Article
Engineering, Mechanical
Melih Yildirim
Summary: A novel image steganography technique based on chaos theory is proposed to hide encrypted voice comments of a doctor on COVID-19 patients in medical images. Security analyses show that the introduced steganography method is robust against statistical attacks and exhibits sensitive dependence on initial conditions and secret key.
NONLINEAR DYNAMICS
(2021)
Article
Computer Science, Information Systems
Mar Gimenez-Aguilar, Jose M. De Fuentes, Lorena Gonzalez-Manzano, Carmen Camara
Summary: This paper explores the feasibility of using Ethereum technology to establish a covert channel, presenting a mechanism called Zephyrus for information hiding. Experimental results show that a significant amount of data can be embedded and retrieved at a relatively low cost.
Article
Computer Science, Information Systems
Ferda Ernawan
Summary: With the rapid development of information technology, it has become easier for users to transfer data or files via the internet. Steganography, the art of hiding secret information in multimedia data, often utilizes video as a popular medium for transmitting data. This research aims to embed data into selected video frames using a new hiding technique based on discrete wavelet transform. The proposed scheme achieves high imperceptibility and robustness against MPEG-4 compression.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Review
Chemistry, Analytical
Zhijun Wu, Junjun Guo, Chenlei Zhang, Changliang Li
Summary: The paper discusses the research hotspots of steganography and steganalysis based on VoIP, divided into two categories: based on voice payload and protocol. It summarizes their characteristics and development directions.
Article
Computer Science, Artificial Intelligence
Wancheng Long, Xiaowen Li, Liping Wang, Fan Zhang, Zhe Lin, Xuemin Lin
Summary: This work investigates a novel m-closest entity (mCE) matching problem over geographic heterogeneous information networks (Geo-HINs). The proposed Fuzzy-Exact framework efficiently solves the problem by simultaneously considering the characteristics of pattern matching and spatial search. Experimental results demonstrate significant improvement in runtime compared to baseline methods.
KNOWLEDGE-BASED SYSTEMS
(2023)
Article
Computer Science, Information Systems
Wenjia Ding, Huyin Zhang, Ralf Reulke, Yulin Wang
Summary: Data hiding is a technology that hides secret information in publicly available media and makes it difficult for people to detect its existence. This paper proposes a lightweight large-capacity image data hiding technique, which improves the sensitivity and positioning accuracy of tampering and ensures the confidentiality of hidden data.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Chemistry, Analytical
Jiao Yang Lu, Quan Jiang, Jiao Jiao Lei, Ying Xuan He, Wei Tao Huang
Summary: This study demonstrates the integration of DNA encoding and molecular recognition with electrochemistry for the detection of fish pathogens and molecular information encryption. The electrochemical system enables rapid and accurate detection of fish pathogens while protecting encoded information hidden in DNA. This system has the potential to advance molecular-level digitization technology.
ANALYTICA CHIMICA ACTA
(2022)
Article
Computer Science, Information Systems
Qi Li, Xingyuan Wang, Xiaoyu Wang, Bin Ma, Chunpeng Wang, Yunqing Shi
Summary: The paper introduces an encrypted coverless information hiding method that transfers secret images between different image domains using generative models, addressing the issue of traditional image steganography methods leaving traces in cover images. Experimental results show that the method is able to generate high-quality encrypted images with strong security and reconstruction ability.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Artificial Intelligence
Zhang Yu, Zhang Ju, Li Teng, Wang Sha, Pan Dongbo
Summary: Information hiding is a crucial technique for security applications and can be widely utilized in various scenarios. Recent research has proposed secret data embedding methods in different domains, but there is still room for improvement. The newly proposed scheme based on the modulus function with Minimum Pixel Modification (MPM22) aims to achieve a larger embedding capacity while maintaining image quality.
EGYPTIAN INFORMATICS JOURNAL
(2022)
Article
Physics, Multidisciplinary
Yi-Lun Pan, Ja-Ling Wu
Summary: This paper presents a rate-distortion-based large-capacity secure steganographic system, which can hide multiple color images and QR codes within another color image with low visual distortion. The system shows robustness against cover attacks and offers high embedding capacity without leaking any secret-related information.
Article
Computer Science, Information Systems
R. Ranjithkumar, D. Ganeshkumar, S. Senthamilarasu
Summary: The paper introduces a video steganography method to securely transmit information by embedding data into video frames. The method uses chaotic maps to generate random positions for hiding information bits, random numbers for frame selection, and confusion order for encryption. It provides three-level security and 25% embedding capacity, with experimental results confirming its competence.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Imon Mukherjee, Goutam Paul
Summary: In this paper, a unique solution is proposed to hide data in the higher bitplanes of an image using Fibonacci numbers as base. The pixel values are converted into Fibonacci base and concealed in the energetic pixels. The algorithm withstands visual, structural, and statistical attacks and performs well in benchmark tests.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Pawel Rajba, Wojciech Mazurczyk
Summary: Information hiding techniques have gained increasing attention for their importance in data security. Attackers use various methods to steal confidential information. By studying these techniques, threats can be evaluated and existing defensive measures can be assessed for effectiveness.
Article
Computer Science, Information Systems
Kurnia Anggriani, Shu-Fen Chiou, Nan- Wu, Min-Shiang Hwang
Summary: Protecting confidential multimedia transmitted online is an important research topic, and information-hiding technology plays a crucial role in this aspect. This paper proposes two schemes that utilize the average pixel value of an image to hide secret information, achieving higher hiding capacity and better robustness against steganalysis tools and image quality attacks compared to previous schemes.
Article
Computer Science, Information Systems
Ashraf AbdelRaouf
Summary: With the increase of data communication globally, there is a demand for secure exchange of private information, and steganography is a common method to hide information. This paper proposes a new data hiding approach for image steganography based on human visual properties using adaptive LSB, which aims to enhance the visual appearance of the steganographic image.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)