thumbnail

EURASIP Journal on Information Security

ESCI-ISI SCOPUS (2007-2025)

  2510-523X

 

 

 

Cơ quản chủ quản:  SpringerOpen , SPRINGER INT PUBL AG

Lĩnh vực:
Computer Science ApplicationsSignal Processing

Phân tích ảnh hưởng

Các bài báo tiêu biểu

Swapped face detection using deep learning and subjective assessment
- 2020
Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul S. Krueger, Michael Hahsler
AbstractThe tremendous success of deep learning for imaging applications has resulted in numerous beneficial advances. Unfortunately, this success has also been a catalyst for malicious uses such as photo-realistic face swapping of parties without consent. In this study, we use deep transfer learning for face swapping detection, showing true positive rates greater than 96% with very few false alar... hiện toàn bộ
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment
Tập 2020 Số 1 - 2020
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
AbstractThe rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective regarding the efficiency of medical i... hiện toàn bộ
Proposing a reliable method of securing and verifying the credentials of graduates through blockchain
- 2021
T. Rama Reddy, P. Jayarama Reddy, Rayudu Srinivas, Ch. V. Raghavendran, R. V. S. Lalitha, B. Annapurna
AbstractEducation acts as a soul in the overall societal development, in one way or the other. Aspirants, who gain their degrees genuinely, will help society with their knowledge and skills. But, on the other side of the coin, the problem of fake certificates is alarming and worrying. It has been prevalent in different forms from paper-based dummy certificates to replicas backed with database tamp... hiện toàn bộ
Use of SHDM in commutative watermarking encryption
Tập 2021 Số 1 - 2021
Roland Schmitz
AbstractSHDM stands for Sphere-Hardening Dither Modulation and is a watermarking algorithm based on quantizing the norm of a vector extracted from the cover work. We show how SHDM can be integrated into a fully commutative watermarking-encryption scheme and investigate implementations in the spatial, DCT, and DWT domain with respect to their fidelity, robustness, capacity, and security of encrypti... hiện toàn bộ
OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks
- 2018
Julio Navarro, Véronique Legrand, Aline Deruyver, Pierre Parrend
Research on gray correlation analysis and situation prediction of network information security
- 2021
Chengqiong Ye, Wenyu Shi, Rui Zhang
AbstractIn order to further improve the accuracy and efficiency of network information security situation prediction, this study used the dynamic equal-dimensional method based on gray correlation analysis to improve the GM (1, N) model and carried out an experiment on the designed network security situation prediction (NSSP) model in a simulated network environment. It was found that the predicte... hiện toàn bộ
Estimating Previous Quantization Factors on Multiple JPEG Compressed Images
Tập 2021 Số 1 - 2021
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signals which are typically exploited for forensic purposes: for instance, the compression parameters of the acquisition device (or editing software) could be inferred. To this aim, in thi... hiện toàn bộ
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM
Tập 2023 Số 1
Xiaoning Wang, Jia Liu, Chunjiong Zhang
AbstractDifferent types of network traffic can be treated as data originating from different domains with the same objectives of problem-solving. Previous work utilizing multi-domain machine learning has primarily assumed that data in different domains have the same distribution, which fails to effectively address the domain offset problem and may not achieve excellent performance in every domain.... hiện toàn bộ
Behavior-based user authentication on mobile devices in various usage contexts
Tập 2022 Số 1
Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko, Andriy Oliynyk
AbstractReliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on “device unlock” scenario—checking of information (authentication factors) provided by the user for unlocking a smartphone. As such factors, we may use either single strong authentication fac... hiện toàn bộ
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks
Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman, Habib Hamam
AbstractThe research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in military security applications. A multi-agent context-aware model employing the belief-desire-intention (BDI) reasoning mechanism is proposed. This model utilizes a semantic knowledge-based intelligent reasoning network to monitor suspicious activit... hiện toàn bộ