EURASIP Journal on Information Security

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Phát hiện giọng nói tổng hợp qua dấu vết dự đoán ngắn hạn và dài hạn Dịch bởi AI
EURASIP Journal on Information Security - - 2021
Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro
Nhiều phương pháp tạo ra giọng nói tổng hợp đã được phát triển trong tài liệu qua nhiều năm. Với những tiến bộ công nghệ lớn do học sâu mang lại, nhiều kỹ thuật giọng nói tổng hợp mới đạt được kết quả thực tế đáng kinh ngạc gần đây đã được đề xuất. Khi những phương pháp này tạo ra giọng nói giả mạo con người thuyết phục, chúng có thể được sử dụng theo cách độc hại để ảnh hưởng tiêu cực đến xã hội ...... hiện toàn bộ
#giọng nói tổng hợp #phát hiện giọng nói #học sâu #xử lý giọng nói #giả mạo #tin giả
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment
EURASIP Journal on Information Security - Tập 2020 Số 1 - 2020
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
AbstractThe rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective rega...... hiện toàn bộ
Estimating Previous Quantization Factors on Multiple JPEG Compressed Images
EURASIP Journal on Information Security - Tập 2021 Số 1 - 2021
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signals which are typically exploited for forensic purposes: for instance, the compression parameters of the acquisition device (or editing software) could...... hiện toàn bộ
Behavior-based user authentication on mobile devices in various usage contexts
EURASIP Journal on Information Security - Tập 2022 Số 1
Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko, Andriy Oliynyk
AbstractReliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on “device unlock” scenario—checking of information (authentication factors) provided by the user for unlocking a smartphone. As such factors, we may use either...... hiện toàn bộ
VISION: a video and image dataset for source identification
EURASIP Journal on Information Security - Tập 2017 - Trang 1-16 - 2017
Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya, Alessandro Piva
Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of resolution, source device, and processing history. Remarkably, in the latest years, portable devices became the preferred means to capture images and videos, and contents are commonly shared thro...... hiện toàn bộ
Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions
EURASIP Journal on Information Security - Tập 2018 - Trang 1-16 - 2018
Jonathan Martínez Padilla, Uwe Meyer-Baese, Simon Foo
In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented within the MATLAB environment that explores various scenarios in which the TPM may be compromised. Performance metrics are evaluated to model possible embedded system implem...... hiện toàn bộ
A trusted measurement model based on dynamic policy and privacy protection in IaaS security domain
EURASIP Journal on Information Security - Tập 2018 - Trang 1-8 - 2018
Liangming Wang, Fagui Liu
In Infrastructure as a Service (IaaS) environments, the user virtual machine is the user’s private property. However, in the case of privacy protection, how to ensure the security of files in the user virtual machine and the user virtual machine’s behavior does not affect other virtual machines; it is a major challenge. This paper presents a trusted measurement model based on dynamic policy and pr...... hiện toàn bộ
Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacks
EURASIP Journal on Information Security - Tập 2021 - Trang 1-25 - 2021
Christian Kraetzer, Andrey Makrushin, Jana Dittmann, Mario Hildebrandt
Information fusion, i.e., the combination of expert systems, has a huge potential to improve the accuracy of pattern recognition systems. During the last decades, various application fields started to use different fusion concepts extensively. The forensic sciences are still hesitant if it comes to blindly applying information fusion. Here, a potentially negative impact on the classification accur...... hiện toàn bộ
A new method of generating hard random lattices with short bases
EURASIP Journal on Information Security - Tập 2019 - Trang 1-8 - 2019
Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao
This paper first gives a regularity theorem and its corollary. Then, a new construction of generating hard random lattices with short bases is obtained by using this corollary. This construction is from a new perspective and uses a random matrix whose entries obeyed Gaussian sampling which ensures that the corresponding schemes have a wider application future in cryptography area. Moreover, this c...... hiện toàn bộ
Multi-resolution privacy-enhancing technologies for smart metering
EURASIP Journal on Information Security - Tập 2017 - Trang 1-13 - 2017
Fabian Knirsch, Günther Eibl, Dominik Engel
The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concerns. Privacy-enhancing technologies have been proposed to address these concerns. In this paper, the extension of privacy-enhancing technologies by wavelet-based multi-resolution analysis (MRA)...... hiện toàn bộ
Tổng số: 65   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7