{"title":"Hybrid prediction error and histogram shifting method for reversible data hiding in video system","authors":"Cheng-Ta Huang , Jing-Xuan Song , Thi Thu-Ha Dang","doi":"10.1016/j.jisa.2025.104007","DOIUrl":"10.1016/j.jisa.2025.104007","url":null,"abstract":"<div><div>With the rapid advancement of communication technology, ensuring the security of information transmission has become increasingly crucial. In today's digital landscape, video has emerged as one of the most popular media formats. Video Reversible Data Hiding (RDH) involves embedding information or secret data within a video file while preserving the perceived quality of the resulting stego video. This technique enables the receiver to perfectly restore the original video and extract the embedded secret data. Achieving high-quality stego files while maintaining sufficient capacity for secret data remains a significant challenge. This research proposes a novel reversible video data hiding method that utilizes an innovative prediction error algorithm for intra-frame pixel value prediction error calculation. The algorithm generates sharp histograms based on these prediction errors, with sharper histograms corresponding to a higher Peak signal-to-noise ratio (PSNR) of the stego video. Additionally, the method incorporates an adaptive zero-point system to identify which zero point that require minimal histogram shifts, thus achieving adaptive effects within each frame by applying different shifts based on frame characteristics. The proposed prediction error algorithm enhances the histogram shifting effects and addresses the limitation of not embedding data in the first frame while maintaining superior PSNR. Extensive experimental analysis demonstrates that proposed method surpasses various existing techniques in terms of steganographic video quality.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104007"},"PeriodicalIF":3.8,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143445840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingfeng Qu , Xu Wang , Yuan Yuan , Jiayu Zhou , Yao Xin
{"title":"Reversible data hiding in Redundancy-Free cipher images through pixel rotation and multi-MSB replacement","authors":"Lingfeng Qu , Xu Wang , Yuan Yuan , Jiayu Zhou , Yao Xin","doi":"10.1016/j.jisa.2025.104003","DOIUrl":"10.1016/j.jisa.2025.104003","url":null,"abstract":"<div><div>Reversible data hiding in encrypted images (RDH-EI) has gained significant attention as a solution to content security challenges in cloud-based image storage. A key challenge in this field is to achieve large-capacity data hiding directly within secure ciphertexts without relying on any redundancy. This paper proposes a scheme for achieving high-capacity reversible data hiding in ciphertext images without redundancy. By combining stream cipher XOR and pixel permutation encryption, the generated ciphertext eliminates redundant information, making it resistant to existing cryptographic attacks. In the data embedding phase, we first rotate the positions of pixels within the image blocks and adjust the arrangement of pixel bit-planes to effectively exploit spatial position features for reversible data hiding. Subsequently, we exploit the embedding potential of the central pixel by applying MSB replacement, further increasing the embedding capacity. We introduce a novel method for calculating image block complexity to enhance image recovery quality, considering pixel correlations within and between adjacent blocks. Experimental results show that the proposed RDH-EI scheme achieves a maximum embedding capacity close to 1<!--> <!-->bpp, significantly higher than both classical and state-of-the-art algorithms. Moreover, the algorithm is resilient to potential attacks, such as forgery attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104003"},"PeriodicalIF":3.8,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143437863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equipment failure data trends focused privacy preserving scheme for Machine-as-a-Service","authors":"Zhengjun Jing , Yongkang Zhu , Quanyu Zhao , Yuanjian Zhou , Chunsheng Gu , Weizhi Meng","doi":"10.1016/j.jisa.2025.104000","DOIUrl":"10.1016/j.jisa.2025.104000","url":null,"abstract":"<div><div>In the Machine-as-a-Service (MaaS) model, enterprises lease equipment from original equipment manufacturer (OEM) to reduce production costs, and share equipment failure data to assist OEM improve equipment quality. However, The failure data trends formed by the frequency of multi-type failure may reveal private information about the enterprises. Most previous studies did not consider the issue of privacy leakage through failure data trends. Therefore, we propose an equipment failure data trends focused privacy preserving scheme for MaaS to prevent the leakage of enterprise privacy data trends. Firstly, our scheme safeguards the multi-dimensional data privacy of equipment through local differential privacy. Secondly, the differential privacy mechanism is integrated into the blockchain to build a fine-grained privacy-preserving categorical query algorithm for enterprise privacy, which decouples the correlation between failure data trends and enterprise privacy. Finally, theoretical analysis proves the privacy preservation capabilities of our scheme. The experimental analysis confirms that our scheme effectively protects data trends privacy, and the results indicate that our scheme has lower computational and time expenditures compared to similar schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104000"},"PeriodicalIF":3.8,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143437851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoliang Wang , Peng Zeng , Guikai Liu , Kuan-Ching Li , Yuzhen Liu , Biao Hu , Francesco Palmieri
{"title":"A privacy-preserving certificate-less aggregate signature scheme with detectable invalid signatures for VANETs","authors":"Xiaoliang Wang , Peng Zeng , Guikai Liu , Kuan-Ching Li , Yuzhen Liu , Biao Hu , Francesco Palmieri","doi":"10.1016/j.jisa.2025.104001","DOIUrl":"10.1016/j.jisa.2025.104001","url":null,"abstract":"<div><div>Vehicular Ad-hoc Networks (VANETs) have significantly improved the efficiency of traffic systems, but there are many security concerns, such as reliable message exchange and privacy-preserving. Besides, under resource-limited conditions, many signed safety-related messages need to be verified in a short period of time. For such, many Certificate-Less Aggregate Signature (CLAS) schemes are proposed. However, some existing CLAS schemes need an efficient algorithm to detect invalid signatures when aggregate verification fails or the proposed algorithms have some unnecessary computation overhead. To overcome such issues, we propose an efficient CLAS scheme that not only fulfills security requirements in VANETs but also provides an improved algorithm to detect invalid signatures with the corresponding real identities. In addition, under the Random Oracle Model (ROM) based Computational Diffie–Hellman (CDH) assumption, we demonstrate that the proposed CLAS scheme is existentially unforgeable under adaptively chosen message attacks (EUF-ACMAs). Performance analysis shows that the proposed scheme is more advantageous in terms of computation overhead and security than other existing schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104001"},"PeriodicalIF":3.8,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143427845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving word vectors learning using partially homomorphic encryption","authors":"Shang Ci , Sen Hu , Donghai Guan , Çetin Kaya Koç","doi":"10.1016/j.jisa.2025.103999","DOIUrl":"10.1016/j.jisa.2025.103999","url":null,"abstract":"<div><div>This paper introduces a privacy-preserving scheme for learning <strong>GloVe</strong> word vectors on encrypted data. Users first encrypt their private data using a partially homomorphic encryption algorithm and then send the ciphertext to a cloud server to execute the proposed scheme. The cloud server generates high-quality word vectors for subsequent machine learning tasks by filtering out disturbances. We conduct a theoretical analysis of the security and efficiency of the proposed approach. Experimental results on real-world datasets demonstrate that our scheme effectively trains word vectors without compromising user privacy or the integrity of the word vector model, while keeping the user-side implementation lightweight and offline.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103999"},"PeriodicalIF":3.8,"publicationDate":"2025-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal verification of a V2X scheme mixing traditional PKI and group signatures","authors":"Simone Bussa, Riccardo Sisto, Fulvio Valenza","doi":"10.1016/j.jisa.2025.103998","DOIUrl":"10.1016/j.jisa.2025.103998","url":null,"abstract":"<div><div>Vehicle-to-Everything (V2X) communications are expected to reshape road mobility in the increasingly near future. This type of communication allows a vehicle to transmit information, such as its position and speed, which can be used for different applications. However, despite the benefits, the increased connectivity and data sent over the network may expose the vehicle to a significant number of cyber attacks. This paper takes one of the schemes proposed in the literature to protect the security and privacy of the vehicles, and analyses it from a security and privacy perspective using Proverif. Specifically, this scheme is unique in combining asymmetric encryption with digital certificates and group signatures used by vehicles to self-certify those certificates. We present a formal model able to capture all the main aspects of the protocol and the context in which it works, and show how security and privacy properties can be expressed for formal verification in Proverif. Our analysis conducted on the model of the protocol revealed some weaknesses for which we tried to provide a solution.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103998"},"PeriodicalIF":3.8,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143403137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDS-DWKAFL: An intrusion detection scheme based on Dynamic Weighted K-asynchronous Federated Learning for smart grid","authors":"Mi Wen , Yanbo Zhang , Pengsong Zhang , Liduo Chen","doi":"10.1016/j.jisa.2025.103993","DOIUrl":"10.1016/j.jisa.2025.103993","url":null,"abstract":"<div><div>With the widespread application of 5G and smart terminals in power systems, malicious traffic and customer privacy issues have become critical security problems that urgently need to be addressed. Currently, intrusion detection systems (IDS) using distributed approaches such as Federated Learning (FL) are primarily employed. However, this method often assumes stable network connections and fails to account for the significant heterogeneity caused by the large number of diverse devices in real-world scenarios, which significantly increases the training time of the mode. To overcome these challenges, this paper proposes a Dynamic Weighted K-Asynchronous Federated Learning (DWKAFL) IDS scheme that determines aggregation eligibility and order based on gradient quality and staleness, thereby improving the efficiency and performance of IDS training in heterogeneous power system scenarios. Specifically, we introduce a node selection algorithm that considers both the quality and staleness of gradients uploaded by clients, as well as their communication capabilities, to dynamically select appropriate nodes for global aggregation. Additionally, we propose an Adaptive Gradient Storage Bucket (AGSB) approach, which stores gradients based on their arrival times and optimizes the timing of aggregation tasks, minimizing the impact of user dropouts on system performance. For the experiments, three publicly available intrusion detection datasets were converted into grayscale maps. The experimental results show that the DWKAFL-IDS scheme demonstrates stronger convergence and higher accuracy during training, achieving approximately 92% accuracy on the CICIDS2017, 91.3% accuracy on the UNSW-NB15 dataset and 85% on the NSL-KDD dataset. Notably, in scenarios with highly heterogeneous devices, the scheme exhibits more significant advantages compared to existing methods.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103993"},"PeriodicalIF":3.8,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143395428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel image encryption algorithm utilizing hybrid chaotic maps and Elliptic Curve Cryptography with genetic algorithm","authors":"Kartikey Pandey, Deepmala Sharma","doi":"10.1016/j.jisa.2025.103995","DOIUrl":"10.1016/j.jisa.2025.103995","url":null,"abstract":"<div><div>In the era of digital communications, securing image data became a hot issue. In this respect, the present paper offers a powerful encryption technique for images while integrating three phases: confusion-diffusion, encryption, and optimization. In the confusion phase, the Lorenz chaotic map applied to improve the randomness of the image data. Diffusion is further made by using a novel hybrid chaotic map known as Logistic-Piecewise Linear Chaotic Map (LPWLCM). This further enhances the image content with the new hybrid of the Logistic and Piecewise Linear Chaotic Maps. The encryption phase uses Elliptic Curve Cryptography (ECC), which offers high security with minimal key sizes such that the encrypted image is resistant to unauthorized access. Finally, the optimization step applies Genetic Algorithm in order to optimize the cipher image to get maximum strength, both in terms of cryptographic quality and performance. Extensive experiments have been performed to show the substantial gains obtained with this proposed technique in security metrics and computational efficiency compared with the existing techniques. Thus, the proposed approach has hope to be taken into account as a good solution for secure image transmission in many applications. The experimental results validate the proposal, hence showing the potential of applying it in real-world implementation of secure digital communication systems.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103995"},"PeriodicalIF":3.8,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143395427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging High-Frequency Diversified Augmentation for general deepfake detection","authors":"Zhimao Lai , Yun Zhang , Dong Li , Jiangqun Ni","doi":"10.1016/j.jisa.2025.103994","DOIUrl":"10.1016/j.jisa.2025.103994","url":null,"abstract":"<div><div>With the rapid advancement of deepfake technology, the visual quality of synthesized faces has significantly improved, raising serious security concerns about the misuse of facial manipulation techniques. As a result, deepfake detection has become a central focus within the multimedia forensics community. Recent studies have highlighted discrepancies between forged and genuine images in the high-frequency components. However, these studies have not fully addressed the inconsistency in high-frequency distributions across different datasets, which can lead to overfitting since models are trained on a limited range of high-frequency features. To overcome this challenge, we propose a High-Frequency Diversified Augmentation (HFDA) method designed to broaden the variation range of high-frequency features in training images. Specifically, our approach perturbs the amplitude spectra of the training data to generate augmented images with enhanced diversity in the high-frequency bands. Additionally, we introduce a forgery artifact consistency learning strategy to guide discriminative feature learning, aligning augmented images with their corresponding raw images. Extensive experiments demonstrate that the proposed HFDA method achieves superior or comparable performance to state-of-the-art methods across several widely used datasets. The code is available at <span><span>https://github.com/laizhm/HFDA</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103994"},"PeriodicalIF":3.8,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143387657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eslam Amer , Bander Ali Saleh Al-rimy , Shaker El-Sappagh
{"title":"Strengthening ICS defense: Modbus-NFA behavior model for enhanced anomaly detection","authors":"Eslam Amer , Bander Ali Saleh Al-rimy , Shaker El-Sappagh","doi":"10.1016/j.jisa.2025.103990","DOIUrl":"10.1016/j.jisa.2025.103990","url":null,"abstract":"<div><div>The rise of the Internet of Things (IoT) has significantly transformed Industrial Control Systems (ICS) by increasing their dependence on interconnected devices for automating processes. This growing integration of IoT technologies within ICS has heightened concerns about security and privacy, underscoring the importance of protecting sensitive data. This paper addresses the challenge of detecting anomalies within ICS environments that utilize the Modbus protocol. Modbus requests are encapsulated in Modbus frames, which direct devices on the specific actions to undertake. Thus, the sequence of Modbus frames in network traffic serves as a comprehensive indicator of device behavior on the network. To tackle this challenge, we introduce a novel approach for anomaly detection by modeling device interactions on the network through the analysis of Modbus frame sequences using a Non-deterministic Finite Automaton (NFA) framework, termed the Modbus-NFA Behavior Distinguisher (MNBD) model. The NFA framework is particularly effective for this purpose as it can represent multiple potential states and transitions within a network, thereby capturing the complexity and variability of network behaviors. This capability allows the MNBD model to detect deviations from normal behavior, identifying potential anomalies with high accuracy. Our MNBD model was evaluated against several existing ICS network traffic datasets. The results demonstrate that the Modbus-NFA approach not only surpasses traditional machine learning models but also outperforms sequence-based deep learning models. Additionally, cross-dataset testing reveals that the MNBD model exhibits superior generalization capabilities compared to deep learning-based approaches. These findings highlight the MNBD model’s potential as a robust tool for anomaly detection, advancing research and development efforts in ICS security.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103990"},"PeriodicalIF":3.8,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143387656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}