首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
Role and attribute-based access control scheme for decentralized medicine supply chain 基于角色和属性的分散式药品供应链访问控制方案
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-06 DOI: 10.1016/j.jisa.2024.103851
Jigna J. Hathaliya, Sudeep Tanwar

The medicine supply chain (MSC) is an intricate structure that extends across multiple organizations and geographic locations and is an important basis for essential daily services. It involves manufacturing, distributing, and delivering medicine to patients. The intermediaries in the MSC include manufacturers, warehouses, distributors, transporters, retailers, consumers, and patients, in which each intermediary plays a vital role and responsibility in an MSC. MSC poses different challenges, such as medicine counterfeiting, data temperament, and cold chain shipping, leading to various security and privacy issues. To overcome the aforementioned issues, public blockchain (BC) provides transparency, traceability, and data security to some extent but often fails to protect MSC’s data privacy. To address the aforementioned, we adopted the Hyperledger Fabric consortium BC, which preserves the data security and privacy of the proposed scheme. Hyperledger Fabric uses a role-based access control (RBAC) policy for all writers and readers, where each reader and writer accesses all the smart contract information based on their static roles (reader and writer). This RBAC scheme limits the dynamicity and granularity of the access control. With this concern, we adopt the combination of RBAC and attribute-based access control (ABAC) schemes to provide fine-grained access to the smart contract functions. Additionally, we use a distributed interplanetary file system (IPFS) to enhance the scalability of the proposed scheme. Before saving data, IPFS does not use any encryption algorithm. We embraced the advanced encryption standard (AES) algorithm to encrypt MSC data. Next, we integrated RBAC and fine-grained ABAC through smart contracts to prevent unauthorized access in an MSC environment. Further, the proposed scheme is evaluated using various performance parameters, such as scalability for different number of clients, average latency (0.12 s), minimum execution time is around (115 s) for 100 transactions execution, and throughput of (72.5) transactions per second (TPS) of invoke-based smart contract functions while 618.7 (TPS) for query-based smart contract functions.

药品供应链(MSC)是一个错综复杂的结构,跨越多个组织和地理位置,是日常基本服务的重要基础。它涉及生产、分销和向患者交付药品。供应链中的中间商包括制造商、仓库、分销商、运输商、零售商、消费者和患者,其中每个中间商在供应链中都扮演着重要角色,承担着重要责任。地中海供应链面临着不同的挑战,如药品造假、数据篡改和冷链运输,从而导致各种安全和隐私问题。为了克服上述问题,公共区块链(BC)在一定程度上提供了透明度、可追溯性和数据安全性,但往往无法保护 MSC 的数据隐私。为解决上述问题,我们采用了Hyperledger Fabric联盟的区块链技术,从而保护了拟议方案的数据安全和隐私。Hyperledger Fabric 对所有写入者和读取者使用基于角色的访问控制(RBAC)策略,其中每个读取者和写入者根据其静态角色(读取者和写入者)访问所有智能合约信息。这种 RBAC 方案限制了访问控制的动态性和粒度。有鉴于此,我们采用了 RBAC 与基于属性的访问控制(ABAC)相结合的方案,以提供对智能合约功能的细粒度访问。此外,我们还使用了分布式星际文件系统(IPFS)来增强拟议方案的可扩展性。在保存数据之前,IPFS 不使用任何加密算法。我们采用高级加密标准(AES)算法对 MSC 数据进行加密。接下来,我们通过智能合约集成了 RBAC 和细粒度 ABAC,以防止在 MSC 环境中出现未经授权的访问。此外,我们还使用各种性能参数对所提出的方案进行了评估,如不同客户端数量下的可扩展性、平均延迟(0.12 秒)、100 个事务执行的最短执行时间约(115 秒),以及基于调用的智能合约功能每秒(72.5)个事务的吞吐量(TPS)和基于查询的智能合约功能每秒(618.7)个事务的吞吐量(TPS)。
{"title":"Role and attribute-based access control scheme for decentralized medicine supply chain","authors":"Jigna J. Hathaliya,&nbsp;Sudeep Tanwar","doi":"10.1016/j.jisa.2024.103851","DOIUrl":"10.1016/j.jisa.2024.103851","url":null,"abstract":"<div><p>The medicine supply chain (MSC) is an intricate structure that extends across multiple organizations and geographic locations and is an important basis for essential daily services. It involves manufacturing, distributing, and delivering medicine to patients. The intermediaries in the MSC include manufacturers, warehouses, distributors, transporters, retailers, consumers, and patients, in which each intermediary plays a vital role and responsibility in an MSC. MSC poses different challenges, such as medicine counterfeiting, data temperament, and cold chain shipping, leading to various security and privacy issues. To overcome the aforementioned issues, public blockchain (BC) provides transparency, traceability, and data security to some extent but often fails to protect MSC’s data privacy. To address the aforementioned, we adopted the Hyperledger Fabric consortium BC, which preserves the data security and privacy of the proposed scheme. Hyperledger Fabric uses a role-based access control (RBAC) policy for all writers and readers, where each reader and writer accesses all the smart contract information based on their static roles (reader and writer). This RBAC scheme limits the dynamicity and granularity of the access control. With this concern, we adopt the combination of RBAC and attribute-based access control (ABAC) schemes to provide fine-grained access to the smart contract functions. Additionally, we use a distributed interplanetary file system (IPFS) to enhance the scalability of the proposed scheme. Before saving data, IPFS does not use any encryption algorithm. We embraced the advanced encryption standard (AES) algorithm to encrypt MSC data. Next, we integrated RBAC and fine-grained ABAC through smart contracts to prevent unauthorized access in an MSC environment. Further, the proposed scheme is evaluated using various performance parameters, such as scalability for different number of clients, average latency (0.12 s), minimum execution time is around (115 s) for 100 transactions execution, and throughput of (72.5) transactions per second (TPS) of invoke-based smart contract functions while 618.7 (TPS) for query-based smart contract functions.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103851"},"PeriodicalIF":3.8,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric 基于聚合签名和 Hyperledger Fabric 的物联网分类数据认证方案
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-05 DOI: 10.1016/j.jisa.2024.103852
Yinjuan Deng , Shangping Wang , Qian Zhang

In Internet of Things (IoT) system, the data acquisition devices collect substantial volumes of diverse categories data, such as temperature, frequency and quantity data, etc., which is subsequently transmitted to the data center for analysis. To ensure precise outcomes, it is crucial to authenticate the data and their categories against any possible tampering, destruction or forgery throughout its transmission process. Traditional aggregate signature schemes are not capable of performing authentication on data as while as its category, which can lead to inefficiencies and security risks in data processing and management. On the other hand, authentication schemes relying on a central platform are susceptible to single point of failure and corruption issues at the center. To address these challenges, a novel data authentication protocol, named Classified Certificateless Aggregate Signature (CCAS), is proposed in this paper to perform aggregate authentication on data with specified categories, and is implemented in collaboration with Hyperledger Fabric. Elaborate design making the authentication is efficient and eliminating the need to manage the certificates. And an abnormal data isolation algorithm is proposed when an aggregate authentication fails, which can quickly identify abnormal data and preserves normal data. A rigorous proof on the unforgeability of the CCAS protocol is given, and multiple experiments are conducted to evaluate the scheme. The experimental results demonstrate the high efficiencies of CCAS, smart contracts on Fabric and our solution, indicating that proposed scheme is suitable for the classified authentication of IoT collection data in decentralized form.

在物联网(IoT)系统中,数据采集设备会收集大量不同类别的数据,如温度、频率和数量数据等,随后传输到数据中心进行分析。为了确保精确的结果,必须在整个传输过程中对数据及其类别进行验证,以防止任何可能的篡改、破坏或伪造。传统的集合签名方案无法对数据及其类别进行验证,这可能导致数据处理和管理效率低下并存在安全风险。另一方面,依赖中心平台的认证方案容易出现单点故障和中心损坏问题。为了应对这些挑战,本文提出了一种名为分类无证书聚合签名(CCAS)的新型数据认证协议,对指定类别的数据进行聚合认证,并与 Hyperledger Fabric 合作实现。精心的设计使认证更加高效,无需管理证书。此外,本文还提出了一种异常数据隔离算法,当聚合认证失败时,该算法能快速识别异常数据并保留正常数据。对 CCAS 协议的不可伪造性给出了严格的证明,并通过多个实验对该方案进行了评估。实验结果表明,CCAS、Fabric 上的智能合约和我们的方案都具有很高的效率,表明所提出的方案适用于以去中心化形式对物联网采集数据进行分类认证。
{"title":"Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric","authors":"Yinjuan Deng ,&nbsp;Shangping Wang ,&nbsp;Qian Zhang","doi":"10.1016/j.jisa.2024.103852","DOIUrl":"10.1016/j.jisa.2024.103852","url":null,"abstract":"<div><p>In Internet of Things (IoT) system, the data acquisition devices collect substantial volumes of diverse categories data, such as temperature, frequency and quantity data, etc., which is subsequently transmitted to the data center for analysis. To ensure precise outcomes, it is crucial to authenticate the data and their categories against any possible tampering, destruction or forgery throughout its transmission process. Traditional aggregate signature schemes are not capable of performing authentication on data as while as its category, which can lead to inefficiencies and security risks in data processing and management. On the other hand, authentication schemes relying on a central platform are susceptible to single point of failure and corruption issues at the center. To address these challenges, a novel data authentication protocol, named Classified Certificateless Aggregate Signature (CCAS), is proposed in this paper to perform aggregate authentication on data with specified categories, and is implemented in collaboration with Hyperledger Fabric. Elaborate design making the authentication is efficient and eliminating the need to manage the certificates. And an abnormal data isolation algorithm is proposed when an aggregate authentication fails, which can quickly identify abnormal data and preserves normal data. A rigorous proof on the unforgeability of the CCAS protocol is given, and multiple experiments are conducted to evaluate the scheme. The experimental results demonstrate the high efficiencies of CCAS, smart contracts on Fabric and our solution, indicating that proposed scheme is suitable for the classified authentication of IoT collection data in decentralized form.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103852"},"PeriodicalIF":3.8,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141962369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cancellable iris template protection scheme based on inverse merger and Bloom filter 基于反向合并和布鲁姆滤波器的可取消虹膜模板保护方案
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-30 DOI: 10.1016/j.jisa.2024.103849
Qianrong Zheng , Jianwen Xiang , Rui Hao , Xuemin Zhang , Songsong Liao , Dongdong Zhao

Iris recognition has found extensive applications in real-world situations and financial contexts. However, Iris template protection schemes are highly vulnerable to well-planned attacks that can lead to the leakage of personal information. Once biological information is compromised, this loss is irreversible for the individual. Cancelable protection schemes for iris templates based on the Bloom filter have substantial attention in the field of iris biometrics. Nevertheless, Bloom filter-based template protection schemes face specific security challenges. Therefore, it is crucial to propose a method to protect iris templates that is both secure and efficient. To address irreversible limitations in security analysis, we propose a template protection scheme, a cancelable iris biometric protection scheme based on inverse merger and Bloom filter. The primary idea of the proposed scheme is to perform an inverse merger operation on the acquired codewords before mapping the iris templates to the Bloom filter specifically. Through a comparison of the sizes between the original templates and their inverted counterparts, the template with the smaller size is chosen as the definitive result, subsequently being mapped into the Bloom filter. Our proposed scheme exhibits significant advancements in accuracy across multiple datasets, as evidenced by empirical validations. In the optimal case, our model achieves an excellent performance of 98.04% in terms of GAR, while achieving a significant reduction of 0.51% in terms of EER. Furthermore, a comparative analysis with existing iris template protection methods is performed to evaluate its relative effectiveness in resisting the attack of averaging the columns of a block. The results demonstrate that the scheme exhibits robust resistance to such attacks. The experimental analysis demonstrated that the scheme provided a good balance between accuracy and safety.

虹膜识别技术在现实世界和金融领域得到了广泛应用。然而,虹膜模板保护方案极易受到精心策划的攻击,从而导致个人信息泄露。一旦生物信息被泄露,这种损失对个人来说是不可逆转的。基于布鲁姆滤波器的虹膜模板可取消保护方案在虹膜生物识别领域备受关注。然而,基于布鲁姆滤波器的模板保护方案面临着特定的安全挑战。因此,提出一种既安全又高效的虹膜模板保护方法至关重要。为了解决安全分析中不可逆转的局限性,我们提出了一种模板保护方案,一种基于反合并和布鲁姆滤波器的可取消虹膜生物识别保护方案。该方案的主要思想是在将虹膜模板映射到布鲁姆滤波器之前,对获取的编码词进行反合并操作。通过比较原始模板和反合并模板的大小,选择较小的模板作为最终结果,然后映射到布鲁姆滤波器中。通过经验验证,我们提出的方案在多个数据集的准确性上都有显著提高。在最优情况下,我们的模型在 GAR 方面取得了 98.04% 的优异成绩,同时在 EER 方面显著降低了 0.51%。此外,我们还与现有的虹膜模板保护方法进行了对比分析,以评估其在抵御对区块列进行平均化处理的攻击方面的相对有效性。结果表明,该方案对此类攻击具有很强的抵御能力。实验分析表明,该方案在准确性和安全性之间取得了良好的平衡。
{"title":"A cancellable iris template protection scheme based on inverse merger and Bloom filter","authors":"Qianrong Zheng ,&nbsp;Jianwen Xiang ,&nbsp;Rui Hao ,&nbsp;Xuemin Zhang ,&nbsp;Songsong Liao ,&nbsp;Dongdong Zhao","doi":"10.1016/j.jisa.2024.103849","DOIUrl":"10.1016/j.jisa.2024.103849","url":null,"abstract":"<div><p>Iris recognition has found extensive applications in real-world situations and financial contexts. However, Iris template protection schemes are highly vulnerable to well-planned attacks that can lead to the leakage of personal information. Once biological information is compromised, this loss is irreversible for the individual. Cancelable protection schemes for iris templates based on the Bloom filter have substantial attention in the field of iris biometrics. Nevertheless, Bloom filter-based template protection schemes face specific security challenges. Therefore, it is crucial to propose a method to protect iris templates that is both secure and efficient. To address irreversible limitations in security analysis, we propose a template protection scheme, a cancelable iris biometric protection scheme based on inverse merger and Bloom filter. The primary idea of the proposed scheme is to perform an inverse merger operation on the acquired codewords before mapping the iris templates to the Bloom filter specifically. Through a comparison of the sizes between the original templates and their inverted counterparts, the template with the smaller size is chosen as the definitive result, subsequently being mapped into the Bloom filter. Our proposed scheme exhibits significant advancements in accuracy across multiple datasets, as evidenced by empirical validations. In the optimal case, our model achieves an excellent performance of 98.04% in terms of GAR, while achieving a significant reduction of 0.51% in terms of EER. Furthermore, a comparative analysis with existing iris template protection methods is performed to evaluate its relative effectiveness in resisting the attack of averaging the columns of a block. The results demonstrate that the scheme exhibits robust resistance to such attacks. The experimental analysis demonstrated that the scheme provided a good balance between accuracy and safety.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103849"},"PeriodicalIF":3.8,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks ZIRCON:基于零水印的物联网网络数据完整性和安全出处方法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1016/j.jisa.2024.103840
Omair Faraj , David Megías , Joaquin Garcia-Alfaro

The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.

物联网(IoT)正在将互联网和智能设备整合到几乎所有领域,如家庭自动化、电子医疗系统、车载网络、工业控制和军事应用。在这些领域,从多个来源收集并通过多个节点的中间处理进行管理的感知数据被用于决策过程。在这种高度动态的环境中,确保数据完整性和跟踪数据出处是核心要求,因为数据出处是保证数据可信度的重要工具。由于物联网网络中的计算和能源资源有限,满足这些要求具有挑战性。这就需要解决几个难题,如处理开销、安全出处、带宽消耗和存储效率。在本文中,我们提出了基于零水印的物联网数据保护(ZIRCON),这是一种新颖的零水印方法,可在物联网网络中安全传输出处并确保传感器数据的完整性。在 ZIRCON 中,出处信息通过水印存储在防篡改网络数据库中,水印在传输前由源节点生成。我们提供了广泛的安全分析,表明我们的方案能够抵御被动和主动攻击。我们还根据计算时间、能源使用和成本分析等性能指标,将我们的方案与现有方案进行了比较。结果表明,与现有技术相比,ZIRCON 可抵御多种攻击,重量轻,存储效率高,而且能耗和带宽消耗更低。
{"title":"ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks","authors":"Omair Faraj ,&nbsp;David Megías ,&nbsp;Joaquin Garcia-Alfaro","doi":"10.1016/j.jisa.2024.103840","DOIUrl":"10.1016/j.jisa.2024.103840","url":null,"abstract":"<div><p>The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain, such as home automation, e-healthcare systems, vehicular networks, industrial control, and military applications. In these areas, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data integrity and keeping track of data provenance are core requirements in such a highly dynamic context, since data provenance is an important tool for the assurance of data trustworthiness. Dealing with such requirements is challenging due to the limited computational and energy resources in IoT networks. This requires addressing several challenges such as processing overhead, secure provenance, bandwidth consumption and storage efficiency. In this paper, we propose Zero-watermarkIng based data pRovenanCe for iOt Networks (ZIRCON), a novel zero-watermarking approach to securely transmit provenance and ensure data integrity of sensor data in an IoT network. In ZIRCON, provenance information is stored in a tamper-proof network database through watermarks, generated at the source node before transmission. We provide an extensive security analysis showing the resilience of our scheme against passive and active attacks. We also compare our scheme with existing works based on performance metrics such as computational time, energy usage, and cost analysis. The results show that ZIRCON is robust against several attacks, lightweight, storage-efficient, and better in energy usage and bandwidth consumption, compared to prior art.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103840"},"PeriodicalIF":3.8,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer 利用基于粗糙集的新型优化器优化深度特征,为执法部门提供稳健的热敏人脸识别功能
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1016/j.jisa.2024.103838
Tarek Gaber , Mathew Nicho , Esraa Ahmed , Ahmed Hamed

In the security domain, the growing need for reliable authentication methods highlights the importance of thermal face recognition for enhancing law enforcement surveillance and safety especially in IoT applications. Challenges like computational resources and alterations in facial appearance, e.g., plastic surgery could affect face recognition systems. This study presents a novel, robust thermal face recognition model tailored for law enforcement, leveraging thermal signatures from facial blood vessels using a new CNN architecture (Max and Average Pooling- MAP-CNN). This architecture addresses expression, illumination, and surgical invariance, providing a robust feature set critical for precise recognition in law enforcement and border control. Additionally, the model employs the NM-PSO algorithm, integrating neighborhood multi-granulation rough set (NMGRS) with particle swarm optimization (PSO), which efficiently handles both categorical and numerical data from multi-granulation perspectives, leading to a 57% reduction in feature dimensions while maintaining high classification accuracy outperforming ten contemporary models on the Charlotte-ThermalFace dataset by about 10% across key metrics. Rigorous statistical tests confirm NM-PSO’s superiority, and further robustness testing of the face recognition model against image ambiguity and missing data demonstrated its consistent performance, enhancing its suitability for security-sensitive environments with 99% classification accuracy.

在安全领域,对可靠身份验证方法的需求日益增长,这凸显了热人脸识别在加强执法监控和安全方面的重要性,尤其是在物联网应用中。计算资源和面部外观改变(如整容)等挑战可能会影响人脸识别系统。本研究利用新型 CNN 架构(Max and Average Pooling- MAP-CNN),利用来自面部血管的热特征,提出了一种专为执法量身定制的新型、稳健的热人脸识别模型。该架构解决了表情、光照和手术不变性问题,为执法和边境控制中的精确识别提供了强大的特征集。此外,该模型还采用了 NM-PSO 算法,将邻域多粒度粗糙集 (NMGRS) 与粒子群优化 (PSO) 相结合,从多粒度角度有效地处理了分类数据和数字数据,从而减少了 57% 的特征维数,同时保持了较高的分类准确性,在夏洛特-热脸数据集上的关键指标上比 10 个当代模型高出约 10%。严格的统计测试证实了 NM-PSO 的优越性,而针对图像模糊性和数据缺失对人脸识别模型进行的进一步鲁棒性测试则证明了其性能的一致性,从而提高了其在安全敏感环境中的适用性,分类准确率高达 99%。
{"title":"Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer","authors":"Tarek Gaber ,&nbsp;Mathew Nicho ,&nbsp;Esraa Ahmed ,&nbsp;Ahmed Hamed","doi":"10.1016/j.jisa.2024.103838","DOIUrl":"10.1016/j.jisa.2024.103838","url":null,"abstract":"<div><p>In the security domain, the growing need for reliable authentication methods highlights the importance of thermal face recognition for enhancing law enforcement surveillance and safety especially in IoT applications. Challenges like computational resources and alterations in facial appearance, e.g., plastic surgery could affect face recognition systems. This study presents a novel, robust thermal face recognition model tailored for law enforcement, leveraging thermal signatures from facial blood vessels using a new CNN architecture (Max and Average Pooling- MAP-CNN). This architecture addresses expression, illumination, and surgical invariance, providing a robust feature set critical for precise recognition in law enforcement and border control. Additionally, the model employs the NM-PSO algorithm, integrating neighborhood multi-granulation rough set (NMGRS) with particle swarm optimization (PSO), which efficiently handles both categorical and numerical data from multi-granulation perspectives, leading to a 57% reduction in feature dimensions while maintaining high classification accuracy outperforming ten contemporary models on the Charlotte-ThermalFace dataset by about 10% across key metrics. Rigorous statistical tests confirm NM-PSO’s superiority, and further robustness testing of the face recognition model against image ambiguity and missing data demonstrated its consistent performance, enhancing its suitability for security-sensitive environments with 99% classification accuracy.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103838"},"PeriodicalIF":3.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001406/pdfft?md5=4569dce2d949eef915b9b242ab573650&pid=1-s2.0-S2214212624001406-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141954377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making 组织间协作中的区块链:用于集体决策的隐私保护投票系统
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1016/j.jisa.2024.103837
Lívia Maria Bettini de Miranda , Rodrigo Dutra Garcia , Gowri Sankar Ramachandran , Jo Ueyama , Fábio Müller Guerrini

Electronic voting systems can support a key behavioral process in inter-organizational collaboration – collective decision-making – but typically face challenges related to single points of failure from centralized databases and trusted third parties to deal with privacy voting requirements. To address such issues, this work presents a decentralized voting system based on blockchain technology, Fully Homomorphic Encryption, tokenization, and Proof-of-Stake mechanisms to promote the system’s sustainability while enhancing voting privacy and anonymization. Our solution introduces verifiability to voting processes without any trusted intermediaries. We use the inter-organizational collaboration use case since it introduces additional voting requirements in the private domain, such as promoting cooperative behavioral processes to develop trustworthy relationships between organizations. Our proof-of-concept implementation and evaluation results show that the proposed solution provides voting privacy with adequate computational costs.

电子投票系统可以支持组织间协作的一个关键行为过程--集体决策,但通常面临着来自中心化数据库和可信第三方的单点故障挑战,无法满足隐私投票的要求。为了解决这些问题,这项工作提出了一种基于区块链技术、完全同态加密、代币化和投票证明机制的去中心化投票系统,以促进系统的可持续性,同时提高投票的隐私性和匿名性。我们的解决方案为投票过程引入了可验证性,无需任何可信中介。我们使用组织间协作用例,因为它在私人领域引入了额外的投票要求,例如促进合作行为过程,以发展组织间的可信关系。我们的概念验证实施和评估结果表明,所提出的解决方案能以足够的计算成本提供投票隐私。
{"title":"Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making","authors":"Lívia Maria Bettini de Miranda ,&nbsp;Rodrigo Dutra Garcia ,&nbsp;Gowri Sankar Ramachandran ,&nbsp;Jo Ueyama ,&nbsp;Fábio Müller Guerrini","doi":"10.1016/j.jisa.2024.103837","DOIUrl":"10.1016/j.jisa.2024.103837","url":null,"abstract":"<div><p>Electronic voting systems can support a key behavioral process in inter-organizational collaboration – collective decision-making – but typically face challenges related to single points of failure from centralized databases and trusted third parties to deal with privacy voting requirements. To address such issues, this work presents a decentralized voting system based on blockchain technology, Fully Homomorphic Encryption, tokenization, and Proof-of-Stake mechanisms to promote the system’s sustainability while enhancing voting privacy and anonymization. Our solution introduces verifiability to voting processes without any trusted intermediaries. We use the inter-organizational collaboration use case since it introduces additional voting requirements in the private domain, such as promoting cooperative behavioral processes to develop trustworthy relationships between organizations. Our proof-of-concept implementation and evaluation results show that the proposed solution provides voting privacy with adequate computational costs.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103837"},"PeriodicalIF":3.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141954378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-supervised QIM steganalysis with ladder networks 利用梯形网络进行半监督式 QIM 隐写分析
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1016/j.jisa.2024.103834
Chuanpeng Guo , Wei Yang , Liusheng Huang

Recently, deep learning-based Quantization Index Modulation (QIM) steganalysis algorithms have achieved great success. However, most of them are supervised learning algorithms that rely on a large number of labeled samples and have poor generalization performance. Towards addressing the challenge, we present a novel semi-supervised ladder network, termed SSLadNet, for weak signal detection in QIM steganalysis of VoIP streams. In particular, we integrate supervised learning and unsupervised learning into an end-to-end learning architecture via a ladder network, and achieve joint optimization for semi-supervised learning by backpropagation to minimize the sum of supervised and unsupervised cost functions. To the best of our knowledge, this is the first deep learning-based semi-supervised detection model applied to QIM steganalysis that can effectively extract rich features reflecting the correlation changes between codewords caused by QIM steganography. Experimental results showed that even for the labeled samples with a number of 512, SSLadNet can achieve a detection accuracy of around 96.09% for 1000ms long samples and 100% embedding rate, and outperforms the state-of-the-art methods based on semi-supervised learning.

最近,基于深度学习的量化指数调制(QIM)隐写分析算法取得了巨大成功。然而,这些算法大多是监督学习算法,依赖于大量标记样本,泛化性能较差。为了应对这一挑战,我们提出了一种新颖的半监督梯形网络(称为 SSLadNet),用于 VoIP 流 QIM 隐写分析中的弱信号检测。特别是,我们通过梯形网络将有监督学习和无监督学习整合到端到端学习架构中,并通过反向传播实现半监督学习的联合优化,以最小化有监督和无监督成本函数之和。据我们所知,这是第一个应用于 QIM 隐写分析的基于深度学习的半监督检测模型,它能有效地提取出反映 QIM 隐写引起的码字间相关性变化的丰富特征。实验结果表明,即使是512个标注样本,SSLadNet在1000毫秒长样本和100%嵌入率的情况下也能达到约96.09%的检测准确率,优于基于半监督学习的先进方法。
{"title":"Semi-supervised QIM steganalysis with ladder networks","authors":"Chuanpeng Guo ,&nbsp;Wei Yang ,&nbsp;Liusheng Huang","doi":"10.1016/j.jisa.2024.103834","DOIUrl":"10.1016/j.jisa.2024.103834","url":null,"abstract":"<div><p>Recently, deep learning-based Quantization Index Modulation (QIM) steganalysis algorithms have achieved great success. However, most of them are supervised learning algorithms that rely on a large number of labeled samples and have poor generalization performance. Towards addressing the challenge, we present a novel semi-supervised ladder network, termed SSLadNet, for weak signal detection in QIM steganalysis of VoIP streams. In particular, we integrate supervised learning and unsupervised learning into an end-to-end learning architecture via a ladder network, and achieve joint optimization for semi-supervised learning by backpropagation to minimize the sum of supervised and unsupervised cost functions. To the best of our knowledge, this is the first deep learning-based semi-supervised detection model applied to QIM steganalysis that can effectively extract rich features reflecting the correlation changes between codewords caused by QIM steganography. Experimental results showed that even for the labeled samples with a number of 512, SSLadNet can achieve a detection accuracy of around 96.09% for <span><math><mrow><mn>1000</mn><mspace></mspace><mi>ms</mi></mrow></math></span> long samples and 100% embedding rate, and outperforms the state-of-the-art methods based on semi-supervised learning.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103834"},"PeriodicalIF":3.8,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141951398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment 用于医疗物联网环境中数据安全的混合安全签名加密算法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1016/j.jisa.2024.103836
Kanneboina Ashok , S. Gopikrishnan

It proposes a Hybrid Secure Signcryption Algorithm (HySSA), a small-size block chain (BC), and a planned system that secures an electronic health record (EHR) exchange through enabled device transmissions with minimal encryption and signature overhead. HySSA has two stages of operation. Patients are fitted with proximity sensor nodes (PSNs), which establish a wireless personal area network (WBAN) in the first phase of the procedure. It is up to the nodes to decide which cluster head (CH) in their vicinity can send data to the WBAN’s Gateway sensor nodes (GSN) containing EHR meta-data. Second, GSN implements a lightweight signcryption technique for authorized stakeholders that combines data encryption and signing in the second phase of its development. An interplanetary file system provides secure keys for access to the data, which is exchanged over open channels (IPFS). Data mining results are stored to lower computing expenses, and block ledgers are used in global chain architectures. Compared to other schemes, the proposed HySSA scheme is cheaper for transaction and signing expense parameters, throughput of transactions, and computational and communication expenses. It takes HySSA a standard of 3.32 s (s) to sign and 6.52 s (s) to verify in simulation. It takes 3.325 s to mine 200 blocks, compared to 7.8 s for traditional schemes. The throughput of transactions was 142.78 Mbps, as opposed to the standard 102.45 Mbps. Computing time (CC) is 45.80 ms, while communication time (CCM) is 97 bytes, indicating that the suggested approach is competitive with other current approaches in terms of security.

它提出了一种混合安全签名加密算法(HySSA)、一个小型区块链(BC)和一个计划中的系统,通过启用设备传输,以最小的加密和签名开销确保电子健康记录(EHR)交换的安全。HySSA 有两个运行阶段。病人身上装有近距离传感器节点(PSN),在手术的第一阶段,这些节点会建立一个无线个人区域网络(WBAN)。由节点决定其附近的哪个簇头(CH)可以向 WBAN 的网关传感器节点(GSN)发送包含 EHR 元数据的数据。其次,GSN 在开发的第二阶段为授权利益相关者实施了一种轻量级签名加密技术,该技术将数据加密和签名结合在一起。星际文件系统为访问数据提供安全密钥,数据通过公开渠道(IPFS)交换。数据挖掘结果被存储起来,以降低计算费用,并在全球链架构中使用区块分类账。与其他方案相比,拟议的 HySSA 方案在交易和签名费用参数、交易吞吐量、计算和通信费用方面更便宜。在仿真中,HySSA 的标准签名时间为 3.32 秒,验证时间为 6.52 秒。挖掘 200 个区块需要 3.325 秒,而传统方案需要 7.8 秒。交易吞吐量为 142.78 Mbps,而标准吞吐量为 102.45 Mbps。计算时间(CC)为 45.80 毫秒,通信时间(CCM)为 97 字节,这表明所建议的方法在安全性方面与其他现有方法相比具有竞争力。
{"title":"A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment","authors":"Kanneboina Ashok ,&nbsp;S. Gopikrishnan","doi":"10.1016/j.jisa.2024.103836","DOIUrl":"10.1016/j.jisa.2024.103836","url":null,"abstract":"<div><p>It proposes a Hybrid Secure Signcryption Algorithm (HySSA), a small-size block chain (BC), and a planned system that secures an electronic health record (EHR) exchange through enabled device transmissions with minimal encryption and signature overhead. HySSA has two stages of operation. Patients are fitted with proximity sensor nodes (PSNs), which establish a wireless personal area network (WBAN) in the first phase of the procedure. It is up to the nodes to decide which cluster head (CH) in their vicinity can send data to the WBAN’s Gateway sensor nodes (GSN) containing EHR meta-data. Second, GSN implements a lightweight signcryption technique for authorized stakeholders that combines data encryption and signing in the second phase of its development. An interplanetary file system provides secure keys for access to the data, which is exchanged over open channels (IPFS). Data mining results are stored to lower computing expenses, and block ledgers are used in global chain architectures. Compared to other schemes, the proposed HySSA scheme is cheaper for transaction and signing expense parameters, throughput of transactions, and computational and communication expenses. It takes HySSA a standard of 3.32 s (s) to sign and 6.52 s (s) to verify in simulation. It takes 3.325 s to mine 200 blocks, compared to 7.8 s for traditional schemes. The throughput of transactions was 142.78 Mbps, as opposed to the standard 102.45 Mbps. Computing time (CC) is 45.80 ms, while communication time (CCM) is 97 bytes, indicating that the suggested approach is competitive with other current approaches in terms of security.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103836"},"PeriodicalIF":3.8,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141951397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet 在云辅助工业互联网中利用隐私集交叉检测恶意加密流量
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1016/j.jisa.2024.103831
Jingyu Feng, Jing Zhang, Wenbo Zhang, Gang Han

Encryption technology provides the ability of confidential transmission to ensure the security of Industrial Internet communication, but it makes detecting malicious encrypted traffic very difficult. To resolve the conflict between the difficulty of malicious encrypted traffic detection and the requirements of traffic privacy protection, we propose a cloud-assisted Industrial Internet malicious encrypted traffic detection scheme with privacy protection. To accurately match the encrypted traffic and the detection rules, a privacy set intersection protocol based on the oblivious pseudorandom function and random garbled Bloom filter is constructed, which can detect malicious traffic without revealing data content. Meanwhile, our scheme can allow semi-trusted cloud servers to assist resource-constrained end devices to participate in private calculations. The key-homomorphic encryption is introduced to obfuscate the detection rules, making the detection rules always transparent to end users and semi-trusted cloud servers. We also design the random input verification to make the malicious end users do not have any opportunity to participate in the privacy set intersection calculation using arbitrary data. The scheme analysis and performance evaluation results show that our scheme can effectively guarantee the security of encrypted traffic detection with better detection performance and limited resource consumption.

加密技术提供了保密传输的能力,保证了工业互联网通信的安全性,但却给恶意加密流量的检测带来了很大困难。为了解决恶意加密流量检测难度与流量隐私保护要求之间的矛盾,我们提出了一种具有隐私保护功能的云辅助工业互联网恶意加密流量检测方案。为了准确匹配加密流量和检测规则,我们构建了基于遗忘伪随机函数和随机乱码布鲁姆滤波器的隐私集交集协议,可以在不泄露数据内容的情况下检测恶意流量。同时,我们的方案可以让半信任的云服务器协助资源受限的终端设备参与隐私计算。我们引入了密钥同构加密来混淆检测规则,使检测规则对终端用户和半信任云服务器始终透明。我们还设计了随机输入验证,使恶意终端用户没有任何机会使用任意数据参与隐私集交叉计算。方案分析和性能评估结果表明,我们的方案能有效保证加密流量检测的安全性,并具有较好的检测性能和有限的资源消耗。
{"title":"Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet","authors":"Jingyu Feng,&nbsp;Jing Zhang,&nbsp;Wenbo Zhang,&nbsp;Gang Han","doi":"10.1016/j.jisa.2024.103831","DOIUrl":"10.1016/j.jisa.2024.103831","url":null,"abstract":"<div><p>Encryption technology provides the ability of confidential transmission to ensure the security of Industrial Internet communication, but it makes detecting malicious encrypted traffic very difficult. To resolve the conflict between the difficulty of malicious encrypted traffic detection and the requirements of traffic privacy protection, we propose a cloud-assisted Industrial Internet malicious encrypted traffic detection scheme with privacy protection. To accurately match the encrypted traffic and the detection rules, a privacy set intersection protocol based on the oblivious pseudorandom function and random garbled Bloom filter is constructed, which can detect malicious traffic without revealing data content. Meanwhile, our scheme can allow semi-trusted cloud servers to assist resource-constrained end devices to participate in private calculations. The key-homomorphic encryption is introduced to obfuscate the detection rules, making the detection rules always transparent to end users and semi-trusted cloud servers. We also design the random input verification to make the malicious end users do not have any opportunity to participate in the privacy set intersection calculation using arbitrary data. The scheme analysis and performance evaluation results show that our scheme can effectively guarantee the security of encrypted traffic detection with better detection performance and limited resource consumption.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103831"},"PeriodicalIF":3.8,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141951396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization 通过集合隐写分析和对抗性扰动最小化提高图像隐写术的安全性
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.jisa.2024.103835
Dewang Wang , Gaobo Yang , Zhiqing Guo , Jiyou Chen

Adversarial embedding, which can deceive the CNN-based steganalyzers, has emerged as an effective strategy to improve image steganography security. However, its efficacy might be easily weakened when confronting re-trained or unknown steganalyzers. In this work, the security of adversarial embedding-based image steganography is further improved by ensemble steganalysis and adversarial perturbation minimization. Different from the existing works that rely on a single targeted steganalyzer, the proposed approach develops an ensemble steganographic classifier, which leverages the majority voting rule to smartly select those pixels that are more suitable for adversarial embedding. To mitigate the interference caused by adversarial embedding, two strategies are adopted. Firstly, a cover image is divided into two non-overlapping regions in terms of pixel gradient amplitude. The regions with higher gradient amplitudes are progressively conducted with adversarial embedding until the targeted steganalyzer is effectively deceived. Secondly, the embedding costs are fine-tuned to minimize the degradation of image quality. Extensive experimental results demonstrate that the proposed approach achieves superior steganography security. Under black-box attacks, with S-UNIWARD and HILL as baseline methods and Deng-Net as the targeted steganalyzer, the proposed approach improves the average detection accuracy of 4.88% and 2.47% for S-UNIWARD and HILL, respectively. In comparison, the existing works only achieve improvements of 2.88% and 2.93% for S-UNIWARD, and 1.44% and 1.12% for HILL, respectively.

逆向嵌入可以欺骗基于 CNN 的隐写分析器,已成为提高图像隐写术安全性的一种有效策略。然而,在面对经过重新训练或未知的隐分析器时,它的功效很容易被削弱。在这项研究中,通过集合隐写分析和对抗性扰动最小化,基于对抗性嵌入的图像隐写术的安全性得到了进一步提高。与依赖单一目标隐分析器的现有工作不同,所提出的方法开发了一种集合隐分析分类器,利用多数投票规则,智能地选择那些更适合进行对抗性嵌入的像素。为了减轻对抗性嵌入造成的干扰,采用了两种策略。首先,按像素梯度振幅将封面图像划分为两个非重叠区域。梯度幅度较大的区域逐步进行对抗性嵌入,直到目标隐分析仪被有效欺骗为止。其次,对嵌入成本进行微调,以尽量减少图像质量的下降。广泛的实验结果表明,所提出的方法实现了卓越的隐写术安全性。在黑盒攻击下,以 S-UNIWARD 和 HILL 为基线方法,Deng-Net 为目标隐写分析器,提出的方法提高了 S-UNIWARD 和 HILL 的平均检测准确率,分别为 4.88% 和 2.47%。相比之下,现有方法对 S-UNIWARD 和 HILL 的平均检测准确率仅分别提高了 2.88% 和 2.93%,对 S-UNIWARD 和 HILL 的平均检测准确率仅分别提高了 1.44% 和 1.12%。
{"title":"Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization","authors":"Dewang Wang ,&nbsp;Gaobo Yang ,&nbsp;Zhiqing Guo ,&nbsp;Jiyou Chen","doi":"10.1016/j.jisa.2024.103835","DOIUrl":"10.1016/j.jisa.2024.103835","url":null,"abstract":"<div><p>Adversarial embedding, which can deceive the CNN-based steganalyzers, has emerged as an effective strategy to improve image steganography security. However, its efficacy might be easily weakened when confronting re-trained or unknown steganalyzers. In this work, the security of adversarial embedding-based image steganography is further improved by ensemble steganalysis and adversarial perturbation minimization. Different from the existing works that rely on a single targeted steganalyzer, the proposed approach develops an ensemble steganographic classifier, which leverages the majority voting rule to smartly select those pixels that are more suitable for adversarial embedding. To mitigate the interference caused by adversarial embedding, two strategies are adopted. Firstly, a cover image is divided into two non-overlapping regions in terms of pixel gradient amplitude. The regions with higher gradient amplitudes are progressively conducted with adversarial embedding until the targeted steganalyzer is effectively deceived. Secondly, the embedding costs are fine-tuned to minimize the degradation of image quality. Extensive experimental results demonstrate that the proposed approach achieves superior steganography security. Under black-box attacks, with S-UNIWARD and HILL as baseline methods and Deng-Net as the targeted steganalyzer, the proposed approach improves the average detection accuracy of 4.88% and 2.47% for S-UNIWARD and HILL, respectively. In comparison, the existing works only achieve improvements of 2.88% and 2.93% for S-UNIWARD, and 1.44% and 1.12% for HILL, respectively.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103835"},"PeriodicalIF":3.8,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141960703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1