Pub Date : 2023-12-11DOI: 10.1186/s13635-023-00148-x
Jimin Zhang, Xianfeng Zhao, Xiaolei He
Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most robust steganography algorithms rely on the resistance of embedding to the general JPEG recompression process. The operations in a specific compression channel are usually ignored, which reduces the robustness performance. Besides, to acquire the robust cover image, the state-of-the-art robust steganography needs to upload the cover image to social networks several times, which may be insecure regarding behavior security. In this paper, a robust steganography method based on the softmax outputs of a trained classifier and protocol message embedding is proposed. In the proposed method, a deep learning-based robustness classifier is trained to model the specific process of the JPEG recompression channel. The prediction result of the classifier is used to select the robust DCT blocks to form the embedding domain. The selection information is embedded as the protocol messages into the middle-frequency coefficients of DCT blocks. To further improve the recovery possibility of the protocol message, a robustness enhancement method is proposed. It decreases the predicted non-robust possibility of the robustness classifier by modifying low-frequency coefficients of DCT blocks. The experimental results show that the proposed method has better robustness performance compared with state-of-the-art robust steganography and does not have the disadvantage regarding behavior security. The method is universal and can be implemented in different JPEG compression channels after fine-tuning the classifier. Moreover, it has better security performance compared with the state-of-the-art method when embedding large-sized secret messages.
{"title":"Robust JPEG steganography based on the robustness classifier","authors":"Jimin Zhang, Xianfeng Zhao, Xiaolei He","doi":"10.1186/s13635-023-00148-x","DOIUrl":"https://doi.org/10.1186/s13635-023-00148-x","url":null,"abstract":"Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most robust steganography algorithms rely on the resistance of embedding to the general JPEG recompression process. The operations in a specific compression channel are usually ignored, which reduces the robustness performance. Besides, to acquire the robust cover image, the state-of-the-art robust steganography needs to upload the cover image to social networks several times, which may be insecure regarding behavior security. In this paper, a robust steganography method based on the softmax outputs of a trained classifier and protocol message embedding is proposed. In the proposed method, a deep learning-based robustness classifier is trained to model the specific process of the JPEG recompression channel. The prediction result of the classifier is used to select the robust DCT blocks to form the embedding domain. The selection information is embedded as the protocol messages into the middle-frequency coefficients of DCT blocks. To further improve the recovery possibility of the protocol message, a robustness enhancement method is proposed. It decreases the predicted non-robust possibility of the robustness classifier by modifying low-frequency coefficients of DCT blocks. The experimental results show that the proposed method has better robustness performance compared with state-of-the-art robust steganography and does not have the disadvantage regarding behavior security. The method is universal and can be implemented in different JPEG compression channels after fine-tuning the classifier. Moreover, it has better security performance compared with the state-of-the-art method when embedding large-sized secret messages.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"26 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138566733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1186/s13635-023-00146-z
Shaojun Chen
With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network security protection mainly starts from the overall perspective, and some studies also start from the interaction between nodes. However, the trust management mechanisms in these studies do not have a predictive function. Therefore, to predict trust levels and protect network security, this paper innovatively proposes a trust management system for network security protection based on the improved hidden Markov model. The research divides the trust level of inter-node interactions by calculating the threat level of inter-node interactions and predicts the trust level of inter-node interactions through an optimized hidden Markov model. In addition, the study designs an estimation of the types of interactive threats between nodes based on alarm data. The research results show that when inactive interaction tuples are not excluded, the average prediction accuracy of the combined model is 95.5%. In response time, the maximum values of the active and passive cluster management pages are 38 ms and 33 ms, respectively, while the minimum values are 16 ms and 14 ms, with an average of 26.2 ms and 24 ms, respectively. The trust management system designed by the research institute has good performance and can provide systematic support for network security protection, which has good practical significance.
{"title":"The design of network security protection trust management system based on an improved hidden Markov model","authors":"Shaojun Chen","doi":"10.1186/s13635-023-00146-z","DOIUrl":"https://doi.org/10.1186/s13635-023-00146-z","url":null,"abstract":"With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network security protection mainly starts from the overall perspective, and some studies also start from the interaction between nodes. However, the trust management mechanisms in these studies do not have a predictive function. Therefore, to predict trust levels and protect network security, this paper innovatively proposes a trust management system for network security protection based on the improved hidden Markov model. The research divides the trust level of inter-node interactions by calculating the threat level of inter-node interactions and predicts the trust level of inter-node interactions through an optimized hidden Markov model. In addition, the study designs an estimation of the types of interactive threats between nodes based on alarm data. The research results show that when inactive interaction tuples are not excluded, the average prediction accuracy of the combined model is 95.5%. In response time, the maximum values of the active and passive cluster management pages are 38 ms and 33 ms, respectively, while the minimum values are 16 ms and 14 ms, with an average of 26.2 ms and 24 ms, respectively. The trust management system designed by the research institute has good performance and can provide systematic support for network security protection, which has good practical significance.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"254 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-19DOI: 10.1186/s13635-023-00144-1
Dan Wang, Qing Wu, Ming Hu
Abstract Currently, sensor energy assembly in wireless sensor networks is limited, and clustering methods are not effective to improve sensor energy consumption rate. Thus, a hierarchical energy-saving routing algorithm based on fuzzy logic was constructed by considering three aspects: residual energy value, centrality, and distance value between nodes and base stations. The remaining sensor nodes selected by fuzzy logic algorithm have a longer time to live and greater residual energy than those selected by low-power adaptive clustering hierarchical protocol algorithm, fuzzy unequal clustering algorithm, and fuzzy logic cluster head election algorithm. For network life cycle, the number of rounds in which the first dead node appears, in descending order, is studied: energy-saving routing algorithm (400 rounds) > new geographic cellular structure algorithm (300 rounds) > virtual grid based dynamic routes adjustment algorithm (100 rounds). Under the same experimental round, energy-saving routing algorithm’s remaining energy curve always reaches its maximum. The energy-saving routing algorithm by fuzzy logic constructed by this research institute can significantly improve network energy utilization, which has certain reference value.
{"title":"Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks","authors":"Dan Wang, Qing Wu, Ming Hu","doi":"10.1186/s13635-023-00144-1","DOIUrl":"https://doi.org/10.1186/s13635-023-00144-1","url":null,"abstract":"Abstract Currently, sensor energy assembly in wireless sensor networks is limited, and clustering methods are not effective to improve sensor energy consumption rate. Thus, a hierarchical energy-saving routing algorithm based on fuzzy logic was constructed by considering three aspects: residual energy value, centrality, and distance value between nodes and base stations. The remaining sensor nodes selected by fuzzy logic algorithm have a longer time to live and greater residual energy than those selected by low-power adaptive clustering hierarchical protocol algorithm, fuzzy unequal clustering algorithm, and fuzzy logic cluster head election algorithm. For network life cycle, the number of rounds in which the first dead node appears, in descending order, is studied: energy-saving routing algorithm (400 rounds) > new geographic cellular structure algorithm (300 rounds) > virtual grid based dynamic routes adjustment algorithm (100 rounds). Under the same experimental round, energy-saving routing algorithm’s remaining energy curve always reaches its maximum. The energy-saving routing algorithm by fuzzy logic constructed by this research institute can significantly improve network energy utilization, which has certain reference value.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135778295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-03DOI: 10.1186/s13635-023-00143-2
Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy
{"title":"Correction: Mobile authentication of copy detection patterns","authors":"Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy","doi":"10.1186/s13635-023-00143-2","DOIUrl":"https://doi.org/10.1186/s13635-023-00143-2","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135739074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User authentication and access control to blockchain-based forensic log data","authors":"Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim, Mehmood A. Chadhar","doi":"10.1186/s13635-023-00142-3","DOIUrl":"https://doi.org/10.1186/s13635-023-00142-3","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45851146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-26DOI: 10.1186/s13635-023-00139-y
Xiaoning Wang, Jia Liu, Chunjiong Zhang
{"title":"Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM","authors":"Xiaoning Wang, Jia Liu, Chunjiong Zhang","doi":"10.1186/s13635-023-00139-y","DOIUrl":"https://doi.org/10.1186/s13635-023-00139-y","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46475057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-10DOI: 10.1186/s13635-023-00137-0
Arslan Ali, Andrea Migliorati, T. Bianchi, E. Magli
{"title":"Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training","authors":"Arslan Ali, Andrea Migliorati, T. Bianchi, E. Magli","doi":"10.1186/s13635-023-00137-0","DOIUrl":"https://doi.org/10.1186/s13635-023-00137-0","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48925705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1186/s13635-023-00138-z
Jen-Ho Yang
{"title":"A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT","authors":"Jen-Ho Yang","doi":"10.1186/s13635-023-00138-z","DOIUrl":"https://doi.org/10.1186/s13635-023-00138-z","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44646077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01Epub Date: 2023-06-06DOI: 10.1186/s13635-023-00140-5
Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.
{"title":"Mobile authentication of copy detection patterns.","authors":"Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy","doi":"10.1186/s13635-023-00140-5","DOIUrl":"10.1186/s13635-023-00140-5","url":null,"abstract":"<p><p>In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.</p>","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2023 1","pages":"4"},"PeriodicalIF":3.6,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9612480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-17DOI: 10.1186/s13635-022-00136-7
Binh Le Thanh Thai, Hidema Tanaka, Kohtaro Watanabe
{"title":"Improved scheme and evaluation method for progressive visual cryptography","authors":"Binh Le Thanh Thai, Hidema Tanaka, Kohtaro Watanabe","doi":"10.1186/s13635-022-00136-7","DOIUrl":"https://doi.org/10.1186/s13635-022-00136-7","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2022 1","pages":"1-13"},"PeriodicalIF":3.6,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48698303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}