The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Keystroke dynamics is an effective behavioral biometrics for user authentication at a computer terminal. Continuous or active authentication using keystroke dynamics has raised a lot of interest among researchers. However, there are only a few public datasets available for the research community compared to other biometric modalities primarily because of the difficulty of large scale data collection...
Data is the new oil; this refrain is repeated extensively in the age of internet tracking, machine learning, and data analytics. As data collection becomes more personal and pervasive, however, public pressure is mounting for privacy protection. In this atmosphere, developers have created applications to add noise to user attributes visible to tracking algorithms. This creates a strategic interaction...
In this paper, we present a new image forgery detection method based on deep learning technique, which utilizes a convolutional neural network (CNN) to automatically learn hierarchical representations from the input RGB color images. The proposed CNN is specifically designed for image splicing and copy-move detection applications. Rather than a random strategy, the weights at the first layer of our...
Smart metering, smart parking, health, environment monitoring, and other applications drive the deployment of the so-called Internet of Things (IoT). Whilst cost and energy efficiency are the main factors that contribute to the popularity of commercial devices in the IoT domain, security features are increasingly desired. Security features typically guarantee authenticity of devices and/or data, as...
In the attempt to investigate the final race of arms between the forensic analyst and the adversary in practical scenarios based on data-driven approaches, we introduce the idea of adversary-aware SVM-based forensic detection. By focusing on the problem of double JPEG compression, we first propose an improved universal counter-forensic (C-F) attack which works against any forensic detector based on...
Free text keystroke dynamics is a behavioral biometric that has the strong potential to offer unobtrusive and continuous user authentication. In free-text keystroke biometrics, users are free to type whatever they want to while still being authenticated. However, not all keystrokes from a user exhibit the same quality of stable patterns that can be used to differentiate them from others. The “unstable”...
We propose a new method for single-image splicing localization. Lacking any side information, such as training data or prior knowledge on the source camera and the image history, we cast the problem as an anomaly detection task. Expressive local features, extracted from the noise residual of the image, feed an autoencoder which generates an implicit model of the data. By iterating discriminative feature...
Zero-sum games are useful to model the strategic interactions between an attacker and a defender over a network. The computation of the equilibrium solutions become challenging when entries of the payoff matrix are either partially or completely unknown. The uncertainties of the game often arise from the error in the observations and the incomplete information on the structure of the game. In this...
Network devices performing Network Address Translation (NAT) overcome the problem of the deficit of IPv4 addresses as well as introduce a vulnerability to the network with possibly insecure configurations. Therefore detection of unauthorized NAT devices is an important task in the network security domain. In this paper, a novel passive NAT detection algorithm is proposed that identifies NAT devices...
Multivariate Statistical Network Monitoring (MSNM) is a methodology that leverages PCA processing of information to provide insight on multiple variables evolution, raising very good detection results that outperforms other current methods. Regretfully, as any other detection approach, it imposes a considerable burden due to the need to transfer traffic-related data. In this paper, we suggest a hierarchical...
Secure source coding provides the methods to compress data efficiently taking the risks of unauthorized access into account. However standard information-theoretic achievability proofs only show the existence of a coding scheme without providing a concrete code design. In the paper we provide an alternative proof of achievability for the secure Wyner-Ziv source coding problem with side information...
With Secure Multi-party Computation (MPC) becoming more and more practical, tools for automatized application development become of importance. Therefore, multiple compilers have been developed that translate high-level functionality descriptions into Boolean circuits, optimized for their use in MPC protocols. Previous efforts in compiler development for MPC either focused on domain specific (hardware)...
We propose a new algorithm for blind camera identification, based on the Photo-Response Non-Uniformity (PRNU) noise estimated by image residuals. Successful identification relies on the correct clustering of residuals coming from the same camera. We adopt a two-step strategy. First, residuals are efficiently grouped by correlation clustering, setting parameters so as to over-partition the data points...
Secure equality testing of two private values is one of the fundamental building blocks of many cryptographic protocols designed for Signal Processing in the Encrypted Domain (SPED). Existing protocols introduce significant amount of computation and computational overhead, which makes it essential to search for new and novel, efficient equality tests for the design of SPED algorithms. In this paper,...
Network monitoring is a primordial source of data in cyber-security since it may reveal abnormal behaviors of users or applications. Indeed, security analysts and tools like IDS (Intrusion Detection system) or SIEM (security information and event management) rely on them as a single source of information or combined with others. In this paper, we propose a visualisation method derived from the Mapper...
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabilization has been increasing in recent years with the development of novel stabilization software and the availability of stabilization in smart-phone cameras. This paper presents a PRNU-based...
We consider the problem of fast content identification in high-dimensional feature spaces where a sub-linear search complexity is required. By formulating the problem as sparse approximation of projected coefficients, a closed-form solution can be found which we approximate as a ternary representation. Hence, as opposed to dense binary codes, a framework of Sparse Ternary Codes (STC) is proposed resulting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.