2021 4th International Conference on Security and Privacy (ISEA-ISAP)最新文献

筛选
英文 中文
A Novel Prediction Error Histogram Shifting-based Reversible Data Hiding Scheme for Medical Image Transmission 一种新的基于预测误差直方图偏移的医学图像传输可逆数据隐藏方案
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9688572
Buggaveeti Padmaja, V. Manikandan
{"title":"A Novel Prediction Error Histogram Shifting-based Reversible Data Hiding Scheme for Medical Image Transmission","authors":"Buggaveeti Padmaja, V. Manikandan","doi":"10.1109/ISEA-ISAP54304.2021.9688572","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9688572","url":null,"abstract":"Reversible data hiding (RDH) is an actively emerging area in the domain of Information Security having wide applications in clinical data transmission along with medical images. In our research, we came up with a new RDH scheme to keep clinical data in the medical image to ensure secure data transmission. Histogram shifting-based RDH schemes are widely explored for RDH in images. The conventional histogram shifting-based RDH schemes have two major concerns: low embedding rate and overflow or underflow. In this approach, we discuss a prediction error histogram shifting-based approach with an improved overflow handling technique. The pixels in the images are divided into two different categories: black and white. The classification of the pixels has been carried out based on the checkerboard pattern. As we know that as per the checkerboard pattern, a black pixel will have four 4-neighbourhood pixels (left, right, top and bottom). To predict the black pixel value in the middle we used the average of three pixels out of 4-neighbourhood which are very close to the central pixel value. By considering the predicted pixel value and the actual pixel value, we have computed the prediction error. The histogram of prediction error is generated based on the prediction error corresponds to all the black pixels in the image. The prediction error histogram is considered for further data hiding through the histogram shifting approach. The overflow/underflow is a critical issue in the histogram shifting-based RDH scheme, so we have came up with an improved overflow/underflow handling technique in this approach. We have validated the results after carrying out the proposed scheme on medical and natural images.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121618775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visibility Enhancement in Surveillance images using Deep Multi-scale Feature Fusion 基于深度多尺度特征融合的监控图像可见性增强
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689709
Mohit Singh, V. Laxmi, Parvez Faruki
{"title":"Visibility Enhancement in Surveillance images using Deep Multi-scale Feature Fusion","authors":"Mohit Singh, V. Laxmi, Parvez Faruki","doi":"10.1109/ISEA-ISAP54304.2021.9689709","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689709","url":null,"abstract":"Visibility degradation is expected in adverse weather phenomena such as fog, mist, and haze. Object detection and identification in the surveillance feed are challenging in these weather conditions. Outdoor images can naturally be degraded, or one can intentionally degrade using smoke or bright light to hide identification. Haze, fog, and smoke are pixel-based degradation and can vary based on their thickness and distribution property in an image. In our proposed work, we explore the possibility of identifying and removal hazy pixels using the benefits of multi-scale feature-fusion and In-scale feature progression. We proposed a learning-based end-to-end network for single image dehazing. Our proposed architecture consists of three different modules: (1) Coarse Feature-fusion, (2) Fine Feature-fusion, and (3) Reconstruction module. The Coarse feature-fusion module learns broad contextual information, and the Fine feature-fusion module refines the coarse features by focusing on the channel and pixel-based information. Multi-scale feature fusion is used both in the coarse and fine module to benefit the network stage from the previous stage’s output. Extensive experimental results suggest that the proposed approach outperforms other state-of-the-art methods on synthetic homogeneous and non-homogeneous haze data and improves object detection and identification accuracy.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130113017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Artificial Intelligence in Cybersecurity: A Brief Review 网络安全中可解释的人工智能:简要回顾
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689765
S. Hariharan, Anusha Velicheti, A.S. Anagha, Ciza Thomas, N. Balakrishnan
{"title":"Explainable Artificial Intelligence in Cybersecurity: A Brief Review","authors":"S. Hariharan, Anusha Velicheti, A.S. Anagha, Ciza Thomas, N. Balakrishnan","doi":"10.1109/ISEA-ISAP54304.2021.9689765","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689765","url":null,"abstract":"Artificial intelligence has an enormous prospective to secure the cyber world. A lot of research is happening in the area of artificial intelligence in cyber security, however, the adoption in real-world practice is extremely limited. Lack of interpretability and accuracy of the artificial intelligence models pose restriction in implementation, as the user need to be confident that the Artificial Intelligence system used in decision making is trustworthy. Explainable Artificial Intelligence overcomes this concern and is the right step towards dependable and predictable Artificial Intelligence. This paper aims to provide a broad understanding of various terminology, classification, and scope of Explainable Artificial Intelligence in cyber security, challenges faced and metrics used for evaluation through the existing literature.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Evaluation of Strategic Decision taken by Autonomous Agent using Explainable AI 基于可解释人工智能的自主智能体战略决策评价
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689715
Rendhir R. Prasad, R. R. Rejimol Robinson, Ciza Thomas, N. Balakrishnan
{"title":"Evaluation of Strategic Decision taken by Autonomous Agent using Explainable AI","authors":"Rendhir R. Prasad, R. R. Rejimol Robinson, Ciza Thomas, N. Balakrishnan","doi":"10.1109/ISEA-ISAP54304.2021.9689715","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689715","url":null,"abstract":"Autonomous intrusion detection systems assess the data intelligently and take strategic decision to detect and mitigate cyber-attacks. These decisions have to be explained and evaluated for the transparency and correctness. Explainable Artificial Intelligent (XAI) methods that explore how features contribute or influence a decision taken using an algorithm can be useful for the purpose. XAI method of Testing with Concept Activation Vectors (TCAV) has been used recently to show the importance of high level concepts for a prediction class in order to deliver explanations in the way humans communicate with each other. This work explores the possibility of using TCAV to evaluate the strategic decision made by autonomous agents. A case study in the context of DoS attack is analysed to show that TCAV scores for various DoS attack classes and normal class of KDD99 data set can be used to evaluate the strategic decisions. The proposed method of analysis provides a quantifiable method to justify the current strategy or change in the strategy if required.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125513217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Peer-to-Peer Trade Registration Process with Blockchain in Small And Medium Enterprises (SMEs) in E-Governance 电子政务中使用区块链的中小企业点对点贸易注册流程
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689760
N. K. Dewangan, Preeti Chandrakar
{"title":"Peer-to-Peer Trade Registration Process with Blockchain in Small And Medium Enterprises (SMEs) in E-Governance","authors":"N. K. Dewangan, Preeti Chandrakar","doi":"10.1109/ISEA-ISAP54304.2021.9689760","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689760","url":null,"abstract":"The trade registration process is a big part of starting economic development for any region of the country. It provides employment, economic growth for the region, production of goods and product of the whole community. In the traditional trade registration system, challenges like corruption, delay in time, non-availability of authorities and critical registration process. Blockchain is a transparent, distributed, decentralized and reliable technology for the fast and trusted working process. Using blockchain in the trade registration process can solve the problems mentioned above in the industrial scenario. The consensus algorithm in blockchain provides the decentralized authority approval process. Any authority can approve the application process based on the digital signature availability in the transactions. In this paper, we use proof-of-authentication for transaction approval and a novel miner selection algorithm to reduce the biasing and centralization of authorization in e-governance. For key generation, we are using Ed25519, and for the implementation of blockchain, a custom PHP-based blockchain is used.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An FPGA Prototyping of the GIFT Cipher for Image Security Applications 用于图像安全的GIFT密码的FPGA原型设计
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689764
Apoorva Jangir, Diksha Shekhawat, J. Pandey
{"title":"An FPGA Prototyping of the GIFT Cipher for Image Security Applications","authors":"Apoorva Jangir, Diksha Shekhawat, J. Pandey","doi":"10.1109/ISEA-ISAP54304.2021.9689764","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689764","url":null,"abstract":"Nowadays, images are frequently used for vital information sharing; therefore, its data security is of prime concern. In this work, the GIFT is implemented on an FPGA device with 256×256 and 512×512 sized gray and RGB images. Hardware prototyping of the architecture is done on the Xilinx ZCU102 platform featuring the Zynq UltraScale+ xczu9eg-2ffvb1156 FPGA. The resource usage, efficiency, throughput, and power studies are highlighted. At a maximum clock frequency of 770/530 MHz, encryption/decryption consumes 643/660 mW of power. Furthermore, statistical analyses for histogram, correlation, entropy, and key sensitivity are carried out. In this study, the average entropy of the original-to-encrypted image is enhanced to 11.38% and improved compared to previous work. The average correlation coefficient is reduced to 99.90/99.80/99.90% in the vertical/horizontal/diagonal direction.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/isea-isap54304.2021.9689711
{"title":"[Copyright notice]","authors":"","doi":"10.1109/isea-isap54304.2021.9689711","DOIUrl":"https://doi.org/10.1109/isea-isap54304.2021.9689711","url":null,"abstract":"","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"477 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116189368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sponge based lightweight authentication mechanism for RFID tags 基于海绵的RFID标签轻量级认证机制
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689766
Chaitanya Palli, Neelima Jampala, T. A. Naidu
{"title":"Sponge based lightweight authentication mechanism for RFID tags","authors":"Chaitanya Palli, Neelima Jampala, T. A. Naidu","doi":"10.1109/ISEA-ISAP54304.2021.9689766","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689766","url":null,"abstract":"Lightweight authentication schemes suitable for resource constrained environments like IoT devices, sensor networks, Radio Frequency IDentification(RFID)tags, contactless smart cards etc., have gained a lot of attention in lightweight cryptographic community. Mostly hash funtions based on block ciphers are widely used for designing lightweight authentication schemes. However, in recent years designing such schemes from a hash function based on permutations using different modes is gaining lot of attention. They are efficient alternatives for the current block-cipher dominated cryptographic practices in pervasive device. We propose a new serverless sponge-permutation based lightweight authentication mechanism for proving RFID Tags authenticity to any legitimate reader and vice-versa.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISEA-ISAP 2021 Cover Page ISEA-ISAP 2021封面页
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689753
{"title":"ISEA-ISAP 2021 Cover Page","authors":"","doi":"10.1109/ISEA-ISAP54304.2021.9689753","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689753","url":null,"abstract":"","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133526785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures 物联网供应链攻击趋势——漏洞和预防措施
2021 4th International Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689704
V. Rao, R. Marshal, K. Gobinath
{"title":"The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures","authors":"V. Rao, R. Marshal, K. Gobinath","doi":"10.1109/ISEA-ISAP54304.2021.9689704","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689704","url":null,"abstract":"The lifestyle of people in this century will be categorized as Pre-COVID and Post-COVID lifestyle in the future. The pandemic has influenced every nation and every sector. The Internet of Things has helped the humankind to progress even during the pandemic time. Internet of Things has grown drastically with the industry switching their offices to homes. This has also increased the threat landscape and the attacks are also on rise. Several cyber-attacks are possible with Internet of Things devices. However, Supply chain attacks remain the largest threat as reactive measures to mitigate them are extremely difficult. In addition to that, supply chain attacks are difficult to detect in a network. In most of the cases, they remain unnoticed and they are used to launch espionage and ransom ware attacks. The impact of supply chain attacks is also extremely large compared to other attacks. The number of Internet of Things devices are going to grow by leaps and bounds, and it is necessary to take proactive steps in the network to mitigate such attacks. In this article, the elements of Internet of Things supply chain, motivation behind these attacks, vulnerabilities in the supply chain, and recent attacks are discussed in detail. In order to mitigate the supply chain attacks in Internet of Things environment, preventive measures that can be adopted at various levels are also suggested. These measures can be applied as best practices in any smart network environment against supply chain attacks.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信