Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.12 (39건)
No
31

A Robust Data Embedding Method for MPEG Layer III Audio Steganography

Mohsen Bazyar, Rubita Sudirman

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.317-328

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A new method of MP3 steganography is proposed with emphasis on increasing the robustness of data embedding based on the MP3 statistical properties, which used Modified Discrete Cosine Transform (MDCT) to compress these properties. In order to achieve this purpose, modification of selected MDCT coefficients is done through MPEG audio compression procedure. In this algorithm, secret message is embedded directly after achievement of MDCT coefficient and before quantization step in process of MP3 encoder. It is feasible to embed some hidden data by substitution of the least significant bit of the MDCT coefficients during compression of MP3 files. The proposed algorithm performance results show considerable robustness against common audio processing attacks, especially MPEG compression with lower computational complexity compared to MP3Stego. The retrieved hidden message obtained from the algorithm has the highest quality against various steganographic attacks and different signal types which shows an excellent imperceptibility for the new algorithm.

32

Numerical Simulating Long-Distance Emergency Rescue System for Belt Fire in Coal Mine

Shao Hao, Jiang Shuguang, Wu Zhengyan, Zhang Weiqing, Wang Kai

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.329-342

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The belt fire in coal mine has the characteristics of fast burning velocity, not easily extinguishing a fire and generating a great deal of poisonous and toxic gas. Once the belt fire happens, it will result in a large number of casualties and enormous property loss, which is one of the greatest disasters that influence on the safety production in coal mine. To reduce the number of casualties and property loss caused by belt fire, the long-distance emergency rescue system for belt fire is proposed, and used to directly import the poisonous and toxic gas produced by belt lane into return airway in order to guarantee the safety of staffs working in mining area. In order to research on how the efficiency of using the system and what the system has additional impact on the ventilation system, the present study applies the approach of numerical stimulation to establish the two-dimensional model of ventilation system. After the belt fire happens, and then this paper researches on the flow laws of poisonous and toxic gas, and explores the long-distance emergency rescue system for belt fire influencing on the ventilation system and controlling the poisonous and toxic gas. The current study yields the conclusions as follows: (1) how poisonous and toxic gas produced by belt fire in different ventilation models spreads and moves in the roadway; and (2) how the long-distance emergency rescue system for belt fire influences on the ventilation system. This research has certain instructive significance and reference value for improving the level of emergency rescue about the belt fire, and reducing the number of casualties and property loss caused by belt fire.

33

Cross-Domain Authorization Management Model for Multi-Levels Hybrid Cloud Computing

Li Na, Dong Yun-Wei, Che Tian-Wei, Wang Chao, Gao Yang, ZhangYu-Chen

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.343-352

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aimed at the security problems of the cross-cloud, cross-level and cross-domain in multi-level hybrid cloud computing, the singleness of the role establishment method, the implicit promotion of privilege and the separation of duties conflict in the traditional cross-domain authorization management models, a new cross-domain authorization management model for multi-levels hybrid cloud computing is proposed based on a novel two-tier role architecture. The two-tier role architecture which is setted in the area of arrangement can better meet the practical needs of role establishment and management. Based on that, the proposed unidirectional role mapping for cross-domain authorization can avoid the role mapping rings. Besides, by introducing attribute and condition, dynamic adjustment of privileges is realized. The model is described formally in dynamic description logic, including concepts, relations and management operations. Finally, the security of the model is analyzed and an example is presented to illustrate the effectiveness and practicality.

34

Taking cognizance of various attacks on MDx family of Hash function including SHA-0 and SHA-1, National Institute of Standards and Technology came up with a public competition for new Hash standard SHA-3 to augment or replace the current Hash standard SHA-2. NIST provided a reference platform (Wintel machines) and compiler (Microsoft Visual Studio) on which the submitted algorithms were to be evaluated. The five algorithms that reached the final round of SHA-3 public competition were evaluated by us on ARM Cortex A8 architecture (architecture other than the reference platform). Performance evaluation of these final round candidate algorithms were done on Cortex-A8 based OpenBoard AM335x from PHYTEC running Linux 3.2.0. The results in Cycles consumed per byte are shared in this paper.

35

Review of Security Research on Address Resolution Protocols

Song Guangjia, Ji Zhenzhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.371-390

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Address resolution protocols (ARPs includes ARP, NDP, SEND, etc.) play an important role in network communication; the security of the ARPs is the premise and guarantee of network security. ARPs consists of three phases: acquisition of the mapping of the target address; duplicate address detection; data structure maintenance. In this paper, we analyze the existing ARPs according to these three phases, analyze security threats and the corresponding attack methods; classify and describe the existing studies on ARPs security. Our analysis shows that the main factors that restrict the development of ARPs are the contradiction between efficiency and cost and the lack of theoretical support in protocol design. Finally, the development of ARPs is prospected.

36

Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption

Chunpeng Ge, Jiandong Wang, Liming Fang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.391-404

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In a conditional proxy re-encryption (C-PRE) scheme, a semi-trusted proxy can transform Alice’s ciphertext into Bob’s ciphertext without learning the underlying plaintext, if the ciphertext satisfies a certain condition. To achieve more fine- grained delegation on conditions, Fang, Wang and Ge introduced the notion of fuzzy conditional proxy re-encryption (FC-PRE), whereby the conditions is viewed a set of descriptive keywords. The proxy with a re-encryption key for a condition word set W can convert a ciphertext encrypted with a condition word set W1, if and only if W and W1 are close to each other as measured by the "set overlap" distance metric. Nonetheless, they left an open problem on how to construct a non-interactive FC-PRE scheme. Furthermore, their scheme is only proved secure in the random oracle model. In this paper, we answer the above problems affirmatively by presenting a non-interactive fuzzy conditional proxy reencryption scheme. Moreover, our scheme is proved secure without random oracles.

37

Public Key Generation and Encryption Mechanism Using the Elliptic Curve in Smart Phones

Seung-Ho Shin, Hee-Ju Eun

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.405-414

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Personal information stored in mobile devices can be unexpectedly exposed to others when users make use of mobile banking, Internet shopping and etc. Because of the important personal information that can be easily exposed in the mobile environment, it becomes more important to have a reliable security system. It is strongly required for this mobile security system to have a small memory size and a high processing speed as its components' characteristics. Considering these characteristics of the mobile security system, this paper aims at proposing a public key generation and an encryption mechanism that generates a hidden key using the Newton-Raphson method and applies the Diffie-Hellman key-exchange method to authenticate the peer. This mechanism uses an elliptic curve resulting in a small size of encryption key and a high security level.

38

With the development of the Internet economy, most people begin to accept online shopping. From the perspective of information economics, consumer credit market is particularly important. The protection of credit consumer rights can improve the shopping satisfaction, and thus to overcome the negative impact of the information asymmetry and the moral hazard. In this paper, we make empirical analysis about the consumer rights protection in online shopping, and test the impact of shopping satisfaction on customer relationship quality. The result shows that consumer rights protection will improve the Customer satisfaction and trust, and conduce to improving the quality of customer relationships. Therefore, construct and improve the legal system of consumer credit law is particularly important.

39

Peer Effect in Spreading Network of Fake Information in Public Crisis

Xiaoxia Zhu, Mengmeng Liu, Haiju Hu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.12 2015.12 pp.425-434

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

 
1 2
페이지 저장