{"title":"Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud","authors":"Dawei Xie, Haining Yang, Jing Qin, Jixin Ma","doi":"10.4018/ijdcf.2019100102","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100102","url":null,"abstract":"As cloud computing provides affordable and scalable computational resources, delegating heavy computing tasks to the cloud service providers is appealing to individuals and companies. Among different types of specific computations, the polynomial evaluation is an important one due to its wide usage in engineering and scientific fields. Cloud service providers may not be trusted, thus, the validity and the privacy of such computation should be guaranteed. In this article, the authors present a protocol for publicly verifiable delegations of high degree polynomials. Compared with the existing solutions, it ensures the privacy of outsourced functions and actual results. And the protocol satisfies the property of blind verifiability such that the results can be publicly verified without learning the value. The protocol also improves in efficiency.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"17 1","pages":"14-27"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87561961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis of AMR Based on Statistical Features of Pitch Delay","authors":"Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen","doi":"10.4018/ijdcf.2019100105","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100105","url":null,"abstract":"The calibrated matrix of the second-order difference of the pitch delay (C-MSDPD) feature has been proven to be effective in detecting steganography based on pitch delay. In this article, a new steganalysis scheme based on multiple statistical features of pitch delay is present. Analyzing the principle of the adaptive multi-rate (AMR) codec, the pitch delay values in the same frame is divided into groups, in each of which, a pitch delay has a closer correlation with the other ones. To depict the characteristic of the pitch delay, two new types of statistical features are adopted in this article. The new features and C-MSDPD feature are together employed to train a classifier based on support vector machine (SVM). The experimental result shows that, the proposed scheme outperforms the existing one at different embedding bit rates and with different speech lengths.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"51 1","pages":"66-81"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87598866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Horner's Rule to Optimize Lightweight MDS Matrices","authors":"Jian Bai, Yao Sun, Ting Li, Dingkang Wang","doi":"10.4018/ijdcf.2019100106","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100106","url":null,"abstract":"This article is concerned with the problem of constructing lightweight MDS matrices. The authors present a new construction of 4 × 4 MDS matrices over GL(F2, m) for any integer m. They give sufficient and necessary conditions to determine whether the construction is an MDS matrix. Further, for any even number m ≥ 4, they construct lightweight MDS matrices in this structure. Applying Horner's rule to implement MDS matrices, the authors constructions need only 8+4×3×m XOR operations.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"46 1","pages":"82-96"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74727861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution","authors":"Mengmeng Zhang, R. Ni, Yao Zhao","doi":"10.4018/ijdcf.2019100103","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100103","url":null,"abstract":"A blind print-recapture robust watermark scheme is proposed. Watermark patterns are embedded into the space domain of a color image and can be detected from a print-recaptured version of the image without knowledge of the original image. The process of embedding invisible watermarks to convert RGB color images to CIE Lab color spaces and embed periodic watermarks in both color channels at the same time. Watermark extraction is achieved by calculating self-convolution and inverting the geometric transformation such as rotation and scale. Normalized correlation coefficients between the extracted and the embedded watermark pattern is calculated to determine whether there is watermark. The decision about the presence/absence of the watermark pattern is then determined by a threshold which is set 0.13, and the detection rate of 241 pictures is about 0.79.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"2 1","pages":"28-49"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80009489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Behavior Steganography Model Based on Secret Sharing","authors":"Hanlin Liu, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, Yue Jiang","doi":"10.4018/ijdcf.2019100107","DOIUrl":"https://doi.org/10.4018/ijdcf.2019100107","url":null,"abstract":"This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms — threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"33 1","pages":"97-117"},"PeriodicalIF":0.7,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78224660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CloudIoT","authors":"Junaid Latief Shah, Heena Farooq Bhat, Asif Iqbal Khan","doi":"10.4018/ijdcf.2019070101","DOIUrl":"https://doi.org/10.4018/ijdcf.2019070101","url":null,"abstract":"The Internet of Things (IoT) is seen as a novel paradigm enabling ubiquitous and pervasive communication of objects with each other and with the physical/virtual world via internet. With the exponential rise of sensor and RFID-based communication, much data is getting generated; which becomes arduous to manage given the constrained power and computation of low-powered devices. To resolve this issue, the integration of Cloud and IoT, also known as CloudIoT, is seen as panacea to create more heterogeneous smart services and handle increasing data demands. In this article, the authors examine and survey literature with a focus on the integration components of CloudIoT and present diverse applications including driving factors for CloudIoT integration. The article also identifies security vulnerabilities implied by the integration of Cloud and IoT and outlines some suggested measures to mitigate the challenge. Finally, the article presents some open issues and challenges providing potential directions for future research in this area.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"119 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform","authors":"S. Sheela, K. Suresh, D. Tandur","doi":"10.4018/IJDCF.2019070103","DOIUrl":"https://doi.org/10.4018/IJDCF.2019070103","url":null,"abstract":"Secured transmission of electrophysiological signals is one of the crucial requirements in telemedicine, telemonitoring, cardiovascular disease diagnosis (CVD) and telecardiology applications. The chaotic systems have good potential in secured transmission of ECG/EEG signals due to their inherent characteristics relevant to cryptography. This article introduces a new cryptosystem for clinical signals such as electrocardiograms (ECG) and electroencephalograms (EEG) based on hyperchaotic DNA confusion and diffusion transform (HC-DNA-CDT). The algorithm uses a hyperchaotic system with cubic nonlinearity and deoxyribonucleic acid (DNA) encoding rules. The performance of the cryptosystem is evaluated for different clinical signals using different encryption/decryption quality metrics. Simulation and comparison results show that the cryptosystem yield good encryption results and is able to resist various cryptographic attacks. The proposed algorithm can also be used in picture archiving and communication systems (PACS) to provide an efficient sharing of medical image over the networks.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"18 1","pages":"43-64"},"PeriodicalIF":0.7,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72900260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications","authors":"Surekha Borra, Rohit M. Thanki","doi":"10.4018/IJDCF.2019040102","DOIUrl":"https://doi.org/10.4018/IJDCF.2019040102","url":null,"abstract":"In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet Transform (FRT) and Singular Value Decomposition (SVD) is proposed. A host medical image is first transformed into 16 × 16 non-overlapping blocks and then ridgelet transform is applied on the individual blocks to obtain sets of ridgelet coefficients. SVD is then applied on these sets, to obtain the corresponding U, S and V matrix. The watermark information is embedded into the host medical image by modification of the value of the significant elements of U matrix. This proposed technique is tested on various types of medical images such as X-ray and CT scan. The simulation results revealed that this technique provides better imperceptibility, with an average PSNR being 42.95 dB for all test medical images. This technique also overcomes the limitation of the existing technique which is applicable on only the Region of Interest (ROI) of the medical image.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"71 1","pages":"13-33"},"PeriodicalIF":0.7,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83939212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment","authors":"Xinchao Huang, Zihan Liu, Wei Lu, Hongmei Liu, Shijun Xiang","doi":"10.4018/IJDCF.2019040104","DOIUrl":"https://doi.org/10.4018/IJDCF.2019040104","url":null,"abstract":"Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method to detect doctored audios. First, the article segments the input audio data into syllables by voice activity detection and syllable detection. Second, the authors select the points in the frequency domain as feature by applying discrete Fourier transform (DFT) to each audio segment. Furthermore, this article sorts every segment according to the features and gets a sorted list of audio segments. In the end, the article merely compares one segment with some adjacent segments in the sorted list so that the time complexity is decreased. After comparisons with other state of the art methods, the results show that the proposed method can identify the authentication of the input audio and locate the forged position fast and effectively.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"130 1","pages":"47-62"},"PeriodicalIF":0.7,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86367516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model","authors":"Xinyi Wang, Shaozhang Niu, Jiwei Zhang","doi":"10.4018/IJDCF.2019040101","DOIUrl":"https://doi.org/10.4018/IJDCF.2019040101","url":null,"abstract":"According to the characteristics of the color filter array interpolation in a camera, an image splicing forgery detection algorithm based on bi-cubic interpolation and Gaussian mixture model is proposed. The authors make the assumption that the image is acquired using a color filter array, and that tampering removes the artifacts due to a demosaicing algorithm. This article extracts the image features based on the variance of the prediction error and create image feature likelihood map to detect and locate the image tampered areas. The experimental results show that the proposed method can detect and locate the splicing tampering areas precisely. Compared with bi-linear interpolation, this method can reduce the prediction error and improve the detection accuracy.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"14 1","pages":"1-12"},"PeriodicalIF":0.7,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88327436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}