2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)最新文献

筛选
英文 中文
A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme 基于纠错码和秘密共享方案的隐写技术研究
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340154
Kaito Onuma, S. Miyata
{"title":"A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme","authors":"Kaito Onuma, S. Miyata","doi":"10.1109/ICSPIS51252.2020.9340154","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340154","url":null,"abstract":"In recent years, opportunities to exchange information on the Internet has increased. Under such circumstances, steganography is a technology for safely exchanging information. Previous studies have proposed some methods that combine Shamir's secret sharing method and correlation-based steganography. Correlation-based steganography embeds pseudo-random number as a secret information in DCT (discrete cosine transform) coefficient of an image and extracts the secret information by correlating the pseudo-random number and DCT coefficient. Since it is necessary to obtain a good correlation at the time of extracting, each value of the pseudorandom number sequence is increased by coefficient. This increasing of values causes image quality deterioration. In this paper, we propose a steganography with an error-correcting code. Our proposed method can improve the embedding capacity without deterioration the image quality.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introducing a Mobile App to Increase Cybersecurity Awareness in MENA 引入移动应用程序以提高中东和北非地区的网络安全意识
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340128
Hadeel Mohammed Jawad, Samir Tout
{"title":"Introducing a Mobile App to Increase Cybersecurity Awareness in MENA","authors":"Hadeel Mohammed Jawad, Samir Tout","doi":"10.1109/ICSPIS51252.2020.9340128","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340128","url":null,"abstract":"Cybersecurity experts predict that cybersecurity is going to be the new cold war. Arab countries are exposed to cyber-attacks that are aimed at stealing personal data and trade secrets. Furthermore, statistics show that women in such countries are exposed to different forms of cyber violence. This paper introduces a new mobile app in the Arabic language to educate Arab-speaking people in the Middle East and North Africa (MENA) about cybersecurity and to increase their awareness of information assurance and cybercrimes. The app was developed for Android and iOS devices and it includes multiple-choice information assurance questions, terms, and articles. Examples of the term definitions are Two-Factor Authentication, Ethical Hacking, and Honeypot. The app data could be increased in the next update of the app.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Obstructive Sleep Apnea on the Cardiovascular Variability 阻塞性睡眠呼吸暂停对心血管变异性的影响
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340127
S. Sani
{"title":"The Effect of Obstructive Sleep Apnea on the Cardiovascular Variability","authors":"S. Sani","doi":"10.1109/ICSPIS51252.2020.9340127","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340127","url":null,"abstract":"Sleep apnea is a serious medical condition that influence millions of adults and children in the United States. It is unknown whether or not sleep apnea can cause any abnormalities in cardiovascular variability in patients with no cardiovascular disease. In this study, we investigated new cardiovascular variables which correspond with obstructive sleep apnea. The power spectrum of the electrocardiogram signal (ECG) was studied in healthy aged-matched adults $boldsymbol{(mathrm{n}=15)}$ and patients diagnosed with moderate obstructive sleep apnea $boldsymbol{(mathrm{n}=15)}$. The power spectral analysis was divided into three main frequency bands: very low frequency $boldsymbol{(0.0033sim 0.04mathrm{Hz})}$; low frequency $boldsymbol{(0.04sim 0.15 mathrm{Hz})}$; and high frequency $boldsymbol{(0.15sim 0.4mathrm{Hz})}$. Frequency domain analysis revealed that the very low frequency component of the ECG signal was increased in obstructive sleep apnea patients during episodes of obstructive sleep apnea, whereas other frequencies (low and high frequency) showed no significant changes. This new cardiovascular variable can be used as a new important feature in any comprehensive obstructive sleep apnea prediction model (to increase the accuracy of the model) or in any other noninvasive approaches for diagnosing or monitoring obstructive sleep apnea at home.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Security Model for IDS Using Deep Learning 基于深度学习的IDS可信安全模型
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340136
K. Makdi, Frederick T. Sheldon, A. A. Hussein
{"title":"Trusted Security Model for IDS Using Deep Learning","authors":"K. Makdi, Frederick T. Sheldon, A. A. Hussein","doi":"10.1109/ICSPIS51252.2020.9340136","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340136","url":null,"abstract":"Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fighting Deepfake by Residual Noise Using Convolutional Neural Networks 利用卷积神经网络残差噪声对抗深度造假
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340138
M. Rai, Hussain Al-Ahmad, O. Gouda, Dina Jamal, M. A. Talib, Q. Nasir
{"title":"Fighting Deepfake by Residual Noise Using Convolutional Neural Networks","authors":"M. Rai, Hussain Al-Ahmad, O. Gouda, Dina Jamal, M. A. Talib, Q. Nasir","doi":"10.1109/ICSPIS51252.2020.9340138","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340138","url":null,"abstract":"In the last few years, the easy access to images and videos shared online have been continuously increased. The generative adversarial networks using deep learning leads to create very realistic deepfake videos by playing with the digital content of images and videos. The spread of such deepfake videos on social media networks urged the international community to consider seriously its danger and accordingly encouraged the researchers around the world to develop powerful deepfake detection methods. Many approaches are available in the recent literature. In this paper, the proposed approach is based on exploiting the residual noise which is the difference between original image and its denoised version. The study of residual noise has shown effectiveness in deep-fake detection with regards to its distinctive and discriminative features which can be effectively captured by convolutional neural networks with transfer learning. The performance of our approach is evaluated on two datasets: low-resolution video sequences of the FaceForensics++ and high-resolution videos from Kaggle Deepfake Detection challenge (DFDC). The obtained results show relevant accuracy in comparison with other competitive methods.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined Radios 使用OpenBTS和软件定义无线电的物联网节点脆弱性评估
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340151
José de Jesús Rugeles Uribe, E. Guillén
{"title":"Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined Radios","authors":"José de Jesús Rugeles Uribe, E. Guillén","doi":"10.1109/ICSPIS51252.2020.9340151","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340151","url":null,"abstract":"Large-scale cyber attacks using IoT devices have increased in recent years. One of the strategies to deal with this problem is the use of penetration test techniques. The aim of this study was to develop a vulnerability assessment for an IoT M2M node that uses GSM technology. A test scenario was designed consisting of a GMS network created using USRP N210 and OpenBTS radios in a multicell configuration. An IoT-GSM node was designed from a sim8001 radio module, used in several M2M devices. The IoT node stores the measurements of the radio bases operational parameters that make up the GSM network. An algorithm for controlling an attacking base radio was designed using the OpenBTS API, which allows the deployment of a “man in the middle” attack. The entire test deployment can be carried out remotely. Analysis of the results of the measurements obtained lets us understand the attack's behavior in detail and determine the IoT-GSM node's vulnerability. The results obtained show the potential of SDR and OpenBTS technology as penetration test tools to analyze vulnerabilities of IoT systems.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Discrete-Time Model of Fractional-Order PLL 分数阶锁相环的一种新的离散时间模型
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) Pub Date : 2020-11-25 DOI: 10.1109/icspis51252.2020.9340137
R. El-Khazali, S. Momani, I. Batiha
{"title":"A New Discrete-Time Model of Fractional-Order PLL","authors":"R. El-Khazali, S. Momani, I. Batiha","doi":"10.1109/icspis51252.2020.9340137","DOIUrl":"https://doi.org/10.1109/icspis51252.2020.9340137","url":null,"abstract":"this work presents a new discrete-time fractional-order phase-locked loop (DTFoPLL). The new model is developed by introducing a 1st-order z-transfer function that approximates a dynamic fractional-order discrete-time integrator that depends on its fractional order. Such structure is used to realize both the discrete-time fractional-order filter (DTFoF) and a fractional-order digital controlled-oscillator (FoDCO) of the PLL. The flexibility of the design follows from choosing low-order PLLs (between $boldsymbol{0.1leqalphaleq 0.2)}$ that provides wider bandwidth and requires lower gains than its integer-order counter parts. The main points of this work are illustrated via numerical simulation.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信