Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan
{"title":"A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video","authors":"Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan","doi":"10.58346/jisis.2023.i2.014","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.014","url":null,"abstract":"This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subsequently injected into the IPCM-Least block's Significant Bits (LSB) of some I-frames' luma and chroma pixel samples. To manage and regulate authentication data and watermark processes (embedding, detection, and verification), a key based on video footage and a secret key has been created. Intra prediction modes and motion vectors from the bitstream can be partially decoded to detect and confirm the hidden watermark data without the need for the original movie or complete video decoding. Several experiments were conducted to assess the sensitivity of the proposed method against signal processing, rate control and transcoding, conventional GOP-based and Frame-based attacks. Experimental simulations demonstrate that the implanted fragile watermark is sensitive to several low to harmful and content-preserving attacks. With only a modest bit-rate increase and hardly any perceptual quality deterioration, a large payload capacity is achieved. Experimental results show that the proposed method is suburb in term of imperceptibility, and lower effect on bit-rate. Applications like tamper-proofing, content-authentication, and covert communication are ideally suited for this technique. Based on achieved results, the devised method is capable of detecting any form of spatial and/or temporal manipulations which make it ideal for real-time applications.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49479176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN","authors":"B.S. Venkatesh Prasad, Roopashree H.R","doi":"10.58346/jisis.2023.i2.009","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.009","url":null,"abstract":"Advance development in wireless sensor network (WSN) has offered tremendous applications in various fields. WSN consists of tiny sensors with unique features, capable of processing the sensed data and are resource constrained. WSN provides robust connection between objects to share information via wireless medium. Despite the significance, WSN face several issues such as more energy consumption, bandwidth constrain and security. Due to open environment and wireless medium secure data transmission within WSN is a critical issue, thus to cope with WSN applications a robust security development is required. Cluster based hierarchical network guarantees energy efficient over flat network. However existing security scheme employs high computational cryptographic functions which consumes more energy and has higher computational overhead. In this work we propose energy efficient hybrid secure key management scheme (EEHSKM) for secure communication from cluster head to base station. This scheme aims to optimize public key cryptographic steps and utilizes symmetric key cryptographic operations which extensively reduce energy consumption and ensures secure communication. The simulation results are evaluated to achieve QoS metrics.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47415585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Project Management Using Genetic Algorithm for the Marketplace Administration","authors":"Alaa Obeidat, Rola Yaqbeh","doi":"10.58346/jisis.2023.i2.004","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.004","url":null,"abstract":"In the sales business, the ultimate goal is to derive more sales and increase the profits for interested stakeholders. Maximizing profit margins from highly demanding products is one of their major objectives. Nowadays, there are varieties of intelligent systems available, which can guide the business owners, entrepreneurs, or managers to make smart decision and lead their business towards success. Out of different options, this research study explores the possibility and elaborates on how their objectives can be achieved through a genetic algorithm? The proposed approach can be adopted by businesses to increase their profits by enhancing low profit yielding products sales using optimized Genetic Algorithm. Initially groups are defined by adding products with high and low sales. After applying the proposed genetic algorithm, a “bundle of three” offers are traced out, to promote the product with poor sales history This study helps the businesses with a decision support model to maximize sales resulting in high profits. In this research, optimization algorithm is used along with variety of operations and methods, by the businesses, in order to reach their respective target goals. This can be achieved by applying an optimization method that has stable and reliable functions, selection methods, population size and mutation rate. The final result is to improve the overall profit of different businesses in the marketplace.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45979884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning","authors":"Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita, Saiful Yeri, Ilian Ikhsan","doi":"10.58346/jisis.2023.i2.002","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.002","url":null,"abstract":"Nowadays, the knowledge of recitation (Tajweed) is only seen as classical knowledge; it only needs to be memorized and practiced without needing to be understood. The purpose of this study is to design learning media in the science of recitation using Android-based augmented reality. The method used is Research and Development in application-based augmented reality technology which is applied in tajwid learning. The research design that was carried out was to create and develop an Android-based application by displaying various laws in the science of recitation used in reading the Qur'an., where the marker identified with the camera would produce a display of the Qur’anic verse and completed with the law of Tajweed and also equipped with an audio play menu. It can be concluded that this research found that the developed media can only provide knowledge about basic Tajweed, which can only be accessed through one platform, namely Android, so this learning media still needs additions and developments in the system. It can be in the form of additions in the discussion of the Tajweed and the development of the application system so that this application can be accessed not only using Android. Still, it can also be accessed using a laptop or computer.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42783246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment","authors":"Varshavardhini S","doi":"10.58346/jisis.2023.i2.015","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.015","url":null,"abstract":"Big data refers to the massive quality of data being generated at a drastic speed from various heterogeneous sources namely social media, mobile devices, internet transactions, networked devices, and sensors. Several data mining (DM) and machine learning (ML) models have been presented for the extraction of knowledge from Big Data. Since the big datasets include numerous features, feature selection techniques are essential to eliminate unwanted and unrelated features which degrade the classification efficiency. The adoption of DM tools for big data environments necessitates remodeling the algorithm. In this aspect, this paper presents an intelligent feature subset selection with fuzzy wavelet neural network (FSS-FWNN) for big data classification. The FSS-FWNN technique incorporates Hadoop Ecosystem tool for handling big data in an effectual way. Besides, the FSS-FWNN technique involves three processes namely preprocessing, feature selection, and classification. In addition, quasi-oppositional chicken swarm optimization (QOCSO) technique is employed for the feature selection process and the FWNN technique is applied for the classification process. The design of QOCSO algorithm as an FS technique for big data classification shows the novelty of the work and the feature subset selection process considerably enhances the classification performance. An extensive set of simulations is carried out and the results are reviewed in terms of several evaluation factors in order to analyse the improvement of the FSS-FWNN approach. The experimental findings demonstrated that the FSS-FWNN approach outperformed the most current algorithms.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45916441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Romero, R. A. Sánchez-Ancajima, Javier A. López-Céspedes, M. Saavedra-López, Segundo Juan Sánchez Tarrillo, R. M. Hernández
{"title":"Security Model for a Central Bank in Latin America using Blockchain","authors":"R. Romero, R. A. Sánchez-Ancajima, Javier A. López-Céspedes, M. Saavedra-López, Segundo Juan Sánchez Tarrillo, R. M. Hernández","doi":"10.58346/jisis.2023.i2.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.007","url":null,"abstract":"Banking institutions in Latin America are the target of increasingly sophisticated and advanced cyber-attacks and threats, which increase every year and leave substantial economic losses, due to the high level of global interconnection and digitization of their operations. The objective of this work is to design a model to guarantee information security in a Central Bank in Latin America using Blockchain technology. Exploratory research, observation and inductive and deductive methods are used to propose Blockchain solutions in a Central Bank. The results are a model for secure transactions in Blockchain, Smart Contract functions and a data management process. It was concluded that the security model for a central bank provides high level of information management and storage of transactions in a secure and immutable way.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49279924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System","authors":"Madhavi M, S. Dr.T., K. Dr.G.","doi":"10.58346/jisis.2023.i2.011","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.011","url":null,"abstract":"Privacy has become a significant factor of e-Health system in the area of data mining termed as Privacy preserving data mining (PPDM) as it can uncover underlying rules and hide sensitive data for data sanitization. Various algorithms and heuristics have been studied to hide sensitive data using transaction removal. However, they are facing challenges to attain the reasonable side effects. Thus, rain optimization algorithm (ROA) based sensitive data hiding techniques is proposed in this paper. Using this algorithm, suitable transactions to be removed are selected. Besides, in this work, ROA based two frameworks are designed for data sanitization that are simple ROA to remove transaction (sROA2RT) and pre-large ROA to remove transaction (pROA2RT). In this algorithm, fitness is evaluated based on four side effects such as hiding failure, artificial cost, missing cost and dissimilarity of database. The proposed frameworks are evaluated using three e-Health datasets. Compared to previous frameworks, the proposed frameworks attain reasonable side effects.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49350827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mae Mai Muay Thai Style Classification in Movement Appling Long-Term Recurrent Convolution Networks","authors":"Shujaat Ali Zaidi","doi":"10.58346/jisis.2023.i1.010","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.010","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46723372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Intelligent Systems in Tourism: Relevant Methods","authors":"R. A. Sánchez-Ancajima","doi":"10.58346/jisis.2023.i1.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.006","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42658384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN","authors":"Santhosh G","doi":"10.58346/jisis.2023.i1.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i1.007","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45792860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}