Pub Date : 2025-12-20DOI: 10.1016/j.jisa.2025.104349
Yan Gao , Lunzhi Deng , Yaying Wu , Na Wang , Huawei Huang , Siwei Li
In the modern healthcare system, patients’ electronic health records (EHRs) often need to be shared among various medical institutions to support continuous treatment and cross-institutional collaboration. To maintain the confidentiality and authenticity of medical data, improve data-sharing efficiency, and restrict each institution’s access to only its relevant data, a signcryption scheme capable of simultaneously signcrypting distinct EHRs for multiple receivers is an efficient solution for secure cross-institutional data sharing. This paper introduces a blockchain-based proxy broadcast signcryption (PBSC) scheme supporting multi-message synchronous transmission. In our work, patients delegate their signcryption rights to a trusted proxy medical institution, which signcrypts distinct plaintexts into a single ciphertext and stores the ciphertext off-chain. To enforce secure access, we design a blockchain-based access control mechanism, allowing only authorized users to retrieve and decrypt the off-chain ciphertext. Under the random oracle model, we prove the proposed PBSC scheme is confidential and unforgeable. Comparative analysis shows our scheme reduces computational costs by 50 % versus existing state-of-the-art schemes, thus rendering it highly suitable for secure EHRs sharing.
{"title":"Blockchain-based proxy broadcast signcryption supporting multi-message synchronous transmission suitable for cross-institutional EHRs sharing system","authors":"Yan Gao , Lunzhi Deng , Yaying Wu , Na Wang , Huawei Huang , Siwei Li","doi":"10.1016/j.jisa.2025.104349","DOIUrl":"10.1016/j.jisa.2025.104349","url":null,"abstract":"<div><div>In the modern healthcare system, patients’ electronic health records (EHRs) often need to be shared among various medical institutions to support continuous treatment and cross-institutional collaboration. To maintain the confidentiality and authenticity of medical data, improve data-sharing efficiency, and restrict each institution’s access to only its relevant data, a signcryption scheme capable of simultaneously signcrypting distinct EHRs for multiple receivers is an efficient solution for secure cross-institutional data sharing. This paper introduces a blockchain-based proxy broadcast signcryption (PBSC) scheme supporting multi-message synchronous transmission. In our work, patients delegate their signcryption rights to a trusted proxy medical institution, which signcrypts distinct plaintexts into a single ciphertext and stores the ciphertext off-chain. To enforce secure access, we design a blockchain-based access control mechanism, allowing only authorized users to retrieve and decrypt the off-chain ciphertext. Under the random oracle model, we prove the proposed PBSC scheme is confidential and unforgeable. Comparative analysis shows our scheme reduces computational costs by 50 % versus existing state-of-the-art schemes, thus rendering it highly suitable for secure EHRs sharing.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104349"},"PeriodicalIF":3.7,"publicationDate":"2025-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-19DOI: 10.1016/j.jisa.2025.104327
Marco Antonio Marques , Lucas Cupertino Cardoso , Pedro H. Barcha Correia , Charles Christian Miers , Marcos Antonio Simplicio Junior
The increasing adoption of extensible and decentralized token systems demands efficient and flexible signature schemes. Aggregate signatures enable the combination of multiple signatures on various messages into a single aggregate. Existing techniques often lack support for features such as delegation and extension, or introduce significant complexity without clear advantages over non-aggregated schemes. This paper presents SchoCo, a Schnorr-based half-aggregate scheme designed for extensible tokens. Its security is proven in the random oracle model through a reduction to the existential unforgeability under adaptive chosen-message attacks of the Schnorr signature scheme. The proposed scheme is inspired by the identity-based signature technique developed by Galindo and Garcia. It achieves signature sizes comparable to existing schemes while cutting verification costs by up to 50 %. Furthermore, we show that SchoCo is well-suited for integrating token-based authorization frameworks, using the Biscuit token as a concrete instantiation, with practical gains in both token size and verification efficiency.
{"title":"SchoCo: Schnorr signature concatenation for extensible tokens","authors":"Marco Antonio Marques , Lucas Cupertino Cardoso , Pedro H. Barcha Correia , Charles Christian Miers , Marcos Antonio Simplicio Junior","doi":"10.1016/j.jisa.2025.104327","DOIUrl":"10.1016/j.jisa.2025.104327","url":null,"abstract":"<div><div>The increasing adoption of extensible and decentralized token systems demands efficient and flexible signature schemes. Aggregate signatures enable the combination of multiple signatures on various messages into a single aggregate. Existing techniques often lack support for features such as delegation and extension, or introduce significant complexity without clear advantages over non-aggregated schemes. This paper presents SchoCo, a Schnorr-based half-aggregate scheme designed for extensible tokens. Its security is proven in the random oracle model through a reduction to the existential unforgeability under adaptive chosen-message attacks of the Schnorr signature scheme. The proposed scheme is inspired by the identity-based signature technique developed by Galindo and Garcia. It achieves signature sizes comparable to existing schemes while cutting verification costs by up to 50 %. Furthermore, we show that SchoCo is well-suited for integrating token-based authorization frameworks, using the Biscuit token as a concrete instantiation, with practical gains in both token size and verification efficiency.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104327"},"PeriodicalIF":3.7,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most common and widespread types of digital image fraudulence is image splicing attack, which combines contents from several sources into a single composite to deceive viewers. In this work, we address the problem of image splicing detection by proposing a robust deep learning-based framework. Specifically, the detector is built to operate for splicing detection on encrypted images, considering the growing usage of images in encrypted domains in IoT environments. The proposed model operates at two levels of granularity. At level 1, the model answers a binary question: whether an encrypted image is spliced or authentic. We achieve this by adding Self-Attention and Squeeze-and-Excitation modules to a custom DenseNet backbone, which enhances feature discrimination and localization in difficult scenarios like compression and encryption. At level 2, we determine the encryption technique that the image under question has undergone. Dense connections and attention mechanisms allow the network to focus on subtle splicing artifacts, on encrypted image inputs. Our results show that learnable patterns are persistent in encrypted image representations, resulting in robust classification performance.
{"title":"Robust DSSA-Net framework for splicing detection in image encryption domain","authors":"Debolina Ghosh , Ruchira Naskar , Bidesh Chakraborty","doi":"10.1016/j.jisa.2025.104341","DOIUrl":"10.1016/j.jisa.2025.104341","url":null,"abstract":"<div><div>One of the most common and widespread types of digital image fraudulence is image splicing attack, which combines contents from several sources into a single composite to deceive viewers. In this work, we address the problem of image splicing detection by proposing a robust deep learning-based framework. Specifically, the detector is built to operate for splicing detection on encrypted images, considering the growing usage of images in encrypted domains in IoT environments. The proposed model operates at two levels of granularity. At <em>level 1</em>, the model answers a binary question: whether an encrypted image is spliced or authentic. We achieve this by adding Self-Attention and Squeeze-and-Excitation modules to a custom <em>DenseNet</em> backbone, which enhances feature discrimination and localization in difficult scenarios like compression and encryption. At <em>level 2</em>, we determine the encryption technique that the image under question has undergone. Dense connections and attention mechanisms allow the network to focus on subtle splicing artifacts, on encrypted image inputs. Our results show that learnable patterns are persistent in encrypted image representations, resulting in robust classification performance.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104341"},"PeriodicalIF":3.7,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1016/j.jisa.2025.104326
Muhammed Saadetdin KAYA , Kenan İNCE
The exponential growth of visual data and the expansion of resource-constrained IoT platforms have intensified the demand for lightweight yet secure image protection schemes. Conventional ciphers, while cryptographically strong, often fail to meet real-time and hardware-efficiency requirements for image data. To address this gap, this study presents the Knit Scrambling (KS) framework, a textile-inspired deterministic permutation framework designed for reversible image scrambling with linear computational cost. This approach models an image as a sequence interwoven from multiple subsequences following cyclic knitting patterns, ensuring both reversibility and high diffusion. A specific instantiation, termed Triple Check Pattern (TCP), realizes the KS framework by dividing the image into three subsequences and applying cyclic pattern rotations to enhance pixel decorrelation while preserving strict invertibility. The confusion process is integrated with a lightweight diffusion stage based on a key-nonce-derived chaotic keystream generated by a one-dimensional logistic map, eliminating plaintext dependence and enabling per-image uniqueness. Experimental analyses conducted on benchmark color images show near-uniform histograms, high entropy close to eight bits, and strong differential performance, with average NPCR around 99.6 percent and UACI approximately 33.5 percent. Statistical randomness evaluation using the NIST SP 800-22 test suite confirms the scheme’s ability to produce unpredictable ciphertexts, while runtime benchmarking on both desktop and embedded-class hardware demonstrates real-time feasibility. The results indicate that the proposed framework provides an effective and hardware-efficient alternative to existing chaos-based and geometric scrambling approaches for lightweight image encryption in IoT environments. The proposed framework (KS) defines a general textile-inspired permutation model, while its implementation through the TCP algorithm demonstrates how this model can be practically realized to achieve efficient and reversible image scrambling.
{"title":"Knit scrambling: A novel image scrambling framework and its demonstration in image encryption","authors":"Muhammed Saadetdin KAYA , Kenan İNCE","doi":"10.1016/j.jisa.2025.104326","DOIUrl":"10.1016/j.jisa.2025.104326","url":null,"abstract":"<div><div>The exponential growth of visual data and the expansion of resource-constrained IoT platforms have intensified the demand for lightweight yet secure image protection schemes. Conventional ciphers, while cryptographically strong, often fail to meet real-time and hardware-efficiency requirements for image data. To address this gap, this study presents the Knit Scrambling (KS) framework, a textile-inspired deterministic permutation framework designed for reversible image scrambling with linear computational cost. This approach models an image as a sequence interwoven from multiple subsequences following cyclic knitting patterns, ensuring both reversibility and high diffusion. A specific instantiation, termed Triple Check Pattern (TCP), realizes the KS framework by dividing the image into three subsequences and applying cyclic pattern rotations to enhance pixel decorrelation while preserving strict invertibility. The confusion process is integrated with a lightweight diffusion stage based on a key-nonce-derived chaotic keystream generated by a one-dimensional logistic map, eliminating plaintext dependence and enabling per-image uniqueness. Experimental analyses conducted on benchmark color images show near-uniform histograms, high entropy close to eight bits, and strong differential performance, with average NPCR around 99.6 percent and UACI approximately 33.5 percent. Statistical randomness evaluation using the NIST SP 800-22 test suite confirms the scheme’s ability to produce unpredictable ciphertexts, while runtime benchmarking on both desktop and embedded-class hardware demonstrates real-time feasibility. The results indicate that the proposed framework provides an effective and hardware-efficient alternative to existing chaos-based and geometric scrambling approaches for lightweight image encryption in IoT environments. The proposed framework (KS) defines a general textile-inspired permutation model, while its implementation through the TCP algorithm demonstrates how this model can be practically realized to achieve efficient and reversible image scrambling.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104326"},"PeriodicalIF":3.7,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1016/j.jisa.2025.104345
Chuanyu Peng , Hequn Xian
Federated Learning (FL) is a distributed machine learning approach where multiple users collaboratively train a shared model without sharing raw data, thereby preserving data privacy. However, FL remains vulnerable to inference and poisoning attacks, which can compromise privacy and degrade global model performance. Therefore, many privacy-preserving frameworks have been proposed. Among these, mask-based frameworks provide advantages in efficiency and flexibility, but are particularly susceptible to poisoning attacks by malicious users. To overcome this challenge, we propose LOPAS-FL, an efficient, privacy-preserving, and robust mask-based federated learning scheme. It first introduces a gradient-splitting and orthogonal perturbation mechanism to ensure privacy through computational indistinguishability. Meanwhile, a dual-server architecture conducts multi-dimensional verification across gradient direction, distribution, and homogeneity. Only gradients that pass all validations are aggregated. This approach effectively defends against poisoning attacks and ensures the quality and robustness of the final model. Security analysis and experiments show that LOPAS-FL effectively detects and mitigates poisoning attacks, outperforming existing approaches in efficiency.
{"title":"Lightweight orthogonal perturbation for privacy-preserving federated learning against poisoning attacks","authors":"Chuanyu Peng , Hequn Xian","doi":"10.1016/j.jisa.2025.104345","DOIUrl":"10.1016/j.jisa.2025.104345","url":null,"abstract":"<div><div>Federated Learning (FL) is a distributed machine learning approach where multiple users collaboratively train a shared model without sharing raw data, thereby preserving data privacy. However, FL remains vulnerable to inference and poisoning attacks, which can compromise privacy and degrade global model performance. Therefore, many privacy-preserving frameworks have been proposed. Among these, mask-based frameworks provide advantages in efficiency and flexibility, but are particularly susceptible to poisoning attacks by malicious users. To overcome this challenge, we propose LOPAS-FL, an efficient, privacy-preserving, and robust mask-based federated learning scheme. It first introduces a gradient-splitting and orthogonal perturbation mechanism to ensure privacy through computational indistinguishability. Meanwhile, a dual-server architecture conducts multi-dimensional verification across gradient direction, distribution, and homogeneity. Only gradients that pass all validations are aggregated. This approach effectively defends against poisoning attacks and ensures the quality and robustness of the final model. Security analysis and experiments show that LOPAS-FL effectively detects and mitigates poisoning attacks, outperforming existing approaches in efficiency.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104345"},"PeriodicalIF":3.7,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Federated Learning is a distributed machine learning paradigm that allows multiple clients to collaboratively train a global model while preserving privacy by avoiding the exchange of raw data. However, its distributed nature makes it vulnerable to backdoor attacks, which threaten the integrity and security of the model. Existing attacks often rely on fixed triggers or optimizations of the local model, failing to adapt to dynamic updates of the global model. We propose a new and effective attack named IDABA (Imperceptible Dynamic Anticipated Backdoor Attack), a novel dynamic backdoor attack method for FL, addressing these limitations by ensuring visual imperceptibility and persistence. IDABA generates visually imperceptible poisoned samples and employs Model-Contrastive Loss (MOON) to maintain similarity with the global model. It also predicts future global model states to optimize trigger effectiveness. Experiments on CIFAR10, MNIST, GTSRB, and TinyImageNet show that IDABA achieves higher Attack Success Rates (ASR) while maintaining model accuracy. It demonstrates strong adaptability against defense mechanisms such as Krum and Multi-Krum. GradCam analysis and image quality metrics confirm the visual stealthiness of IDABA’s backdoor samples.
{"title":"An imperceptible dynamic anticipated backdoor attack in federated learning","authors":"Yingqiang Xie , Wei Ren , Tianqing Zhu , Lianchong Zhang","doi":"10.1016/j.jisa.2025.104317","DOIUrl":"10.1016/j.jisa.2025.104317","url":null,"abstract":"<div><div>Federated Learning is a distributed machine learning paradigm that allows multiple clients to collaboratively train a global model while preserving privacy by avoiding the exchange of raw data. However, its distributed nature makes it vulnerable to backdoor attacks, which threaten the integrity and security of the model. Existing attacks often rely on fixed triggers or optimizations of the local model, failing to adapt to dynamic updates of the global model. We propose a new and effective attack named IDABA (Imperceptible Dynamic Anticipated Backdoor Attack), a novel dynamic backdoor attack method for FL, addressing these limitations by ensuring visual imperceptibility and persistence. IDABA generates visually imperceptible poisoned samples and employs Model-Contrastive Loss (MOON) to maintain similarity with the global model. It also predicts future global model states to optimize trigger effectiveness. Experiments on CIFAR10, MNIST, GTSRB, and TinyImageNet show that IDABA achieves higher Attack Success Rates (ASR) while maintaining model accuracy. It demonstrates strong adaptability against defense mechanisms such as Krum and Multi-Krum. GradCam analysis and image quality metrics confirm the visual stealthiness of IDABA’s backdoor samples.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104317"},"PeriodicalIF":3.7,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1016/j.jisa.2025.104328
Jiangtao Guo, Buwei Tian, Junyong Jiang, Lu Dong
Coverless image steganography (CIS) aims to map secret images into container images without modifying the original images for concealment purposes. However, most current CIS methods rely heavily on deep learning models, which require extensive training datasets and demonstrate limited robustness to variations in image styles. Particularly when applied to images with substantial stylistic variations, these methods often produce unsatisfactory steganographic results, leading to significant degradation in the quality of steganographic image (stego-image). Furthermore, existing diffusion model-based CIS approaches can only achieve effective concealment between images with similar styles, thereby limiting the diversity of application scenarios. To address these limitations, we propose a training-free CIS method based on the diffusion model (DStyleStego), which does not rely on the traditional training, and can effectively handle different styles of images, guaranteeing the image quality and the security of steganographic information. Specifically, we design a two-stage latent transformation method to improve the security and flexibility of image steganography. In addition, we introduce a detail compensation function to recover detail information lost during the diffusion process to improve the quality and fidelity of the generated images. Extensive experimental results demonstrate that DStyleStego achieves efficient and stable steganography across diverse image datasets (Stego260 and UniStega) while exhibiting significant advantages in terms of image quality preservation.
{"title":"Enabling diverse styles coverless image steganography with two-stage latent transformation and diffusion model","authors":"Jiangtao Guo, Buwei Tian, Junyong Jiang, Lu Dong","doi":"10.1016/j.jisa.2025.104328","DOIUrl":"10.1016/j.jisa.2025.104328","url":null,"abstract":"<div><div>Coverless image steganography (CIS) aims to map secret images into container images without modifying the original images for concealment purposes. However, most current CIS methods rely heavily on deep learning models, which require extensive training datasets and demonstrate limited robustness to variations in image styles. Particularly when applied to images with substantial stylistic variations, these methods often produce unsatisfactory steganographic results, leading to significant degradation in the quality of steganographic image (stego-image). Furthermore, existing diffusion model-based CIS approaches can only achieve effective concealment between images with similar styles, thereby limiting the diversity of application scenarios. To address these limitations, we propose a training-free CIS method based on the diffusion model (DStyleStego), which does not rely on the traditional training, and can effectively handle different styles of images, guaranteeing the image quality and the security of steganographic information. Specifically, we design a two-stage latent transformation method to improve the security and flexibility of image steganography. In addition, we introduce a detail compensation function to recover detail information lost during the diffusion process to improve the quality and fidelity of the generated images. Extensive experimental results demonstrate that DStyleStego achieves efficient and stable steganography across diverse image datasets (Stego260 and UniStega) while exhibiting significant advantages in terms of image quality preservation.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104328"},"PeriodicalIF":3.7,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1016/j.jisa.2025.104340
Sishan Wang , Youqun Zhao , Xin Fu , Huachao Si , Wentao Wang , Lei Xue
Advanced driving systems (ADS) and vehicle-to-everything (V2X) technologies are accelerating the shift to software-defined vehicles (SDVs), which have dramatically increased the demand for connectivity and bandwidth of in-vehicle networks (IVNs), e.g., automotive Ethernet. The SOME/IP (Scalable service-Oriented MiddlewarE over IP) protocol, a middleware standard for automotive Ethernet, presents unique security challenges: the lack of security mechanisms and its dynamic session behaviors render traditional rule-based Intrusion Detection Systems (IDSs) ineffective. To address these challenges, we propose GATransformer, a novel hybrid Graph Attention Network (GAT) with Transformer architecture that can learn spatial-temporal dependencies for SOME/IP-based IVNs in the class imbalance scenario. A comprehensive evaluation on a SOME/IP dataset built from a real-world Connected and Autonomous Vehicle (CAV) indicates that the GATransformer enhances robustness in a class imbalance scenario and significantly outperforms conventional Deep Learning (DL) architectures, including Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), standalone Transformers, and baseline GAT. The proposed model achieves an F1-score of 0.9999 with 0.004 ms inference latency on server-grade hardware (NVIDIA RTX 3090) and maintains robust performance (F1-score: 0.9983) with sub-millisecond latency (0.151 ms) when deployed on an automotive-grade embedded platform (NVIDIA Jetson Orin Nano). These results validate the possibility of deploying the hybrid Graph Neural Networks (GNNs) for real-time automotive intrusion detection, representing a significant advancement toward securing next-generation service-oriented architectures (SOA) against evolving cyber threats.
先进驾驶系统(ADS)和车联网(V2X)技术正在加速向软件定义车辆(sdv)的转变,这极大地增加了对车载网络(ivn)(如汽车以太网)的连接性和带宽的需求。SOME/IP(基于IP的可伸缩面向服务的中间件)协议是汽车以太网的中间件标准,它提出了独特的安全挑战:缺乏安全机制及其动态会话行为使得传统的基于规则的入侵检测系统(ids)无效。为了解决这些挑战,我们提出了一种具有Transformer架构的新型混合图注意网络(GAT) gattransformer,它可以在类不平衡场景中学习基于SOME/ ip的ivn的时空依赖关系。对现实世界联网和自动驾驶汽车(CAV)构建的SOME/IP数据集的综合评估表明,gattransformer增强了类不平衡场景中的鲁棒性,并显著优于传统的深度学习(DL)架构,包括卷积神经网络(CNN)、长短期记忆(LSTM)、独立变压器和基线GAT。该模型在服务器级硬件(NVIDIA RTX 3090)上实现了0.9999的f1分数和0.004 ms的推理延迟,并在部署在汽车级嵌入式平台(NVIDIA Jetson Orin Nano)上时保持了亚毫秒级延迟(0.151 ms)的稳健性能(f1分数:0.9983)。这些结果验证了在实时汽车入侵检测中部署混合图神经网络(gnn)的可能性,代表了在保护下一代面向服务的架构(SOA)免受不断发展的网络威胁方面取得的重大进展。
{"title":"A class-imbalance-aware intrusion detection system based on spatiotemporal graph neural networks for software-defined vehicles","authors":"Sishan Wang , Youqun Zhao , Xin Fu , Huachao Si , Wentao Wang , Lei Xue","doi":"10.1016/j.jisa.2025.104340","DOIUrl":"10.1016/j.jisa.2025.104340","url":null,"abstract":"<div><div>Advanced driving systems (ADS) and vehicle-to-everything (V2X) technologies are accelerating the shift to software-defined vehicles (SDVs), which have dramatically increased the demand for connectivity and bandwidth of in-vehicle networks (IVNs), e.g., automotive Ethernet. The SOME/IP (Scalable service-Oriented MiddlewarE over IP) protocol, a middleware standard for automotive Ethernet, presents unique security challenges: the lack of security mechanisms and its dynamic session behaviors render traditional rule-based Intrusion Detection Systems (IDSs) ineffective. To address these challenges, we propose GATransformer, a novel hybrid Graph Attention Network (GAT) with Transformer architecture that can learn spatial-temporal dependencies for SOME/IP-based IVNs in the class imbalance scenario. A comprehensive evaluation on a SOME/IP dataset built from a real-world Connected and Autonomous Vehicle (CAV) indicates that the GATransformer enhances robustness in a class imbalance scenario and significantly outperforms conventional Deep Learning (DL) architectures, including Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), standalone Transformers, and baseline GAT. The proposed model achieves an F1-score of 0.9999 with 0.004 ms inference latency on server-grade hardware (NVIDIA RTX 3090) and maintains robust performance (F1-score: 0.9983) with sub-millisecond latency (0.151 ms) when deployed on an automotive-grade embedded platform (NVIDIA Jetson Orin Nano). These results validate the possibility of deploying the hybrid Graph Neural Networks (GNNs) for real-time automotive intrusion detection, representing a significant advancement toward securing next-generation service-oriented architectures (SOA) against evolving cyber threats.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104340"},"PeriodicalIF":3.7,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1016/j.jisa.2025.104330
Pengfei Li , Weijia Cao , Tao Yu
Fragile watermarking is an effective technique for detecting image tampering, yet current block-based fragile watermarking methods often struggle with limited watermarked image quality and high false-positive rates. To overcome these limitations, this paper proposes an enhanced semi-blind fragile watermarking method based on an improved least significant bit (LSB) substitution (ILSBS), named TLFW. First, the original image is divided into non-overlapping blocks, within which a novel rule-based ILSBS approach dynamically adjusts the watermark embedding bits to minimize pixel distortion effectively. This significantly enhances the visual quality of the watermarked image. Next, a tamper localization optimization (TLO) strategy is introduced to substantially reduce false positives by refining detection results around reference points. Extensive experimental results demonstrate that the TLFW approach improves the peak signal-to-noise ratio (PSNR) of watermarked images from 44 dB to 46 dB, consistently reduces the false positive rate (FPR) across multiple attack scenarios while achieving 45 % FPR reduction and 52 % tamper detection rate (TDR) gain specifically for the text-addition attack, and lowers computational costs significantly compared to existing methods. The proposed TLFW scheme is compatible with both grayscale and color images and does not require the original image during watermark extraction, making it highly suitable for practical image authentication applications.
脆弱水印是检测图像篡改的一种有效技术,但目前基于分块的脆弱水印方法往往存在水印图像质量有限、误报率高的问题。为了克服这些局限性,本文提出了一种基于改进的最低有效位替换(least significant bit substitution, ILSBS)的增强半盲脆弱水印方法TLFW。首先,将原始图像划分为互不重叠的块,在块内采用基于规则的ILSBS方法动态调整水印嵌入位,有效减小像素失真;这大大提高了水印图像的视觉质量。接下来,引入了篡改定位优化(TLO)策略,通过在参考点周围改进检测结果,大大减少误报。大量的实验结果表明,TLFW方法将水印图像的峰值信噪比(PSNR)从44 dB提高到46 dB,在多种攻击场景中持续降低假阳性率(FPR),同时在文本添加攻击中实现45%的FPR降低和52%的篡改检测率(TDR)增益,并且与现有方法相比显著降低了计算成本。所提出的TLFW方案兼容灰度图像和彩色图像,并且在水印提取时不需要原始图像,非常适合实际图像认证应用。
{"title":"Improved LSB substitution based semi-blind fragile watermarking for high-accuracy tamper localization","authors":"Pengfei Li , Weijia Cao , Tao Yu","doi":"10.1016/j.jisa.2025.104330","DOIUrl":"10.1016/j.jisa.2025.104330","url":null,"abstract":"<div><div>Fragile watermarking is an effective technique for detecting image tampering, yet current block-based fragile watermarking methods often struggle with limited watermarked image quality and high false-positive rates. To overcome these limitations, this paper proposes an enhanced semi-blind fragile watermarking method based on an improved least significant bit (LSB) substitution (ILSBS), named TLFW. First, the original image is divided into non-overlapping blocks, within which a novel rule-based ILSBS approach dynamically adjusts the watermark embedding bits to minimize pixel distortion effectively. This significantly enhances the visual quality of the watermarked image. Next, a tamper localization optimization (TLO) strategy is introduced to substantially reduce false positives by refining detection results around reference points. Extensive experimental results demonstrate that the TLFW approach improves the peak signal-to-noise ratio (PSNR) of watermarked images from 44 dB to 46 dB, consistently reduces the false positive rate (FPR) across multiple attack scenarios while achieving 45 % FPR reduction and 52 % tamper detection rate (TDR) gain specifically for the text-addition attack, and lowers computational costs significantly compared to existing methods. The proposed TLFW scheme is compatible with both grayscale and color images and does not require the original image during watermark extraction, making it highly suitable for practical image authentication applications.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104330"},"PeriodicalIF":3.7,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1016/j.jisa.2025.104324
Betul Gokkaya, Leonardo Aniello, Basel Halak
The software product is a source of cyber-attacks that target organizations by using their software supply chain (SSC) as a distribution vector. As the reliance of software projects on open-source or proprietary modules is increasing drastically, SSC is becoming more and more critical and, therefore, has attracted the interest of cyber attackers. While existing studies primarily focus on software supply chain attacks’ prevention and detection methods, there is a need for a broad overview of attacks and comprehensive risk assessment for software supply chain security. This study conducts a systematic literature review to fill this gap. By analyzing 96 papers published between 2015-2023, we identified 19 distinct SSC attacks, including 6 novel attacks highlighted in recent studies. Additionally, we developed 25 specific security controls and established a precisely mapped taxonomy that transparently links each control to one or more specific attacks. By establishing this relationship, we demonstrate how SSC security controls are strategically designed to counteract specific attack vectors. Furthermore, we emphasize the role of risk assessment as a foundational step in understanding and prioritizing these vulnerabilities. This study introduces a risk assessment methodology tailored to software supply chain environments, focusing on identifying vulnerabilities in software components, dependencies, and suppliers. The proposed methodology enables organizations to systematically prioritize threats and implement appropriate mitigation strategies.
{"title":"Software supply chain: A taxonomy of attacks, mitigations and risk assessment strategies","authors":"Betul Gokkaya, Leonardo Aniello, Basel Halak","doi":"10.1016/j.jisa.2025.104324","DOIUrl":"10.1016/j.jisa.2025.104324","url":null,"abstract":"<div><div>The software product is a source of cyber-attacks that target organizations by using their software supply chain (SSC) as a distribution vector. As the reliance of software projects on open-source or proprietary modules is increasing drastically, SSC is becoming more and more critical and, therefore, has attracted the interest of cyber attackers. While existing studies primarily focus on software supply chain attacks’ prevention and detection methods, there is a need for a broad overview of attacks and comprehensive risk assessment for software supply chain security. This study conducts a systematic literature review to fill this gap. By analyzing 96 papers published between 2015-2023, we identified 19 distinct SSC attacks, including 6 novel attacks highlighted in recent studies. Additionally, we developed 25 specific security controls and established a precisely mapped taxonomy that transparently links each control to one or more specific attacks. By establishing this relationship, we demonstrate how SSC security controls are strategically designed to counteract specific attack vectors. Furthermore, we emphasize the role of risk assessment as a foundational step in understanding and prioritizing these vulnerabilities. This study introduces a risk assessment methodology tailored to software supply chain environments, focusing on identifying vulnerabilities in software components, dependencies, and suppliers. The proposed methodology enables organizations to systematically prioritize threats and implement appropriate mitigation strategies.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104324"},"PeriodicalIF":3.7,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}