2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
A robust Optimal Zero-Watermarking Technique for Secret Watermark Sharing
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.349-360
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, a robust optimal zero-watermarking technique based on genetic algorithm for secret watermark sharing is proposed for the purpose of copyright protection. It is implemented in discrete cosine transform (DCT) for gray scale images in which the visual secret sharing is used to generate unexpanded master and secret shares for the watermark. The GA based zero watermarking is used to select the perfect positions to extract the robust features. The experimental results indicate that the proposed scheme is highly robust even after different types of attacks being applied, where NC values of each selected attack are considered in the fitness function of the genetic optimization algorithm.
Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.361-376
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose new fast handover authentication scheme with privacy preservation to improve the capabilities of IEEE 802.16m network. New metric is presented for handover authentication protocols in wireless networks. It’s the required time for base station and mobile station to detect the undesirable messages. We propose a new scheme which gives a minimum time of detection to these fault and undesirable messages. Our protocol uses symmetric encryption which gives a good level of secrecy. The identity of the mobile station (MS) is changed for every hop which preserves privacy. Numerical analysis results show that our protocol is better than IEEE 802.11 m authentication in authentication delay parameter.
An efficient algorithm for image copy-move forgery detection based on DWT and SVD
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.377-390
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the rapid development and popularization of Photoshop, ACDSee and other digital processing and editing software, the non-professionals can easily modify the image to achieve the purpose of beautification, spoof or malicious tampering. Digital tampering usually has ulterior motives, which would bring crisis of confidence to the credibility of media image, the authenticity of judicial evidence and the reliability of military intelligence. The Copy-move forgery is one of the most common and immediate tampering attacks, and is one type of image forgery where one region of an image is copied to another region in an attempt to cover some potentially important features. In this paper, an efficient algorithm is presented for image copy-move forgery detection and localization based on DWT and SVD. Experiment results demonstrate that our proposed algorithm can effectively detect multiple copy-move forgery and precisely locate the duplicated regions, even when an image was distorted by Gaussian blurring, JPEG compression and their mixed operations.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.391-402
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Internet worms are malware programs that imitate themselves and spread around the network. Internet worm, a wide spreading malcode exploits vulnerability in the operating system, hard disk, software and web browsers. This paper analyzes and classifies the Internet worm, depending on the training signatures. This work presents the Internet worm detection mechanism, using Principal Component Analysis (PCA) and Support Vector Machine (SVM). A Selective sampling technique is applied to maximize the performance of the classifier and to reduce misleading data instances. The results obtained show improved memory utilization, detection time and detection accuracy for Internet worms.
Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN)
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.403-420
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Wireless Body Area Network (WBAN) is a wireless network that can be attached or implanted into the human body. This allows medical devices that are used for monitoring any bodily function to be equipped with a wireless network system. This system is vulnerable, similar to any other currently available wireless systems e.g. Wireless Local Area Network (WLAN) and Bluetooth. However, currently there were not many discussions on the WBAN security impact and security threats and if there is any, the issues were discussed through theoretical and simulation data. In this paper, a practical approach to assessing WBAN security impact is designed in order to identify, evaluate, and develop a Secure Network Architecture complete with the Forensic Readiness capability to secure WBAN implementation.
Research on Insecure Impact of Inflation upon Capital Structure
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.421-426
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The inflation often causes insecure impact on the capital structure, and the inflation is used as an important indicator of the economy state. To analyze the insecure impact of the inflation, an analysis model is proposed to reflect the inflation’s effect on the capital structure of the company, in this paper. We use the parameter CPI to measure the inflation. Because the inflation is a time series that affects the capital structure for a long time, we choose different CPIs for different time, i.e. the current month (CPI), three months ago (CPI3), six months ago (CPI6), one year ago (CPI12), half and one year ago (CPI18), and two years ago (CPI24). With the financial data of the companies listed in the Chinese stock market, we empirically testified the outcomes of this model. The results of this analysis show that only the increasing inflation or the decline of corporate income tax rate will increase the company's debt ratio. However, these two factors together will decrease the debt level of the company and cause the insecure financial impact.
Contextual Security with IF-MAP
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.427-438
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The multi-context attacks are serious challenges to security detection process. Actually, each security solution produces a considerable number of security events, heterogeneous and difficult to correlate. Sensors usually work independently making hard to extract security information related to a multi-step attacks. Therefore, correlation and sharing mechanism becomes the key to deal with such challenging IT security threats. This paper provides an analysis of the current security state and proposes our security architecture based on local and global contextual protections that share security events in a real time IF-MAP approach in response to malicious activities. As to implementation phase we used opensource Omapd as a MAPS central data repository, apache web server and iptables as MAPC clients in perspective to provide real time containment when attacks are detected.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.439-456
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Watermarking is an important technique used for copyright protection, authentication, tamper detection and hiding secret information in multimedia contents. In this article a new digital watermarking scheme is proposed based on multiple parameter discrete fractional Fourier transform and using least significant bit (LSB) technique. The multiple parameter discrete fractional Fourier transform (MPDFRFT) is the generalization of the discrete fractional Fourier transform (DFRFT) in terms of its different nature of its fractional orders. The MPDFRFT can converge to DFRFT when all of its fractional order parameters having a similar value. The multiple parameter discrete fractional transforms shows it’s superiority over DFRFT because of that it benefitted us with an extra degree of freedom that is provided by its multiple fractional orders. The LSB technique is more preferable because of its lesser effect on the image characteristics. During the implementation of proposed scheme cover image is subdivided and MPDFRFT is applied to each subdivided image to transformed coefficients and watermark images are embedded by using LSB technique. Similarly during watermark extraction process the reverse order of MPDFRFT is applied for reconstruction of original images along with LSB extraction mechanism. The MPDFRFT fractional order parameters are used as secret key to improve the robustness of the system. The robustness of the watermark image is tested under different attacks such as additive noise, cropping, rotation and Gaussian low-pass filtering is analyzed and the results demonstrate that the embedding scheme has good performance of robustness. The imperceptibility of the proposed scheme against the hostile person is also verified by simulations results.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.5 2014.09 pp.457-470
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.