thumbnail

EURASIP Journal on Information Security

ESCI-ISI SCOPUS (2007-2023)

  2510-523X

 

 

 

Cơ quản chủ quản:  SpringerOpen , SPRINGER INT PUBL AG

Lĩnh vực:
Computer Science ApplicationsSignal Processing

Phân tích ảnh hưởng

Các bài báo tiêu biểu

Swapped face detection using deep learning and subjective assessment
- 2020
Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul S. Krueger, Michael Hahsler
AbstractThe tremendous success of deep learning for imaging applications has resulted in numerous beneficial advances. Unfortunately, this success has also been a catalyst for malicious uses such as photo-realistic face swapping of parties without consent. In this study, we use deep transfer learning for face swapping detection, showing true positive rates greater ...... hiện toàn bộ
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment
Tập 2020 Số 1 - 2020
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
AbstractThe rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective rega...... hiện toàn bộ
Proposing a reliable method of securing and verifying the credentials of graduates through blockchain
- 2021
T. Rama Reddy, P. Jayarama Reddy, Rayudu Srinivas, Ch. V. Raghavendran, R. V. S. Lalitha, B. Annapurna
AbstractEducation acts as a soul in the overall societal development, in one way or the other. Aspirants, who gain their degrees genuinely, will help society with their knowledge and skills. But, on the other side of the coin, the problem of fake certificates is alarming and worrying. It has been prevalent in different forms from paper-based dummy certificates to r...... hiện toàn bộ
Use of SHDM in commutative watermarking encryption
Tập 2021 Số 1 - 2021
Roland Schmitz
AbstractSHDM stands for Sphere-Hardening Dither Modulation and is a watermarking algorithm based on quantizing the norm of a vector extracted from the cover work. We show how SHDM can be integrated into a fully commutative watermarking-encryption scheme and investigate implementations in the spatial, DCT, and DWT domain with respect to their fidelity, robustness, c...... hiện toàn bộ
OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks
- 2018
Julio Navarro, Véronique Legrand, Aline Deruyver, Pierre Parrend
Research on gray correlation analysis and situation prediction of network information security
- 2021
Chengqiong Ye, Wenyu Shi, Rui Zhang
AbstractIn order to further improve the accuracy and efficiency of network information security situation prediction, this study used the dynamic equal-dimensional method based on gray correlation analysis to improve the GM (1, N) model and carried out an experiment on the designed network security situation prediction (NSSP) model in a simulated network environmen...... hiện toàn bộ
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM
Tập 2023 Số 1
Xiaoning Wang, Jia Liu, Chunjiong Zhang
AbstractDifferent types of network traffic can be treated as data originating from different domains with the same objectives of problem-solving. Previous work utilizing multi-domain machine learning has primarily assumed that data in different domains have the same distribution, which fails to effectively address the domain offset problem and may not achieve excel...... hiện toàn bộ
Estimating Previous Quantization Factors on Multiple JPEG Compressed Images
Tập 2021 Số 1 - 2021
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signals which are typically exploited for forensic purposes: for instance, the compression parameters of the acquisition device (or editing software) could...... hiện toàn bộ
“Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant
Tập 2022 Số 1
Filipo Sharevski, Peter Jachim
AbstractThis paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelligent voice assistants can hardly utilize visual cues but provide for convenient interaction with users, we developed an interaction-based...... hiện toàn bộ
Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN
Ming Li
AbstractWireless sensor networks, as an emerging information exchange technology, have been widely applied in many fields. However, nodes tend to become damaged in harsh and complex environmental conditions. In order to effectively diagnose node faults, a Bayesian model-based node fault diagnosis model was proposed. Firstly, a comprehensive analysis was conducted i...... hiện toàn bộ