International Journal of Digital Crime and Forensics最新文献

筛选
英文 中文
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud 将多项式评估外包给恶意云的隐私保护和可公开验证协议
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-10-01 DOI: 10.4018/ijdcf.2019100102
Dawei Xie, Haining Yang, Jing Qin, Jixin Ma
{"title":"Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud","authors":"Dawei Xie, Haining Yang, Jing Qin, Jixin Ma","doi":"10.4018/ijdcf.2019100102","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100102","url":null,"abstract":"As cloud computing provides affordable and scalable computational resources, delegating heavy computing tasks to the cloud service providers is appealing to individuals and companies. Among different types of specific computations, the polynomial evaluation is an important one due to its wide usage in engineering and scientific fields. Cloud service providers may not be trusted, thus, the validity and the privacy of such computation should be guaranteed. In this article, the authors present a protocol for publicly verifiable delegations of high degree polynomials. Compared with the existing solutions, it ensures the privacy of outsourced functions and actual results. And the protocol satisfies the property of blind verifiability such that the results can be publicly verified without learning the value. The protocol also improves in efficiency.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"17 1","pages":"14-27"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87561961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganalysis of AMR Based on Statistical Features of Pitch Delay 基于基音延迟统计特征的AMR隐写分析
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-10-01 DOI: 10.4018/ijdcf.2019100105
Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen
{"title":"Steganalysis of AMR Based on Statistical Features of Pitch Delay","authors":"Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen","doi":"10.4018/ijdcf.2019100105","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100105","url":null,"abstract":"The calibrated matrix of the second-order difference of the pitch delay (C-MSDPD) feature has been proven to be effective in detecting steganography based on pitch delay. In this article, a new steganalysis scheme based on multiple statistical features of pitch delay is present. Analyzing the principle of the adaptive multi-rate (AMR) codec, the pitch delay values in the same frame is divided into groups, in each of which, a pitch delay has a closer correlation with the other ones. To depict the characteristic of the pitch delay, two new types of statistical features are adopted in this article. The new features and C-MSDPD feature are together employed to train a classifier based on support vector machine (SVM). The experimental result shows that, the proposed scheme outperforms the existing one at different embedding bit rates and with different speech lengths.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"51 1","pages":"66-81"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87598866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying Horner's Rule to Optimize Lightweight MDS Matrices 应用Horner规则优化轻量级MDS矩阵
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-10-01 DOI: 10.4018/ijdcf.2019100106
Jian Bai, Yao Sun, Ting Li, Dingkang Wang
{"title":"Applying Horner's Rule to Optimize Lightweight MDS Matrices","authors":"Jian Bai, Yao Sun, Ting Li, Dingkang Wang","doi":"10.4018/ijdcf.2019100106","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100106","url":null,"abstract":"This article is concerned with the problem of constructing lightweight MDS matrices. The authors present a new construction of 4 × 4 MDS matrices over GL(F2, m) for any integer m. They give sufficient and necessary conditions to determine whether the construction is an MDS matrix. Further, for any even number m ≥ 4, they construct lightweight MDS matrices in this structure. Applying Horner's rule to implement MDS matrices, the authors constructions need only 8+4×3×m XOR operations.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"46 1","pages":"82-96"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74727861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution 一种计算自卷积的盲印再现鲁棒水印方案
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-10-01 DOI: 10.4018/ijdcf.2019100103
Mengmeng Zhang, R. Ni, Yao Zhao
{"title":"A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution","authors":"Mengmeng Zhang, R. Ni, Yao Zhao","doi":"10.4018/ijdcf.2019100103","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100103","url":null,"abstract":"A blind print-recapture robust watermark scheme is proposed. Watermark patterns are embedded into the space domain of a color image and can be detected from a print-recaptured version of the image without knowledge of the original image. The process of embedding invisible watermarks to convert RGB color images to CIE Lab color spaces and embed periodic watermarks in both color channels at the same time. Watermark extraction is achieved by calculating self-convolution and inverting the geometric transformation such as rotation and scale. Normalized correlation coefficients between the extracted and the embedded watermark pattern is calculated to determine whether there is watermark. The decision about the presence/absence of the watermark pattern is then determined by a threshold which is set 0.13, and the detection rate of 241 pictures is about 0.79.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"2 1","pages":"28-49"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80009489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Behavior Steganography Model Based on Secret Sharing 一种基于秘密共享的行为隐写模型
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-10-01 DOI: 10.4018/ijdcf.2019100107
Hanlin Liu, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, Yue Jiang
{"title":"A Novel Behavior Steganography Model Based on Secret Sharing","authors":"Hanlin Liu, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, Yue Jiang","doi":"10.4018/ijdcf.2019100107","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100107","url":null,"abstract":"This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms — threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"33 1","pages":"97-117"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78224660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CloudIoT CloudIoT
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-07-01 DOI: 10.4018/ijdcf.2019070101
Junaid Latief Shah, Heena Farooq Bhat, Asif Iqbal Khan
{"title":"CloudIoT","authors":"Junaid Latief Shah, Heena Farooq Bhat, Asif Iqbal Khan","doi":"10.4018/ijdcf.2019070101","DOIUrl":"https://doi.org/10.4018/ijdcf.2019070101","url":null,"abstract":"The Internet of Things (IoT) is seen as a novel paradigm enabling ubiquitous and pervasive communication of objects with each other and with the physical/virtual world via internet. With the exponential rise of sensor and RFID-based communication, much data is getting generated; which becomes arduous to manage given the constrained power and computation of low-powered devices. To resolve this issue, the integration of Cloud and IoT, also known as CloudIoT, is seen as panacea to create more heterogeneous smart services and handle increasing data demands. In this article, the authors examine and survey literature with a focus on the integration components of CloudIoT and present diverse applications including driving factors for CloudIoT integration. The article also identifies security vulnerabilities implied by the integration of Cloud and IoT and outlines some suggested measures to mitigate the challenge. Finally, the article presents some open issues and challenges providing potential directions for future research in this area.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"119 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform 利用超混沌DNA混淆和扩散变换安全传输临床信号
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-07-01 DOI: 10.4018/IJDCF.2019070103
S. Sheela, K. Suresh, D. Tandur
{"title":"Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform","authors":"S. Sheela, K. Suresh, D. Tandur","doi":"10.4018/IJDCF.2019070103","DOIUrl":"https://doi.org/10.4018/IJDCF.2019070103","url":null,"abstract":"Secured transmission of electrophysiological signals is one of the crucial requirements in telemedicine, telemonitoring, cardiovascular disease diagnosis (CVD) and telecardiology applications. The chaotic systems have good potential in secured transmission of ECG/EEG signals due to their inherent characteristics relevant to cryptography. This article introduces a new cryptosystem for clinical signals such as electrocardiograms (ECG) and electroencephalograms (EEG) based on hyperchaotic DNA confusion and diffusion transform (HC-DNA-CDT). The algorithm uses a hyperchaotic system with cubic nonlinearity and deoxyribonucleic acid (DNA) encoding rules. The performance of the cryptosystem is evaluated for different clinical signals using different encryption/decryption quality metrics. Simulation and comparison results show that the cryptosystem yield good encryption results and is able to resist various cryptographic attacks. The proposed algorithm can also be used in picture archiving and communication systems (PACS) to provide an efficient sharing of medical image over the networks.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"18 1","pages":"43-64"},"PeriodicalIF":0.7,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72900260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications 基于FRT - SVD的盲医学水印技术在远程医疗中的应用
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-04-01 DOI: 10.4018/IJDCF.2019040102
Surekha Borra, Rohit M. Thanki
{"title":"A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications","authors":"Surekha Borra, Rohit M. Thanki","doi":"10.4018/IJDCF.2019040102","DOIUrl":"https://doi.org/10.4018/IJDCF.2019040102","url":null,"abstract":"In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet Transform (FRT) and Singular Value Decomposition (SVD) is proposed. A host medical image is first transformed into 16 × 16 non-overlapping blocks and then ridgelet transform is applied on the individual blocks to obtain sets of ridgelet coefficients. SVD is then applied on these sets, to obtain the corresponding U, S and V matrix. The watermark information is embedded into the host medical image by modification of the value of the significant elements of U matrix. This proposed technique is tested on various types of medical images such as X-ray and CT scan. The simulation results revealed that this technique provides better imperceptibility, with an average PSNR being 42.95 dB for all test medical images. This technique also overcomes the limitation of the existing technique which is applicable on only the Region of Interest (ROI) of the medical image.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"71 1","pages":"13-33"},"PeriodicalIF":0.7,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83939212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment 基于自动分段的数字音频快速有效的拷贝移动检测
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-04-01 DOI: 10.4018/IJDCF.2019040104
Xinchao Huang, Zihan Liu, Wei Lu, Hongmei Liu, Shijun Xiang
{"title":"Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment","authors":"Xinchao Huang, Zihan Liu, Wei Lu, Hongmei Liu, Shijun Xiang","doi":"10.4018/IJDCF.2019040104","DOIUrl":"https://doi.org/10.4018/IJDCF.2019040104","url":null,"abstract":"Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method to detect doctored audios. First, the article segments the input audio data into syllables by voice activity detection and syllable detection. Second, the authors select the points in the frequency domain as feature by applying discrete Fourier transform (DFT) to each audio segment. Furthermore, this article sorts every segment according to the features and gets a sorted list of audio segments. In the end, the article merely compares one segment with some adjacent segments in the sorted list so that the time complexity is decreased. After comparisons with other state of the art methods, the results show that the proposed method can identify the authentication of the input audio and locate the forged position fast and effectively.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"130 1","pages":"47-62"},"PeriodicalIF":0.7,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86367516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model 基于CFA插值特征和高斯混合模型的数字图像取证
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2019-04-01 DOI: 10.4018/IJDCF.2019040101
Xinyi Wang, Shaozhang Niu, Jiwei Zhang
{"title":"Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model","authors":"Xinyi Wang, Shaozhang Niu, Jiwei Zhang","doi":"10.4018/IJDCF.2019040101","DOIUrl":"https://doi.org/10.4018/IJDCF.2019040101","url":null,"abstract":"According to the characteristics of the color filter array interpolation in a camera, an image splicing forgery detection algorithm based on bi-cubic interpolation and Gaussian mixture model is proposed. The authors make the assumption that the image is acquired using a color filter array, and that tampering removes the artifacts due to a demosaicing algorithm. This article extracts the image features based on the variance of the prediction error and create image feature likelihood map to detect and locate the image tampered areas. The experimental results show that the proposed method can detect and locate the splicing tampering areas precisely. Compared with bi-linear interpolation, this method can reduce the prediction error and improve the detection accuracy.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"14 1","pages":"1-12"},"PeriodicalIF":0.7,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88327436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信