪行为线索时不留痕迹,从而促进了其在不同法医领域的适用性。
{"title":"Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics","authors":"Barkha Shree, Parneeta Dhaliwal","doi":"10.4018/IJDCF.20210901.OA2","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA2","url":null,"abstract":"Recent developments in digital forensics (DF) have emphasized that along with inspection of digital evidence, the study of behavioural clues based on behavioural evidence analysis (BEA) is vital for accurate and complete criminal investigation. This paper reviews the existing BEA approaches and process models and concludes the lack of standardisation in the BEA process. The research comprehends that existing BEA methodologies are restricted to specific characteristics of the forensic domain in question. To address these limitations, the paper proposes a standardised approach detailing the step-by-step implementation of BEA in the DF process. The proposed model presents a homogenous technique that can be practically applied to real-life cases. This standard BEA framework classifies digital evidence into categories to decipher associated offender characteristics. Unlike existing models, this new approach collects evidence from diverse sources and leaves no aspect unattended while probing criminal behavioural cues, thus facilitating its applicability across varied forensic domains.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"64 1","pages":"20-42"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78183032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud 公共云智能入口生成访客图像的安全存储与共享
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA4
Rajashree Soman, R. Sukumar
Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive adversaries from performing cryptographic attacks on these data. The image data also needs to be authenticated before giving it for future use. Focusing on reliable and secure image sharing, the proposed method involves building a novel cloud platform, which aims to provide a secure storage in the public cloud. The main objective of this paper is to provide a new way of secure image data storage and transmission on cloud using cryptographic algorithms. To overcome the flaws in current system, a novel method using BigchainDB, which has advantages of blockchain technology and traditional database, is proposed for storing attributes of image.
入口的访客验证会生成大量的图像文件,这些文件需要传输到云端以供将来参考。图像数据需要受到主动和被动攻击者的保护,以防止对这些数据进行加密攻击。在提供图像数据供将来使用之前,还需要对其进行身份验证。该方法以可靠、安全的图像共享为重点,构建了一种新型的云平台,旨在提供安全的公有云存储。本文的主要目标是提供一种使用加密算法在云上安全存储和传输图像数据的新方法。为了克服现有系统的缺陷,提出了一种利用BigchainDB存储图像属性的新方法,该方法具有区块链技术和传统数据库的优点。
{"title":"Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud","authors":"Rajashree Soman, R. Sukumar","doi":"10.4018/IJDCF.20210901.OA4","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA4","url":null,"abstract":"Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive adversaries from performing cryptographic attacks on these data. The image data also needs to be authenticated before giving it for future use. Focusing on reliable and secure image sharing, the proposed method involves building a novel cloud platform, which aims to provide a secure storage in the public cloud. The main objective of this paper is to provide a new way of secure image data storage and transmission on cloud using cryptographic algorithms. To overcome the flaws in current system, a novel method using BigchainDB, which has advantages of blockchain technology and traditional database, is proposed for storing attributes of image.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"32 1","pages":"65-77"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79253264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Holistic Analytics of Digital Artifacts: Unique Metadata Association Model 数字文物的整体分析:独特的元数据关联模型
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA5
A. K. Mohan, Sethumadhavan Madathil, K. V. Lakshmy
Investigation of every crime scene with digital evidence is predominantly required in identifying almost all atomic files behind the scenes that have been intentionally scrubbed out. Apart from the data generated across digital devices and the use of diverse technology that slows down the traditional digital forensic investigation strategies. Dynamically scrutinizing the concealed or sparse metadata matches from the less frequent archives of evidence spread across heterogeneous sources and finding their association with other artifacts across the collection is still a horrendous task for the investigators. The effort of this article via unique pockets (UP), unique groups (UG), and unique association (UA) model is to address the exclusive challenges mixed up in identifying incoherent associations that are buried well within the meager metadata field-value pairs. Both the existing similarity models and proposed unique mapping models are verified by the unique metadata association model.
对每个有数字证据的犯罪现场进行调查,主要是为了识别几乎所有被故意清除的幕后原子文件。除了跨数字设备生成的数据和各种技术的使用,这些都减慢了传统的数字取证调查策略。动态地仔细检查隐藏的或稀疏的元数据匹配,这些匹配来自分布在异质来源的不太频繁的证据档案,并发现它们与整个集合中的其他工件的关联,对于调查人员来说仍然是一项可怕的任务。本文通过独特的口袋(UP)、独特的组(UG)和独特的关联(UA)模型来解决在识别隐藏在微薄的元数据字段值对中的不一致关联时所遇到的排他挑战。通过唯一元数据关联模型对已有的相似性模型和提出的唯一映射模型进行验证。
{"title":"Holistic Analytics of Digital Artifacts: Unique Metadata Association Model","authors":"A. K. Mohan, Sethumadhavan Madathil, K. V. Lakshmy","doi":"10.4018/IJDCF.20210901.OA5","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA5","url":null,"abstract":"Investigation of every crime scene with digital evidence is predominantly required in identifying almost all atomic files behind the scenes that have been intentionally scrubbed out. Apart from the data generated across digital devices and the use of diverse technology that slows down the traditional digital forensic investigation strategies. Dynamically scrutinizing the concealed or sparse metadata matches from the less frequent archives of evidence spread across heterogeneous sources and finding their association with other artifacts across the collection is still a horrendous task for the investigators. The effort of this article via unique pockets (UP), unique groups (UG), and unique association (UA) model is to address the exclusive challenges mixed up in identifying incoherent associations that are buried well within the meager metadata field-value pairs. Both the existing similarity models and proposed unique mapping models are verified by the unique metadata association model.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"4 1","pages":"78-100"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88748605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Framework for Matching Forensic Composite Sketches With Digital Images 一种新的法医合成草图与数字图像匹配框架
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA1
T. ChethanaH., Trisiladevi C. Nagavi
Face sketch recognition is considered as a sub-problem of face recognition. Matching composite sketches with its corresponding digital image is one of the challenging tasks. A new convolution neural network (CNN) framework for matching composite sketches with digital images is proposed in this work. The framework consists of a base CNN model that uses swish activation function in the hidden layers. Both composite sketches and digital images are trained separately in the network by providing matching pairs and mismatching pairs. The final output resulted from the network’s final layer is compared with the threshold value, and then the pair is assigned to the same or different class. The proposed framework is evaluated on two datasets, and it exhibits an accuracy of 78.26% with extended-PRIP (E-PRIP) and 69.57% with composite sketches with age variations (CSA) respectively. Experimental analysis shows the improved results compared to state-of-the-art composite sketch matching systems.
人脸素描识别是人脸识别的一个子问题。将合成草图与其对应的数字图像进行匹配是具有挑战性的任务之一。本文提出了一种新的卷积神经网络框架,用于合成草图与数字图像的匹配。该框架由一个基本的CNN模型组成,该模型在隐藏层中使用swish激活函数。通过提供匹配对和不匹配对,在网络中分别训练合成草图和数字图像。将网络最后一层的最终输出与阈值进行比较,然后将对分配到相同或不同的类中。在两个数据集上对所提出的框架进行了评估,扩展prip (E-PRIP)和年龄变化复合草图(CSA)的准确率分别为78.26%和69.57%。实验分析表明,与目前最先进的复合草图匹配系统相比,改进的结果更好。
{"title":"A New Framework for Matching Forensic Composite Sketches With Digital Images","authors":"T. ChethanaH., Trisiladevi C. Nagavi","doi":"10.4018/IJDCF.20210901.OA1","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA1","url":null,"abstract":"Face sketch recognition is considered as a sub-problem of face recognition. Matching composite sketches with its corresponding digital image is one of the challenging tasks. A new convolution neural network (CNN) framework for matching composite sketches with digital images is proposed in this work. The framework consists of a base CNN model that uses swish activation function in the hidden layers. Both composite sketches and digital images are trained separately in the network by providing matching pairs and mismatching pairs. The final output resulted from the network’s final layer is compared with the threshold value, and then the pair is assigned to the same or different class. The proposed framework is evaluated on two datasets, and it exhibits an accuracy of 78.26% with extended-PRIP (E-PRIP) and 69.57% with composite sketches with age variations (CSA) respectively. Experimental analysis shows the improved results compared to state-of-the-art composite sketch matching systems.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"43 1","pages":"1-19"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74929855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1