Skip to main content

Articles

Page 1 of 5

  1. Extensive research has been conducted to enhance the availability of IoT devices and data by focusing on the rapid prediction of instantaneous fault rates and temperatures. Temperature plays a crucial role in ...

    Authors: Zhiqiang Chen, Zhihua Song, Tao Zhang and Yong Wei
    Citation: EURASIP Journal on Information Security 2024 2024:2
  2. Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most rob...

    Authors: Jimin Zhang, Xianfeng Zhao and Xiaolei He
    Citation: EURASIP Journal on Information Security 2023 2023:11
  3. For dispute resolution in daily life, tamper-proof data storage and retrieval of log data are important with the incorporation of trustworthy access control for the related users and devices, while giving acce...

    Authors: Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim and Mehmood Chadhar
    Citation: EURASIP Journal on Information Security 2023 2023:7
  4. Traffic classification is widely used in network security and network management. Early studies have mainly focused on mapping network traffic to different unencrypted applications, but little research has bee...

    Authors: Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao and Yanqi Song
    Citation: EURASIP Journal on Information Security 2023 2023:6
  5. In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection...

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev and Slava Voloshynovskiy
    Citation: EURASIP Journal on Information Security 2023 2023:4

    The Correction to this article has been published in EURASIP Journal on Information Security 2023 2023:8

  6. In this work, we present the Gaussian Class-Conditional Simplex (GCCS) loss: a novel approach for training deep robust multiclass classifiers that improves over the state-of-the-art in terms of classification ...

    Authors: Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
    Citation: EURASIP Journal on Information Security 2023 2023:3
  7. This paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelli...

    Authors: Filipo Sharevski and Peter Jachim
    Citation: EURASIP Journal on Information Security 2022 2022:7
  8. Reliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on “device...

    Authors: Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko and Andriy Oliynyk
    Citation: EURASIP Journal on Information Security 2022 2022:6
  9. Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. S...

    Authors: Erwin Haasnoot, Luuk J. Spreeuwers and Raymond N. J. Veldhuis
    Citation: EURASIP Journal on Information Security 2022 2022:5
  10. Among the most major potential attacks against fingerprint authentication systems are those that target the stored reference templates. These threats are extremely damaging as they can lead to the invasion of ...

    Authors: Ayoub Lahmidi, Chouaib Moujahdi, Khalid Minaoui and Mohammed Rziza
    Citation: EURASIP Journal on Information Security 2022 2022:3
  11. Source device identification is an important topic in image forensics since it allows to trace back the origin of an image. Its forensics counterpart is source device anonymization, that is, to mask any trace ...

    Authors: Francesco Picetti, Sara Mandelli, Paolo Bestagini, Vincenzo Lipari and Stefano Tubaro
    Citation: EURASIP Journal on Information Security 2022 2022:2
  12. Deep neural networks (DNNs) are widely used to handle many difficult tasks, such as image classification and malware detection, and achieve outstanding performance. However, recent studies on adversarial examp...

    Authors: Jing Lin, Laurent L. Njilla and Kaiqi Xiong
    Citation: EURASIP Journal on Information Security 2022 2022:1
  13. Machine learning algorithms, however effective, are known to be vulnerable in adversarial scenarios where a malicious user may inject manipulated instances. In this work, we focus on evasion attacks, where a m...

    Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi and Salvatore Orlando
    Citation: EURASIP Journal on Information Security 2021 2021:12
  14. Illicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. In this attack, victims’ computing resources are abused to mine cryptocurrency for the ben...

    Authors: Michele Russo, Nedim Šrndić and Pavel Laskov
    Citation: EURASIP Journal on Information Security 2021 2021:11
  15. Recently, adversarial attacks have drawn the community’s attention as an effective tool to degrade the accuracy of neural networks. However, their actual usage in the world is limited. The main reason is that ...

    Authors: Pavlo Haleta, Dmytro Likhomanov and Oleksandra Sokol
    Citation: EURASIP Journal on Information Security 2021 2021:10
  16. Information fusion, i.e., the combination of expert systems, has a huge potential to improve the accuracy of pattern recognition systems. During the last decades, various application fields started to use diff...

    Authors: Christian Kraetzer, Andrey Makrushin, Jana Dittmann and Mario Hildebrandt
    Citation: EURASIP Journal on Information Security 2021 2021:9
  17. The JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signa...

    Authors: Sebastiano Battiato, Oliver Giudice, Francesco Guarnera and Giovanni Puglisi
    Citation: EURASIP Journal on Information Security 2021 2021:8
  18. Education acts as a soul in the overall societal development, in one way or the other. Aspirants, who gain their degrees genuinely, will help society with their knowledge and skills. But, on the other side of ...

    Authors: T. Rama Reddy, P. V. G. D. Prasad Reddy, Rayudu Srinivas, Ch. V. Raghavendran, R. V. S. Lalitha and B. Annapurna
    Citation: EURASIP Journal on Information Security 2021 2021:7
  19. Estimating the primary quantization matrix of double JPEG compressed images is a problem of relevant importance in image forensics since it allows to infer important information about the past history of an im...

    Authors: Benedetta Tondi, Andrea Costanzo, Dequ Huang and Bin Li
    Citation: EURASIP Journal on Information Security 2021 2021:5
  20. The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the ...

    Authors: Cecilia Pasquini, Irene Amerini and Giulia Boato
    Citation: EURASIP Journal on Information Security 2021 2021:4
  21. Several methods for synthetic audio speech generation have been developed in the literature through the years. With the great technological advances brought by deep learning, many novel synthetic speech techni...

    Authors: Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti and Stefano Tubaro
    Citation: EURASIP Journal on Information Security 2021 2021:2
  22. SHDM stands for Sphere-Hardening Dither Modulation and is a watermarking algorithm based on quantizing the norm of a vector extracted from the cover work. We show how SHDM can be integrated into a fully commut...

    Authors: Roland Schmitz
    Citation: EURASIP Journal on Information Security 2021 2021:1
  23. This paper investigates the visual quality of the adversarial examples. Recent papers propose to smooth the perturbations to get rid of high frequency artifacts. In this work, smoothing has a different meaning...

    Authors: Hanwei Zhang, Yannis Avrithis, Teddy Furon and Laurent Amsaleg
    Citation: EURASIP Journal on Information Security 2020 2020:15
  24. Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applicat...

    Authors: Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande and Aderonke Anthonia Kayode
    Citation: EURASIP Journal on Information Security 2020 2020:14
  25. The rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing...

    Authors: Davood Noori, Hassan Shakeri and Masood Niazi Torshiz
    Citation: EURASIP Journal on Information Security 2020 2020:13
  26. In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerab...

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak and Slava Voloshynovskiy
    Citation: EURASIP Journal on Information Security 2020 2020:10
  27. An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...

    Authors: Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann and Stefan Katzenbeisser
    Citation: EURASIP Journal on Information Security 2020 2020:9
  28. Security vulnerabilities of the modern Internet of Things (IoT) systems are unique, mainly due to the complexity and heterogeneity of the technology and data. The risks born out of these IoT systems cannot eas...

    Authors: Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan and Venkat P. Rangan
    Citation: EURASIP Journal on Information Security 2020 2020:8
  29. The tremendous success of deep learning for imaging applications has resulted in numerous beneficial advances. Unfortunately, this success has also been a catalyst for malicious uses such as photo-realistic fa...

    Authors: Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul Krueger and Michael Hahsler
    Citation: EURASIP Journal on Information Security 2020 2020:6
  30. Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed t...

    Authors: Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng and Fabio Roli
    Citation: EURASIP Journal on Information Security 2020 2020:5
  31. User interaction with a mobile device predominantly consists of touch motions, otherwise known as swipe gestures, which are used as a behavioural biometric modality to verify the identity of a user. Literature re...

    Authors: Elakkiya Ellavarason, Richard Guest and Farzin Deravi
    Citation: EURASIP Journal on Information Security 2020 2020:4

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    3.6 - 2-year Impact Factor
    3.6 - 5-year Impact Factor
    1.461 - SNIP (Source Normalized Impact per Paper)
    0.901 - SJR (SCImago Journal Rank)

    2022 Speed
    71 days submission to first editorial decision for all manuscripts (Median)
    236 days submission to accept (Median)

    2022 Usage 
    210,880 downloads
    61 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here