scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Digital Crime and Forensics in 2017"


Journal ArticleDOI
TL;DR: The proposed HVCS inherits the good features of traditional VCS, such as, loss-tolerant e.g., k, n threshold and simply reconstructed method, and can support signal processing in the encrypted domain SPED.
Abstract: In this paper, homomorphic visual cryptographic scheme HVCS is proposed. The proposed HVCS inherits the good features of traditional VCS, such as, loss-tolerant e.g., k, n threshold and simply reconstructed method, where simply reconstructed method means that the decryption of the secret image is based on human visual system HVS without any cryptographic computation. In addition, the proposed HVCS can support signal processing in the encrypted domain SPED, e.g., homomorphic operations and authentication, which can protect the user's privacy as well as improve the security in some applications, such as, cloud computing and so on. Both the theoretical analysis and simulation results demonstrate the effectiveness and security of the proposed HVCS.

31 citations


Journal ArticleDOI
TL;DR: Empirical findings show that the classifier can detect the age of the subject with a probability that is far from the uniform random distribution, making the proposed method suitable for providing supporting yet circumstantial evidence during e-discovery.
Abstract: In this paper an incident response approach is proposed for handling detections of authentication failures in systems that employ dynamic biometric authentication and more specifically keystroke user recognition. The main component of the approach is a multi layer perceptron focusing on the age classification of a user. Empirical findings show that the classifier can detect the age of the subject with a probability that is far from the uniform random distribution, making the proposed method suitable for providing supporting yet circumstantial evidence during e-discovery.

24 citations


Journal ArticleDOI
TL;DR: An investigation approach based on similarity metric is proposed to recognize attacker plans and predict their intentions and demonstrates that the proposed approach is capable of investigating similarity of attack signatures and recognizing the intentions of Network attack.
Abstract: Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient confidentiality, integrity, and availability. The rapid development of network technologies helps increase network attacks and hides their malicious intentions. Attack intention is the ultimate attack goal that the attacker attempts to achieve by executing various intrusion methods or techniques. Recognizing attack intentions helps security administrator develop effective protection systems that can detect network attacks that have similar intentions. This paper analyses attack types and classifies them according to their malicious intent. An investigation approach based on similarity metric is proposed to recognize attacker plans and predict their intentions. The obtained results demonstrate that the proposed approach is capable of investigating similarity of attack signatures and recognizing the intentions of Network attack.

13 citations


Journal ArticleDOI
TL;DR: The KEywoRDS Histograms of Oriented Gradients (HOG), Human Behavior Recognition, Local Binary Pattern (LBP) and Local Binary pattern (SILTP) datasets.
Abstract: This paper presents an empirical study for human behavior analysis based on three distinct feature extraction techniques: Histograms of Oriented Gradients (HOG), Local Binary Pattern (LBP) and Scale Invariant Local Ternary Pattern (SILTP). The utilised public videos representing spatio-temporal problem area of investigation include INRIA person detection and Weizmann pedestrian activity datasets. For INRIA dataset, both LBP and HOG were able to eliminate redundant video data and show human-intelligible feature visualisation of extracted features required for classification tasks. However, for Weizmann dataset only HOG feature extraction was found to work well with classifying five selected activities/exercises (walking, running, skipping, jumping and jacking). KEywoRDS Histograms of Oriented Gradients (HOG), Human Behavior Recognition, Local Binary Pattern (LBP)

9 citations


Journal ArticleDOI
TL;DR: This paper generalizes Ateniese et al.'s method of comparing the optimal pixel expansion of VCSs with two different access structures, and derives constructive upper bounds derived by the graph decomposition technique.
Abstract: In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual cryptography schemesVCSs for more kinds of graph access structures, in which we require that a subset of parties can determine the secret if they contain an edge of the graph G. The constructive upper bounds are derived by the graph decomposition technique. Then we generalize Ateniese et al.'s method of comparing the optimal pixel expansion of VCSs with two different access structures.

8 citations


Journal ArticleDOI
TL;DR: The proposed visual secret-secret-sharing scheme and results show the potential foreffectiveness of the VSS-recovery are investigated.
Abstract: In this paper, a novel visual secret sharing (VSS) scheme using QR codes is investigated. The proposed visual secret sharing scheme based on QR codes(VSSQR) can visually reveal secret image by stacking sufficient (shadow images) shares as well as scan the QR code by a QR code reader. Our VSSQR exploits the error correction mechanism in the QR code structure, to embed the bits corresponding to shares generated by VSS from a secret bit into the same locations of QR codes in the processing of encoding QR. Each output share is a valid QR code, which may reduce the likelihood of attracting the attention of potential attackers. The secret image can be recovered by stacking sufficient QR code shares based on the human visual system without any computation. In addition, it can assist alignment for VSS recovery. The experiment results show the effectiveness of our scheme. KeywoRDS Error Correction, QR Code, Visual Cryptography Application, Visual Secret Sharing

7 citations



Journal ArticleDOI
TL;DR: The proposed algorithm could be able to recognize the substitution andsteganography fairly and efficiently, and be better than existing existing algorithms.
Abstract: Steganographic algorithm recognition is currently a key issue in digital image steganalysis. For the typical substitution steganographic algorithm in spatial domain, we analyze the modification way...

4 citations



Journal ArticleDOI
TL;DR: An automatic detection of traffic ticketing events from video footages and immediate notification of such event when a car is passing the white stop line before a red traffic light is presented.
Abstract: This paper presents a new scheme to implement an event-driven traffic ticketing system. The system consists of two modules, namely, 1 event detection module, 2 database management module to execute information retrieval and deliver traffic tickets. In this paper, the notable contribution is an automatic detection of traffic ticketing events from video footages and immediate notification of such event when a car is passing the white stop line before a red traffic light. The results show the authors' work is efficient and could detect the events precisely.

3 citations


Journal ArticleDOI
TL;DR: KeywoRDS Classification, Comparative Study, Currency Security, Feature Extraction, feature extraction, feature Extraction.
Abstract: The security issue of currency has attracted awareness from the public. De-spite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them in market without being detected. By reviewing related work in currency security, the focus of this paper is on conducting a comparative study of feature extraction and classification algorithms of currency notes authentication. We extract various computational features from the dataset consisting of US dollar (USD), Chinese Yuan (CNY) and New Zealand Dollar (NZD) and apply the classification algorithms to currency identification. Our contributions are to find and implement various algorithms from the existing literatures and choose the best approaches for use. KeywoRDS Classification, Comparative Study, Currency Security, Feature Extraction


Journal ArticleDOI
TL;DR: The proposed round robin mechanism is going to be implemented on RTOS and mean while providing actionable, accountable & measurable for individuals who are accessing sensitive information on multiple relation functions, operation and services RFOS on multiple resources of RTS.
Abstract: The preventive, detective and corrective control is well advanced automated control in order to attain the maximum objectives of preserving the CIA mechanism on RTS. The risk analysis is the process of identifying the risk on RTS to achieving business objectives and deciding the measure components of RTOS on optimizing the lowest level of risk. This proposed round robin mechanism is going to be implemented on RTOS and mean while providing actionable, accountable & measurable for individuals who are accessing sensitive information on multiple relation functions, operation and services RFOS on multiple resources of RTS. We have to develop the RRP for risk assessment on MIMD. This research work going to be applied into security pattern on the measure component of the system security as well as RTOS. Furthermore, this RRP optimize the cost, time & resources is supposed to optimize the system risks and maximize the performance of business, resource & technology all the time & every time.

Journal ArticleDOI
TL;DR: A hybrid-pair wireless fNIRS system that takes advantages of short-pair channel to suppress the effect of physiological noises, and wireless module to improve the comfortableness of wearing it was applied into a modified Guilty Knowledge Test.
Abstract: Normal fNIRS setting up was limited by superficial physiological noises when applied into the deception detection. We designed a hybrid-pair wireless fNIRS system to improve the detection. The syst...

Journal ArticleDOI
TL;DR: This work contributes to the development of an optimization pattern that aims to determine the optimal cost to be apply into security mechanisms deciding on the measure components of system security and resources.
Abstract: The preventive control is one of the best well advance control for recent complex IS Security Application to protect the data and services from the uncertainty, hacker, and unauthorized users. Now, increasing the demand and importance of business, information & communication system & growing the external risks is a very common phenomenon for everywhere. The RTS security put forward to the management focus on IT infrastructure. This work contributes to the development of an optimization pattern that aims to determine the optimal cost to be apply into security mechanisms deciding on the measure components of system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity, Availability, Authenticity and Accountability are automatically PDC for all the time. The author has to optimize the system attacks and down time by implementing semi-group structure CIA pattern, mean while improving the throughput of the Business, Resources & Technology. Finally, the author has to maximize the protection of IT resources & Services for all the time and every time. This proposed CIA Pattern is the part of protection, detection, benchmarking, fault analysis and risk assessment of real time operating system and applicable to efficient resource management on web application.


Journal ArticleDOI
TL;DR: A lossless and high capacity watermarking scheme is proposed for 3D STL model based on entity rearrangement and bit mapping that can achieve good efficiency and it is robust against translation, rotation and even scaling.
Abstract: With the wide application of 3D STL model in 3D printing, much attention has been paid to its content security and copyright protection. Based on entity rearrangement and bit mapping, a lossless and high capacity watermarking scheme is proposed for 3D STL model. Experimental results and analysis show that the average capacity is improved 0.71bits/facet compared with the original entity rearrangement method, and the capacity is 0.247 bits/entity larger than that of the optimal capacity of the standard entity rearrangement method. It can achieve good efficiency and it is robust against translation, rotation and even scaling. It has potential application in secret communication and copyright protection of 3D STL model.

Journal ArticleDOI
TL;DR: This paper mainly discussesﻷtheﻴuseﻵ use﻽�ofﻹmutual-information-of-the-world-at-a-glance ﻷ, which shows how high-precision design can help improve quality and efficiency in the face of ambiguity.
Abstract: This paper mainly discusses the use of mutual information (MI) and Support Vector Machines (SVMs) for Uyghur Web text classification and digital forensics process of web text categorization: automatic classification and identification, conversion and pretreatment of plain text based on encoding features of various existing Uyghur Web documents etc., introduces the pre-paratory work for Uyghur Web text encoding. Focusing on the non-Uyghur characters and stop words in the web texts filtering, we put forward a Multi-feature Space Normalized Mutual Information (M-FNMI) algorithm and replace MI between single feature and category with mutual information (MI) between input feature combination and category so as to extract more accurate feature words; finally, we classify features with support vector machine (SVM) algorithm. The experimental result shows that this scheme has a high precision of classification and can provide criterion for digital forensics with specific purpose. KeyWoRDS Digital Forensic, Mutual Information, Support Vector Machine, Text Classification, Uyghur

Journal ArticleDOI
TL;DR: Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.
Abstract: The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.

Journal ArticleDOI
Jie Zhu1, Qingxiao Guan1, Xianfeng Zhao1, Yun Cao1, Gong Chen1 
TL;DR: In this article, the authors make use of steganalytic features and classification techniques to make steganalysis more applicable toward dete... because of the complexity and different characteristics of cover images.
Abstract: Steganalysis relies on steganalytic features and classification techniques. Because of the complexity and different characteristics of cover images, to make steganalysis more applicable toward dete...


Journal ArticleDOI
TL;DR: A novel progressive secret image sharing PSS scheme based on arithmetic mean that can realize lossless recovery with all the shares, and is directly used to share grayscale images and can be easily extended to deal with binary and color images.
Abstract: The current researches in secret sharing techniques have limitations of lossy recovery for binary images, complex computation for grayscale images, and "All-or-Nothing" In this paper, we propose a novel progressive secret image sharing PSS scheme based on arithmetic mean In the proposed scheme, the more shares are collected, the better recovered visual quality will be Furthermore, it can realize lossless recovery with all the shares It can be directly used to share grayscale images and can be easily extended to deal with binary and color images In the recovery process, it only needs simple computing arithmetic mean Simulations show the advantages and effectiveness of the proposed scheme