Phát hiện giọng nói tổng hợp qua dấu vết dự đoán ngắn hạn và dài hạn Dịch bởi AI EURASIP Journal on Information Security - - 2021
Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro
Nhiều phương pháp tạo ra giọng nói tổng hợp đã được phát triển trong tài liệu qua nhiều năm. Với những tiến bộ công nghệ lớn do học sâu mang lại, nhiều kỹ thuật giọng nói tổng hợp mới đạt được kết quả thực tế đáng kinh ngạc gần đây đã được đề xuất. Khi những phương pháp này tạo ra giọng nói giả mạo con người thuyết phục, chúng có thể được sử dụng theo cách độc hại để ảnh hưởng tiêu cực đến xã hội ...... hiện toàn bộ
#giọng nói tổng hợp #phát hiện giọng nói #học sâu #xử lý giọng nói #giả mạo #tin giả
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environmentEURASIP Journal on Information Security - Tập 2020 Số 1 - 2020
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
AbstractThe rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective rega...... hiện toàn bộ
Estimating Previous Quantization Factors on Multiple JPEG Compressed ImagesEURASIP Journal on Information Security - Tập 2021 Số 1 - 2021
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signals which are typically exploited for forensic purposes: for instance, the compression parameters of the acquisition device (or editing software) could...... hiện toàn bộ
Behavior-based user authentication on mobile devices in various usage contextsEURASIP Journal on Information Security - Tập 2022 Số 1
Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko, Andriy Oliynyk
AbstractReliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on “device unlock” scenario—checking of information (authentication factors) provided by the user for unlocking a smartphone. As such factors, we may use either...... hiện toàn bộ
VISION: a video and image dataset for source identificationEURASIP Journal on Information Security - Tập 2017 - Trang 1-16 - 2017
Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya, Alessandro Piva
Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of resolution, source device, and processing history. Remarkably, in the latest years, portable devices became the preferred means to capture images and videos, and contents are commonly shared thro...... hiện toàn bộ
Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissionsEURASIP Journal on Information Security - Tập 2018 - Trang 1-16 - 2018
Jonathan Martínez Padilla, Uwe Meyer-Baese, Simon Foo
In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented within the MATLAB environment that explores various scenarios in which the TPM may be compromised. Performance metrics are evaluated to model possible embedded system implem...... hiện toàn bộ
A trusted measurement model based on dynamic policy and privacy protection in IaaS security domainEURASIP Journal on Information Security - Tập 2018 - Trang 1-8 - 2018
Liangming Wang, Fagui Liu
In Infrastructure as a Service (IaaS) environments, the user virtual machine is the user’s private property. However, in the case of privacy protection, how to ensure the security of files in the user virtual machine and the user virtual machine’s behavior does not affect other virtual machines; it is a major challenge. This paper presents a trusted measurement model based on dynamic policy and pr...... hiện toàn bộ
A new method of generating hard random lattices with short basesEURASIP Journal on Information Security - Tập 2019 - Trang 1-8 - 2019
Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao
This paper first gives a regularity theorem and its corollary. Then, a new construction of generating hard random lattices with short bases is obtained by using this corollary. This construction is from a new perspective and uses a random matrix whose entries obeyed Gaussian sampling which ensures that the corresponding schemes have a wider application future in cryptography area. Moreover, this c...... hiện toàn bộ
Multi-resolution privacy-enhancing technologies for smart meteringEURASIP Journal on Information Security - Tập 2017 - Trang 1-13 - 2017
Fabian Knirsch, Günther Eibl, Dominik Engel
The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concerns. Privacy-enhancing technologies have been proposed to address these concerns. In this paper, the extension of privacy-enhancing technologies by wavelet-based multi-resolution analysis (MRA)...... hiện toàn bộ