The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content-adaptive image steganography means that steganographer chooses embedding positions based on image textures. Steganalyst can also focus on detecting these positions according to image textures. Game theory is preferred to analyze the above situation. However, in previous game models, steganalyst will mistakenly identify that no bit is embedded, when the secret bit is the same as the least significant...
Audio players form a type of frequently used software, in which there are still bugs. In this paper, we investigate the test on MP3 for audio player, a mainstream audio format. An MP3 file consists of ID3v2 tag and MPEG layer III frames, with which there are standards for them. We first introduce the standards through the official documents, then summarize several potentially error-prone points for...
In this paper, a novel image steganographic method with four pixel-value-differencing and multiple-base notational is proposed. It processes non-overlapping 2 × 2 pixels blocks, and the features of edge can be considered sufficiently. Secret data, dynamically expressed as different digits in multiple-base, are embedded into each four-pixel block by adaptively applying exploiting modification direction...
Covert channel has been studied for years due to its ability to divulge sensitive information in computer systems. Constructing covert communication scenarios is the first step to learn the threat of a channel. There are several challenges in the existing design of covert channel communications: lacking general communicating model description, low transmission accuracy and weak anti-interference ability...
Server consolidation in Cloud Computing makes it possible for multiple servers or desktops to run on one physical server to get high resource utilization, low cost and less energy consumption. However, the scheduler in virtual machine monitor (VMM) is agnostic about the communication behavior between the guest operating systems. It leads to inefficient network communication in consolidated environment...
With the rapid adoption of the concepts of Service Oriented Architecture (SOA), sophisticated business processes and tasks are increasingly realized through composing distributed software components offered by different providers. Though such practices offer advantages in terms of cost-effectiveness and flexibility, those components are not immune to vulnerabilities. It is therefore important for...
Cloud computing security has become the focus in information security, where much attention has been drawn to the user privacy leakage. Although isolation and some other security policies have been provided to protect the security of cloud computing, confidential information can be still stolen by timing channels without being detected. In this paper, a new method named XenPump is presented aiming...
This paper presents a novel approach, based on static analysis, to detect format string vulnerabilities in C programs. Format string vulnerability is viewed as a finite state safety property. The analysis is expressed as a system of constraint describing how the safety state at one program point is related to the state at adjacent program points. Our analysis is inter-procedurally flow sensitive and...
Virtualization technology is the basis of cloud computing, and the most important property of virtualization is isolation. Isolation guarantees security between virtual machines. However, covert channel breaks the isolation and leaks sensitive message covertly. In this paper, we formally model the isolation into noninterference, and define that all the transmission channels violating noninterference...
Tagging systems are particularly vulnerable to tag spam. Although some previous efforts aim to address this problem with detection-based or demotion-based approaches, tricky attacks launched by attackers who can exploit vulnerabilities of spam-resistant mechanisms are still able to invalidate those efforts. Therefore, it is challenging to resist tricky spam attacks in tagging systems. This paper proposes...
Covert channel analysis is an important requirement when building secure information systems, and identification is the most difficult task. Although some approaches were presented, they are either experimental or constrained to some particular systems. This paper presents a practical approach based on directed information flow graph taking advantage of the source code analysis. The approach divides...
The purpose of this article is to give a brief overview on the current work towards the emerging research problem of secure machine learning. Machine learning technique has been applied widely in various applications especially in spam detection and network intrusion detection. Most existing learning schemes assume that the environment they settle in is benign. However this is not always true in the...
In virtualization environment, the communication and resource sharing between virtual machines can be protected by mandatory access control mechanism to guarantee the isolation of the virtual machines. The safety of the mandatory access control framework depends on whether the security sensitive operations are protected by the security check functions completely. In this paper, we present a novel...
This paper considers the problem of modelling the topics in a sequence of images with known time stamp. Detecting and tracking of temporal data is an important task in multiple applications, such as finding hot research point from scientific literature, news article series analysis, email surveillance, search query log mining, etc. In contrast to existing works mainly focusing on text document collections,...
The present article focuses on the application of a procedure based on ant colonies to solve disassembly line balancing problem. Firstly, the problem under study is proposed with the objective functions of line idle rate, workload smoothness and disassembly cost. Subsequently, the multi-objective optimization mathematical model of disassembly line balancing is formulated based on the proposed functions...
In this paper, we introduce a class of vector-valued wavelet packets for vector-valued multivariate function space, which are generalizations of univariate wavelet packets. A procedure for constructing a class of biorthogonal vector-valued wavelet packets in higher dimensions is presented and their biorthogonality properties are characterized by virtue of matrix theory, time-frequency analysis method,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.