Skip to main content

Articles

Page 1 of 4

  1. Information fusion, i.e., the combination of expert systems, has a huge potential to improve the accuracy of pattern recognition systems. During the last decades, various application fields started to use diff...

    Authors: Christian Kraetzer, Andrey Makrushin, Jana Dittmann and Mario Hildebrandt

    Citation: EURASIP Journal on Information Security 2021 2021:9

    Content type: Research

    Published on:

  2. The JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signa...

    Authors: Sebastiano Battiato, Oliver Giudice, Francesco Guarnera and Giovanni Puglisi

    Citation: EURASIP Journal on Information Security 2021 2021:8

    Content type: Research

    Published on:

  3. Education acts as a soul in the overall societal development, in one way or the other. Aspirants, who gain their degrees genuinely, will help society with their knowledge and skills. But, on the other side of ...

    Authors: T. Rama Reddy, P. V. G. D. Prasad Reddy, Rayudu Srinivas, Ch. V. Raghavendran, R. V. S. Lalitha and B. Annapurna

    Citation: EURASIP Journal on Information Security 2021 2021:7

    Content type: Research

    Published on:

  4. Estimating the primary quantization matrix of double JPEG compressed images is a problem of relevant importance in image forensics since it allows to infer important information about the past history of an im...

    Authors: Benedetta Tondi, Andrea Costanzo, Dequ Huang and Bin Li

    Citation: EURASIP Journal on Information Security 2021 2021:5

    Content type: Research

    Published on:

  5. The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the ...

    Authors: Cecilia Pasquini, Irene Amerini and Giulia Boato

    Citation: EURASIP Journal on Information Security 2021 2021:4

    Content type: Review

    Published on:

  6. Several methods for synthetic audio speech generation have been developed in the literature through the years. With the great technological advances brought by deep learning, many novel synthetic speech techni...

    Authors: Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti and Stefano Tubaro

    Citation: EURASIP Journal on Information Security 2021 2021:2

    Content type: Research

    Published on:

  7. SHDM stands for Sphere-Hardening Dither Modulation and is a watermarking algorithm based on quantizing the norm of a vector extracted from the cover work. We show how SHDM can be integrated into a fully commut...

    Authors: Roland Schmitz

    Citation: EURASIP Journal on Information Security 2021 2021:1

    Content type: Research

    Published on:

  8. This paper investigates the visual quality of the adversarial examples. Recent papers propose to smooth the perturbations to get rid of high frequency artifacts. In this work, smoothing has a different meaning...

    Authors: Hanwei Zhang, Yannis Avrithis, Teddy Furon and Laurent Amsaleg

    Citation: EURASIP Journal on Information Security 2020 2020:15

    Content type: Research

    Published on:

  9. Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applicat...

    Authors: Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande and Aderonke Anthonia Kayode

    Citation: EURASIP Journal on Information Security 2020 2020:14

    Content type: Research

    Published on:

  10. The rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing...

    Authors: Davood Noori, Hassan Shakeri and Masood Niazi Torshiz

    Citation: EURASIP Journal on Information Security 2020 2020:13

    Content type: Research

    Published on:

  11. In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerab...

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak and Slava Voloshynovskiy

    Citation: EURASIP Journal on Information Security 2020 2020:10

    Content type: Research

    Published on:

  12. An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...

    Authors: Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann and Stefan Katzenbeisser

    Citation: EURASIP Journal on Information Security 2020 2020:9

    Content type: Research

    Published on:

  13. Security vulnerabilities of the modern Internet of Things (IoT) systems are unique, mainly due to the complexity and heterogeneity of the technology and data. The risks born out of these IoT systems cannot eas...

    Authors: Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan and Venkat P. Rangan

    Citation: EURASIP Journal on Information Security 2020 2020:8

    Content type: Research

    Published on:

  14. The tremendous success of deep learning for imaging applications has resulted in numerous beneficial advances. Unfortunately, this success has also been a catalyst for malicious uses such as photo-realistic fa...

    Authors: Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul Krueger and Michael Hahsler

    Citation: EURASIP Journal on Information Security 2020 2020:6

    Content type: Research

    Published on:

  15. Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed t...

    Authors: Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng and Fabio Roli

    Citation: EURASIP Journal on Information Security 2020 2020:5

    Content type: Research

    Published on:

  16. User interaction with a mobile device predominantly consists of touch motions, otherwise known as swipe gestures, which are used as a behavioural biometric modality to verify the identity of a user. Literature re...

    Authors: Elakkiya Ellavarason, Richard Guest and Farzin Deravi

    Citation: EURASIP Journal on Information Security 2020 2020:4

    Content type: Research

    Published on:

  17. A feature of search engines is prediction and suggestion to complete or extend input query phrases, i.e. search suggestion functions (SSF). Given the immediate temporal nature of this functionality, alongside ...

    Authors: Nicholas Whiskerd, Nicklas Körtge, Kris Jürgens, Kevin Lamshöft, Salatiel Ezennaya-Gomez, Claus Vielhauer, Jana Dittmann and Mario Hildebrandt

    Citation: EURASIP Journal on Information Security 2020 2020:2

    Content type: Research

    Published on:

  18. PRNU-based image processing is a key asset in digital multimedia forensics. It allows for reliable device identification and effective detection and localization of image forgeries, in very general conditions....

    Authors: Davide Cozzolino, Francesco Marra, Diego Gragnaniello, Giovanni Poggi and Luisa Verdoliva

    Citation: EURASIP Journal on Information Security 2020 2020:1

    Content type: Research

    Published on:

  19. Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...

    Authors: Johannes Buchmann, Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser and Sebastian Stammler

    Citation: EURASIP Journal on Information Security 2019 2019:16

    Content type: Research

    Published on:

  20. Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a meth...

    Authors: Jivitesh Sharma, Charul Giri, Ole-Christoffer Granmo and Morten Goodwin

    Citation: EURASIP Journal on Information Security 2019 2019:15

    Content type: Research

    Published on:

  21. Many applications are built upon private algorithms, and executing them in untrusted, remote environments poses confidentiality issues. To some extent, these problems can be addressed by ensuring the use of se...

    Authors: Kubilay Ahmet Küçük, David Grawrock and Andrew Martin

    Citation: EURASIP Journal on Information Security 2019 2019:14

    Content type: Research

    Published on:

  22. The Internet of Things (IoT) is a new technology rapidly developed in various fields in recent years. With the continuous application of the IoT technology in production and life, the network security problem ...

    Authors: Wenjun Yang, Jiaying Zhang, Chundong Wang and Xiuliang Mo

    Citation: EURASIP Journal on Information Security 2019 2019:13

    Content type: Research

    Published on:

  23. Mobile ads are plagued with fraudulent clicks which is a major challenge for the advertising community. Although popular ad networks use many techniques to detect click fraud, they do not protect the client fr...

    Authors: Riwa Mouawi, Imad H. Elhajj, Ali Chehab and Ayman Kayssi

    Citation: EURASIP Journal on Information Security 2019 2019:11

    Content type: Research

    Published on:

  24. The current online digital world, consisting of thousands of newspapers, blogs, social media, and cloud file sharing services, is providing easy and unlimited access to a large treasure of text contents. Makin...

    Authors: Stefano Giovanni Rizzo, Flavio Bertini and Danilo Montesi

    Citation: EURASIP Journal on Information Security 2019 2019:10

    Content type: Research

    Published on:

  25. Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack ...

    Authors: Fitzroy D. Nembhard, Marco M. Carvalho and Thomas C. Eskridge

    Citation: EURASIP Journal on Information Security 2019 2019:9

    Content type: Research

    Published on:

  26. This paper first gives a regularity theorem and its corollary. Then, a new construction of generating hard random lattices with short bases is obtained by using this corollary. This construction is from a new ...

    Authors: Chengli Zhang, Wenping Ma, Hefeng Chen and Feifei Zhao

    Citation: EURASIP Journal on Information Security 2019 2019:8

    Content type: Research

    Published on:

  27. A new approach is proposed to quantitatively evaluate the binary detection performance of the biometric personal recognition systems. The importance of correlation between the overall detection performance and...

    Authors: Pallavi D. Deshpande, Prachi Mukherji and Anil S. Tavildar

    Citation: EURASIP Journal on Information Security 2019 2019:6

    Content type: Research

    Published on:

  28. Like how useful weather forecasting is, the capability of forecasting or predicting cyber threats can never be overestimated. Previous investigations show that cyber attack data exhibits interesting phenomena,...

    Authors: Xing Fang, Maochao Xu, Shouhuai Xu and Peng Zhao

    Citation: EURASIP Journal on Information Security 2019 2019:5

    Content type: Research

    Published on:

  29. This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the gen...

    Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee and Sakir Sezer

    Citation: EURASIP Journal on Information Security 2019 2019:4

    Content type: Research

    Published on:

  30. With rapid development of the Internet, images are spreading more and more quickly and widely. The phenomenon of image illegal usage emerges frequently, and this has marked impacts on people’s normal life. The...

    Authors: Yahong Hu, Xia Sheng, Jiafa Mao, Kaihui Wang and Danhong Zhong

    Citation: EURASIP Journal on Information Security 2019 2019:3

    Content type: Research

    Published on:

  31. Blockchains are proposed for many application domains apart from financial transactions. While there are generic blockchains that can be molded for specific use cases, they often lack a lightweight and easy-to...

    Authors: Fabian Knirsch, Andreas Unterweger and Dominik Engel

    Citation: EURASIP Journal on Information Security 2019 2019:2

    Content type: Research

    Published on:

  32. Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the networ...

    Authors: Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua and Kevin Kwiat

    Citation: EURASIP Journal on Information Security 2019 2019:1

    Content type: Research

    Published on:

  33. Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a u...

    Authors: Hang Cai and Krishna K. Venkatasubramanian

    Citation: EURASIP Journal on Information Security 2018 2018:13

    Content type: Research

    Published on:

  34. Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as ...

    Authors: Guangwei Xu, Miaolin Lai, Jing Li, Li Sun and Xiujin Shi

    Citation: EURASIP Journal on Information Security 2018 2018:12

    Content type: Research

    Published on:

  35. Distributed denial of service (DDoS) flooding attacks are one of the main methods to destroy the availability of critical online services today. These DDoS attacks cannot be prevented ahead of time, and once i...

    Authors: Sufian Hameed and Usman Ali

    Citation: EURASIP Journal on Information Security 2018 2018:11

    Content type: Research

    Published on:

  36. The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks...

    Authors: Filipo Sharevski

    Citation: EURASIP Journal on Information Security 2018 2018:8

    Content type: Review

    Published on:

  37. Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be describ...

    Authors: Julio Navarro, Véronique Legrand, Aline Deruyver and Pierre Parrend

    Citation: EURASIP Journal on Information Security 2018 2018:6

    Content type: Research

    Published on:

  38. Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems f...

    Authors: Albert Sitek and Zbigniew Kotulski

    Citation: EURASIP Journal on Information Security 2018 2018:5

    Content type: Research

    Published on:

  39. Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of c...

    Authors: Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver and Pierre Collet

    Citation: EURASIP Journal on Information Security 2018 2018:4

    Content type: Review

    Published on:

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here