scispace - formally typeset
Search or ask a question
JournalISSN: 1687-4161

Eurasip Journal on Information Security 

Springer Nature
About: Eurasip Journal on Information Security is an academic journal. The journal publishes majorly in the area(s): Encryption & Digital watermarking. It has an ISSN identifier of 1687-4161. Over the lifetime, 198 publications have been published receiving 5319 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a universal distortion design called universal wavelet relative distortion (UNIWARD) that can be applied for embedding in an arbitrary domain and demonstrates experimentally using rich models as well as targeted attacks that steganographic methods built using UNIWARD match or outperform the current state of the art in the spatial domain, JPEG domain, and side-informed JPEG domain.
Abstract: Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function. The design of the distortion is essentially the only task left to the steganographer since efficient practical codes exist that embed near the payload-distortion bound. The practitioner’s goal is to design the distortion to obtain a scheme with a high empirical statistical detectability. In this paper, we propose a universal distortion design called universal wavelet relative distortion (UNIWARD) that can be applied for embedding in an arbitrary domain. The embedding distortion is computed as a sum of relative changes of coefficients in a directional filter bank decomposition of the cover image. The directionality forces the embedding changes to such parts of the cover object that are difficult to model in multiple directions, such as textures or noisy regions, while avoiding smooth regions or clean edges. We demonstrate experimentally using rich models as well as targeted attacks that steganographic methods built using UNIWARD match or outperform the current state of the art in the spatial domain, JPEG domain, and side-informed JPEG domain.

859 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Abstract: Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms for biometric-dependent key-release. In the last years a significant amount of approaches to both technologies have been published. A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented. State-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.

620 citations

Journal ArticleDOI
TL;DR: This paper proposes a selection of the most important available solutions for homomorphic encryption, discussing their properties and limitations.
Abstract: Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important available solutions, discussing their properties and limitations.

463 citations

Journal ArticleDOI
TL;DR: The VISION dataset is currently composed by 34,427 images and 1914 videos, both in the native format and in their social version (Facebook, YouTube, and WhatsApp are considered), from 35 portable devices of 11 major brands, and can be exploited as benchmark for the exhaustive evaluation of several image and video forensic tools.
Abstract: Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of resolution, source device, and processing history. Remarkably, in the latest years, portable devices became the preferred means to capture images and videos, and contents are commonly shared through social media platforms (SMPs, for example, Facebook, YouTube, etc.). These facts pose new challenges to the forensic community: for example, most modern cameras feature digital stabilization, that is proved to severely hinder the performance of video source identification technologies; moreover, the strong re-compression enforced by SMPs during upload threatens the reliability of multimedia forensic tools. On the other hand, portable devices capture both images and videos with the same sensor, opening new forensic opportunities. The goal of this paper is to propose the VISION dataset as a contribution to the development of multimedia forensics. The VISION dataset is currently composed by 34,427 images and 1914 videos, both in the native format and in their social version (Facebook, YouTube, and WhatsApp are considered), from 35 portable devices of 11 major brands. VISION can be exploited as benchmark for the exhaustive evaluation of several image and video forensic tools.

206 citations

Journal ArticleDOI
TL;DR: This tutorial is intended to give an overview on selective encryption algorithms, which consists of encrypting only a subset of the data while preserving a sufficient level of security.
Abstract: In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, IDEA, etc.). The specific characteristics of this kind of data (high-transmission rate with limited bandwidth) make standard encryption algorithms inadequate. Another limitation of fully layered systems consists of altering the whole bitstream syntax which may disable some codec functionalities. Selective encryption is a new trend in image and video content protection. It consists of encrypting only a subset of the data. The aim of selective encryption is to reduce the amount of data to encrypt while preserving a sufficient level of security. This computation saving is very desirable especially in constrained communications (real-time networking, high-definition delivery, and mobile communications with limited computational power devices). In addition, selective encryption allows preserving some codec functionalities such as scalability. This tutorial is intended to give an overview on selective encryption algorithms. The theoretical background of selective encryption, potential applications, challenges, and perspectives is presented.

175 citations

Network Information
Related Journals (5)
IACR Cryptology ePrint Archive
15.2K papers, 222.4K citations
80% related
IEEE Communications Surveys and Tutorials
1.3K papers, 292.9K citations
79% related
Multimedia Tools and Applications
16K papers, 185.7K citations
78% related
IEEE Transactions on Circuits and Systems for Video Technology
5.4K papers, 311.2K citations
78% related
IEEE Transactions on Information Theory
16.3K papers, 1.3M citations
77% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202110
202015
201916
201813
201718
201628