{"title":"Secure LSB steganography for colored images using character-color mapping","authors":"Zaid Y. Al-Omari, Ahmad T. Al-Taani","doi":"10.1109/IACS.2017.7921954","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921954","url":null,"abstract":"Steganography is the science of embedding the secret messages inside other medium files in a way that hides the existence of the secret message at all. Steganography can be applied to text, audio, image, and video file types. In this study, we propose a new steganography approach for digital images in which the RGB coloring model was used. The efficiency of the proposed approach has been tested and evaluated. The experimental results show that the proposed approach produce high-quality stego images that resist against visual and statistical attacks.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suhib Bani Melhem, A. Agarwal, N. Goel, Marzia Zaman
{"title":"Selection process approaches in live migration: A comparative study","authors":"Suhib Bani Melhem, A. Agarwal, N. Goel, Marzia Zaman","doi":"10.1109/IACS.2017.7921940","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921940","url":null,"abstract":"Live virtual machine (VM) migration is defined as a technique that migrates the entire operating system (OS) and its associated applications from one host/physical server to another providing that users should not notice any interruption in their services. Live VM migration plays an important role to facilitate online maintenance, load balancing, and energy management as part of resource management. Live VM migration can be divided into two parts: 1) selection process which involves three different phases: when to trigger the migration, which VMs must be selected to be migrated, and which destination host must be chosen to move the selected VMs. 2) migration process that targets moving the VM in minimum time to avoid any interruption of services. In this paper, we present a comparative study of selection approaches used in the live VM migration technique.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taking over malicious connection in half way by migrating protocol state to a user-level TCP stack","authors":"Qi Tang, Chao Zheng, Qiuwen Lu, Wei Yang, Qingsheng Yuan, Xunxun Chen","doi":"10.1109/IACS.2017.7921976","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921976","url":null,"abstract":"Network intrusion detection system (NIDS) takes necessary measures when detecting threats. Since most of the malicious contents like phishing sites and advanced persistent threats are transmitted on transmission control protocol (TCP), existing measures are usually injection-based, such as injecting a reset (RST) packet to terminate the connection or a HTTP 302 response to redirect users' requests. Injection is a feasible measure but is unable to scrub traffic like removing malicious contents. Therefore, taking over malicious TCP connections instead of injection is a more effective solution for NIDS. In this paper, we propose an efficient and flexible solution to take over malicious connections selectively at any period of the connections combining with two typical deployments of NIDS. The NIDS usually works as a passive protocol analyzer to gain high performance, when malicious contents are detected, it will migrate TCP states to a user-level TCP stack and work as a transparent proxy. The migration to user-level TCP stack is flexible and graceful due to bypassing the complexity and overhead of OS TCP stack. To evaluate our approach, we elaborate an experiment to compare with the migration to OS TCP stack. The result shows that the response speed of our approach is 8x faster than the OS stack, and more stable.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting malicious user accounts using Canvas Fingerprint","authors":"Ahmed M. Abouollo, Sultan Almuhammadi","doi":"10.1109/IACS.2017.7921998","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921998","url":null,"abstract":"Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time employees to detect these fake accounts. Many researchers have proposed methods that help detecting fake accounts in online social networks. This research paper proposes a new technique that depends on HTML Canvas Fingerprint to identify what accounts belong to the same person or entity. The methodology has been tested on a public web application and found to give promising results, especially when combined with the other techniques described in the future work.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129405864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient joint encryption and data hiding algorithm for medical images security","authors":"Heba Abdelnabi, A. Al-Haj","doi":"10.1109/IACS.2017.7921962","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921962","url":null,"abstract":"In this paper an efficient crypto-watermarking algorithm is proposed to secure medical images transmitted in tele-medicine applications. The proposed algorithm uses standard encryption methods and reversible watermarking techniques to provide security to the transmitted medical images as well as to control access privileges at the receiver side. The algorithm jointly embeds two watermarks in two domains using encryption and reversible watermarking to avoid any interference between the watermarks. The authenticity and integrity of medical images can be verified in the spatial domain, the encrypted domain, or in both domains. The performance of the proposed algorithm is evaluated using test medical images of different modalities. The algorithm preforms well in terms of visual quality of the watermarked images and in terms of the available embedding capacity.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent model for trustworthiness evaluation in semantic web applications","authors":"R. Mohammad, Hussein Y. AbuMansour","doi":"10.1109/IACS.2017.7921999","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921999","url":null,"abstract":"The development and the advances of the World Wide Web from its first inception resulted in numerous diverse amounts of data and webpages on the web which motivates to greater demand for managing this data in an effective manner. Therefore, novel tools and techniques are required to effectively manage these data. Such tools are assumed to support interoperability and warehousing between the multiple data sources and extracting information from the different trusted databases on the web. Subsequently, the web is evolving into what is now called the Semantic Web aims to alleviate users from the burden of integrating different information sources as well as to perform searches. However, one needs to examine the trust issue of the searching results from any Semantic Web application. This paper investigates trust policies and mechanisms in semantic web applications and introduces an intermediary step to classify the relevant web services via intelligent model based on NN.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes","authors":"Khaled W. Mahmoud","doi":"10.1109/IACS.2017.7921991","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921991","url":null,"abstract":"Text passwords were and still an easy, common, practical and reliable authentication method. To ensure the desired goal of access protection, passwords should be implemented carefully. This study proposes a new mechanism to strengthen passwords through introducing time gaps (delays) between some password characters during the sign-up process. During sign-in, users should not only enter their correct passwords, but also they must leave time delays in the correct position(s) as it was designated during the sign-up process. Any attempt to login using a real password without adding time delays in the correct position(s) will be rejected. Laboratory experiments were conducted to test the proposed mechanism. These experiments are based on known password but hidden delay position(s). The obtained results show that the False Acceptance Rate (FAR) was 11.33% and the False Rejection Rate (FRR) was 17.3%. These ratios could be improved when users became more familiar with the system.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"405 4-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120897215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MUMBA: Multi-unit multi-broker auctions for CRNs","authors":"N. Riala, M. Al-Ayyoub, Y. Jararweh, H. Salameh","doi":"10.1109/IACS.2017.7921983","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921983","url":null,"abstract":"Several studies have highlighted the severe under utilization of licensed spectrum by its incumbent (primary) users. To increase spectrum utilization, studies suggested using a dynamic spectrum access model in both spatial and temporal dimensions. For such a model, the spectrum is continuously monitored and the unused parts of it are allocated to secondary users. This is known as Cognitive Radio Networks (CRNs), where secondary users (nodes) send their messages (packets) directly to a nearby Secondary Base Station (SBS), which is responsible for forwarding the messages to their designated recipients. In terms of their power sources, there are two types of secondary nodes: continuous power nodes (CPN) and limited power nodes (LPN). An LPN's goal is to send its message with the minimum battery power consumption. To save power, an LPN can use a nearby “idle” CPN as a relay. On the other hand, an idle CPN (which has no packets of its own to send) aims at maximizing the benefit of its resources. These different types of nodes compete with each other to achieve their goals. An auction-based market mechanism is an appealing option to regulate such a competitive environment. It is favored due to its simplicity, efficiency and high utilization of the spectrum. The model consists of a set of brokers (idle CPNs) and an available (unused) spectrum divided into channels. The brokers iteratively issue short-term dynamic spectrum leases of these channels to competing LPNs. They choose a temporary leading broker to run the auction. The leading broker receives the LPNs' bids (which are based on their spectrum demands) and computes the output of the auction (i.e., the set of winners and their payments) with the objective of obtaining maximal revenue. Computing a solution with the maximum revenue is known to be an NP-hard problem even if there is only one broker. We design a greedy algorithm to solve this problem in polynomial time and compare it with the brute-force solution requiring exponential time. We conduct several experiments and compare the two mechanisms in terms of revenue, running time and spectrum utilization. The results show that the greedy algorithm is very fast and produces solutions that are very close (or sometimes identical) to the optimal solution.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132938194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A stochastic optimization technique for PAPR reduction in the uplink of LTE-Advanced with carrier aggregation","authors":"Abdel-karim Ajami, H. Artail","doi":"10.1109/IACS.2017.7921972","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921972","url":null,"abstract":"The ever increase in the demand on peak data rates due to emerging services and applications has motivated the use of carrier aggregation (CA) as a key enabling technique to increase the bandwidth of users. CA allows the users to utilize both licensed and unlicensed spectrum simultaneously. However one of the main practical challenges that comes with CA is the severe increase in the peak-to-average-power ratio (PAPR) of the aggregated time domain N×SC-FDMA signal. This issue affects the efficiency of the power amplifier (PA) at the user equipment (UE) in the uplink and hence the transmission coverage is reduced. In this paper, we propose a stochastic optimization technique to reduce the PAPR of N×SC-FDMA signals. Several CA scenarios were analyzed where experimental results show that the proposed technique outperforms the random circular shifting technique and can provide an average coverage gain of 40% for the case of 2 CCs.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samia Ben Ismail, Hajer Maraoui, K. Haddar, Laurent Romary
{"title":"ALIF editor for generating Arabic normalized lexicons","authors":"Samia Ben Ismail, Hajer Maraoui, K. Haddar, Laurent Romary","doi":"10.1109/IACS.2017.7921948","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921948","url":null,"abstract":"The development of a normalized morpho-syntactic Arabic lexicon is not an easy task. In fact, many norms allow the structuration and representation of lexical data. The adoption of a stable standard will guarantee the interoperability and interchangeability of lexical resources. Still, research work that deals with normalization for Arabic lexical resources is not well developed yet, especially for some standards such as the TEI (Text Encoding Initiative). In this context, we aim at creating an Arabic lexicon editor with a constraint checker based on both the ISO standard LMF (Lexical Markup Framework) and the TEI guidelines. To develop this editor, we use a linguistic approach composed of several steps. The editor's prototype named ALIF can guarantee the construction of two types of output lexicon files: one in LMF and the other in TEI. The evaluation of this system is based upon a lexical database that contains all the derived and inflected forms generated from a lexicon of 10 000 canonical verbs. The results obtained were encouraging despite some flaws related to exceptional cases of difficult words.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}