2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
Secure LSB steganography for colored images using character-color mapping 使用字符-颜色映射的彩色图像安全LSB隐写术
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921954
Zaid Y. Al-Omari, Ahmad T. Al-Taani
{"title":"Secure LSB steganography for colored images using character-color mapping","authors":"Zaid Y. Al-Omari, Ahmad T. Al-Taani","doi":"10.1109/IACS.2017.7921954","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921954","url":null,"abstract":"Steganography is the science of embedding the secret messages inside other medium files in a way that hides the existence of the secret message at all. Steganography can be applied to text, audio, image, and video file types. In this study, we propose a new steganography approach for digital images in which the RGB coloring model was used. The efficiency of the proposed approach has been tested and evaluated. The experimental results show that the proposed approach produce high-quality stego images that resist against visual and statistical attacks.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Selection process approaches in live migration: A comparative study 移民选择过程方法的比较研究
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921940
Suhib Bani Melhem, A. Agarwal, N. Goel, Marzia Zaman
{"title":"Selection process approaches in live migration: A comparative study","authors":"Suhib Bani Melhem, A. Agarwal, N. Goel, Marzia Zaman","doi":"10.1109/IACS.2017.7921940","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921940","url":null,"abstract":"Live virtual machine (VM) migration is defined as a technique that migrates the entire operating system (OS) and its associated applications from one host/physical server to another providing that users should not notice any interruption in their services. Live VM migration plays an important role to facilitate online maintenance, load balancing, and energy management as part of resource management. Live VM migration can be divided into two parts: 1) selection process which involves three different phases: when to trigger the migration, which VMs must be selected to be migrated, and which destination host must be chosen to move the selected VMs. 2) migration process that targets moving the VM in minimum time to avoid any interruption of services. In this paper, we present a comparative study of selection approaches used in the live VM migration technique.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Taking over malicious connection in half way by migrating protocol state to a user-level TCP stack 通过将协议状态迁移到用户级TCP堆栈,在中途接管恶意连接
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921976
Qi Tang, Chao Zheng, Qiuwen Lu, Wei Yang, Qingsheng Yuan, Xunxun Chen
{"title":"Taking over malicious connection in half way by migrating protocol state to a user-level TCP stack","authors":"Qi Tang, Chao Zheng, Qiuwen Lu, Wei Yang, Qingsheng Yuan, Xunxun Chen","doi":"10.1109/IACS.2017.7921976","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921976","url":null,"abstract":"Network intrusion detection system (NIDS) takes necessary measures when detecting threats. Since most of the malicious contents like phishing sites and advanced persistent threats are transmitted on transmission control protocol (TCP), existing measures are usually injection-based, such as injecting a reset (RST) packet to terminate the connection or a HTTP 302 response to redirect users' requests. Injection is a feasible measure but is unable to scrub traffic like removing malicious contents. Therefore, taking over malicious TCP connections instead of injection is a more effective solution for NIDS. In this paper, we propose an efficient and flexible solution to take over malicious connections selectively at any period of the connections combining with two typical deployments of NIDS. The NIDS usually works as a passive protocol analyzer to gain high performance, when malicious contents are detected, it will migrate TCP states to a user-level TCP stack and work as a transparent proxy. The migration to user-level TCP stack is flexible and graceful due to bypassing the complexity and overhead of OS TCP stack. To evaluate our approach, we elaborate an experiment to compare with the migration to OS TCP stack. The result shows that the response speed of our approach is 8x faster than the OS stack, and more stable.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting malicious user accounts using Canvas Fingerprint 使用Canvas指纹检测恶意用户帐户
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921998
Ahmed M. Abouollo, Sultan Almuhammadi
{"title":"Detecting malicious user accounts using Canvas Fingerprint","authors":"Ahmed M. Abouollo, Sultan Almuhammadi","doi":"10.1109/IACS.2017.7921998","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921998","url":null,"abstract":"Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time employees to detect these fake accounts. Many researchers have proposed methods that help detecting fake accounts in online social networks. This research paper proposes a new technique that depends on HTML Canvas Fingerprint to identify what accounts belong to the same person or entity. The methodology has been tested on a public web application and found to give promising results, especially when combined with the other techniques described in the future work.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129405864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient joint encryption and data hiding algorithm for medical images security 医学图像安全的高效联合加密与数据隐藏算法
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921962
Heba Abdelnabi, A. Al-Haj
{"title":"Efficient joint encryption and data hiding algorithm for medical images security","authors":"Heba Abdelnabi, A. Al-Haj","doi":"10.1109/IACS.2017.7921962","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921962","url":null,"abstract":"In this paper an efficient crypto-watermarking algorithm is proposed to secure medical images transmitted in tele-medicine applications. The proposed algorithm uses standard encryption methods and reversible watermarking techniques to provide security to the transmitted medical images as well as to control access privileges at the receiver side. The algorithm jointly embeds two watermarks in two domains using encryption and reversible watermarking to avoid any interference between the watermarks. The authenticity and integrity of medical images can be verified in the spatial domain, the encrypted domain, or in both domains. The performance of the proposed algorithm is evaluated using test medical images of different modalities. The algorithm preforms well in terms of visual quality of the watermarked images and in terms of the available embedding capacity.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An intelligent model for trustworthiness evaluation in semantic web applications 语义web应用中可信度评估的智能模型
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921999
R. Mohammad, Hussein Y. AbuMansour
{"title":"An intelligent model for trustworthiness evaluation in semantic web applications","authors":"R. Mohammad, Hussein Y. AbuMansour","doi":"10.1109/IACS.2017.7921999","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921999","url":null,"abstract":"The development and the advances of the World Wide Web from its first inception resulted in numerous diverse amounts of data and webpages on the web which motivates to greater demand for managing this data in an effective manner. Therefore, novel tools and techniques are required to effectively manage these data. Such tools are assumed to support interoperability and warehousing between the multiple data sources and extracting information from the different trusted databases on the web. Subsequently, the web is evolving into what is now called the Semantic Web aims to alleviate users from the burden of integrating different information sources as well as to perform searches. However, one needs to examine the trust issue of the searching results from any Semantic Web application. This paper investigates trust policies and mechanisms in semantic web applications and introduces an intermediary step to classify the relevant web services via intelligent model based on NN.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes 弹性密码:使用按键之间的时间延迟来加强密码的新机制
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921991
Khaled W. Mahmoud
{"title":"Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes","authors":"Khaled W. Mahmoud","doi":"10.1109/IACS.2017.7921991","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921991","url":null,"abstract":"Text passwords were and still an easy, common, practical and reliable authentication method. To ensure the desired goal of access protection, passwords should be implemented carefully. This study proposes a new mechanism to strengthen passwords through introducing time gaps (delays) between some password characters during the sign-up process. During sign-in, users should not only enter their correct passwords, but also they must leave time delays in the correct position(s) as it was designated during the sign-up process. Any attempt to login using a real password without adding time delays in the correct position(s) will be rejected. Laboratory experiments were conducted to test the proposed mechanism. These experiments are based on known password but hidden delay position(s). The obtained results show that the False Acceptance Rate (FAR) was 11.33% and the False Rejection Rate (FRR) was 17.3%. These ratios could be improved when users became more familiar with the system.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"405 4-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120897215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MUMBA: Multi-unit multi-broker auctions for CRNs 孟买:多单位多经纪人拍卖crn
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921983
N. Riala, M. Al-Ayyoub, Y. Jararweh, H. Salameh
{"title":"MUMBA: Multi-unit multi-broker auctions for CRNs","authors":"N. Riala, M. Al-Ayyoub, Y. Jararweh, H. Salameh","doi":"10.1109/IACS.2017.7921983","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921983","url":null,"abstract":"Several studies have highlighted the severe under utilization of licensed spectrum by its incumbent (primary) users. To increase spectrum utilization, studies suggested using a dynamic spectrum access model in both spatial and temporal dimensions. For such a model, the spectrum is continuously monitored and the unused parts of it are allocated to secondary users. This is known as Cognitive Radio Networks (CRNs), where secondary users (nodes) send their messages (packets) directly to a nearby Secondary Base Station (SBS), which is responsible for forwarding the messages to their designated recipients. In terms of their power sources, there are two types of secondary nodes: continuous power nodes (CPN) and limited power nodes (LPN). An LPN's goal is to send its message with the minimum battery power consumption. To save power, an LPN can use a nearby “idle” CPN as a relay. On the other hand, an idle CPN (which has no packets of its own to send) aims at maximizing the benefit of its resources. These different types of nodes compete with each other to achieve their goals. An auction-based market mechanism is an appealing option to regulate such a competitive environment. It is favored due to its simplicity, efficiency and high utilization of the spectrum. The model consists of a set of brokers (idle CPNs) and an available (unused) spectrum divided into channels. The brokers iteratively issue short-term dynamic spectrum leases of these channels to competing LPNs. They choose a temporary leading broker to run the auction. The leading broker receives the LPNs' bids (which are based on their spectrum demands) and computes the output of the auction (i.e., the set of winners and their payments) with the objective of obtaining maximal revenue. Computing a solution with the maximum revenue is known to be an NP-hard problem even if there is only one broker. We design a greedy algorithm to solve this problem in polynomial time and compare it with the brute-force solution requiring exponential time. We conduct several experiments and compare the two mechanisms in terms of revenue, running time and spectrum utilization. The results show that the greedy algorithm is very fast and produces solutions that are very close (or sometimes identical) to the optimal solution.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132938194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stochastic optimization technique for PAPR reduction in the uplink of LTE-Advanced with carrier aggregation 基于载波聚合的LTE-Advanced上行链路PAPR降低随机优化技术
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921972
Abdel-karim Ajami, H. Artail
{"title":"A stochastic optimization technique for PAPR reduction in the uplink of LTE-Advanced with carrier aggregation","authors":"Abdel-karim Ajami, H. Artail","doi":"10.1109/IACS.2017.7921972","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921972","url":null,"abstract":"The ever increase in the demand on peak data rates due to emerging services and applications has motivated the use of carrier aggregation (CA) as a key enabling technique to increase the bandwidth of users. CA allows the users to utilize both licensed and unlicensed spectrum simultaneously. However one of the main practical challenges that comes with CA is the severe increase in the peak-to-average-power ratio (PAPR) of the aggregated time domain N×SC-FDMA signal. This issue affects the efficiency of the power amplifier (PA) at the user equipment (UE) in the uplink and hence the transmission coverage is reduced. In this paper, we propose a stochastic optimization technique to reduce the PAPR of N×SC-FDMA signals. Several CA scenarios were analyzed where experimental results show that the proposed technique outperforms the random circular shifting technique and can provide an average coverage gain of 40% for the case of 2 CCs.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ALIF editor for generating Arabic normalized lexicons 用于生成阿拉伯语规范化词汇的ALIF编辑器
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921948
Samia Ben Ismail, Hajer Maraoui, K. Haddar, Laurent Romary
{"title":"ALIF editor for generating Arabic normalized lexicons","authors":"Samia Ben Ismail, Hajer Maraoui, K. Haddar, Laurent Romary","doi":"10.1109/IACS.2017.7921948","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921948","url":null,"abstract":"The development of a normalized morpho-syntactic Arabic lexicon is not an easy task. In fact, many norms allow the structuration and representation of lexical data. The adoption of a stable standard will guarantee the interoperability and interchangeability of lexical resources. Still, research work that deals with normalization for Arabic lexical resources is not well developed yet, especially for some standards such as the TEI (Text Encoding Initiative). In this context, we aim at creating an Arabic lexicon editor with a constraint checker based on both the ISO standard LMF (Lexical Markup Framework) and the TEI guidelines. To develop this editor, we use a linguistic approach composed of several steps. The editor's prototype named ALIF can guarantee the construction of two types of output lexicon files: one in LMF and the other in TEI. The evaluation of this system is based upon a lexical database that contains all the derived and inflected forms generated from a lexicon of 10 000 canonical verbs. The results obtained were encouraging despite some flaws related to exceptional cases of difficult words.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信