scispace - formally typeset
Search or ask a question

Showing papers in "International journal of security and its applications in 2016"


Journal ArticleDOI
TL;DR: There are many ANN proposed methods which give overview face recognition using ANN, and the strengths and limitations of these literature studies and systems were included, and also the performance analysis of different ANN approach and algorithm is analysing.
Abstract: Face recognition from the real data, capture images, sensor images and database images is challenging problem due to the wide variation of face appearances, illumination effect and the complexity of the image background. Face recognition is one of the most effective and relevant applications of image processing and biometric systems. In this paper we are discussing the face recognition methods, algorithms proposed by many researchers using artificial neural networks (ANN) which have been used in the field of image processing and pattern recognition. How ANN will used for the face recognition system and how it is effective than another methods will also discuss in this paper. There are many ANN proposed methods which give overview face recognition using ANN. Therefore, this research includes a general review of face detection studies and systems which based on different ANN approaches and algorithms. The strengths and limitations of these literature studies and systems were included, and also the performance analysis of different ANN approach and algorithm is analysing in this research study.

95 citations



Journal ArticleDOI
TL;DR: Various dimensions of VANETs including its emerging applications, security issues, challenges, security threats and the existing solutions proposed by the different researchers are studied.
Abstract: Vehicular Ad-hoc Networks (VANETs) is a technology that has been recently emerged, and brings a lot of research interests. Security is one of the important issues in VANET, it is considered a critical point in the development of robust VANET applications. In this paper, various dimensions of VANETs including its emerging applications, security issues, challenges, security threats and the existing solutions proposed by the different researchers are studied. Also author reviewed various type of VANET simulator available and presented possible key research area of VANETs.

68 citations


Journal ArticleDOI
TL;DR: DNA algorithm based substitution is used for spatial domain bit permutation for generating a pseudorandom bit sequence and a final layer of security is imposed to make this process more fault tolerant.
Abstract: Presently, there is a growth in the transmission of image and video data. Security becomes a main issue. Very strong image cryptographic techniques are a solution to this problem. There is a use of a randomly generated public key and based on that there is an application of DNA algorithm. In the proposed method DNA algorithm based substitution is used for spatial domain bit permutation. Here the chaotic logistic map is used for generating a pseudorandom bit sequence. We have generated 48bit length sequences for every pixel. After the substitution operation, a final layer of security is imposed to make this process more fault tolerant. The For checking the strength of the work a series of tests are performed and various parameters are checked like Correlation Coefficient Analysis, analysis of NPCR and UACI values etc.

40 citations


Journal ArticleDOI
TL;DR: Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher by determining the evaluation function in the genetic algorithm, and the key that fits the composition will be obtained.
Abstract: Received Sep 16, 2017 Revised Nov 14, 2017 Accepted Nov 22, 2017 The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher. Keyword:

39 citations


Journal ArticleDOI
TL;DR: In this paper, the authors examined the relationship between Machiavellianism and knowledge hiding, as well as the moderating roles of demographic variables (gender, age, and educational level).
Abstract: Machiavellianism is deemed as one of the dark personalities. Knowledge hiding refers to employee’s intentional attempt to withhold or conceal knowledge that has been requested by another person, and it is comprised of three related sub-dimensions: playing dumb, evasive hiding, and rationalized hiding. The present research examines the relationship between Machiavellianism and knowledge hiding, as well as the moderating roles of demographic variables (gender, age, and educational level). 360 individual data were used to test our hypotheses. Results show that Machiavellianism is positively related to the overall knowledge hiding, playing dumb, and evasive hiding, but unrelated to rationalized hiding. In addition, employees’ knowledge hiding decreases with age. The moderating effects of demographic variables are not supported in this study. Contributions, limitations, and future directions are discussed at the end.

33 citations


Journal ArticleDOI
TL;DR: It is discovered that remote exploitation is feasible via a broad range of attack points such as mechanic tools, CD players, Bluetooth and Tire Pressure Monitoring System and Wireless communications channels allow long distance vehicle control.
Abstract: Recent studies have shown that ‘’hacktivists’’ can mount serious attacks on automobiles. The automotive On-Board Diagnostic (OBD) interface enables an efficient way to access information of the in-vehicle electronic system and leaves way for unauthorized access by an intruder. We discover that remote exploitation is feasible via a broad range of attack points such as mechanic tools, CD players, Bluetooth and Tire Pressure Monitoring System. Wireless communications channels allow long distance vehicle control. Finally, the paper discusses the drawbacks of Seed-Key Mechanism to authenticate and provide an extra layer of authentication to help build a safer automotive ecosystem.

31 citations


Journal ArticleDOI
TL;DR: A novel approach to detect the advanced malware with high accuracy by analyzing the occurrence of opcodes (features) by grouping the executables by studying the performance of thirteen classifiers using N-fold cross-validation available in machine learning tool WEKA.
Abstract: Combating malware is very important for software/systems security, but to prevent the software/systems from the advanced malware, viz. metamorphic malware is a challenging task, as it changes the structure/code after each infection. Therefore in this paper, we present a novel approach to detect the advanced malware with high accuracy by analyzing the occurrence of opcodes (features) by grouping the executables. These groups are made on the basis of our earlier studies (1) that the difference between the sizes of any two malware generated by popular advanced malware kits viz. PS-MPC, G2 and NGVCK are within 5 KB. On the basis of obtained promising features, we studied the performance of thirteen classifiers using N-fold cross-validation available in machine learning tool WEKA. Among these thirteen classifiers we studied in-depth top five classifiers (Random forest, LMT, NBT, J48 and FT) and obtain more than 96.28% accuracy for the detection of unknown malware, which is better than the maximum detection accuracy (~95.9%) reported by Santos et al (2013). In these top five classifiers, our approach obtained a detection accuracy of ∼97.95% by the Random forest.

29 citations



Journal ArticleDOI
TL;DR: A construction of certificateless aggregate signature scheme with stronger security by using pairings and introducing state information is put forward, based on the infeasibility of the computational Diffie-Hellman (CDH) problem.
Abstract: Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor networks. Recently, people discuss aggregate signature in certificateless public key setting. But some existing certificateless aggregate signature schemes are not secure. In this paper, we analyze the security of Zhang et al.’s certificateless aggregate signature schemes, and propose a new certificateless aggregate signature schemes, and prove the new scheme is existentially unforgeable under adaptive chosen-message attacks under the assumption that computational Diffie–Hellman problem is hard. Furthermore, in signing equation of the proposed scheme user’s partial private key and secret value are directly combined with the signed message. So, the scheme is also secure against some inside forgery attack.

22 citations


Journal ArticleDOI
TL;DR: An automated surveillance system for detecting fire weapons in cluttered scene is proposed to adopt the visual words classification scheme in detectingFire weapons.
Abstract: Terror attacks are increased worldwide. The early detection of weapons is an important objective for security specialists. In this paper, we proposed an automated surveillance system for detecting fire weapons in cluttered scene. First SIFT features are extracted from the collection of images. Second, K-means clustering is adopted for clustering the SIFT features. Third, a word vocabulary based histogram is implemented by counting occurrences of the extracted clusters in each image. The histogram is the input to Support Vector Machine that will be trained on the collection of images. Finally, the trained SVM is the system classifier that will decide if new image contains a weapon or not. The main contributions of the paper is to adopt the visual words classification scheme in detecting fire weapons. In addition, we used RANSAC to reduce the matching outliers. The system showed high accuracy in detecting fire weapons in images and video surveillance systems.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed coverless multi-keywords information hiding method can improve the capacity of the existing coverless Information hiding method based on text.
Abstract: As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method can hide only one Chinese character in each natural text. However, the problem of the method is that the hiding capacity is too small. To address this problem, a new method named coverless multi-keywords information hiding method based on text is proposed in this paper. The main idea of the method is that both the keywords and their number will be hidden in the texts. Experimental results show that the proposed method can improve the capacity of the existing coverless information hiding method based on text.

Journal ArticleDOI
TL;DR: The paper assesses how security and privacy issues transpire in the context of cloud computing and examines ways in which they might be addressed, and aims to solve privacy and security issues in cloud computing using UEC (Ubuntu Enterprise Cloud).
Abstract: Many clients worry about their susceptibility to attack if their businesses’ crucial IT resources and information are outside the firewall. The extremely scalable nature of Cloud Computing allows its users to access huge amounts of data and use distributed computational resources via different interfaces. Cloud entities such as cloud service providers, users and business associates share the offered resources at diverse levels of technological operations. This research paper focuses on the user privacy and security in cloud computing and the solutions to improve privacy and security of cloud computing. The study employs UEC (Ubuntu Enterprise Cloud) Eucalyptus for simulation, which is the accepted open source cloud computing software as a solution. The paper assesses how security and privacy issues transpire in the context of cloud computing and examines ways in which they might be addressed. This paper aims to solve privacy and security issues in cloud computing using UEC (Ubuntu Enterprise Cloud). The methodology used involves encrypting and decrypting data to ensure privacy and security in the cloud.

Journal ArticleDOI
TL;DR: The most important threats faced by the mobile operating systems (Malware, Vulnerabilities, Attacks) and the risks posed by these threats were analyzed in chronological order and the future-oriented security perspective was suggested.
Abstract: Portable devices are today used in all areas of life thanks to their ease of use as well as their applications with unique features. The increase in the number of users, however, also leads to an increase in security threats. This study examines the threats to mobile operating systems. Addressing the four mobile operating systems (Android, Apple OS (iOS), Symbian and Java ME) with the highest number of users, the study provides statistical information about the features of the corresponding operating systems and their areas of use. In the study, the most important threats faced by the mobile operating systems (Malware, Vulnerabilities, Attacks) and the risks posed by these threats were analyzed in chronological order and the future-oriented security perspective was suggested..

Journal ArticleDOI
TL;DR: Based on the food supply chain safety evaluation model, Li et al. as discussed by the authors used AHP fuzzy integrated evaluation method with a new scale to evaluate food-supply chain safety risk and provided reference to ensure the safety of the food- supply chain.
Abstract: With the improvement of people’s living standards, the food safety issue occurs frequently. How to identify all kinds of risks, evaluate these risks scientifically and manage the risk control effectively are the challenge for each sully chain manager and the relevant researchers. In order to reduce the occurrence of the food safety issues and ensure the quality of the people’s life, it is necessary to evaluate the food safety. Based on the food supply chain safety evaluation model, this paper uses AHP fuzzy integrated evaluation method with a new scale to evaluate food supply chain safety risk. The paper provides reference to ensure the safety of the food supply chain.

Journal ArticleDOI
TL;DR: This paper introduces some different schemes of network flow watermarking in anonymity systems and discusses some attacks against it, which could be an effective way to trace the communication connections and supervise anonymous communication.
Abstract: With the rapid development of internet technology, the connection between man and internet is closer and closer. When people is communicating with others through internet, some malicious intruders may want to eavesdrop or peep the communicators. In order to evade being watching, people use anonymous communication systems to communicate. The anonymity system can encrypt the content of communication and the identity of the communicators. But if the communicators want to know who is talking to them at the other end, they must correlate the outgoing and incoming flows to identify a host or a person. As an active traffic analysis approach, network flow watermarking technology can detect the correlation of flows, and then make the anonymous communicators accountable. While network flow watermarking technology achieves good detecting rate and low false positive rate, it could be an effective way to trace the communication connections and supervise anonymous communication. So it is a widely used way for tracing in anonymity systems. In this paper, we introduce some different schemes of network flow watermarking in anonymity systems and discuss some attacks against it. Finally, a conclusion will be given.

Journal ArticleDOI
TL;DR: It is observed that the proposed Enhanced Particle Swarm Optimization (EPSO) technique performs better in terms of Detection rate, False Alarm rate, Packet delivery ration, Message drop and Average delay when compared to the existing swarm intelligence techniques namely, Ant Colony Optimization and Particle swarm Optimization.
Abstract: Wireless Sensor Network (WSN) is a collection of tiny sensor nodes capable of sensing and processing the data. These sensors are used to collect the information from the environment and pass it on to the base station. A WSN is more vulnerable to various attacks. Among the different types of attacks, sinkhole attack is more vulnerable because it leads to a variety of attacks further in the network. Intrusion detection techniques are applied to handle sinkhole attacks. One of effective approach of intrusion detection mechanism is using Swarm Intelligence techniques (SI). Particle Swarm Optimization is one of the important swarm intelligence techniques. This research work enhances the existing Particle Swarm Optimization technique and the proposed technique is tested in a simulated environment for performance. It is observed that the proposed Enhanced Particle Swarm Optimization (EPSO) technique performs better in terms of Detection rate, False Alarm rate, Packet delivery ration, Message drop and Average delay when compared to the existing swarm intelligence techniques namely, Ant Colony Optimization and Particle Swarm Optimization.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a rule-based data protection system that is to provide authorize rules used in mechanism, to control an access users without intermediaries on the blockchain.
Abstract: The blockchain is new revolutionary paradigm for the world, but the privacy and confidentiality are still issues. This study is focused on the technical securities to provide a blockchain service on a foundation of trust. We suggested the rule-based data protection system that is to provide authorize rules used in mechanism, to control an access users without intermediaries on the blockchain. We have developed a scenario of an application a smart contract based on the suggested system and simulated it.

Journal ArticleDOI
TL;DR: The experimental results and the comparisons demonstrated that the proposed duel encryption methodology is highly efficient in terms of encryption and the capacity size of the text.
Abstract: In this paper the concept of cryptography and steganography are combined to perform a powerful encryption. Here we propose a novel approach where a duel encryption methodology has been implemented. In the first level of encryption a pattern matching algorithm has been employed to encrypt the text message in terms of their positional value. In second level, the conventional LSB method has been used to embed the positional value in the cover file. Such a duel encryption method will ensure data security in an efficient manner. Finally the performance of the proposed method is evaluated in terms of means square error (MSE) and signal to noise ratio (SNR). A comparison has been carried out with conventional LSB method. The experimental results and the comparisons demonstrated that our algorithm is highly efficient in terms of encryption and the capacity size of the text.

Journal ArticleDOI
TL;DR: Various public key encryption schemes on certificateless setting with the security model and the performance are surveyed and the generic model of Certificateless Public Key Encryption (CL-PKE) scheme proposed by various authors is presented.
Abstract: Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks In this paper, we survey various public key encryption schemes on certificateless setting with the security model and discuss the performance Also, we present the generic model of Certificateless Public Key Encryption (CL-PKE) scheme proposed by various authors

Journal ArticleDOI
TL;DR: This is the first scheme which can be proved that its security is based on two hard problems, both of which are based on both the security of the ElGamal signature scheme and the modified OSS signature scheme.
Abstract: In the paper, we propose a new digital signature scheme based on factoring and discrete logarithms. Specially, we prove that the security of the proposed signature scheme is based on both the security of the ElGamal signature scheme and the security of the modified OSS signature scheme. This is the first scheme which can be proved that its security is based on two hard problems. Like Meta-ElGamal signature schemes, the proposed signature scheme can be extended to many kinds of scheme. The corresponding computations for our proposed scheme are also discussed.

Journal ArticleDOI
TL;DR: It is proved that the combination weighting method can reflect the relative importance of each indicators and the information that index itself contains and can reflecting the subjective and objective decisions which make the weighting results more reasonable.
Abstract: When the weight of each attribute is determined in the multiple attribute decision making problems, calculated by the method of subjective values or objective values solely will cause the problem that weight coefficient is not reasonable. So the paper puts forward the weightingmethod which is based on maximizing deviations and normalized constraint condition. The method integrates the subjective and objective weighting information. On the one hand, the deviation between each weight vector which is determined by the various weighting method makes the maximum of its total deviation. On the other hand, the various evaluated object integrated value makes the maximum of its total evaluated value. Thus we establish a double objective optimization model. What’s more, we deduce the weight calculation formula by solving the model. Finally we have an experimental analysis. It proves that the combination weighting methodcan reflect the relative importance of each indicators and the information that index itself contains. In other words, it can reflect the subjective and objective decisions which make the weighting results more reasonable.

Journal ArticleDOI
TL;DR: This paper proposes a rating scale based quality evaluation model for image steganography algorithms that utilizes both quantitative parameters and observation heuristics and the system is simple, efficient and flexible.
Abstract: Steganography refers to techniques that hide information inside innocuous looking objects known as “Cover Objects” such that its very existence remains concealed to any unintended recipient. Images are pervasive in day to day applications and have high redundancy in representation. Thus, they are appealing contenders to be used as cover objects. There are a large number of image steganography techniques proposed till date but negligible research has been done on the development of a standard quality evaluation model for judging their performance. Existence of such a model is important for fueling the development of superior techniques and also paves the way for the improvement of the existing ones. However, the common quality parameters often considered for performance evaluation of an image steganography technique are insufficient for overall quantitative evaluation. This paper proposes a rating scale based quality evaluation model for image steganography algorithms that utilizes both quantitative parameters and observation heuristics. Different image steganography techniques have been evaluated using proposed model and quantitative performance scores for each of the techniques have been derived. The scores have been observed to be in accordance with actual literature and the system is simple, efficient and flexible.

Journal ArticleDOI
TL;DR: This paper presents the review and critical analysis of steganography methods projected during the recent years that are from 2011 to 2015 and discusses many schemes mentioned with their technical terms, main logic, advantages and disadvantages in terms of important measures.
Abstract: Steganography is the art of hiding information inside another medium while the presence of this embedding is invisible by human perception. In disparity to cryptography, steganography have a tendency to conceal the presence of the message or communication appearance, while cryptography tries to hide the content of the clandestine message. Hiding the presence of message or communication can be made by inserting a clandestine message into the clear cover medium which no one besides the correspondent and the receiver can imagine. This paper present the review and critical analysis of steganography methods projected during the recent years that are from 2011 to 2015. Many schemes are mentioned with their technical terms, main logic, advantages and disadvantages in terms of important measures. Critical analysis is based on the type of cover object used, domain of the algorithm and important properties that are used as evaluative measures for steganographic system.

Journal ArticleDOI
TL;DR: The results of this research reveal that the secret code (watermark) is strong enough against threats (noise) and invisibility (its imperceptibility) according to the researcher's main objective.
Abstract: The researcher has adopted a digital watermarking technique which operates in the frequency domain: a hybrid watermarking scheme based joint discrete wavelet transform – discrete cosine transform – (DWT-DCT). Its main objective is to test whether this technique can withstand attacks (its robustness) and invisibility (its imperceptibility), achieved by taking DCT of the DWT coefficients of the LL mid-frequency sub-bands from its band. To ensure security, the secret code (watermark) is scrambled using the Arnold transformation which is embedded in the original host image; only gray-scale digital images are used. The results of this research reveal that the secret code (watermark) is strong enough against threats (noise). Comparative results are measured using signal-tonoise ratio criterions, mean square error and normalized cross correlation. Simulated experimentation is done in Matlab.

Journal ArticleDOI
TL;DR: SDroid (Secured anDroid) is presented, a tool that assesses the best permissions management based on end users opinion and allow users selectively grant permissions considering his/her knowledge level depending on the opinion.
Abstract: Android based smartphone users’ privacy has been a hot issue recently in public concerns due to various instances of security attacks and privacy leakage on Android platform. Android existing security has been built upon a permission based mechanism which restricts critical resources accesses of third-party Android applications. This permission based security system is widely assessed for its major control of application permissions and critical management of permissions by developers, marketers, and endusers. Considering the critical management of permissions some previous research papers proposed automatic permission management tools. But those automatic tools never assessed end user’s expectation about permissions perfectly. This paper presents a tool, SDroid (Secured anDroid) that assesses the best permissions management based on end users opinion. SDroid evaluates requested permissions and allow users selectively grant permissions considering his/her knowledge level depending on the opinion.

Journal ArticleDOI
TL;DR: It is demonstrated that the proposed algorithm is effective in solving reliability-redundancy allocation problems and greatly enhances the computation efficiency, convergence speed and precision of the optimal solution in addressing the problem of reliability redundancy optimization.
Abstract: The bat algorithm is a recently proposed meta-heuristic algorithm. Usually in solving the problem of optimization, the position of virtual bats is updated by flying speed, which decreases efficiency of the algorithm and accuracy of the solution. This paper has improved the location update strategy and individual selection strategy of bat algorithm, then puts forward an improved bat algorithm. The algorithm is used to solve three typical reliability-redundancy allocation problems, and the simulation experiment results show that the presented algorithm greatly enhances the computation efficiency, convergence speed and precision of the optimal solution in addressing the problem of reliability redundancy optimization. When compared with the best results reported in the previous literatures, the algorithm achieves a better or equally good optimal solution. It is demonstrated that the proposed algorithm is effective in solving reliability-redundancy allocation problems.

Journal ArticleDOI
TL;DR: A Trust System for securing GOOSE communication between IEDs in IEC 61850 network is proposed and contains the modules for firewall, format and pattern validation, priority level assignment, alerting, blocking, and event logging.
Abstract: IEC 61850 is the standard for substation automation which enables substation equipment called Intelligent Electronic Devices (IEDs) to communicate with each other. The communication protocol used by the IEDs to communicate is called GOOSE. Unfortunately, there are security researchers who have identified a number of vulnerabilities in the GOOSE protocol and have demonstrated that these vulnerabilities can be exploited to perform security attacks on the IEC 61850 network. By itself, the IEC 61850 standard does not address security requirements needed in a critical infrastructure. Therefore, a security mechanism to better protect the IEC 61850 network needs to be implemented. In their paper, Coates et al. has proposed a Trust System for securing the TCP/IP communication of SCADA network. However, due to the focus on TCP/IP communication, the Trust System by Coates et al. cannot be directly utilized for the IEC 61850 network because the IEDs are using GOOSE protocol to communicate. This paper proposed a Trust System for securing GOOSE communication between IEDs in IEC 61850 network. The proposed Trust System contains the modules for firewall, format and pattern validation, priority level assignment, alerting, blocking, and event logging.

Journal ArticleDOI
Wang Ke, Wang Huiqin, Shu Yue, Mao Li, Qiu Fengyan 
TL;DR: A image defect identification method based on convolutional neural network (CNN) is designed and the experimental results show that the identification accuracy rate is 95.6%, which is significantly better than traditional identification method.
Abstract: There are shortcomings in the currently used traditional CCD imaging system which can automatically recognize banknote image defect, such as the need to manually extract the defect characteristics and low accuracy rate of detection results. This paper briefly introduced the advantage of convolution Neural Network (CNN) in image classification and designed a image defect identification method based on convolutional neural network (CNN). The experimental results on data sets show that the identification accuracy rate of this method is 95.6%, which is significantly better than traditional identification method.

Journal ArticleDOI
TL;DR: Computer simulation show that, the novel blind equalization algorithm speeds up the convergence rate, reduces the remaining steady-state error and bit error rate, which is compared with the Neural Network Blind Equalization Algorithm (NNBE) and Genetic Algorithm optimization Neural Networkblind equalization Al algorithm (GA-NNBE).
Abstract: The project of ant colony algorithm optimization neural network combining blind equalization algorithm is proposed. The better initial weights of neural networks are provided because of the randomness, ergodicity and positive feedback of the ant colony algorithm. And then, a combination of optimal weights are found through BP algorithm, which is fast local search speed. Thus blind equalization performance is improved. Computer simulation show that, the novel blind equalization algorithm speeds up the convergence rate, reduces the remaining steady-state error and bit error rate, which is compared with the Neural Network Blind Equalization Algorithm(NNBE) and Genetic Algorithm optimization Neural Network Blind Equalization Algorithm(GA-NNBE) .