Search

Results: 15
User Identity Hiding Method of Android
Yi Zhang
Jul 01, 2020
With an 86.1% global market share, Android takes the top spot smartphone operating system. Due to its open environment, Android suffers from various kinds of attacks, which cause a serious privacy leakage problem. To protect...
Published by: IGI Global
Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model
According to the characteristics of the color filter array interpolation in a camera, an image splicing forgery detection algorithm based on bi-cubic interpolation and Gaussian mixture model is proposed. The authors make the...
Published by: IGI Global
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution
A blind print-recapture robust watermark scheme is proposed. Watermark patterns are embedded into the space domain of a color image and can be detected from a print-recaptured version of the image without knowledge of the...
Published by: IGI Global
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation
This article describes how the existing distortion functions for JPEG steganography allot same cost for ±1 embedding changes. Because of the correlation of natural image, however, changes with different polarities make different...
Published by: IGI Global
Steganalysis of AMR Based on Statistical Features of Pitch Delay
The calibrated matrix of the second-order difference of the pitch delay (C-MSDPD) feature has been proven to be effective in detecting steganography based on pitch delay. In this article, a new steganalysis scheme based on...
Published by: IGI Global
A Summary of the Development of Cyber Security Threat Intelligence Sharing
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security...
Published by: IGI Global
A Modification-Free Steganography Algorithm Based on Image Classification and CNN
In order to improve the data-embedding capacity of modification-free steganography algorithm, scholars have done a lot of research work to meet practical demands. By researching the user's behavioral habits of several social...
Published by: IGI Global
Analysis of WeChat Subscription Influence Based on Topic Diffusion
With the average daily growth of 15000 new subscribers, the number of WeChat subscription has broken the 5,800,000 subscribers recently. WeChat subscription's topic influence calculation has been very significant. This article...
Published by: IGI Global
Breaking Steganography
This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are...
Published by: IGI Global
Exploiting Routing Strategy of DTN for Message Forwarding in Information Hiding Applications
Delay tolerant networks (DTNs) represent a class of intermittently connected networks. In such networks, messages are hard to track since they are transmitted by opportunistic encounters between mobile nodes. This feature makes...
Published by: IGI Global
Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation
A new reversible watermarking algorithm on stereo audio signals is proposed in this article. By utilizing correlations between two channels of audio signal, the authors segment one channel based on another one according to the...
Published by: IGI Global
Design of Cyberspace Security Talents Training System Based on Knowledge Graph
Internet, big data, global society, economy, life, politics, military, and culture are deeply integrated and have developed into an era of overlapping cyberspace and real society. Cyberspace security has become the most complex...
Published by: IGI Global
A Universal Image Forensics of Smoothing Filtering
Digital image smoothing filtering operations, including the average filtering, Gaussian filtering and median filtering are always used to beautify the forged images. The detection of these smoothing operations is important in...
Published by: IGI Global
Applying Secret Image Sharing to Economics
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
Published by: IGI Global
Coverless Information Hiding Based on WGAN-GP Model
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this...
Published by: IGI Global