首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
GMADV: An android malware variant generation and classification adversarial training framework GMADV:安卓恶意软件变体生成与分类对抗训练框架
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1016/j.jisa.2024.103800
Shuangcheng Li , Zhangguo Tang , Huanzhou Li , Jian Zhang , Han Wang , Junfeng Wang

Android malware uses anti-reverse analysis and APK shelling technology, which leads to the failure of the classification method based on decompiled features and the reduction of the classification accuracy based on single file features. Moreover, the lack of samples in some families of Android malware makes the classification model based on sample learning ineffective. To solve the above problems, this paper proposes a two-layer general framework for Android malware classification and adversarial training named GMADV, which enhances classifier performance through adversarial training. In the sample classification layer, based on the transformation method of the Markov model, it is proposed for the first time to convert the three files in the APK into RGB Markov images, and use VGG13 to automatically extract features and classification; In the variant amplification layer, the idea of "regression for generation" is firstly proposed, and GMM-GAN based on Gaussian process is designed to amplify the diversity of samples within the family. The experimental results show that RGB Markov images have better classification performance than grayscale images. On the three datasets, the classification effect after amplification has been improved to varying degrees, and all F1_Score reaches 95 %. Compared with other methods, GMADV has stronger family sample amplification ability and greater adversarial intensity.

安卓恶意软件采用反逆向分析和 APK 加壳技术,导致基于反编译特征的分类方法失效,基于单个文件特征的分类精度降低。此外,某些 Android 恶意软件家族缺乏样本,导致基于样本学习的分类模型失效。为解决上述问题,本文提出了一种用于安卓恶意软件分类和对抗训练的双层通用框架,命名为 GMADV,通过对抗训练提高分类器性能。在样本分类层,基于马尔可夫模型的变换方法,首次提出将APK中的三个文件转换为RGB马尔可夫图像,并利用VGG13自动提取特征并进行分类;在变体放大层,首次提出 "回归生成 "的思想,设计了基于高斯过程的GMM-GAN来放大族内样本的多样性。实验结果表明,RGB 马尔科夫图像的分类性能优于灰度图像。在三个数据集上,放大后的分类效果均有不同程度的提高,F1_Score 均达到 95%。与其他方法相比,GMADV 具有更强的族样本放大能力和更大的对抗强度。
{"title":"GMADV: An android malware variant generation and classification adversarial training framework","authors":"Shuangcheng Li ,&nbsp;Zhangguo Tang ,&nbsp;Huanzhou Li ,&nbsp;Jian Zhang ,&nbsp;Han Wang ,&nbsp;Junfeng Wang","doi":"10.1016/j.jisa.2024.103800","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103800","url":null,"abstract":"<div><p>Android malware uses anti-reverse analysis and APK shelling technology, which leads to the failure of the classification method based on decompiled features and the reduction of the classification accuracy based on single file features. Moreover, the lack of samples in some families of Android malware makes the classification model based on sample learning ineffective. To solve the above problems, this paper proposes a two-layer general framework for Android malware classification and adversarial training named GMADV, which enhances classifier performance through adversarial training. In the sample classification layer, based on the transformation method of the Markov model, it is proposed for the first time to convert the three files in the APK into RGB Markov images, and use VGG13 to automatically extract features and classification; In the variant amplification layer, the idea of \"regression for generation\" is firstly proposed, and GMM-GAN based on Gaussian process is designed to amplify the diversity of samples within the family. The experimental results show that RGB Markov images have better classification performance than grayscale images. On the three datasets, the classification effect after amplification has been improved to varying degrees, and all F1_Score reaches 95 %. Compared with other methods, GMADV has stronger family sample amplification ability and greater adversarial intensity.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103800"},"PeriodicalIF":5.6,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital image steganalysis using entropy driven deep neural network 利用熵驱动深度神经网络进行数字图像隐写分析
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1016/j.jisa.2024.103799
Saurabh Agarwal , Ki-Hyun Jung

Context-aware steganography techniques are quite popular due to their robustness. However, steganography techniques are misused to hide inappropriate information in some occurrences. In this paper, a new entropy-driven convolutional neural network is proposed to detect a stego-image. The proposed steganalysis method divides images into multiple sub-regions, and the highest entropy sub-regions are utilized for training the network. Small block size is used to eliminate the requirement of a pooling layer and to intact the flow of information content between the layers. A pooling layer is commonly used between the layers to reduce the size of the block at the cost of some information loss. The proposed method uses only sixteen non-trainable 3 × 3 size kernels, rather than thirty 3 × 3 and 5 × 5 size kernels used in the previous networks. In the proposed method, one global average pooling layer is considered to boost the performance at the last part of the network. The proposed method reduces the computational cost and improves detection accuracy. The proposed scheme is verified in the experimental analysis on the content-aware steganography algorithms, i.e., WOW, S-UNIWARD, and HILL, with multiple payloads. Two publicly available databases, i.e., BOWS2 and BOSSBase, are used to create numerous test scenarios.

上下文感知隐写技术因其鲁棒性而颇受欢迎。然而,在某些情况下,隐写技术会被滥用来隐藏不恰当的信息。本文提出了一种新的熵驱动卷积神经网络来检测偷窃图像。所提出的隐写分析方法将图像分成多个子区域,利用熵值最高的子区域来训练网络。采用小块尺寸以消除对汇集层的要求,并使各层之间的信息内容流动完好无损。层与层之间通常使用汇集层来减小数据块的大小,但会损失一些信息。建议的方法只使用 16 个不可训练的 3 × 3 大小的内核,而不是之前网络中使用的 30 个 3 × 3 和 5 × 5 大小的内核。建议的方法考虑了一个全局平均池化层,以提高网络最后部分的性能。提议的方法降低了计算成本,提高了检测精度。实验分析在多种有效载荷的内容感知隐写术算法(即 WOW、S-UNIWARD 和 HILL)上验证了所提出的方案。使用两个公开数据库(即 BOWS2 和 BOSSBase)创建了大量测试场景。
{"title":"Digital image steganalysis using entropy driven deep neural network","authors":"Saurabh Agarwal ,&nbsp;Ki-Hyun Jung","doi":"10.1016/j.jisa.2024.103799","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103799","url":null,"abstract":"<div><p>Context-aware steganography techniques are quite popular due to their robustness. However, steganography techniques are misused to hide inappropriate information in some occurrences. In this paper, a new entropy-driven convolutional neural network is proposed to detect a stego-image. The proposed steganalysis method divides images into multiple sub-regions, and the highest entropy sub-regions are utilized for training the network. Small block size is used to eliminate the requirement of a pooling layer and to intact the flow of information content between the layers. A pooling layer is commonly used between the layers to reduce the size of the block at the cost of some information loss. The proposed method uses only sixteen non-trainable 3 × 3 size kernels, rather than thirty 3 × 3 and 5 × 5 size kernels used in the previous networks. In the proposed method, one global average pooling layer is considered to boost the performance at the last part of the network. The proposed method reduces the computational cost and improves detection accuracy. The proposed scheme is verified in the experimental analysis on the content-aware steganography algorithms, i.e., WOW, S-UNIWARD, and HILL, with multiple payloads. Two publicly available databases, i.e., BOWS2 and BOSSBase, are used to create numerous test scenarios.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103799"},"PeriodicalIF":5.6,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473] 基于属性的扩展访问控制与物联网中的受控授权》更正[信息系统与应用期刊 76 (2023) 103473]
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.jisa.2024.103745
Saher Tegane , Khaled Hamouid , Mawloud Omar , Fouzi Semchedine , Abdelmalek Boudries
{"title":"Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]","authors":"Saher Tegane ,&nbsp;Khaled Hamouid ,&nbsp;Mawloud Omar ,&nbsp;Fouzi Semchedine ,&nbsp;Abdelmalek Boudries","doi":"10.1016/j.jisa.2024.103745","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103745","url":null,"abstract":"","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103745"},"PeriodicalIF":5.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624000486/pdfft?md5=95a42c03a527fd06486ccea74b387bf5&pid=1-s2.0-S2214212624000486-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141313670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Auth4App: Streamlining authentication for integrated cyber–physical environments Auth4App:简化集成网络物理环境的身份验证
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.jisa.2024.103802
Vagner Ereno Quincozes , Rodrigo Brandão Mansilha , Diego Kreutz , Charles Christian Miers , Roger Immich

The growing integration of mobile applications for user authentication has revolutionized user interactions with digital platforms, offering novel possibilities in user experience (UX). However, this paradigm shift poses significant security challenges. Leveraging smartphones for authentication purposes provides convenient and swift access to services, streamlining user interactions with various platforms through simple taps. Several institutions adopt static QR Codes generated from primary, unchanging user data (e.g., individual citizen national identification numbers) for physical authentication procedures like access turnstiles. However, relying on static data introduces critical security vulnerabilities as this data is susceptible to compromise. Implementing an One-Time Authentication Code (OTAC) approach appears promising in addressing these issues. Nevertheless, the absence of an integrated solution for developing a physical authentication process using OTAC leads to suboptimal API user experiences (UX APIs) and subsequent security vulnerabilities. In response to this challenge, we introduce Auth4App, a protocol set designed for identification and authentication using mobile applications. Auth4App comprises two core protocols: one dedicated to linking user credentials to mobile devices (i.e., identification), and the other for generating OTAC. We showcase the adaptability and practicality of Auth4App through three distinct case studies: a mobile-only scenario, integration of mobile devices with a turnstile, and integration of Auth4App with FIDO2. To ensure the robustness of the security protocols, Auth4App is evaluated using automated verification tools and argument proofs, solidifying the system’s reliability.

越来越多的移动应用集成了用户身份验证功能,彻底改变了用户与数字平台的交互方式,为用户体验(UX)提供了新的可能性。然而,这种模式的转变也带来了巨大的安全挑战。利用智能手机进行身份验证可以方便快捷地访问服务,通过简单的点击简化用户与各种平台的交互。一些机构采用由基本的、不变的用户数据(如公民个人身份证号码)生成的静态 QR 码来进行实体身份验证程序,如进入旋转栅门。然而,依赖静态数据会带来严重的安全漏洞,因为这些数据很容易被泄露。采用一次性验证码(OTAC)方法似乎有望解决这些问题。然而,由于缺乏使用 OTAC 开发物理身份验证流程的集成解决方案,导致 API 用户体验(UX API)不尽人意,并随之产生安全漏洞。为了应对这一挑战,我们推出了 Auth4App,这是一套专为使用移动应用程序进行身份识别和验证而设计的协议。Auth4App 包含两个核心协议:一个用于将用户凭证与移动设备相连(即识别),另一个用于生成 OTAC。我们通过三个不同的案例研究展示了 Auth4App 的适应性和实用性:纯移动场景、移动设备与旋转栅门的集成以及 Auth4App 与 FIDO2 的集成。为确保安全协议的稳健性,我们使用自动验证工具和论据证明对 Auth4App 进行了评估,从而巩固了系统的可靠性。
{"title":"Auth4App: Streamlining authentication for integrated cyber–physical environments","authors":"Vagner Ereno Quincozes ,&nbsp;Rodrigo Brandão Mansilha ,&nbsp;Diego Kreutz ,&nbsp;Charles Christian Miers ,&nbsp;Roger Immich","doi":"10.1016/j.jisa.2024.103802","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103802","url":null,"abstract":"<div><p>The growing integration of mobile applications for user authentication has revolutionized user interactions with digital platforms, offering novel possibilities in user experience (UX). However, this paradigm shift poses significant security challenges. Leveraging smartphones for authentication purposes provides convenient and swift access to services, streamlining user interactions with various platforms through simple taps. Several institutions adopt static QR Codes generated from primary, unchanging user data (e.g., individual citizen national identification numbers) for physical authentication procedures like access turnstiles. However, relying on static data introduces critical security vulnerabilities as this data is susceptible to compromise. Implementing an One-Time Authentication Code (OTAC) approach appears promising in addressing these issues. Nevertheless, the absence of an integrated solution for developing a physical authentication process using OTAC leads to suboptimal API user experiences (UX APIs) and subsequent security vulnerabilities. In response to this challenge, we introduce Auth4App, a protocol set designed for identification and authentication using mobile applications. Auth4App comprises two core protocols: one dedicated to linking user credentials to mobile devices (i.e., identification), and the other for generating OTAC. We showcase the adaptability and practicality of Auth4App through three distinct case studies: a mobile-only scenario, integration of mobile devices with a turnstile, and integration of Auth4App with FIDO2. To ensure the robustness of the security protocols, Auth4App is evaluated using automated verification tools and argument proofs, solidifying the system’s reliability.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103802"},"PeriodicalIF":5.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141240092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage 一种用于云存储的无配对动态多接收器无证书认证可搜索加密技术
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.jisa.2024.103801
Venkata Bhikshapathi Chenam, Syed Taqi Ali

In the current age of constrained local storage capacity, ensuring the security and privacy of user data against unauthorized third-party access has grown significantly more vital. Searchable Encryption (SE) has arisen as a promising method for preserving the confidentiality of user data while also enabling efficient search capabilities. Certificateless Searchable Encryption (CLSE) stands out among a range of SE cryptosystems by effectively addressing issues related to certification management and key escrow. Nevertheless, the majority of current CLSE approaches heavily depend on computationally intensive bilinear pairings and do not offer robust support for conjunctive keyword searches in multi-receiver scenarios. To address these limitations, we propose a Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption (PDMCLASE) scheme. PDMCLASE focuses on three essential features: (1) Dynamic multi-receiver functionality, enabling new data receivers to access documents while revoking access for existing receivers; (2) Conjunctive subset keyword search, empowering data receivers to perform efficient conjunctive searches on subsets of keywords; and (3) Data sender authentication, ensuring the authenticity of keyword encryption by the data sender. Furthermore, PDMCLASE attains keyword privacy by leveraging elliptic curve hardness problems within the standard model. Through our performance analysis, we establish that PDMCLASE not only delivers improved functionality but also demonstrates reduced computational overhead when compared to alternative schemes.

在当前本地存储容量有限的时代,确保用户数据的安全性和隐私性,防止未经授权的第三方访问,已变得越来越重要。可搜索加密(SE)作为一种有前途的方法应运而生,它既能保护用户数据的机密性,又能实现高效的搜索功能。无证书可搜索加密(CLSE)通过有效解决与证书管理和密钥托管相关的问题,在一系列 SE 密码系统中脱颖而出。然而,目前大多数 CLSE 方法都严重依赖于计算密集型双线性配对,无法为多接收器场景中的连接关键词搜索提供强大支持。为了解决这些局限性,我们提出了一种无配对动态多接收方无认证可搜索加密(PDMCLASE)方案。PDMCLASE 有三个基本特征:(1) 动态多接收器功能,使新的数据接收器能够访问文档,同时撤销现有接收器的访问权限;(2) 连接子集关键字搜索,使数据接收器能够对关键字子集执行高效的连接搜索;以及 (3) 数据发送者认证,确保数据发送者对关键字加密的真实性。此外,PDMCLASE 利用标准模型中的椭圆曲线硬度问题实现了关键词隐私保护。通过性能分析,我们发现与其他方案相比,PDMCLASE 不仅提供了更好的功能,而且减少了计算开销。
{"title":"A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage","authors":"Venkata Bhikshapathi Chenam,&nbsp;Syed Taqi Ali","doi":"10.1016/j.jisa.2024.103801","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103801","url":null,"abstract":"<div><p>In the current age of constrained local storage capacity, ensuring the security and privacy of user data against unauthorized third-party access has grown significantly more vital. Searchable Encryption (SE) has arisen as a promising method for preserving the confidentiality of user data while also enabling efficient search capabilities. Certificateless Searchable Encryption (CLSE) stands out among a range of SE cryptosystems by effectively addressing issues related to certification management and key escrow. Nevertheless, the majority of current CLSE approaches heavily depend on computationally intensive bilinear pairings and do not offer robust support for conjunctive keyword searches in multi-receiver scenarios. To address these limitations, we propose a Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption (PDMCLASE) scheme. PDMCLASE focuses on three essential features: (1) Dynamic multi-receiver functionality, enabling new data receivers to access documents while revoking access for existing receivers; (2) Conjunctive subset keyword search, empowering data receivers to perform efficient conjunctive searches on subsets of keywords; and (3) Data sender authentication, ensuring the authenticity of keyword encryption by the data sender. Furthermore, PDMCLASE attains keyword privacy by leveraging elliptic curve hardness problems within the standard model. Through our performance analysis, we establish that PDMCLASE not only delivers improved functionality but also demonstrates reduced computational overhead when compared to alternative schemes.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103801"},"PeriodicalIF":5.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141249905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing robustness in video data hiding against recompression with a wide parameter range 在宽参数范围内增强视频数据隐藏对重新压缩的稳健性
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-29 DOI: 10.1016/j.jisa.2024.103796
Yanli Chen , Asad Malik , Hongxia Wang , Ben He , Yonghui Zhou , Hanzhou Wu

With the exponential growth of online videos and the availability of advanced video editing tools, the integrity of videos is increasingly threatened by various cyber-based attacks, particularly recompression attacks. Different recompression parameters are used for various attack scenarios. However, recompression operations can modify video data and cause authentication failures, especially for videos with integrated authentication information. To address this issue, this research proposes a robust video data concealing strategy to protect authentication information during recompression operations. By analyzing the impact of recompression on the reference and encoded components of a video, a robust embedding entity is developed. This entity enables the identification of suitable embedding parameters that minimize distortion caused by recompression. Based on the embedding entity and parameters, a scheme is proposed to hide data using two embedding methods, thereby enhancing the robustness of the overall approach. The performance of the scheme is evaluated based on criteria such as the correct rate of extracted information and the quality of marked videos. Hypothesis testing is employed to assess the confidence level. In comparison to existing robust video data hiding methods against recompression, our scheme demonstrates the ability to preserve more information during recompression, particularly with Quantization Parameters (QP) ranging from 25 to 34. This is achieved when the test videos are initially compressed with QP=28.

随着在线视频的指数级增长和先进视频编辑工具的出现,视频的完整性日益受到各种网络攻击的威胁,尤其是重压缩攻击。不同的重压缩参数用于不同的攻击场景。然而,重压缩操作会修改视频数据并导致身份验证失败,尤其是对于集成了身份验证信息的视频。针对这一问题,本研究提出了一种稳健的视频数据隐藏策略,以在重新压缩操作过程中保护身份验证信息。通过分析重新压缩对视频参考和编码组件的影响,开发了一种稳健的嵌入实体。通过该实体,可以确定合适的嵌入参数,从而最大限度地减少重新压缩造成的失真。在嵌入实体和参数的基础上,提出了一种使用两种嵌入方法隐藏数据的方案,从而增强了整个方法的鲁棒性。根据提取信息的正确率和标记视频的质量等标准,对该方案的性能进行了评估。采用假设检验来评估置信度。与现有的针对重压缩的稳健视频数据隐藏方法相比,我们的方案在重压缩过程中能够保留更多信息,尤其是在量化参数(QP)为 25 到 34 的情况下。当测试视频最初以 QP=28 进行压缩时,就能实现这一点。
{"title":"Enhancing robustness in video data hiding against recompression with a wide parameter range","authors":"Yanli Chen ,&nbsp;Asad Malik ,&nbsp;Hongxia Wang ,&nbsp;Ben He ,&nbsp;Yonghui Zhou ,&nbsp;Hanzhou Wu","doi":"10.1016/j.jisa.2024.103796","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103796","url":null,"abstract":"<div><p>With the exponential growth of online videos and the availability of advanced video editing tools, the integrity of videos is increasingly threatened by various cyber-based attacks, particularly recompression attacks. Different recompression parameters are used for various attack scenarios. However, recompression operations can modify video data and cause authentication failures, especially for videos with integrated authentication information. To address this issue, this research proposes a robust video data concealing strategy to protect authentication information during recompression operations. By analyzing the impact of recompression on the reference and encoded components of a video, a robust embedding entity is developed. This entity enables the identification of suitable embedding parameters that minimize distortion caused by recompression. Based on the embedding entity and parameters, a scheme is proposed to hide data using two embedding methods, thereby enhancing the robustness of the overall approach. The performance of the scheme is evaluated based on criteria such as the correct rate of extracted information and the quality of marked videos. Hypothesis testing is employed to assess the confidence level. In comparison to existing robust video data hiding methods against recompression, our scheme demonstrates the ability to preserve more information during recompression, particularly with Quantization Parameters (QP) ranging from 25 to 34. This is achieved when the test videos are initially compressed with QP=28.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103796"},"PeriodicalIF":5.6,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141164118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain ZeroMT:为基于账户的区块链实现具有隐私性的多重转账交易
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-29 DOI: 10.1016/j.jisa.2024.103794
Emanuele Scala , Changyu Dong , Flavio Corradini , Leonardo Mostarda

The public blockchain lacks data confidentiality. Although a level of anonymity seems guaranteed, it is still possible to link transactions and disclose related information. A solution to the privacy problem is to use cryptography in transactions, however this can lead to increased costs and slowdown in network throughput. Recent works experiment with advanced cryptography, in particular Zero-Knowledge proofs (ZK-proofs) can be supplied within a transaction to prove its validity, without revealing sensitive information. We analyze solutions that adopt ZK-proofs, such as Confidential Transactions (CTs). Several challenges emerge depending on both the zero-knowledge system and the balance model considered (UTXO, hybrid or account model). For ZK-proofs, systems that do not introduce additional trust are required. On the other hand, the account model is the most flexible for addressing security challenges. Moreover, CTs do not fully exploit the potential of ZK-proofs, since each transaction comes with one or more ZK-proof for a single transfer. Within this paper, we present ZeroMT, a novel multi-transfer private payment scheme for account-based blockchains. Drawing inspiration from Zether, our approach extends their work to develop a payment model that supports multiple payees within a single transaction. This also benefits scalability: ZeroMT enriches the CTs with the aggregation property, i.e., the batch verification of multiple transfers from a single and aggregate proof. We show that in our extended model the overdraft-safety and privacy security properties still hold. We provide an implementation and evaluation of ZeroMT, which shows the benefits of aggregating multiple transfers.

公共区块链缺乏数据保密性。虽然一定程度的匿名性似乎得到了保证,但仍有可能将交易联系起来并披露相关信息。解决隐私问题的办法是在交易中使用加密技术,但这会导致成本增加和网络吞吐量减慢。最近的研究尝试使用先进的加密技术,特别是零知识证明(ZK-proofs),可以在不泄露敏感信息的情况下,在交易中提供零知识证明以证明其有效性。我们分析了采用 ZK 证明的解决方案,如保密交易 (CT)。根据所考虑的零知识系统和余额模型(UTXO、混合或账户模型),会出现一些挑战。对于零知识验证,需要不引入额外信任的系统。另一方面,账户模式在应对安全挑战方面最为灵活。此外,CT 并不能充分发挥 ZK-proofs 的潜力,因为每笔交易都会为单次转账带来一个或多个 ZK-proof。在本文中,我们介绍了 ZeroMT,一种基于账户的区块链新型多转账私人支付方案。从 Zether 中汲取灵感,我们的方法扩展了他们的工作,开发出一种在单笔交易中支持多个收款人的支付模型。这也有利于可扩展性:ZeroMT 利用聚合属性丰富了 CT,即通过单个聚合证明对多个转账进行批量验证。我们证明,在我们的扩展模型中,透支安全和隐私安全属性仍然成立。我们提供了 ZeroMT 的实现和评估,显示了聚合多个转账的好处。
{"title":"ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain","authors":"Emanuele Scala ,&nbsp;Changyu Dong ,&nbsp;Flavio Corradini ,&nbsp;Leonardo Mostarda","doi":"10.1016/j.jisa.2024.103794","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103794","url":null,"abstract":"<div><p>The public blockchain lacks data confidentiality. Although a level of anonymity seems guaranteed, it is still possible to link transactions and disclose related information. A solution to the privacy problem is to use cryptography in transactions, however this can lead to increased costs and slowdown in network throughput. Recent works experiment with advanced cryptography, in particular Zero-Knowledge proofs (ZK-proofs) can be supplied within a transaction to prove its validity, without revealing sensitive information. We analyze solutions that adopt ZK-proofs, such as Confidential Transactions (CTs). Several challenges emerge depending on both the zero-knowledge system and the balance model considered (UTXO, hybrid or account model). For ZK-proofs, systems that do not introduce additional trust are required. On the other hand, the account model is the most flexible for addressing security challenges. Moreover, CTs do not fully exploit the potential of ZK-proofs, since each transaction comes with one or more ZK-proof for a single transfer. Within this paper, we present ZeroMT, a novel <em>multi-transfer</em> private payment scheme for account-based blockchains. Drawing inspiration from Zether, our approach extends their work to develop a payment model that supports multiple payees within a single transaction. This also benefits scalability: ZeroMT enriches the CTs with the aggregation property, i.e., the batch verification of multiple transfers from a single and aggregate proof. We show that in our extended model the overdraft-safety and privacy security properties still hold. We provide an implementation and evaluation of ZeroMT, which shows the benefits of aggregating multiple transfers.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103794"},"PeriodicalIF":5.6,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624000978/pdfft?md5=4c1ef252f50a68b5e8dc876f81b4fde6&pid=1-s2.0-S2214212624000978-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141164526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel DNA tree-based chaotic image encryption algorithm 基于 DNA 树的新型混沌图像加密算法
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-28 DOI: 10.1016/j.jisa.2024.103791
Moatsum Alawida

For confidential transmission of information over open channels, image encryption algorithms offer a vital method to safeguard content. Traditional ciphers often prove inefficient for large, correlated content like digital images. To address this, DNA and digital chaos are utilized in the creation of numerous image ciphers. Most DNA chaotic image ciphers utilize DNA bases for substitution and chaotic maps for permutation operations. This paper introduces a novel approach wherein the secret key is generated by a DNA tree, providing complete control over all components of the image cipher. A new chaotic state machine map (CSMM) is proposed, incorporating a finite state machine and a one-dimensional (1D) perturbed logistic chaotic map controlled by a DNA state transition table. The CSMM enhances security while maintaining efficient implementation. The DNA tree is employed to generate a DNA table consisting of 256 values representing DNA bases. This table is used to convert digital images into DNA bases and chaotic points into DNA bases. Chaotic DNA bases facilitate permutation operations, while the DNA table is utilized to generate a DNA S-box for substitution operations. The encryption process involves two rounds of permutations and substitutions, coupled with XOR operations, using all DNA bases in the digital image. The resulting cipher effectively encrypts digital images of various sizes and types. Experimental results demonstrate that the proposed cipher generates noise-like images and withstands rigorous security tests, including differential attack analysis and entropy measurements, all accomplished in a short amount of time.

对于通过公开渠道传输机密信息而言,图像加密算法是保护内容安全的重要方法。对于像数字图像这样的大型相关内容,传统的加密算法往往效率低下。为了解决这个问题,DNA 和数字混沌被用于创建许多图像密码。大多数 DNA 混沌图像密码利用 DNA 碱基进行替换,利用混沌图进行排列操作。本文介绍了一种新方法,即由 DNA 树生成秘钥,从而完全控制图像密码的所有组成部分。本文提出了一种新的混沌状态机图(CSMM),其中包含一个有限状态机和一个由 DNA 状态转换表控制的一维(1D)扰动逻辑混沌图。CSMM 增强了安全性,同时保持了高效的执行。DNA 树用于生成一个由代表 DNA 碱基的 256 个值组成的 DNA 表。该表用于将数字图像转换为 DNA 碱基,将混沌点转换为 DNA 碱基。混沌 DNA 碱基便于进行排列操作,而 DNA 表则用于生成 DNA S 框,以进行替换操作。加密过程包括两轮排列和置换,以及使用数字图像中的所有 DNA 碱基进行 XOR 运算。由此产生的密码能有效地加密各种尺寸和类型的数字图像。实验结果表明,所提出的密码能生成类似噪声的图像,并能经受严格的安全测试,包括差分攻击分析和熵测量,所有这些都是在短时间内完成的。
{"title":"A novel DNA tree-based chaotic image encryption algorithm","authors":"Moatsum Alawida","doi":"10.1016/j.jisa.2024.103791","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103791","url":null,"abstract":"<div><p>For confidential transmission of information over open channels, image encryption algorithms offer a vital method to safeguard content. Traditional ciphers often prove inefficient for large, correlated content like digital images. To address this, DNA and digital chaos are utilized in the creation of numerous image ciphers. Most DNA chaotic image ciphers utilize DNA bases for substitution and chaotic maps for permutation operations. This paper introduces a novel approach wherein the secret key is generated by a DNA tree, providing complete control over all components of the image cipher. A new chaotic state machine map (CSMM) is proposed, incorporating a finite state machine and a one-dimensional (1D) perturbed logistic chaotic map controlled by a DNA state transition table. The CSMM enhances security while maintaining efficient implementation. The DNA tree is employed to generate a DNA table consisting of 256 values representing DNA bases. This table is used to convert digital images into DNA bases and chaotic points into DNA bases. Chaotic DNA bases facilitate permutation operations, while the DNA table is utilized to generate a DNA S-box for substitution operations. The encryption process involves two rounds of permutations and substitutions, coupled with XOR operations, using all DNA bases in the digital image. The resulting cipher effectively encrypts digital images of various sizes and types. Experimental results demonstrate that the proposed cipher generates noise-like images and withstands rigorous security tests, including differential attack analysis and entropy measurements, all accomplished in a short amount of time.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103791"},"PeriodicalIF":5.6,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141164525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving manipulated and synthetic Deepfake detection through face texture naturalness 通过人脸纹理的自然性来保护人工合成的 Deepfake 检测结果
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-25 DOI: 10.1016/j.jisa.2024.103798
Chit-Jie Chew, Yu-Cheng Lin, Ying-Chin Chen, Yun-Yi Fan, Jung-San Lee

With the rapid development of deep learning and face recognition technology, AI(Artificial Intelligence) experts have rated Deepfake cheating as the top AI threat. It is difficult for the human eye to distinguish the fake face images generated by Deepfake. Therefore, it has become a popular tool for criminals to seek benefits. Deepfake can be mainly divided into two types, a manipulated Deepfake that falsifies images of others by targeting real faces, and a synthetic Deepfake using GAN to generate a new fake image. So far, seldom cybersecurity system is able to detect these two types simultaneously. In this article, we aim to propose a hybrid Deepfake detection mechanism (HDDM) based on face texture and naturalness degree. HDDM constructs a unique texture from a facial image based on CNN(Convolutional Neural Network) and builds a naturalness degree recognition model via DNN(Deep Neural Network) to help cheating detection. Experimental results have proved that HDDM possesses a sound effect and stability for synthetic and manipulated Deepfake attacks. In particular, the WildDeepfake simulation has demonstrated the possibility of applying HDDM to the real world.

随着深度学习和人脸识别技术的飞速发展,人工智能(Artificial Intelligence)专家已将 Deepfake 欺骗列为人工智能的首要威胁。人眼很难分辨 Deepfake 生成的虚假人脸图像。因此,它已成为不法分子谋取利益的常用工具。Deepfake主要分为两种类型,一种是针对真实人脸伪造他人图像的操纵型Deepfake,另一种是利用GAN生成新的假图像的合成型Deepfake。迄今为止,很少有网络安全系统能同时检测到这两种类型。本文旨在提出一种基于人脸纹理和自然度的混合 Deepfake 检测机制(HDDM)。HDDM 基于 CNN(卷积神经网络)从人脸图像中构建独特的纹理,并通过 DNN(深度神经网络)建立自然度识别模型,以帮助作弊检测。实验结果证明,HDDM 对合成和操纵 Deepfake 攻击具有良好的效果和稳定性。尤其是 WildDeepfake 仿真证明了将 HDDM 应用于现实世界的可能性。
{"title":"Preserving manipulated and synthetic Deepfake detection through face texture naturalness","authors":"Chit-Jie Chew,&nbsp;Yu-Cheng Lin,&nbsp;Ying-Chin Chen,&nbsp;Yun-Yi Fan,&nbsp;Jung-San Lee","doi":"10.1016/j.jisa.2024.103798","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103798","url":null,"abstract":"<div><p>With the rapid development of deep learning and face recognition technology, AI(Artificial Intelligence) experts have rated Deepfake cheating as the top AI threat. It is difficult for the human eye to distinguish the fake face images generated by Deepfake. Therefore, it has become a popular tool for criminals to seek benefits. Deepfake can be mainly divided into two types, a manipulated Deepfake that falsifies images of others by targeting real faces, and a synthetic Deepfake using GAN to generate a new fake image. So far, seldom cybersecurity system is able to detect these two types simultaneously. In this article, we aim to propose a hybrid Deepfake detection mechanism (HDDM) based on face texture and naturalness degree. HDDM constructs a unique texture from a facial image based on CNN(Convolutional Neural Network) and builds a naturalness degree recognition model via DNN(Deep Neural Network) to help cheating detection. Experimental results have proved that HDDM possesses a sound effect and stability for synthetic and manipulated Deepfake attacks. In particular, the WildDeepfake simulation has demonstrated the possibility of applying HDDM to the real world.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103798"},"PeriodicalIF":5.6,"publicationDate":"2024-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141097746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GR-NTRU: Dihedral group over ring of Eisenstein integers GR-NTRU: 爱森斯坦整数环上的二面群
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-24 DOI: 10.1016/j.jisa.2024.103795
Vikas Kumar , Rohan Das , Aditi Kar Gangopadhyay

NTRU is a lattice-based cryptosystem built on a convolutional ring of polynomials. There are many generalizations of NTRU in the literature; however, group ring NTRU, or GR-NTRU, is the most reasonable description of NTRU as a general framework to design its variants. Most versions are commutative and are obtained by changing the ring of coefficients while keeping the cyclic structure intact. In this work, we analyze the noncommutative version of GR-NTRU designed with the group ring of dihedral group over the ring of Eisenstein integers. We experimentally test the size of the keyspace of this new variant and find that it is comparable and even larger for certain parameters compared to the existing commutative counterpart. We observe that although it is slightly slow in terms of speed of encryption and decryption, it has higher lattice security.

NTRU 是一种基于网格的密码系统,建立在多项式的卷积环上。文献中有许多对 NTRU 的概括;然而,群环 NTRU 或 GR-NTRU 是对 NTRU 最合理的描述,是设计其变体的一般框架。大多数版本都是交换型的,通过改变系数环而获得,同时保持循环结构不变。在这项工作中,我们分析了用爱森斯坦整数环上的二面体群组环设计的 GR-NTRU 的非交换版本。我们通过实验测试了这种新变体的密钥空间大小,发现它与现有的交换型对应程序相当,甚至在某些参数下更大。我们观察到,虽然它的加密和解密速度稍慢,但它具有更高的晶格安全性。
{"title":"GR-NTRU: Dihedral group over ring of Eisenstein integers","authors":"Vikas Kumar ,&nbsp;Rohan Das ,&nbsp;Aditi Kar Gangopadhyay","doi":"10.1016/j.jisa.2024.103795","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103795","url":null,"abstract":"<div><p>NTRU is a lattice-based cryptosystem built on a convolutional ring of polynomials. There are many generalizations of NTRU in the literature; however, group ring NTRU, or GR-NTRU, is the most reasonable description of NTRU as a general framework to design its variants. Most versions are commutative and are obtained by changing the ring of coefficients while keeping the cyclic structure intact. In this work, we analyze the noncommutative version of GR-NTRU designed with the group ring of dihedral group over the ring of Eisenstein integers. We experimentally test the size of the keyspace of this new variant and find that it is comparable and even larger for certain parameters compared to the existing commutative counterpart. We observe that although it is slightly slow in terms of speed of encryption and decryption, it has higher lattice security.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103795"},"PeriodicalIF":5.6,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141090285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1