首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Multimedia Concealed Data Detection Using Quantitative Steganalysis 使用定量隐写分析的多媒体隐藏数据检测
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA6
Rupa Ch., S. Shaikh, Mukesh Chinta
In current days, there is a constant evolution in modern technology. The most predominant usage of technology by society is the internet. There are many ways and means on the internet through which data is transmitted. Having such rapid and fast growth of communicating media also increases the exposure to security threats, causing unintellectual information ingress. Steganography is the main aspect of communicating in an aspect that hides the extent of communication. Steganalysis is another essential concern in data concealing, which is the art of identifying the existence of steganography. A framework has been designed to identify the concealed data in the multimedia file in the proposed system. This work’s main strength is analyzing concealed data images without embedding and extracting the image’s payloads. A quantitative steganalysis approach was considered to accomplish the proposed objective. By using this approach, the results were achieved with 98% accuracy.
如今,现代技术在不断发展。社会对技术最主要的使用是互联网。在互联网上有许多传输数据的方式和手段。通信媒体的快速增长也增加了安全威胁的暴露,造成了不理智的信息入侵。隐写术是通信的主要方面,它隐藏了通信的程度。隐写分析是数据隐藏的另一个重要问题,它是识别隐写术存在的艺术。在该系统中,设计了一个识别多媒体文件中隐藏数据的框架。这项工作的主要优势是分析隐藏的数据图像,而不嵌入和提取图像的有效载荷。一种定量隐写分析方法被认为可以实现所提出的目标。通过使用该方法,结果达到98%的准确率。
{"title":"Multimedia Concealed Data Detection Using Quantitative Steganalysis","authors":"Rupa Ch., S. Shaikh, Mukesh Chinta","doi":"10.4018/IJDCF.20210901.OA6","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA6","url":null,"abstract":"In current days, there is a constant evolution in modern technology. The most predominant usage of technology by society is the internet. There are many ways and means on the internet through which data is transmitted. Having such rapid and fast growth of communicating media also increases the exposure to security threats, causing unintellectual information ingress. Steganography is the main aspect of communicating in an aspect that hides the extent of communication. Steganalysis is another essential concern in data concealing, which is the art of identifying the existence of steganography. A framework has been designed to identify the concealed data in the multimedia file in the proposed system. This work’s main strength is analyzing concealed data images without embedding and extracting the image’s payloads. A quantitative steganalysis approach was considered to accomplish the proposed objective. By using this approach, the results were achieved with 98% accuracy.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"29 1","pages":"101-113"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81152859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm 基于元启发式算法的语义图三元异常检测的设计与开发
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-09-01 DOI: 10.4018/IJDCF.20210901.OA3
M. S. K. Reddy, D. Rajput
At present, the field of homeland security faces many obstacles while determining abnormal or suspicious entities within the huge set of data. Several approaches have been adopted from social network analysis and data mining; however, it is challenging to identify the objective of abnormal instances within the huge complicated semantic graphs. The abnormal node is the one that takes an individual or abnormal semantic in the network. Hence, for defining this notion, a graph structure is implemented for generating the semantic profile of each node by numerous kinds of nodes and links that are associated to the node in a specific distance via edges. Once the graph structure is framed, the ternary list is formed on the basis of its adjacent nodes. The abnormalities in the nodes are detected by introducing a new optimization concept referred to as biogeography optimization with fitness sorted update (BO-FBU), which is the extended version of the standard biogeography optimization algorithm (BBO). The abnormal behavior in the network is identified by the similarities among the derived rule features. Further, the performance of the proposed model is compared to the other classical models in terms of certain performance measures. These techniques will be useful to detect digital crime and forensics.
目前,国土安全领域在海量数据中确定异常或可疑实体时面临诸多障碍。从社会网络分析和数据挖掘中采用了几种方法;然而,在庞大复杂的语义图中识别异常实例的目标是一项挑战。异常节点是指网络中单个或异常语义的节点。因此,为了定义这一概念,实现了一个图结构,通过在特定距离上通过边缘与节点相关联的多种节点和链接来生成每个节点的语义轮廓。一旦构建了图结构,就会在相邻节点的基础上形成三元表。通过引入一种新的优化概念——适应度排序更新生物地理优化(BO-FBU)来检测节点的异常,这是标准生物地理优化算法(BBO)的扩展版本。该方法利用衍生规则特征之间的相似性来识别网络中的异常行为。此外,根据某些性能度量,将所提出模型的性能与其他经典模型进行比较。这些技术将有助于检测数字犯罪和取证。
{"title":"Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm","authors":"M. S. K. Reddy, D. Rajput","doi":"10.4018/IJDCF.20210901.OA3","DOIUrl":"https://doi.org/10.4018/IJDCF.20210901.OA3","url":null,"abstract":"At present, the field of homeland security faces many obstacles while determining abnormal or suspicious entities within the huge set of data. Several approaches have been adopted from social network analysis and data mining; however, it is challenging to identify the objective of abnormal instances within the huge complicated semantic graphs. The abnormal node is the one that takes an individual or abnormal semantic in the network. Hence, for defining this notion, a graph structure is implemented for generating the semantic profile of each node by numerous kinds of nodes and links that are associated to the node in a specific distance via edges. Once the graph structure is framed, the ternary list is formed on the basis of its adjacent nodes. The abnormalities in the nodes are detected by introducing a new optimization concept referred to as biogeography optimization with fitness sorted update (BO-FBU), which is the extended version of the standard biogeography optimization algorithm (BBO). The abnormal behavior in the network is identified by the similarities among the derived rule features. Further, the performance of the proposed model is compared to the other classical models in terms of certain performance measures. These techniques will be useful to detect digital crime and forensics.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"10 1","pages":"43-64"},"PeriodicalIF":0.7,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82174124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intra-Prediction Mode-Based Video Steganography With Secure Strategy 基于内预测模型的视频隐写安全策略
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-07-01 DOI: 10.4018/IJDCF.20210701.OA1
Xiushi Cao, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive selection strategy was adopted to measure candidate carrier macroblock. Then, a more efficient encoding strategy based on grouped IPM was applied to encode secret message. This encoding strategy aimed to further enhance the security performance by exploiting the deviation feature of calibrated IPM. Finally, syndrome-trellis code was used as the embedding implementation to minimize distortion. Experimental results demonstrate that this article proposed algorithm presents a novel security performance with any existing IPM-based video steganography.
针对H.264视频流,提出了一种基于内预测模式(IPM)的视频隐写安全策略。首先,根据校正后IPM转换的特性,采用内容自适应选择策略对候选载波宏块进行测量;然后,采用一种基于分组IPM的高效编码策略对秘密消息进行编码。该编码策略旨在利用校正后的IPM的偏差特性进一步提高安全性能。最后,采用证格编码作为嵌入实现,以减小失真。实验结果表明,本文提出的算法与现有的基于ip的视频隐写相比具有新的安全性能。
{"title":"An Intra-Prediction Mode-Based Video Steganography With Secure Strategy","authors":"Xiushi Cao, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu","doi":"10.4018/IJDCF.20210701.OA1","DOIUrl":"https://doi.org/10.4018/IJDCF.20210701.OA1","url":null,"abstract":"In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive selection strategy was adopted to measure candidate carrier macroblock. Then, a more efficient encoding strategy based on grouped IPM was applied to encode secret message. This encoding strategy aimed to further enhance the security performance by exploiting the deviation feature of calibrated IPM. Finally, syndrome-trellis code was used as the embedding implementation to minimize distortion. Experimental results demonstrate that this article proposed algorithm presents a novel security performance with any existing IPM-based video steganography.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"15 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79267509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF 基于主题分布和TF-IDF的大数据文本无覆盖信息隐藏
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-07-01 DOI: 10.4018/IJDCF.20210701.OA4
Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang, Zhibin He
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent Dirichlet allocation) topic distribution and keyword TF-IDF (term frequency-inverse document frequency). Firstly, the sender and receiver build codebook, including word segmentation, word frequency and TF-IDF features, LDA topic model clustering. The sender then shreds the secret information, converts it into keyword ID through the keywords-index table, and searches the text containing the secret information keywords. Secondly, the searched text is taken as the index tag according to the topic distribution and TF-IDF features. At the same time, random numbers are introduced to control the keyword order of secret information.
无盖信息隐藏是近年来研究的热点问题。现有的隐写分析工具由于没有对载体进行任何修改而采用无覆盖隐写而失效。然而,针对文本无覆盖隐藏能力较低的问题,本文提出了一种基于LDA (latent Dirichlet allocation)主题分布和关键词TF-IDF (term frequency-inverse document frequency)的大数据文本无覆盖信息隐藏方法。首先,发送方和接收方构建码本,包括分词、词频和TF-IDF特征、LDA主题模型聚类。发送方然后分解秘密信息,通过关键字索引表将其转换为关键字ID,并搜索包含秘密信息关键字的文本。其次,根据主题分布和TF-IDF特征,将检索到的文本作为索引标签。同时,引入随机数来控制保密信息的关键字顺序。
{"title":"A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF","authors":"Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang, Zhibin He","doi":"10.4018/IJDCF.20210701.OA4","DOIUrl":"https://doi.org/10.4018/IJDCF.20210701.OA4","url":null,"abstract":"Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent Dirichlet allocation) topic distribution and keyword TF-IDF (term frequency-inverse document frequency). Firstly, the sender and receiver build codebook, including word segmentation, word frequency and TF-IDF features, LDA topic model clustering. The sender then shreds the secret information, converts it into keyword ID through the keywords-index table, and searches the text containing the secret information keywords. Secondly, the searched text is taken as the index tag according to the topic distribution and TF-IDF features. At the same time, random numbers are introduced to control the keyword order of secret information.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"17 1","pages":"40-56"},"PeriodicalIF":0.7,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81456646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-Layer Fusion Neural Network for Deepfake Detection 深度伪造检测的多层融合神经网络
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-07-01 DOI: 10.4018/IJDCF.20210701.OA3
Zheng Zhao, Penghui Wang, Wei Lu
Recently, the spread of videos forged by deepfake tools has been widely concerning, and effective ways for detecting them are urgently needed. It is known that such artificial intelligence-aided forgery makes at least three levels of artifacts, which can be named as microcosmic or statistical features, mesoscopic features, and macroscopic or semantic features. However, existing detection methods have not been designed to exploited them all. This work proposes a new approach to more effective detection of deepfake videos. A multi-layer fusion neural network (MFNN) has been designed to capture the artifacts in different levels. Features maps output from specially designed shallow, middle, and deep layers, which are used as statistical, mesoscopic, and semantic features, respectively, are fused together before classification. FaceForensic++ dataset was used to train and test the method. The experimental results show that MFNN outperforms other relevant methods. Particularly, it demonstrates more advantage in detecting low-quality deepfake videos.
近年来,深度伪造工具伪造的视频传播受到广泛关注,迫切需要有效的检测方法。众所周知,这种人工智能辅助伪造至少制造了三个层次的工件,可以命名为微观或统计特征,介观特征和宏观或语义特征。然而,现有的检测方法的设计并没有充分利用它们。这项工作提出了一种更有效地检测深度假视频的新方法。设计了多层融合神经网络(MFNN)来捕获不同层次的伪影。从专门设计的浅层、中层和深层输出的特征图,分别用作统计特征、介观特征和语义特征,在分类之前融合在一起。使用face取证++数据集对该方法进行训练和测试。实验结果表明,MFNN优于其他相关方法。特别是在检测低质量深度假视频方面表现出了更大的优势。
{"title":"Multi-Layer Fusion Neural Network for Deepfake Detection","authors":"Zheng Zhao, Penghui Wang, Wei Lu","doi":"10.4018/IJDCF.20210701.OA3","DOIUrl":"https://doi.org/10.4018/IJDCF.20210701.OA3","url":null,"abstract":"Recently, the spread of videos forged by deepfake tools has been widely concerning, and effective ways for detecting them are urgently needed. It is known that such artificial intelligence-aided forgery makes at least three levels of artifacts, which can be named as microcosmic or statistical features, mesoscopic features, and macroscopic or semantic features. However, existing detection methods have not been designed to exploited them all. This work proposes a new approach to more effective detection of deepfake videos. A multi-layer fusion neural network (MFNN) has been designed to capture the artifacts in different levels. Features maps output from specially designed shallow, middle, and deep layers, which are used as statistical, mesoscopic, and semantic features, respectively, are fused together before classification. FaceForensic++ dataset was used to train and test the method. The experimental results show that MFNN outperforms other relevant methods. Particularly, it demonstrates more advantage in detecting low-quality deepfake videos.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"9 1","pages":"26-39"},"PeriodicalIF":0.7,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81571140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coverless Information Hiding Based on WGAN-GP Model 基于WGAN-GP模型的无覆盖信息隐藏
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-07-01 DOI: 10.4018/IJDCF.20210701.OA5
X. Duan, Baoxia Li, Daidou Guo, Kai Jia, E. Zhang, Chuan Qin
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model. The sender trains the WGAN-GP with a natural image and a secret image. The generated image and secret image are visually identical, and the parameters of generator are saved to form the codebook. The sender uploads the natural image (disguise image) to the cloud disk. The receiver downloads the camouflage image from the cloud disk and obtains the corresponding generator parameter in the codebook and inputs it to the generator. The generator outputs the same image for the secret image, which realized the same results as sending the secret image. The experimental results indicate that the scheme produces high image quality and good security.
隐写分析技术通过监测载体数据的异常情况来判断载体中是否存在秘密信息,使得传统的信息隐藏技术达到了瓶颈。为此,本文提出了基于改进训练的Wasserstein gan (WGAN-GP)模型的无覆盖信息隐藏方法。发送方用自然图像和秘密图像训练WGAN-GP。生成的图像与保密图像在视觉上完全相同,并将生成器的参数保存成码本。发送者将自然图像(伪装图像)上传到云盘。接收机从云盘中下载伪装图像,从码本中获取相应的发生器参数,输入到发生器中。生成器为秘密图像输出相同的图像,实现了与发送秘密图像相同的结果。实验结果表明,该方案具有较高的图像质量和较好的安全性。
{"title":"Coverless Information Hiding Based on WGAN-GP Model","authors":"X. Duan, Baoxia Li, Daidou Guo, Kai Jia, E. Zhang, Chuan Qin","doi":"10.4018/IJDCF.20210701.OA5","DOIUrl":"https://doi.org/10.4018/IJDCF.20210701.OA5","url":null,"abstract":"Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model. The sender trains the WGAN-GP with a natural image and a secret image. The generated image and secret image are visually identical, and the parameters of generator are saved to form the codebook. The sender uploads the natural image (disguise image) to the cloud disk. The receiver downloads the camouflage image from the cloud disk and obtains the corresponding generator parameter in the codebook and inputs it to the generator. The generator outputs the same image for the secret image, which realized the same results as sending the secret image. The experimental results indicate that the scheme produces high image quality and good security.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"35 1","pages":"57-70"},"PeriodicalIF":0.7,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77309513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying Secret Image Sharing to Economics 将秘密图像共享应用于经济学
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-07-01 DOI: 10.4018/IJDCF.20210701.OA2
Xuemei Zhao, Tongtong Zhang, Jun Liu, Canju Lu, Huang Lu, Xuehu Yan
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image through splitting it into n shadows, a.k.a. shadow images or shares, assigned to n corresponding participants. The secret image can be disclosed by obtaining k or more shadows. Polynomial-based SIS and visual secret sharing (VSS) are the chief research branches. This paper first analyzes the insecure issues in economics and then introduces two methods to apply typical SIS schemes to improve economical security. Finally, experiments are realized to illustrate the efficiency of the methods.
经济学也存在一定的局限性,如多方经济投资决策不安全、企业报价泄漏等。(k, n)阈值的秘密图像共享(SIS)是一种通过将图像分割成n个阴影来保护图像的技术,又称阴影图像或共享,分配给n个相应的参与者。秘密图像可以通过获得k个或更多的阴影来披露。基于多项式的SIS和可视化秘密共享(VSS)是主要的研究方向。本文首先分析了经济学中的不安全问题,然后介绍了两种应用典型SIS方案提高经济安全性的方法。最后通过实验验证了该方法的有效性。
{"title":"Applying Secret Image Sharing to Economics","authors":"Xuemei Zhao, Tongtong Zhang, Jun Liu, Canju Lu, Huang Lu, Xuehu Yan","doi":"10.4018/IJDCF.20210701.OA2","DOIUrl":"https://doi.org/10.4018/IJDCF.20210701.OA2","url":null,"abstract":"Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image through splitting it into n shadows, a.k.a. shadow images or shares, assigned to n corresponding participants. The secret image can be disclosed by obtaining k or more shadows. Polynomial-based SIS and visual secret sharing (VSS) are the chief research branches. This paper first analyzes the insecure issues in economics and then introduces two methods to apply typical SIS schemes to improve economical security. Finally, experiments are realized to illustrate the efficiency of the methods.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"39 1","pages":"16-25"},"PeriodicalIF":0.7,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75411297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching 基于密钥交换的lwe加密域无损数据隐藏
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-07-01 DOI: 10.4018/IJDCF.20210701.OA6
Tingting Su, Yan Ke, Yi Ding, Jia Liu
This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the private key for decryption. Key-switching-based least-significant-bit (KSLSB) data hiding method has been designed during the lossless data hiding process. The owner of the plaintext first encrypts the plaintext by using LWE encryption and uploads ciphertext to a (trusted or untrusted) third server. Then the server performs KSLSB to obtain a marked ciphertext. To enable the third party to manage ciphertext flexibly and keep the plaintext secret, the embedded data can be extracted from the marked ciphertext without using the private key of LWE encryption in the proposed scheme. Experimental results demonstrate that data hiding would not compromise the security of LWE encryption, and the embedding rate is 1 bit per bit of plaintext without introducing any loss into the directly decrypted result.
提出了一种基于密钥交换技术的带错误学习(LWE)加密域无损数据隐藏方案。第三方可以在不知道解密私钥的情况下实现无损的数据隐藏和提取。在无损数据隐藏过程中,设计了基于密钥交换的最小有效位(KSLSB)数据隐藏方法。明文的所有者首先使用LWE加密对明文进行加密,然后将密文上传到(受信任或不受信任的)第三方服务器。然后,服务器执行KSLSB以获得标记的密文。为了使第三方能够灵活地管理密文并保证明文的机密性,该方案可以在不使用LWE加密私钥的情况下从标记的密文中提取嵌入数据。实验结果表明,数据隐藏不会影响LWE加密的安全性,并且嵌入率为每比特明文1比特,不会给直接解密的结果带来任何损失。
{"title":"Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching","authors":"Tingting Su, Yan Ke, Yi Ding, Jia Liu","doi":"10.4018/IJDCF.20210701.OA6","DOIUrl":"https://doi.org/10.4018/IJDCF.20210701.OA6","url":null,"abstract":"This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the private key for decryption. Key-switching-based least-significant-bit (KSLSB) data hiding method has been designed during the lossless data hiding process. The owner of the plaintext first encrypts the plaintext by using LWE encryption and uploads ciphertext to a (trusted or untrusted) third server. Then the server performs KSLSB to obtain a marked ciphertext. To enable the third party to manage ciphertext flexibly and keep the plaintext secret, the embedded data can be extracted from the marked ciphertext without using the private key of LWE encryption in the proposed scheme. Experimental results demonstrate that data hiding would not compromise the security of LWE encryption, and the embedding rate is 1 bit per bit of plaintext without introducing any loss into the directly decrypted result.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"140 1","pages":"71-89"},"PeriodicalIF":0.7,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76392022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Hiding Model Based on Channel Construction of Orthogonal Basis 基于正交基信道构造的信息隐藏模型
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-05-01 DOI: 10.4018/IJDCF.20210501.OA1
Bao Kangsheng
Secret information communication model based on channel construction of orthogonal basis can implement secret information hiding and recovery without a key. The orthogonal basis is constructed by the media carrier's self-correlation. Carrier and secret information channels are constructed independently. And it has good properties of avoiding detection. The experiments show that the model with proper carrier components and threshold of secret information coding has the capacity of secret information and robustness. And the secret information capacity and anti-noise capability can be improved by compressed and error correcting or checking codes.
基于正交基信道构造的秘密信息通信模型可以实现秘密信息的隐藏和恢复,无需密钥。正交基是利用载体的自相关构造的。载波信道和秘密信道是独立构建的。并且具有良好的避检性能。实验表明,采用合适的载体分量和秘密信息编码阈值的模型具有良好的秘密信息处理能力和鲁棒性。通过码的压缩和纠错或校验,可以提高密码的保密容量和抗噪声能力。
{"title":"Information Hiding Model Based on Channel Construction of Orthogonal Basis","authors":"Bao Kangsheng","doi":"10.4018/IJDCF.20210501.OA1","DOIUrl":"https://doi.org/10.4018/IJDCF.20210501.OA1","url":null,"abstract":"Secret information communication model based on channel construction of orthogonal basis can implement secret information hiding and recovery without a key. The orthogonal basis is constructed by the media carrier's self-correlation. Carrier and secret information channels are constructed independently. And it has good properties of avoiding detection. The experiments show that the model with proper carrier components and threshold of secret information coding has the capacity of secret information and robustness. And the secret information capacity and anti-noise capability can be improved by compressed and error correcting or checking codes.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"64 1","pages":"1-18"},"PeriodicalIF":0.7,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85664075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Color Image Encryption Using Angular Graph Fourier Transform 利用角图傅里叶变换进行彩色图像加密
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-05-01 DOI: 10.4018/IJDCF.20210501.OA5
Liu Yang, W. Meng, Xudong Zhao
In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties of angular transform and graph transform. In the proposed encryption method, color images are encoded by DNA sequences and confused under the control of chaotic key streams firstly. Secondly, sparse decomposition based on the random walk is applied to scramble pixels spatially, and a series of sub-images are obtained. This step increases encryption efficiency. Finally, the intrinsic sub-image structure is reflected by graphs, and the signals on different subgraphs are transformed into different AGFT domains with particular angular parameters, which makes the proposed method relevant to the original image structure and enhances security. The experimental results demonstrate that the proposed algorithm can resist various potential attacks and achieve better performance than the state-of-the-art algorithms.
本文采用角图傅里叶变换(AGFT)对彩色图像的固有结构进行加密。将图傅里叶变换(GFT)推广到AGFT,证明了它具有角变换和图变换的特性。该方法首先对彩色图像进行DNA序列编码,并在混沌密钥流的控制下进行混淆。其次,采用基于随机游走的稀疏分解对像素进行空间置乱,得到一系列子图像;此步骤可提高加密效率。最后,通过图来反映子图像的固有结构,并将不同子图上的信号变换到具有特定角度参数的AGFT域,使所提方法与原始图像结构相关联,增强了安全性。实验结果表明,该算法能够抵抗各种潜在的攻击,并取得了比现有算法更好的性能。
{"title":"Color Image Encryption Using Angular Graph Fourier Transform","authors":"Liu Yang, W. Meng, Xudong Zhao","doi":"10.4018/IJDCF.20210501.OA5","DOIUrl":"https://doi.org/10.4018/IJDCF.20210501.OA5","url":null,"abstract":"In this paper, an angular graph Fourier transform (AGFT) is introduced to encrypt color images with their intrinsic structures. The graph Fourier transform (GFT) is extended to the AGFT and proven to have the desired properties of angular transform and graph transform. In the proposed encryption method, color images are encoded by DNA sequences and confused under the control of chaotic key streams firstly. Secondly, sparse decomposition based on the random walk is applied to scramble pixels spatially, and a series of sub-images are obtained. This step increases encryption efficiency. Finally, the intrinsic sub-image structure is reflected by graphs, and the signals on different subgraphs are transformed into different AGFT domains with particular angular parameters, which makes the proposed method relevant to the original image structure and enhances security. The experimental results demonstrate that the proposed algorithm can resist various potential attacks and achieve better performance than the state-of-the-art algorithms.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"59-82"},"PeriodicalIF":0.7,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84035063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1