Phát hiện giọng nói tổng hợp qua dấu vết dự đoán ngắn hạn và dài hạn Dịch bởi AI EURASIP Journal on Information Security - - 2021
Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro
Nhiều phương pháp tạo ra giọng nói tổng hợp đã được phát triển trong tài liệu
qua nhiều năm. Với những tiến bộ công nghệ lớn do học sâu mang lại, nhiều kỹ
thuật giọng nói tổng hợp mới đạt được kết quả thực tế đáng kinh ngạc gần đây đã
được đề xuất. Khi những phương pháp này tạo ra giọng nói giả mạo con người
thuyết phục, chúng có thể được sử dụng theo cách độc hại để ảnh hưởng tiêu cực
đến xã hội ... hiện toàn bộ
#giọng nói tổng hợp #phát hiện giọng nói #học sâu #xử lý giọng nói #giả mạo #tin giả
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environmentEURASIP Journal on Information Security - Tập 2020 Số 1 - 2020
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
AbstractThe rapid development of IoT technology has led to the usage of various
devices in our daily life. Along with the ever-increasing rise of the Internet
of Things, the use of appropriate methods for establishing secure communications
in health care systems is vital. The adoption of high-security optimal
mechanisms for this purpose has been more effective regarding the efficiency of
medical i... hiện toàn bộ
Estimating Previous Quantization Factors on Multiple JPEG Compressed ImagesEURASIP Journal on Information Security - Tập 2021 Số 1 - 2021
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving
storage and preserving image quality thus becoming extremely popular. On the
other hand, the overall process leaves traces into encoded signals which are
typically exploited for forensic purposes: for instance, the compression
parameters of the acquisition device (or editing software) could be inferred. To
this aim, in thi... hiện toàn bộ
Behavior-based user authentication on mobile devices in various usage contextsEURASIP Journal on Information Security - Tập 2022 Số 1
Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko, Andriy Oliynyk
AbstractReliable and non-intrusive user identification and authentication on
mobile devices, such as smartphones, are topical tasks today. The majority of
state-of-the-art solutions in this domain are based on “device unlock”
scenario—checking of information (authentication factors) provided by the user
for unlocking a smartphone. As such factors, we may use either single strong
authentication fac... hiện toàn bộ
VISION: a video and image dataset for source identificationEURASIP Journal on Information Security - Tập 2017 - Trang 1-16 - 2017
Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya, Alessandro Piva
Forensic research community keeps proposing new techniques to analyze digital
images and videos. However, the performance of proposed tools are usually tested
on data that are far from reality in terms of resolution, source device, and
processing history. Remarkably, in the latest years, portable devices became the
preferred means to capture images and videos, and contents are commonly shared
thro... hiện toàn bộ
Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissionsEURASIP Journal on Information Security - Tập 2018 - Trang 1-16 - 2018
Jonathan Martínez Padilla, Uwe Meyer-Baese, Simon Foo
In this work, side-channel attacks (SCAs) are considered as a security metric
for the implementation of hybrid cryptosystems utilizing the neural
network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented
within the MATLAB environment that explores various scenarios in which the TPM
may be compromised. Performance metrics are evaluated to model possible embedded
system implem... hiện toàn bộ
A trusted measurement model based on dynamic policy and privacy protection in IaaS security domainEURASIP Journal on Information Security - Tập 2018 - Trang 1-8 - 2018
Liangming Wang, Fagui Liu
In Infrastructure as a Service (IaaS) environments, the user virtual machine is
the user’s private property. However, in the case of privacy protection, how to
ensure the security of files in the user virtual machine and the user virtual
machine’s behavior does not affect other virtual machines; it is a major
challenge. This paper presents a trusted measurement model based on dynamic
policy and pr... hiện toàn bộ
A new method of generating hard random lattices with short basesEURASIP Journal on Information Security - Tập 2019 - Trang 1-8 - 2019
Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao
This paper first gives a regularity theorem and its corollary. Then, a new
construction of generating hard random lattices with short bases is obtained by
using this corollary. This construction is from a new perspective and uses a
random matrix whose entries obeyed Gaussian sampling which ensures that the
corresponding schemes have a wider application future in cryptography area.
Moreover, this c... hiện toàn bộ
Multi-resolution privacy-enhancing technologies for smart meteringEURASIP Journal on Information Security - Tập 2017 - Trang 1-13 - 2017
Fabian Knirsch, Günther Eibl, Dominik Engel
The availability of individual load profiles per household in the smart grid
end-user domain combined with non-intrusive load monitoring to infer personal
data from these load curves has led to privacy concerns. Privacy-enhancing
technologies have been proposed to address these concerns. In this paper, the
extension of privacy-enhancing technologies by wavelet-based multi-resolution
analysis (MRA)... hiện toàn bộ