Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 79, Issue CDec 2023
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
A practical multi-tab website fingerprinting attack
Abstract

The rapid development of Internet of Things technology has allowed a massive number of devices to be connected, resulting in a lot of private data being transmitted over the network. To protect the security and privacy, anonymous communication ...

research-article
The evolution of Mirai botnet scans over a six-year period
Abstract

The proliferation of Internet of Things devices has resulted in an increase in security vulnerabilities and network attacks. The Mirai botnet is a well-known example of a network used for malicious activities, detected for the first time by the ...

research-article
Image steganography based on smooth cycle-consistent adversarial learning
Abstract

Steganography is the process of concealing a secret message in ordinary digital media by making small modifications that try to preserve cover statistics. In this paper, a novel unified steganographic framework is introduced inspired by image-to-...

research-article
Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
Abstract

Images are promising information carriers when compared to other media documents in the healthcare domain. However, digital data transmission over unprotected wired or wireless networks poses a threat to the security of healthcare systems. As a ...

Highlights

  • A biometric image feature based secure data hiding technique is proposed.
  • Joint encryption-compression methods are used to enhance security of medical images.
  • This method is highly imperceptible, secure and successfully resists ...

Graphical abstract

Display Omitted

research-article
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations
Abstract

Electronic voting has the potential to revolutionize democratic participation; however, conventional systems face challenges in ensuring transparency and bear risks associated with centralization. Blockchain technology presents a novel approach ...

research-article
Privacy-preserving recommendation system based on user classification
Abstract

Recommender systems have become ubiquitous in many application domains such as e-commerce and entertainment to recommend items that are interesting to the users. Collaborative Filtering is one of the most widely known techniques for implementing ...

research-article
More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate
Abstract

Constand-round secure multi-party computation enables a group of mutually distrustful parties to jointly compute a function of their inputs in a constant-round of communication. In recent years, the constant-round secure multi-party computation ...

research-article
PVO-based reversible data hiding using bit plane segmentation and pixel expansion
Abstract

The existing pixel value ordering (PVO)-based reversible data hiding (RDH) approaches have been investigated; however, the functions of these techniques are weak when embedded in rough image regions. Therefore, a novel PVO-RDH method is proposed ...

research-article
VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios
Abstract

In the realm of industrial anomaly detection, machine and deep learning models face a critical vulnerability to adversarial attacks. In this context, existing attack methodologies primarily target continuous features, often in the context of ...

research-article
Evolution of web tracking protection in Chrome
Abstract

In our society, protecting users’ privacy is of utmost importance, especially when users access websites. Increased awareness of privacy concerns has led web browsers to implement new mechanisms to improve privacy while browsing the Internet. In ...

research-article
From the detection towards a pyramidal classification of terrorist propaganda
Abstract

With over 3,81 billion users from across the world, social media platforms provide a borderless environment for people of different nationalities, races, ethnicities, and religious beliefs to interact and communicate with each other. Not only for ...

research-article
Refined statistical attacks against searchable symmetric encryption using non-indexed documents
Abstract

Searchable symmetric encryption(SSE) schemes allow clients to search encrypted data stored on remote servers but ensure efficient retrieval by revealing specific information about the queries, such as access patterns. Honest but curious servers ...

research-article
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory
Abstract

With the advancement of NIST PQC standardization, three of the four candidates in Round 4 are code-based schemes, namely Classic McEliece, HQC and BIKE. Currently, one of the most important tasks is to further analyze their security levels for ...

research-article
A dynamic anonymous authentication scheme with trusted fog computing in V2G networks
Abstract

As an important component of smart grid, vehicle-to-grid (V2G) is helpful to improve grid stability, save on generation costs, and reduce energy consumption. However, the existing V2G authentication schemes focus on the trustworthiness of ...

research-article
Robust coverless video steganography based on inter-frame keypoint matching
Abstract

Existing coverless video steganography schemes primarily focus on single-frame features, which manifest poor robustness. To enhance resistance against adversarial attacks, this paper proposes a coverless video steganography method based on inter-...

research-article
Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme
Abstract

In recent years, medical image transmission using a multi-cloud system has played a significant role in e-Healthcare infrastructure. It allows medical practitioners to easily store, retrieve, and share patients’ medical information across ...

research-article
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images
Abstract

Deep watermarking has been successfully applied to real-value domain (e.g., CT, MRI, DWI) medical images for copyright protection; however, manifold-value domain images, such as diffusion tensor imaging (DTI), have received less academic ...

research-article
ttPAKE: Typo tolerance password-authenticated key exchange
Abstract

Error tolerant password-authenticated key exchange (PAKE) allows a user to authenticate to a server using a password and agree on a session key with the server, provided that the password for authentication and the registered one are “close ...

research-article
System-widely and fine-grained forward secure identity-based signature scheme
Abstract

In an identity-based signature (IBS) system, each user uses individual information as his/her public key, and also holds a private key issued by a fully trusted key generation center (KGC) with a master secret key. This avoids the mandatory ...

research-article
Crypto-space image steganography based on blind flipping
Abstract

Reversible data hiding (RDH) for digital images is a widely studied steganography that ensures the carrier image can be restored without distortion. Due to the popularity of Internet applications, a lot of research reports focus on the RDH for ...

research-article
Provably secure and lightweight three-factor authentication scheme for industrial medical CPS
Abstract

Cyber-Physical System (CPS) is a multidimensional complex system that integrates computing, network, and physical environment, which is widely used to promote the upgrading of industrial production and technology. Recently, the application of ...

Comments