首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
A HEVC Video Steganalysis Against DCT/DST-Based Steganography 针对DCT/ dst隐写的HEVC视频隐写分析
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-05-01 DOI: 10.4018/IJDCF.20210501.OA2
Henan Shi, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu
The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency video coding (HEVC) videos. The new steganalysis employs special frames extraction (SFE) and accordion unfolding (AU) transformation to target the latest DCT/DST domain HEVC video steganography algorithms by merging temporal and spatial correlation. In this article, the distortion process of DCT/DST-based HEVC steganography is firstly analyzed. Then, based on the analysis, two kinds of distortion, the intra-frame distortion and the inter-frame distortion, are mainly caused by DCT/DST-based steganography. Finally, to effectively detect these distortions, an innovative method of HEVC steganalysis is proposed, which gives a combination feature of SFE and a temporal to spatial transformation, AU. The experiment results show that the proposed steganalysis performs better than other methods.
视频隐写技术的发展对视频隐写分析提出了更高的要求。提出了一种针对离散余弦/正弦变换(DCT/DST)的隐写分析方法,用于高效视频编码(HEVC)视频。新的隐写算法采用特殊帧提取(SFE)和手风琴展开(AU)变换,结合时空相关性,针对最新的DCT/DST域HEVC视频隐写算法。本文首先分析了基于DCT/ dst的HEVC隐写的失真过程。然后,在分析的基础上,指出基于DCT/ dst的隐写主要造成帧内失真和帧间失真两种失真。最后,为了有效地检测这些失真,提出了一种创新的HEVC隐写分析方法,该方法结合了SFE和时空转换(AU)的特征。实验结果表明,该方法的隐写性能优于其他方法。
{"title":"A HEVC Video Steganalysis Against DCT/DST-Based Steganography","authors":"Henan Shi, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu","doi":"10.4018/IJDCF.20210501.OA2","DOIUrl":"https://doi.org/10.4018/IJDCF.20210501.OA2","url":null,"abstract":"The development of video steganography has put forward a higher demand for video steganalysis. This paper presents a novel steganalysis against discrete cosine/sine transform (DCT/DST)-based steganography for high efficiency video coding (HEVC) videos. The new steganalysis employs special frames extraction (SFE) and accordion unfolding (AU) transformation to target the latest DCT/DST domain HEVC video steganography algorithms by merging temporal and spatial correlation. In this article, the distortion process of DCT/DST-based HEVC steganography is firstly analyzed. Then, based on the analysis, two kinds of distortion, the intra-frame distortion and the inter-frame distortion, are mainly caused by DCT/DST-based steganography. Finally, to effectively detect these distortions, an innovative method of HEVC steganalysis is proposed, which gives a combination feature of SFE and a temporal to spatial transformation, AU. The experiment results show that the proposed steganalysis performs better than other methods.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"26 1","pages":"19-33"},"PeriodicalIF":0.7,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90636688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Sample Generation and Ensemble Learning Based Image Source Identification With Small Training Samples 基于虚拟样本生成和集成学习的小训练样本图像源识别
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-05-01 DOI: 10.4018/IJDCF.20210501.OA3
Shiqi Wu, Bo Wang, Jianxiang Zhao, Mengnan Zhao, Kun Zhong, Yanqing Guo
Nowadays, source camera identification, which aims to identify the source camera of images, is quite important in the field of forensics. There is a problem that cannot be ignored that the existing methods are unreliable and even out of work in the case of the small training sample. To solve this problem, a virtual sample generation-based method is proposed in this paper, combined with the ensemble learning. In this paper, after constructing sub-sets of LBP features, the authors generate a virtual sample-based on the mega-trend-diffusion (MTD) method, which calculates the diffusion range of samples according to the trend diffusion theory, and then randomly generates virtual sample according to uniform distribution within this range. In the aspect of the classifier, an ensemble learning scheme is proposed to train multiple SVM-based classifiers to improve the accuracy of image source identification. The experimental results demonstrate that the proposed method achieves higher average accuracy than the state-of-the-art, which uses a small number of samples as the training sample set.
目前,以识别图像的源摄像机为目的的源摄像机识别在法医学领域占有重要地位。在训练样本较小的情况下,现有的方法不可靠,甚至失效,这是一个不容忽视的问题。为了解决这一问题,本文结合集成学习,提出了一种基于虚拟样本生成的方法。本文在构造LBP特征子集后,基于大趋势扩散(MTD)方法生成虚拟样本,该方法根据趋势扩散理论计算样本的扩散范围,然后在该范围内按均匀分布随机生成虚拟样本。在分类器方面,提出了一种集成学习方案来训练多个基于svm的分类器,以提高图像源识别的准确性。实验结果表明,该方法比目前使用少量样本作为训练样本集的方法具有更高的平均准确率。
{"title":"Virtual Sample Generation and Ensemble Learning Based Image Source Identification With Small Training Samples","authors":"Shiqi Wu, Bo Wang, Jianxiang Zhao, Mengnan Zhao, Kun Zhong, Yanqing Guo","doi":"10.4018/IJDCF.20210501.OA3","DOIUrl":"https://doi.org/10.4018/IJDCF.20210501.OA3","url":null,"abstract":"Nowadays, source camera identification, which aims to identify the source camera of images, is quite important in the field of forensics. There is a problem that cannot be ignored that the existing methods are unreliable and even out of work in the case of the small training sample. To solve this problem, a virtual sample generation-based method is proposed in this paper, combined with the ensemble learning. In this paper, after constructing sub-sets of LBP features, the authors generate a virtual sample-based on the mega-trend-diffusion (MTD) method, which calculates the diffusion range of samples according to the trend diffusion theory, and then randomly generates virtual sample according to uniform distribution within this range. In the aspect of the classifier, an ensemble learning scheme is proposed to train multiple SVM-based classifiers to improve the accuracy of image source identification. The experimental results demonstrate that the proposed method achieves higher average accuracy than the state-of-the-art, which uses a small number of samples as the training sample set.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"83 1","pages":"34-46"},"PeriodicalIF":0.7,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86203893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Modification-Free Steganography Algorithm Based on Image Classification and CNN 基于图像分类和CNN的无修改隐写算法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-05-01 DOI: 10.4018/IJDCF.20210501.OA4
Jianbin Wu, Yang Zhang, Chuwei Luo, L. Yuan, X. Shen
In order to improve the data-embedding capacity of modification-free steganography algorithm, scholars have done a lot of research work to meet practical demands. By researching the user's behavioral habits of several social platforms, a semi-structured modification-free steganography algorithm is introduced in the paper. By constructing the mapping relationship between small icons and binary numbers, the idea of image stitching is utilized, and small icons are stitched together according to the behavioral habits of people's social platforms to implement the graphical representation of secret messages. The convolutional neural network (CNN) has been used to train the small icon recognition and classification data set in the algorithm. In order to improve the robustness of the algorithm, the icons processed by various attack methods are introduced as interference samples in the training set. The experimental results show that the algorithm has good anti-attack ability, and the hiding capacity can be improved, which can be used in the covert communication.
为了提高无修改隐写算法的数据嵌入能力,为了满足实际需求,学者们进行了大量的研究工作。本文通过对多个社交平台用户行为习惯的研究,提出了一种半结构化的无修改隐写算法。通过构建小图标与二进制数之间的映射关系,利用图像拼接的思想,根据人们在社交平台上的行为习惯将小图标拼接在一起,实现秘密信息的图形化表示。该算法采用卷积神经网络(CNN)对小图标识别和分类数据集进行训练。为了提高算法的鲁棒性,在训练集中引入了经过各种攻击方法处理的图标作为干扰样本。实验结果表明,该算法具有良好的抗攻击能力,并能提高隐藏能力,可用于隐蔽通信。
{"title":"A Modification-Free Steganography Algorithm Based on Image Classification and CNN","authors":"Jianbin Wu, Yang Zhang, Chuwei Luo, L. Yuan, X. Shen","doi":"10.4018/IJDCF.20210501.OA4","DOIUrl":"https://doi.org/10.4018/IJDCF.20210501.OA4","url":null,"abstract":"In order to improve the data-embedding capacity of modification-free steganography algorithm, scholars have done a lot of research work to meet practical demands. By researching the user's behavioral habits of several social platforms, a semi-structured modification-free steganography algorithm is introduced in the paper. By constructing the mapping relationship between small icons and binary numbers, the idea of image stitching is utilized, and small icons are stitched together according to the behavioral habits of people's social platforms to implement the graphical representation of secret messages. The convolutional neural network (CNN) has been used to train the small icon recognition and classification data set in the algorithm. In order to improve the robustness of the algorithm, the icons processed by various attack methods are introduced as interference samples in the training set. The experimental results show that the algorithm has good anti-attack ability, and the hiding capacity can be improved, which can be used in the covert communication.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"47-58"},"PeriodicalIF":0.7,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90405480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Phishing in Internet of Things Using Machine Learning Approach 基于机器学习方法的物联网网络钓鱼检测
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030101
Sameena Naaz
Phishing attacks are growing in the similar manner as e-commerce industries are growing. Prediction and prevention of phishing attacks is a very critical step towards safeguarding online transactions. Data mining tools can be applied in this regard as the technique is very easy and can mine millions of information within seconds and deliver accurate results. With the help of machine learning algorithms like random forest, decision tree, neural network, and linear model, we can classify data into phishing, suspicious, and legitimate. The devices that are connected over the internet, known as internet of things (IoT), are also at very high risk of phishing attack. In this work, machine learning algorithms random forest classifier, support vector machine, and logistic regression have been applied on IoT dataset for detection of phishing attacks, and then the results have been compared with previous work carried out on the same dataset as well as on a different dataset. The results of these algorithms have then been compared in terms of accuracy, error rate, precision, and recall.
网络钓鱼攻击的增长方式与电子商务行业的增长方式类似。预测和预防网络钓鱼攻击是保护网上交易的一个非常关键的步骤。数据挖掘工具可以应用于这方面,因为该技术非常简单,可以在几秒钟内挖掘数百万条信息并提供准确的结果。在随机森林、决策树、神经网络和线性模型等机器学习算法的帮助下,我们可以将数据分为钓鱼、可疑和合法。通过互联网连接的设备(称为物联网(IoT))也面临非常高的网络钓鱼攻击风险。在这项工作中,机器学习算法随机森林分类器、支持向量机和逻辑回归应用于物联网数据集来检测网络钓鱼攻击,然后将结果与之前在同一数据集以及不同数据集上进行的工作进行比较。然后将这些算法的结果在准确性、错误率、精度和召回率方面进行比较。
{"title":"Detection of Phishing in Internet of Things Using Machine Learning Approach","authors":"Sameena Naaz","doi":"10.4018/IJDCF.2021030101","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030101","url":null,"abstract":"Phishing attacks are growing in the similar manner as e-commerce industries are growing. Prediction and prevention of phishing attacks is a very critical step towards safeguarding online transactions. Data mining tools can be applied in this regard as the technique is very easy and can mine millions of information within seconds and deliver accurate results. With the help of machine learning algorithms like random forest, decision tree, neural network, and linear model, we can classify data into phishing, suspicious, and legitimate. The devices that are connected over the internet, known as internet of things (IoT), are also at very high risk of phishing attack. In this work, machine learning algorithms random forest classifier, support vector machine, and logistic regression have been applied on IoT dataset for detection of phishing attacks, and then the results have been compared with previous work carried out on the same dataset as well as on a different dataset. The results of these algorithms have then been compared in terms of accuracy, error rate, precision, and recall.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"11 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88824644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on Threat Information Network Based on Link Prediction 基于链路预测的威胁信息网络研究
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030106
Jin Du, Feng Yuan, Liping Ding, Guangxuan Chen, Xuehua Liu
The study of complex networks is to discover the characteristics of these connections and to discover the nature of the system between them. Link prediction method is a classic in the study of complex networks. It ca not only reflect the relationship between the node similarity. More can be estimated through the edge, which reveals the intrinsic factors of network evolution, namely the network evolution mechanism. Threat information network is the evolution and development of the network. The introduction of such a complex network of interdisciplinary approach is an innovative research perspective to observe that the threat intelligence occurs. The characteristics of the network show, at the same time, also can predict what will happen. The evolution of the network for network security situational awareness of the research provides a new approach.
对复杂网络的研究就是要发现这些连接的特征,发现它们之间的系统的本质。链路预测方法是研究复杂网络的经典方法。它不仅可以反映节点之间的相似度关系。通过边缘可以估计出更多的信息,揭示了网络演化的内在因素,即网络演化机制。威胁信息网络是网络的演变和发展。这种复杂网络跨学科方法的引入,是一种观察威胁情报发生的创新研究视角。网络的特点显示,同时,也可以预测将会发生什么。网络的演化为网络安全态势感知的研究提供了一种新的途径。
{"title":"Research on Threat Information Network Based on Link Prediction","authors":"Jin Du, Feng Yuan, Liping Ding, Guangxuan Chen, Xuehua Liu","doi":"10.4018/IJDCF.2021030106","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030106","url":null,"abstract":"The study of complex networks is to discover the characteristics of these connections and to discover the nature of the system between them. Link prediction method is a classic in the study of complex networks. It ca not only reflect the relationship between the node similarity. More can be estimated through the edge, which reveals the intrinsic factors of network evolution, namely the network evolution mechanism. Threat information network is the evolution and development of the network. The introduction of such a complex network of interdisciplinary approach is an innovative research perspective to observe that the threat intelligence occurs. The characteristics of the network show, at the same time, also can predict what will happen. The evolution of the network for network security situational awareness of the research provides a new approach.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"7 1","pages":"94-102"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84650927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment 基于改进萤火虫算法的云环境入侵检测系统
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030105
Partha Ghosh, D. Sarkar, Joy Sharma, S. Phadikar
The present era is being dominated by cloud computing technology which provides services to the users as per demand over the internet. Satisfying the needs of huge people makes the technology prone to activities which come up as a threat. Intrusion detection system (IDS) is an effective method of providing data security to the information stored in the cloud which works by analyzing the network traffic and informs in case of any malicious activities. In order to control high amount of data stored in cloud, data is stored as per relevance leading to distributed computing. To remove redundant data, the authors have implemented data mining process such as feature selection which is used to generate an optimum subset of features from a dataset. In this paper, the proposed IDS provides security working upon the idea of feature selection. The authors have prepared a modified-firefly algorithm which acts as a proficient feature selection method and enables the NSL-KDD dataset to consume less storage space by reducing dimensions as well as less training time with greater classification accuracy.
当今时代是由云计算技术主导的,云计算技术通过互联网为用户提供按需服务。为了满足庞大人群的需求,这项技术很容易出现威胁活动。入侵检测系统(IDS, Intrusion detection system)是一种通过分析网络流量,及时发现恶意活动,为存储在云中的信息提供数据安全保障的有效方法。为了控制存储在云中的大量数据,数据按相关性存储,从而实现分布式计算。为了去除冗余数据,作者实现了数据挖掘过程,如特征选择,用于从数据集中生成最优的特征子集。在本文中,提出的IDS基于特征选择的思想提供安全工作。作者准备了一种改进的萤火虫算法,作为一种熟练的特征选择方法,使NSL-KDD数据集通过降维消耗更少的存储空间和更少的训练时间,具有更高的分类精度。
{"title":"An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment","authors":"Partha Ghosh, D. Sarkar, Joy Sharma, S. Phadikar","doi":"10.4018/IJDCF.2021030105","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030105","url":null,"abstract":"The present era is being dominated by cloud computing technology which provides services to the users as per demand over the internet. Satisfying the needs of huge people makes the technology prone to activities which come up as a threat. Intrusion detection system (IDS) is an effective method of providing data security to the information stored in the cloud which works by analyzing the network traffic and informs in case of any malicious activities. In order to control high amount of data stored in cloud, data is stored as per relevance leading to distributed computing. To remove redundant data, the authors have implemented data mining process such as feature selection which is used to generate an optimum subset of features from a dataset. In this paper, the proposed IDS provides security working upon the idea of feature selection. The authors have prepared a modified-firefly algorithm which acts as a proficient feature selection method and enables the NSL-KDD dataset to consume less storage space by reducing dimensions as well as less training time with greater classification accuracy.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"95 1","pages":"77-93"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78566042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code 基于抖动模拟混沌码的无线隐蔽信道设计
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030108
Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yue-wei Dai, Huiwen Bai
To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on constellation modulation has made the composite and legitimate signal undistinguishable, there exists an imperfection on reliability due to the dense distribution of covert constellation points. In this study, the authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability. The dither analog chaotic code (DACC) plays the role as the error correcting code. In the modulation, the analog variables converted from secret messages are encode into joint codewords by chaotic mapping and dither derivation of DACC. The joint codewords are mapped to artificial noise later. Simulation results show that the proposed scheme can achieve better reliability than the state-of-the-art scheme while maintaining the similar performance on undetectability.
为了隐藏通信的存在,基于噪声的无线隐蔽信道将秘密信息调制成人工噪声,并将其添加到正常的无线信号中。目前基于星座调制的工作虽然使合成信号和合法信号难以区分,但由于隐蔽星座点分布密集,可靠性存在缺陷。在此研究中,作者设计了一种基于抖动模拟混沌码的无线隐蔽信道,在不破坏不可检测性的前提下提高了信道的可靠性。用抖动模拟混沌码(DACC)作为纠错码。在调制中,利用DACC的混沌映射和抖动派生,将秘密信息转换成的模拟变量编码为联合码字。然后将联合码字映射到人工噪声中。仿真结果表明,该方案在保持相似的不可检测性能的同时,具有比现有方案更好的可靠性。
{"title":"Design a Wireless Covert Channel Based on Dither Analog Chaotic Code","authors":"Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yue-wei Dai, Huiwen Bai","doi":"10.4018/IJDCF.2021030108","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030108","url":null,"abstract":"To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on constellation modulation has made the composite and legitimate signal undistinguishable, there exists an imperfection on reliability due to the dense distribution of covert constellation points. In this study, the authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability. The dither analog chaotic code (DACC) plays the role as the error correcting code. In the modulation, the analog variables converted from secret messages are encode into joint codewords by chaotic mapping and dither derivation of DACC. The joint codewords are mapped to artificial noise later. Simulation results show that the proposed scheme can achieve better reliability than the state-of-the-art scheme while maintaining the similar performance on undetectability.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"36 1","pages":"115-133"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86796570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform 基于行程编码和整数小波变换的音频隐写
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030102
Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Dingwei Tan
This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose an audio steganography with high capacity, where the secret information is compressed by run length encoding. In the applicable scenario, the main purpose is to hide as more information as possible in the cover audio files. First, the secret information is chaotic scrambling, then the result of scrambling is run length encoded, and finally, the secret information is embedded into integer wavelet coefficients. The experimental results and comparison with existing technique show that by utilizing the lossless compression of run length encoding and anti-attack of wavelet domain, the proposed method has improved the capacity, good audio quality, and can achieve blind extraction while maintaining imperceptibility and strong robustness.
提出了一种基于行程编码和整数小波变换的音频隐写方法,可用于隐藏数字音频中的秘密信息。该方案的主要贡献是提出了一种高容量的音频隐写技术,其中秘密信息通过运行长度编码进行压缩。在适用的场景中,主要目的是在封面音频文件中隐藏尽可能多的信息。首先对秘密信息进行混沌置乱,然后对置乱后的结果进行码长编码,最后将秘密信息嵌入到整数小波系数中。实验结果和与现有技术的比较表明,该方法利用了游程编码的无损压缩和小波域的抗攻击,提高了容量,音质好,在保持不可感知性和较强鲁棒性的同时实现了盲提取。
{"title":"An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform","authors":"Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Dingwei Tan","doi":"10.4018/IJDCF.2021030102","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030102","url":null,"abstract":"This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose an audio steganography with high capacity, where the secret information is compressed by run length encoding. In the applicable scenario, the main purpose is to hide as more information as possible in the cover audio files. First, the secret information is chaotic scrambling, then the result of scrambling is run length encoded, and finally, the secret information is embedded into integer wavelet coefficients. The experimental results and comparison with existing technique show that by utilizing the lossless compression of run length encoding and anti-attack of wavelet domain, the proposed method has improved the capacity, good audio quality, and can achieve blind extraction while maintaining imperceptibility and strong robustness.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"38 1","pages":"16-34"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74811818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis 基于静态指令赋值和动态内存分析的ROP自动生成
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030104
Ning Huang, Shuguang Huang, Chao Chang
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and bypass the W⊕X. However, manual search for gadgets that match the conditions is inefficient, with high error and missing rates. In order to improve the efficiency of ROP generation, the authors propose an automatic generation method based on a fragmented layout called automatic generation of ROP. This method designs new intermediate instruction construction rules based on an automatic ROP generation framework Q, uses symbolic execution to analyze program memory states and construct data constraints for multi-modules ROP, and solves ROP data constraints to generate test cases of an ROP chain. Experiments show that this method can effectively improve the space efficiency of the ROP chain and lower the requirements of the ROP layout on memory conditions.
W⊕X是一个防止控制流劫持攻击的保护机制。面向返回的编程(ROP)可以通过在代码段中搜索合适的汇编指令片段(gadget)来执行特定的功能,并绕过W⊕X。然而,手动搜索符合条件的小工具效率低下,错误和缺失率很高。为了提高ROP生成的效率,提出了一种基于碎片化布局的ROP自动生成方法。该方法基于ROP自动生成框架Q设计新的中间指令构造规则,采用符号执行分析程序内存状态,构造多模块ROP的数据约束,解决ROP数据约束,生成ROP链的测试用例。实验表明,该方法可以有效提高ROP链的空间效率,降低ROP布局对存储条件的要求。
{"title":"Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis","authors":"Ning Huang, Shuguang Huang, Chao Chang","doi":"10.4018/IJDCF.2021030104","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030104","url":null,"abstract":"W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and bypass the W⊕X. However, manual search for gadgets that match the conditions is inefficient, with high error and missing rates. In order to improve the efficiency of ROP generation, the authors propose an automatic generation method based on a fragmented layout called automatic generation of ROP. This method designs new intermediate instruction construction rules based on an automatic ROP generation framework Q, uses symbolic execution to analyze program memory states and construct data constraints for multi-modules ROP, and solves ROP data constraints to generate test cases of an ROP chain. Experiments show that this method can effectively improve the space efficiency of the ROP chain and lower the requirements of the ROP layout on memory conditions.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"35 1","pages":"57-76"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72773766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Fusion Strategies in Localization of Local Deformation Tampering 局部变形篡改定位中的多种融合策略
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030107
Yongzhen Ke, Yiping Cui
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features and the correlation between the pixels of an image are changed. Multiple fusion strategies based on first-order difference images and their texture feature is proposed to locate the tamper in local deformation image. Firstly, texture features using overlapping blocks on one color channel are extracted and fed into fuzzy c-means clustering method to generate a tamper probability map (TPM), and then several TPMs with different block sizes are fused in the first fusion. Secondly, different TPMs with different color channels and different texture features are respectively fused in the second and third fusion. The experimental results show that the proposed method can accurately detect the location of the local deformation of an image.
篡改图像可能涉及犯罪领域,也会给公众带来错误的价值观等问题。图像局部变形是最常见的图像篡改方法之一,它改变了图像的原始纹理特征和像素之间的相关性。提出了基于一阶差分图像及其纹理特征的多重融合策略来定位局部变形图像中的篡改点。首先,提取一个颜色通道上具有重叠块的纹理特征,并将其输入模糊c均值聚类方法生成篡改概率图(TPM),然后在第一次融合中融合多个不同块大小的篡改概率图。其次,在第二次和第三次融合中分别融合具有不同颜色通道和不同纹理特征的不同TPMs;实验结果表明,该方法可以准确地检测出图像局部变形的位置。
{"title":"Multiple Fusion Strategies in Localization of Local Deformation Tampering","authors":"Yongzhen Ke, Yiping Cui","doi":"10.4018/IJDCF.2021030107","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030107","url":null,"abstract":"Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features and the correlation between the pixels of an image are changed. Multiple fusion strategies based on first-order difference images and their texture feature is proposed to locate the tamper in local deformation image. Firstly, texture features using overlapping blocks on one color channel are extracted and fed into fuzzy c-means clustering method to generate a tamper probability map (TPM), and then several TPMs with different block sizes are fused in the first fusion. Secondly, different TPMs with different color channels and different texture features are respectively fused in the second and third fusion. The experimental results show that the proposed method can accurately detect the location of the local deformation of an image.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"46 1","pages":"103-114"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77072779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1