A practical multi-tab website fingerprinting attack
The rapid development of Internet of Things technology has allowed a massive number of devices to be connected, resulting in a lot of private data being transmitted over the network. To protect the security and privacy, anonymous communication ...
The evolution of Mirai botnet scans over a six-year period
The proliferation of Internet of Things devices has resulted in an increase in security vulnerabilities and network attacks. The Mirai botnet is a well-known example of a network used for malicious activities, detected for the first time by the ...
Image steganography based on smooth cycle-consistent adversarial learning
Steganography is the process of concealing a secret message in ordinary digital media by making small modifications that try to preserve cover statistics. In this paper, a novel unified steganographic framework is introduced inspired by image-to-...
Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
Images are promising information carriers when compared to other media documents in the healthcare domain. However, digital data transmission over unprotected wired or wireless networks poses a threat to the security of healthcare systems. As a ...
Highlights
- A biometric image feature based secure data hiding technique is proposed.
- Joint encryption-compression methods are used to enhance security of medical images.
- This method is highly imperceptible, secure and successfully resists ...
Display Omitted
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations
Electronic voting has the potential to revolutionize democratic participation; however, conventional systems face challenges in ensuring transparency and bear risks associated with centralization. Blockchain technology presents a novel approach ...
Privacy-preserving recommendation system based on user classification
Recommender systems have become ubiquitous in many application domains such as e-commerce and entertainment to recommend items that are interesting to the users. Collaborative Filtering is one of the most widely known techniques for implementing ...
More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate
Constand-round secure multi-party computation enables a group of mutually distrustful parties to jointly compute a function of their inputs in a constant-round of communication. In recent years, the constant-round secure multi-party computation ...
PVO-based reversible data hiding using bit plane segmentation and pixel expansion
The existing pixel value ordering (PVO)-based reversible data hiding (RDH) approaches have been investigated; however, the functions of these techniques are weak when embedded in rough image regions. Therefore, a novel PVO-RDH method is proposed ...
VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios
In the realm of industrial anomaly detection, machine and deep learning models face a critical vulnerability to adversarial attacks. In this context, existing attack methodologies primarily target continuous features, often in the context of ...
Evolution of web tracking protection in Chrome
In our society, protecting users’ privacy is of utmost importance, especially when users access websites. Increased awareness of privacy concerns has led web browsers to implement new mechanisms to improve privacy while browsing the Internet. In ...
From the detection towards a pyramidal classification of terrorist propaganda
With over 3,81 billion users from across the world, social media platforms provide a borderless environment for people of different nationalities, races, ethnicities, and religious beliefs to interact and communicate with each other. Not only for ...
Refined statistical attacks against searchable symmetric encryption using non-indexed documents
Searchable symmetric encryption(SSE) schemes allow clients to search encrypted data stored on remote servers but ensure efficient retrieval by revealing specific information about the queries, such as access patterns. Honest but curious servers ...
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory
With the advancement of NIST PQC standardization, three of the four candidates in Round 4 are code-based schemes, namely Classic McEliece, HQC and BIKE. Currently, one of the most important tasks is to further analyze their security levels for ...
A dynamic anonymous authentication scheme with trusted fog computing in V2G networks
As an important component of smart grid, vehicle-to-grid (V2G) is helpful to improve grid stability, save on generation costs, and reduce energy consumption. However, the existing V2G authentication schemes focus on the trustworthiness of ...
Robust coverless video steganography based on inter-frame keypoint matching
Existing coverless video steganography schemes primarily focus on single-frame features, which manifest poor robustness. To enhance resistance against adversarial attacks, this paper proposes a coverless video steganography method based on inter-...
Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme
- K. Jyothsna Devi,
- Priyanka Singh,
- Jatindra Kumar Dash,
- Hiren Kumar Thakkar,
- Sudeep Tanwar,
- Abdulatif Alabdulatif
In recent years, medical image transmission using a multi-cloud system has played a significant role in e-Healthcare infrastructure. It allows medical practitioners to easily store, retrieve, and share patients’ medical information across ...
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images
Deep watermarking has been successfully applied to real-value domain (e.g., CT, MRI, DWI) medical images for copyright protection; however, manifold-value domain images, such as diffusion tensor imaging (DTI), have received less academic ...
ttPAKE: Typo tolerance password-authenticated key exchange
Error tolerant password-authenticated key exchange (PAKE) allows a user to authenticate to a server using a password and agree on a session key with the server, provided that the password for authentication and the registered one are “close ...
System-widely and fine-grained forward secure identity-based signature scheme
In an identity-based signature (IBS) system, each user uses individual information as his/her public key, and also holds a private key issued by a fully trusted key generation center (KGC) with a master secret key. This avoids the mandatory ...
Crypto-space image steganography based on blind flipping
Reversible data hiding (RDH) for digital images is a widely studied steganography that ensures the carrier image can be restored without distortion. Due to the popularity of Internet applications, a lot of research reports focus on the RDH for ...
Provably secure and lightweight three-factor authentication scheme for industrial medical CPS
Cyber-Physical System (CPS) is a multidimensional complex system that integrates computing, network, and physical environment, which is widely used to promote the upgrading of industrial production and technology. Recently, the application of ...