Skip to main content

Articles

Page 3 of 4

  1. This paper develops a retrieval scheme for encrypted JPEG images based on a Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt discrete cosine transform (DCT) c...

    Authors: Hang Cheng, Xinpeng Zhang, Jiang Yu and Fengyong Li

    Citation: EURASIP Journal on Information Security 2016 2016:1

    Content type: Research

    Published on:

  2. Information processing services are becoming increasingly pervasive, such as is demonstrated by the Internet of Things or smart grids. Given the importance that these services have reached in our daily life, t...

    Authors: Stefan Rass, Peter Schartner and Monika Brodbeck

    Citation: EURASIP Journal on Information Security 2015 2015:7

    Content type: Research

    Published on:

  3. In this paper, we propose two different solutions for making a recently proposed asymmetric fingerprinting protocol based on client-side embedding robust to collusion attacks. The first solution is based on pr...

    Authors: Tiziano Bianchi, Alessandro Piva and Dasara Shullani

    Citation: EURASIP Journal on Information Security 2015 2015:6

    Content type: Research

    Published on:

  4. Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR...

    Authors: José Marinho, Jorge Granjal and Edmundo Monteiro

    Citation: EURASIP Journal on Information Security 2015 2015:4

    Content type: Review

    Published on:

  5. To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of...

    Authors: Subhas Barman, Debasis Samanta and Samiran Chattopadhyay

    Citation: EURASIP Journal on Information Security 2015 2015:3

    Content type: Research

    Published on:

  6. This paper investigates the statistical detection of JSteg steganography. The approach is based on a statistical model of discrete cosine transformation (DCT) coefficients challenging the usual assumption that...

    Authors: Tong Qiao, Florent Retraint, Rémi Cogranne and Cathel Zitzmann

    Citation: EURASIP Journal on Information Security 2015 2015:2

    Content type: Research

    Published on:

  7. In this paper we present Laribus, a peer-to-peer network designed to detect local man-in-the-middle attacks against secure socket layer/transport layer security (SSL/TLS). With Laribus, clients can validate th...

    Authors: Karl-Peter Fuchs, Dominik Herrmann, Andrea Micheloni and Hannes Federrath

    Citation: EURASIP Journal on Information Security 2015 2015:1

    Content type: Research

    Published on:

  8. Cyber security attacks are becoming ever more frequent and sophisticated. Enterprises often deploy several security protection mechanisms, such as anti-virus software, intrusion detection/prevention systems, a...

    Authors: Xin Hu, Ting Wang, Marc Ph Stoecklin, Douglas L Schales, Jiyong Jang and Reiner Sailer

    Citation: EURASIP Journal on Information Security 2014 2014:17

    Content type: Research

    Published on:

  9. Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users’ activities for censorship, to distribute malware and spam and to...

    Authors: Haya Shulman and Michael Waidner

    Citation: EURASIP Journal on Information Security 2014 2014:16

    Content type: Research

    Published on:

  10. The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have be...

    Authors: Pratik Narang, Chittaranjan Hota and VN Venkatakrishnan

    Citation: EURASIP Journal on Information Security 2014 2014:15

    Content type: Research

    Published on:

  11. Many papers have already provided models to formally specify security policies. In this paper, security policies are modeled using deontic concepts of permission and obligation. Permission rules are used to sp...

    Authors: Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia and Anas Abou El Kalam

    Citation: EURASIP Journal on Information Security 2014 2014:13

    Content type: Research

    Published on:

  12. We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function, we choose the Dirichlet distribution with ...

    Authors: Sarah Ibrahimi, Boris Škorić and Jan-Jaap Oosterwijk

    Citation: EURASIP Journal on Information Security 2014 2014:12

    Content type: Research

    Published on:

  13. Online social networks (OSNs) have become an integral part of social interaction and communication between people. Reasons include the ubiquity of OSNs that is offered through mobile devices and the possibilit...

    Authors: Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger and Günther Pernul

    Citation: EURASIP Journal on Information Security 2014 2014:11

    Content type: Research

    Published on:

  14. This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. T...

    Authors: Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya and Patrick Bas

    Citation: EURASIP Journal on Information Security 2014 2014:9

    Content type: Research

    Published on:

  15. In this work, by exploiting the traces left by double compression in the statistics of quantized modified discrete cosine transform coefficients, a single measure has been derived that allows to decide whether...

    Authors: Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo and Alessandro Piva

    Citation: EURASIP Journal on Information Security 2014 2014:10

    Content type: Research

    Published on:

  16. This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the ...

    Authors: Saiful Islam, Mangat R Modi and Phalguni Gupta

    Citation: EURASIP Journal on Information Security 2014 2014:8

    Content type: Research

    Published on:

  17. The long-term evolution (LTE) is the newly adopted technology to offer enhanced capacity and coverage for current mobility networks, which experience a constant traffic increase and skyrocketing bandwidth dema...

    Authors: Roger Piqueras Jover, Joshua Lackey and Arvind Raghavan

    Citation: EURASIP Journal on Information Security 2014 2014:7

    Content type: Research

    Published on:

  18. 419 scam (also referred to as Nigerian scam) is a popular form of fraud in which the fraudster tricks the victim into paying a certain amount of money under the promise of a future, larger payoff.

    Authors: Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon and David Balzarotti

    Citation: EURASIP Journal on Information Security 2014 2014:4

    Content type: Research

    Published on:

  19. Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally i...

    Authors: Eirini Karapistoli and Anastasios A Economides

    Citation: EURASIP Journal on Information Security 2014 2014:3

    Content type: Research

    Published on:

  20. Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function. The design of the distorti...

    Authors: Vojtěch Holub, Jessica Fridrich and Tomáš Denemark

    Citation: EURASIP Journal on Information Security 2014 2014:1

    Content type: Research

    Published on:

  21. Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a co...

    Authors: Irene Amerini, Mauro Barni, Roberto Caldelli and Andrea Costanzo

    Citation: EURASIP Journal on Information Security 2013 2013:8

    Content type: Research

    Published on:

  22. The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of diverse evidence. In this work we first conduct a complex experiment to expand our ...

    Authors: Elias Raftopoulos and Xenofontas Dimitropoulos

    Citation: EURASIP Journal on Information Security 2013 2013:7

    Content type: Research

    Published on:

  23. The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessi...

    Authors: Donny J Ohana and Narasimha Shashidhar

    Citation: EURASIP Journal on Information Security 2013 2013:6

    Content type: Research

    Published on:

  24. Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a d...

    Authors: Zekeriya Erkin, Thijs Veugen, Tomas Toft and Reginald L Lagendijk

    Citation: EURASIP Journal on Information Security 2013 2013:4

    Content type: Research

    Published on:

  25. Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a high...

    Authors: Vaibhav Garg, Thomas Koster and Linda Jean Camp

    Citation: EURASIP Journal on Information Security 2013 2013:3

    Content type: Research

    Published on:

  26. This paper analyses and proposes a novel detection strategy for the 'Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The resear...

    Authors: Jonny Milliken, Valerio Selis and Alan Marshall

    Citation: EURASIP Journal on Information Security 2013 2013:2

    Content type: Research

    Published on:

  27. This article details the conception, design, development and analysis of invisible, blind and robust color image watermarking algorithms based on the wavelet transform. Using error correcting codes, the waterm...

    Authors: Wadood Abdul, Philippe Carré and Philippe Gaborit

    Citation: EURASIP Journal on Information Security 2013 2013:1

    Content type: Research

    Published on:

  28. We analyze and discuss encryption schemes for JPEG2000 based on the wavelet packet transform with a key-dependent subband structure. These schemes have been assumed to reduce the runtime complexity of encrypti...

    Authors: Dominik Engel, Thomas Stütz and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2012 2012:2

    Content type: Research

    Published on:

  29. Identity theft is one of the most profitable crimes committed by felons. In the cyber space, this is commonly achieved using phishing. We propose here robust server side methodology to detect phishing attacks,...

    Authors: Venkatesh Ramanathan and Harry Wechsler

    Citation: EURASIP Journal on Information Security 2012 2012:1

    Content type: Research

    Published on:

  30. Denial-of-service (DoS) attack exploits inherent limitation of resources in wireless networks in attempt to overwhelm and exhaust their finite capacity. In wireless networks, clear-text form of control packets...

    Authors: Mina Malekzadeh, Abdul Azim Abdul Ghani and Shamala Subramaniam

    Citation: EURASIP Journal on Information Security 2011 2011:4

    Content type: Research

    Published on:

  31. Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technolog...

    Authors: Christian Rathgeb and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2011 2011:3

    Content type: Research

    Published on:

  32. Recent experimental work by Androulidakis and Papavassiliou (IET Commun 2(3):399, 2008; IEEE Netw 23(1):6, 2009) has shown that it is possible to maintain a high level of network security while selectively ins...

    Authors: Ezzat G Bakhoum

    Citation: EURASIP Journal on Information Security 2011 2011:2

    Content type: Research

    Published on:

  33. In this article, we present an automatic face recognition system. We show that fractal features obtained from Iterated Function System allow a successful face recognition and outperform the classical approache...

    Authors: Yousra Ben Jemaa, Ahmed Derbel and Ahmed Ben Jmaa

    Citation: EURASIP Journal on Information Security 2011 2011:1

    Content type: Research

    Published on:

  34. Watermarking payload is a topic in which the watermarking researchers have a great interest at present. Based on the constraint of "perceptual invisibility," this paper makes a study of the maximum watermarkin...

    Authors: Mao Jia-Fa, Zhang Ru, Niu Xin-Xin, Yang Yi-Xian and Zhou Lin-Na

    Citation: EURASIP Journal on Information Security 2011 2011:502748

    Content type: Research Article

    Published on:

  35. An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of vid...

    Authors: Klimis Ntalianis, Nicolas Tsapatsoulis and Athanasios Drigas

    Citation: EURASIP Journal on Information Security 2011 2011:174945

    Content type: Research Article

    Published on:

  36. Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, this paper proposed a Joint Source-Cryptographic-Channel Coding (JSCC) based on...

    Authors: Mahnaz Sinaie and Vahid Tabataba Vakili

    Citation: EURASIP Journal on Information Security 2010 2010:621521

    Content type: Research Article

    Published on:

  37. For evaluation of biometric performance of biometric components and system, the availability of independent databases and desirably independent evaluators is important. Both databases of significant size and i...

    Authors: Davrondzhon Gafurov, Patrick Bours, Bian Yang and Christoph Busch

    Citation: EURASIP Journal on Information Security 2010 2010:391761

    Content type: Research Article

    Published on:

  38. An overview of reversible watermarking techniques appeared in literature during the last five years approximately is presented in this paper. In addition to this a general classification of algorithms on the b...

    Authors: Roberto Caldelli, Francesco Filippini and Rudy Becarelli

    Citation: EURASIP Journal on Information Security 2010 2010:134546

    Content type: Review Article

    Published on:

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here