Journal of Internet Services and Information Security最新文献

筛选
英文 中文
A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video 一种用于H.264-AVC视频内容认证的脆弱水印方法
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.014
Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan
{"title":"A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video","authors":"Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan","doi":"10.58346/jisis.2023.i2.014","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.014","url":null,"abstract":"This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subsequently injected into the IPCM-Least block's Significant Bits (LSB) of some I-frames' luma and chroma pixel samples. To manage and regulate authentication data and watermark processes (embedding, detection, and verification), a key based on video footage and a secret key has been created. Intra prediction modes and motion vectors from the bitstream can be partially decoded to detect and confirm the hidden watermark data without the need for the original movie or complete video decoding. Several experiments were conducted to assess the sensitivity of the proposed method against signal processing, rate control and transcoding, conventional GOP-based and Frame-based attacks. Experimental simulations demonstrate that the implanted fragile watermark is sensitive to several low to harmful and content-preserving attacks. With only a modest bit-rate increase and hardly any perceptual quality deterioration, a large payload capacity is achieved. Experimental results show that the proposed method is suburb in term of imperceptibility, and lower effect on bit-rate. Applications like tamper-proofing, content-authentication, and covert communication are ideally suited for this technique. Based on achieved results, the devised method is capable of detecting any form of spatial and/or temporal manipulations which make it ideal for real-time applications.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49479176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN 基于分层簇的无线传感器网络的节能安全密钥管理方案
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.009
B.S. Venkatesh Prasad, Roopashree H.R
{"title":"Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN","authors":"B.S. Venkatesh Prasad, Roopashree H.R","doi":"10.58346/jisis.2023.i2.009","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.009","url":null,"abstract":"Advance development in wireless sensor network (WSN) has offered tremendous applications in various fields. WSN consists of tiny sensors with unique features, capable of processing the sensed data and are resource constrained. WSN provides robust connection between objects to share information via wireless medium. Despite the significance, WSN face several issues such as more energy consumption, bandwidth constrain and security. Due to open environment and wireless medium secure data transmission within WSN is a critical issue, thus to cope with WSN applications a robust security development is required. Cluster based hierarchical network guarantees energy efficient over flat network. However existing security scheme employs high computational cryptographic functions which consumes more energy and has higher computational overhead. In this work we propose energy efficient hybrid secure key management scheme (EEHSKM) for secure communication from cluster head to base station. This scheme aims to optimize public key cryptographic steps and utilizes symmetric key cryptographic operations which extensively reduce energy consumption and ensures secure communication. The simulation results are evaluated to achieve QoS metrics.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47415585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Project Management Using Genetic Algorithm for the Marketplace Administration 基于遗传算法的市场管理企业项目管理
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.004
Alaa Obeidat, Rola Yaqbeh
{"title":"Business Project Management Using Genetic Algorithm for the Marketplace Administration","authors":"Alaa Obeidat, Rola Yaqbeh","doi":"10.58346/jisis.2023.i2.004","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.004","url":null,"abstract":"In the sales business, the ultimate goal is to derive more sales and increase the profits for interested stakeholders. Maximizing profit margins from highly demanding products is one of their major objectives. Nowadays, there are varieties of intelligent systems available, which can guide the business owners, entrepreneurs, or managers to make smart decision and lead their business towards success. Out of different options, this research study explores the possibility and elaborates on how their objectives can be achieved through a genetic algorithm? The proposed approach can be adopted by businesses to increase their profits by enhancing low profit yielding products sales using optimized Genetic Algorithm. Initially groups are defined by adding products with high and low sales. After applying the proposed genetic algorithm, a “bundle of three” offers are traced out, to promote the product with poor sales history This study helps the businesses with a decision support model to maximize sales resulting in high profits. In this research, optimization algorithm is used along with variety of operations and methods, by the businesses, in order to reach their respective target goals. This can be achieved by applying an optimization method that has stable and reliable functions, selection methods, population size and mutation rate. The final result is to improve the overall profit of different businesses in the marketplace.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45979884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning 基于android的增强现实:掌握Tajweed学生学习的另一种选择
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.002
Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita, Saiful Yeri, Ilian Ikhsan
{"title":"Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning","authors":"Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita, Saiful Yeri, Ilian Ikhsan","doi":"10.58346/jisis.2023.i2.002","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.002","url":null,"abstract":"Nowadays, the knowledge of recitation (Tajweed) is only seen as classical knowledge; it only needs to be memorized and practiced without needing to be understood. The purpose of this study is to design learning media in the science of recitation using Android-based augmented reality. The method used is Research and Development in application-based augmented reality technology which is applied in tajwid learning. The research design that was carried out was to create and develop an Android-based application by displaying various laws in the science of recitation used in reading the Qur'an., where the marker identified with the camera would produce a display of the Qur’anic verse and completed with the law of Tajweed and also equipped with an audio play menu. It can be concluded that this research found that the developed media can only provide knowledge about basic Tajweed, which can only be accessed through one platform, namely Android, so this learning media still needs additions and developments in the system. It can be in the form of additions in the discussion of the Tajweed and the development of the application system so that this application can be accessed not only using Android. Still, it can also be accessed using a laptop or computer.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42783246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment 基于模糊小波神经网络的大数据挖掘特征子集选择
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.015
Varshavardhini S
{"title":"An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment","authors":"Varshavardhini S","doi":"10.58346/jisis.2023.i2.015","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.015","url":null,"abstract":"Big data refers to the massive quality of data being generated at a drastic speed from various heterogeneous sources namely social media, mobile devices, internet transactions, networked devices, and sensors. Several data mining (DM) and machine learning (ML) models have been presented for the extraction of knowledge from Big Data. Since the big datasets include numerous features, feature selection techniques are essential to eliminate unwanted and unrelated features which degrade the classification efficiency. The adoption of DM tools for big data environments necessitates remodeling the algorithm. In this aspect, this paper presents an intelligent feature subset selection with fuzzy wavelet neural network (FSS-FWNN) for big data classification. The FSS-FWNN technique incorporates Hadoop Ecosystem tool for handling big data in an effectual way. Besides, the FSS-FWNN technique involves three processes namely preprocessing, feature selection, and classification. In addition, quasi-oppositional chicken swarm optimization (QOCSO) technique is employed for the feature selection process and the FWNN technique is applied for the classification process. The design of QOCSO algorithm as an FS technique for big data classification shows the novelty of the work and the feature subset selection process considerably enhances the classification performance. An extensive set of simulations is carried out and the results are reviewed in terms of several evaluation factors in order to analyse the improvement of the FSS-FWNN approach. The experimental findings demonstrated that the FSS-FWNN approach outperformed the most current algorithms.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45916441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Model for a Central Bank in Latin America using Blockchain 拉丁美洲中央银行使用区块链的安全模型
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.007
R. Romero, R. A. Sánchez-Ancajima, Javier A. López-Céspedes, M. Saavedra-López, Segundo Juan Sánchez Tarrillo, R. M. Hernández
{"title":"Security Model for a Central Bank in Latin America using Blockchain","authors":"R. Romero, R. A. Sánchez-Ancajima, Javier A. López-Céspedes, M. Saavedra-López, Segundo Juan Sánchez Tarrillo, R. M. Hernández","doi":"10.58346/jisis.2023.i2.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.007","url":null,"abstract":"Banking institutions in Latin America are the target of increasingly sophisticated and advanced cyber-attacks and threats, which increase every year and leave substantial economic losses, due to the high level of global interconnection and digitization of their operations. The objective of this work is to design a model to guarantee information security in a Central Bank in Latin America using Blockchain technology. Exploratory research, observation and inductive and deductive methods are used to propose Blockchain solutions in a Central Bank. The results are a model for secure transactions in Blockchain, Smart Contract functions and a data management process. It was concluded that the security model for a central bank provides high level of information management and storage of transactions in a secure and immutable way.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49279924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System 基于简单大暴雨前优化算法的电子健康系统敏感医疗数据隐藏
Journal of Internet Services and Information Security Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.011
Madhavi M, S. Dr.T., K. Dr.G.
{"title":"Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System","authors":"Madhavi M, S. Dr.T., K. Dr.G.","doi":"10.58346/jisis.2023.i2.011","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.011","url":null,"abstract":"Privacy has become a significant factor of e-Health system in the area of data mining termed as Privacy preserving data mining (PPDM) as it can uncover underlying rules and hide sensitive data for data sanitization. Various algorithms and heuristics have been studied to hide sensitive data using transaction removal. However, they are facing challenges to attain the reasonable side effects. Thus, rain optimization algorithm (ROA) based sensitive data hiding techniques is proposed in this paper. Using this algorithm, suitable transactions to be removed are selected. Besides, in this work, ROA based two frameworks are designed for data sanitization that are simple ROA to remove transaction (sROA2RT) and pre-large ROA to remove transaction (pROA2RT). In this algorithm, fitness is evaluated based on four side effects such as hiding failure, artificial cost, missing cost and dissimilarity of database. The proposed frameworks are evaluated using three e-Health datasets. Compared to previous frameworks, the proposed frameworks attain reasonable side effects.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49350827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mae Mai Muay Thai Style Classification in Movement Appling Long-Term Recurrent Convolution Networks 运用长期递归卷积网络对运动中的梅-迈-泰拳风格进行分类
Journal of Internet Services and Information Security Pub Date : 2023-02-28 DOI: 10.58346/jisis.2023.i1.010
Shujaat Ali Zaidi
{"title":"Mae Mai Muay Thai Style Classification in Movement Appling Long-Term Recurrent Convolution Networks","authors":"Shujaat Ali Zaidi","doi":"10.58346/jisis.2023.i1.010","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.010","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46723372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of Intelligent Systems in Tourism: Relevant Methods 智能系统在旅游业中的应用:相关方法
Journal of Internet Services and Information Security Pub Date : 2023-02-28 DOI: 10.58346/jisis.2023.i1.006
R. A. Sánchez-Ancajima
{"title":"Applications of Intelligent Systems in Tourism: Relevant Methods","authors":"R. A. Sánchez-Ancajima","doi":"10.58346/jisis.2023.i1.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.006","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42658384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN 面向提高集群无线传感器网络生存期的压缩数据感知节能方案
Journal of Internet Services and Information Security Pub Date : 2023-02-28 DOI: 10.58346/jisis.2023.i1.007
Santhosh G
{"title":"Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN","authors":"Santhosh G","doi":"10.58346/jisis.2023.i1.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.007","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45792860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信