International Journal of Digital Crime and Forensics最新文献

筛选
英文 中文
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code 基于抖动模拟混沌码的无线隐蔽信道设计
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030108
Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yue-wei Dai, Huiwen Bai
{"title":"Design a Wireless Covert Channel Based on Dither Analog Chaotic Code","authors":"Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yue-wei Dai, Huiwen Bai","doi":"10.4018/IJDCF.2021030108","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030108","url":null,"abstract":"To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on constellation modulation has made the composite and legitimate signal undistinguishable, there exists an imperfection on reliability due to the dense distribution of covert constellation points. In this study, the authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability. The dither analog chaotic code (DACC) plays the role as the error correcting code. In the modulation, the analog variables converted from secret messages are encode into joint codewords by chaotic mapping and dither derivation of DACC. The joint codewords are mapped to artificial noise later. Simulation results show that the proposed scheme can achieve better reliability than the state-of-the-art scheme while maintaining the similar performance on undetectability.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86796570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis 基于静态指令赋值和动态内存分析的ROP自动生成
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030104
Ning Huang, Shuguang Huang, Chao Chang
{"title":"Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis","authors":"Ning Huang, Shuguang Huang, Chao Chang","doi":"10.4018/IJDCF.2021030104","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030104","url":null,"abstract":"W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and bypass the W⊕X. However, manual search for gadgets that match the conditions is inefficient, with high error and missing rates. In order to improve the efficiency of ROP generation, the authors propose an automatic generation method based on a fragmented layout called automatic generation of ROP. This method designs new intermediate instruction construction rules based on an automatic ROP generation framework Q, uses symbolic execution to analyze program memory states and construct data constraints for multi-modules ROP, and solves ROP data constraints to generate test cases of an ROP chain. Experiments show that this method can effectively improve the space efficiency of the ROP chain and lower the requirements of the ROP layout on memory conditions.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72773766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform 基于行程编码和整数小波变换的音频隐写
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030102
Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Dingwei Tan
{"title":"An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform","authors":"Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Dingwei Tan","doi":"10.4018/IJDCF.2021030102","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030102","url":null,"abstract":"This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose an audio steganography with high capacity, where the secret information is compressed by run length encoding. In the applicable scenario, the main purpose is to hide as more information as possible in the cover audio files. First, the secret information is chaotic scrambling, then the result of scrambling is run length encoded, and finally, the secret information is embedded into integer wavelet coefficients. The experimental results and comparison with existing technique show that by utilizing the lossless compression of run length encoding and anti-attack of wavelet domain, the proposed method has improved the capacity, good audio quality, and can achieve blind extraction while maintaining imperceptibility and strong robustness.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74811818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Fusion Strategies in Localization of Local Deformation Tampering 局部变形篡改定位中的多种融合策略
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030107
Yongzhen Ke, Yiping Cui
{"title":"Multiple Fusion Strategies in Localization of Local Deformation Tampering","authors":"Yongzhen Ke, Yiping Cui","doi":"10.4018/IJDCF.2021030107","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030107","url":null,"abstract":"Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features and the correlation between the pixels of an image are changed. Multiple fusion strategies based on first-order difference images and their texture feature is proposed to locate the tamper in local deformation image. Firstly, texture features using overlapping blocks on one color channel are extracted and fed into fuzzy c-means clustering method to generate a tamper probability map (TPM), and then several TPMs with different block sizes are fused in the first fusion. Secondly, different TPMs with different color channels and different texture features are respectively fused in the second and third fusion. The experimental results show that the proposed method can accurately detect the location of the local deformation of an image.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77072779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images 彩色生物特征图像篡改检测的脆弱水印框架
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030103
Rohit M. Thanki, Surekha Borra, A. Kothari
{"title":"Fragile Watermarking Framework for Tamper Detection of Color Biometric Images","authors":"Rohit M. Thanki, Surekha Borra, A. Kothari","doi":"10.4018/IJDCF.2021030103","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030103","url":null,"abstract":"Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79463067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method 基于Hessian矩阵和双分量分割方法的掌纹识别
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010102
Jyotismita Chaki, N. Dey
{"title":"Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method","authors":"Jyotismita Chaki, N. Dey","doi":"10.4018/ijdcf.2021010102","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010102","url":null,"abstract":"Palmprint recognition has been comprehensively examined in the past couple of years and various undertakings are done to use it as a biometric methodology for various applications. The point of this study is to construct an effective palmprint recognition technique with low computational multifaceted nature and along these lines to expand the acknowledgment and precision. Since edges are free from distortion, they are very reliable and subsequently used for palm print recognition. The originality of the proposed technique depends on new area of interest (ROI) extraction took after by new principal line extraction and texture matching strategy. The new principal line extraction technique is created by using the Hessian matrix and Eigen value. The texture matching of the ROI is done using new 2-component partition method by segmenting the image into comparative and non-comparative edges. Examinations are finished on a database and exploratory results exhibit that the accuracy of the proposed method is comparable to past methods used for palmprint recognition.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87349765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications 在加密货币金融交易应用程序中检测可疑或不可信的用户
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010105
R. Mittal, M. P. S. Bhatia
{"title":"Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications","authors":"R. Mittal, M. P. S. Bhatia","doi":"10.4018/ijdcf.2021010105","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010105","url":null,"abstract":"In this age, where cryptocurrencies are slowly creeping into the banking services and making a name for them, it is becoming crucially essential to figure out the security concerns when users make transactions. This paper investigates the untrusted users of cryptocurrency transaction services, which are connected using smartphones and computers. However, as technology is increasing, transaction frauds are growing, and there is a need to detect vulnerabilities in systems. A methodology is proposed to identify suspicious users based on their reputation score by collaborating centrality measures and machine learning techniques. The results are validated on two cryptocurrencies network datasets, Bitcoin-OTC, and Bitcoin-Alpha, which contain information of the system formed by the users and the user's trust score. Results found that the proposed approach provides improved and accurate results. Hence, the fusion of machine learning with centrality measures provides a highly robust system and can be adapted to prevent smart devices' financial services.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81902837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card 一种限制智能卡非法获取信息的新型验证协议
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010104
A. Sahu, Ashish Kumar
{"title":"A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card","authors":"A. Sahu, Ashish Kumar","doi":"10.4018/ijdcf.2021010104","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010104","url":null,"abstract":"The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The two-factor-based password verification techniques are used between remote server and legitimate users for verification over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, and robustness. The authors proved that their enhanced protocols are vulnerable to different attacks on the network and permit only authenticated users to update their password preserving traceability and identity. Analysis shows that no scheme has fulfilled all the security requirements and achieved entire goals. Therefore, in this article, a scheme has been presented to overcome these issues in the previous schemes to resist illegal access leading to misuse and achieve all the security requirements and goals. The safety analysis of the presented scheme has confirmed its performance in terms of reliability and safety.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77893946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models 无人机取证:基于常见无人机模型的数字取证调查案例研究
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010101
Khalifa Al-Room, Farkhund Iqbal, T. Baker, B. Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung
{"title":"Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models","authors":"Khalifa Al-Room, Farkhund Iqbal, T. Baker, B. Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung","doi":"10.4018/ijdcf.2021010101","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010101","url":null,"abstract":"Drones (a.k.a. unmanned aerial vehicles – UAV) have become a societal norm in our daily lives. The ability of drones capture high-quality photos from an aerial view and store and transmit such data presents a multi-facet problem. These actions possess privacy challenges to innocent users who can be spied on or drone owner's data which may be intercepted by a hacker. With all technological paradigms, utilities can be misused, and this is an increasing occurrence with drones. As a result, it is imperative to develop a novel methodological approach for the digital forensic analysis of a seized drone. This paper investigates six brands of drones commonly used in criminal activities and extracts forensically relevant data such as location information, captured images and videos, drones' flight paths, and data related to the ownership of the confiscated drone. The experimental results indicate that drone forensics would facilitate law enforcement in collecting significant information necessary for criminal investigations.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88717900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SafeWomen SafeWomen
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010103
S. Yadav, Kavita Sharma, Ananya Gupta
{"title":"SafeWomen","authors":"S. Yadav, Kavita Sharma, Ananya Gupta","doi":"10.4018/ijdcf.2021010103","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010103","url":null,"abstract":"The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So instead of becoming a victim of a violent crime such as domestic violence, robbery, or rape, women should call on resources to help her out of that situation. In this paper, the authors develop a women safety device, namely SafeWomen, which helps in reducing the crimes held against women. This is a new approach for providing security to women in any unsafe situation by sending an alert having geographical location along with emergency message to the registered contact numbers so that the incident could be prevented. Also, it can track the current location of the victim just by knowing the IP address of the device she is using. One can also use this system for the safety and security of kids and elderly people just by making some changes in the functionality of the system.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信