<p><p>This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent comp
Security with Intelligent Computing and Big-Data Services 2019: Proceedings of the 3rd International Conference on Security with Intelligent Computing ... in Intelligent Systems and Computing, 1145)
β Scribed by Lakhmi C. Jain (editor), Sheng-Lung Peng (editor), Shiuh-Jeng Wang (editor)
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 369
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book aims to attract researchers and practitioners who are working in Information Technology and Computer Science. This edited book is about basics and high level concepts regarding Blockchain Technology and Application, Multimedia Security, Information Processing, Security of Network, Cloud and IoT, Cryptography and Cryptosystem, Learning and Intelligent Computing, Information Hiding. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure and privacy-aware mechanisms in high performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security related areas. We believe that this volume not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas.
β¦ Table of Contents
Preface
Organization
Honorary Chairs
General Chairs
International Advisory Committee
Program Committee Chairs
Publicity Chairs
Publication Chairs
Finance Chairs
Local Arrangement Chairs
Organizing Chairs
Program Committees
Contents
About the Editors
Cryptography, Multimedia Security and Artificial Intelligence
Embedding Advanced Persistent Threat in Steganographic Images
Abstract
1 Introduction
2 Related Work
2.1 Advanced Persistent Threat
2.2 Simplest Image Steganography: Least Significant Bit (LSB) Embedding
2.3 Stegosploit
2.4 Malware Analysis
3 Proposed Scheme
4 Experiment and Analysis
4.1 Experiment Environment
4.2 Implementation of the Scheme
4.3 Analysis
5 Conclusion
Acknowledgement
References
AI-Based Farm Survey Technique for Efficient Fruit Harvesting
Abstract
1 Introduction
2 Status of Existing Solutions
3 Solution Overview
3.1 Custom Model
3.2 Model-Building Process
3.3 Collecting and Labeling Data
3.4 Preparing Data
4 Results
5 Conclusion
Acknowledge
References
A Lightweight Authentication Stream Cypher Mechanism for Industrial Internet of Things
Abstract
1 Introduction
2 Background and Related Works
3 Mechanism Design
4 Experiment Results
5 Conclusion
References
The Research of Attacking TOR Network Users
Abstract
1 Introduction
2 System Architecture and Function Design
2.1 Scenario
2.2 System Architecture
2.3 System Components
2.4 System Functions and Features
3 Conclusion
References
Preserving Tenacious DDoS Vitality via Resurrection Social Hybrid Botnet
Abstract
1 Introduction
2 Proposed Scheme
2.1 Construction of Communication Layer
2.2 Introduction of Reputation Strategy
2.3 Design of Latency Bot
2.4 Implementation of Resurrection Mechanism
3 Performance Evaluation
3.1 Simulation Assumptions and Setup
3.2 Enumeration Results
4 Conclusions
References
Internet of Things and Big Data
Impact of Big Data Analytics Capability and Strategic Alliances on Financial Performance
Abstract
1 Introduction
2 Literature Review
2.1 Big Data Analytics Capability and Financial Performance
2.2 Big Data Analytics (BDA) Software and Hardware Infrastructure Capability and Financial Performance
2.3 Big Data Analytics (BDA) Personnel Professional Competence and Financial Performance
2.4 Big Data Analytics (BDA) Management Capabilities and Financial Performance
2.5 Strategic Alliances and Financial Performance
2.6 Resources-Based Strategic Alliances and Financial Performance
2.7 Marketing-Based Strategic Alliances and Financial Performance
2.8 Learning-Based Strategic Alliances and Financial Performance
3 Research Methodology
3.1 Sample and Data Sources
3.2 Variables and Measures
4 Results
4.1 The Structural Equation Modeling (SEM) Results for Strategic Alliance, Big Data Analytics Financial Performance
4.2 The Influence of the Big Data Analytics Capability (BDAC) on Financial Performance
4.3 The Influence of Strategic Alliance on Financial Performance
4.4 The Influence of the Big Data Analytics (BDA) Software and Hardware Infrastructure Capability on Financial Performance
4.5 The Influence of the BDA Personnel Professional Competence on Financial Performance
4.6 The Influence of the BDA Management Capabilities on Financial Performance
4.7 The Influence of the Resource-Based Strategic Alliances on Financial Performance
4.8 The Influence of the Marketing-Based Strategic Alliances on Financial Performance
4.9 The Influence of the Learning-Based Strategic Alliances on Financial Performance
5 Conclusions
5.1 Contribution of This Research
5.2 Suggestion for Future Research
5.3 Limitations of This Research
References
A Progressive Secret Image Sharing Scheme Based on GEMD Data Hiding
Abstract
1 Introduction
2 Related Works
2.1 Exploiting Modification Direction (EMD) [26]
2.2 General Exploiting Modification Direction (GEMD) [6]
2.3 Progressive Secret Image Sharing (PSIS)
3 Proposed Method
3.1 Segmentation of Secret Image
3.2 The Method of Embedding and Extracting
4 Experimental Results
5 Conclusions
Acknowledgment
References
Device Discovery Techniques for Industrial Internet of Things Through Predictive Analytic Mechanism
1 Introduction
1.1 Motivations
1.2 Contributions
1.3 Organization
2 Literature Survey
2.1 Related Works on IIoT
2.2 Device Discovery Techniques
3 Use-Case Scenario and Predictive Maintenance Ontology
3.1 Boiler
3.2 Predictive Maintenance Ontology
4 PdM Architecture
4.1 Overview of Architecture
4.2 Workflow
4.3 Example
5 Experiments and Results
5.1 Dataset Description
5.2 Implementation and Experimental Setup
6 Conclusions
References
SmileJob: A Lightweight Personalized Accompanying System for Home Security
1 Introduction
2 Related Works
3 Proposed Design
3.1 Proposed System Architecture Building
3.2 Visualization
4 Implementation
4.1 LED Display, Wiring, and Wafer Control
4.2 Nvidia Jetson Nano Environment and Settings
4.3 Server Environment and Settings
5 Results
6 Conclusion
References
Secure Authentication Key Agreement Protocol with eCK Model in Heterogeneous IoT Environment
Abstract
1 Introduction
2 Authentication Protocol for Heterogeneous IoT
3 Preliminaries
3.1 Elliptic Curve Cryptography
3.2 eCK Security Assumption
3.3 NAXOS Authentication Key Agreement Security Model
4 Proposed Protocol
4.1 System Initialization Phase
4.2 Long-Term Private/Public Key Generation Phase
4.3 Key Agreement Phase
5 Security Analysis and Performance Comparison
5.1 Security Analysis
5.2 Security and Performance Comparison
6 Conclusion
Acknowledgements
References
Multimedia Security
Robust Syndrome-Trellis Codes for Fault-Tolerant Steganography
1 Introduction
2 Review of Syndrome-Trellis Codes
3 Robust Syndrome-Trellis Codes
3.1 Message Encoding Algorithm
3.2 Example of Message Encoding
3.3 Message Decoding Algorithm
4 Experimental Result
4.1 Performance Analysis
4.2 Comparison on Natural Images
5 Conclusion
References
Audio Information Hiding Based on Cochlear Delay Characteristics with Optimized Segment Selection
1 Introduction
2 Audio Information Hiding Based on Cochlear Delay Characteristics
3 Proposed Method
3.1 Data Embedding
3.2 Data Detection
4 Evaluation and Result
4.1 Detection Accuracy
4.2 Inaudibility
5 Conclusion and Future Works
References
A Watermarking Method for 3D Game Model Based on FCM Clustering and Density Tag Estimation of Vertex Set
Abstract
1 Introduce
2 Overview
2.1 Preprocess
2.2 Establishing a New Coordinate System
2.3 KNN-Based Density Estimation of the Vertex Set
2.4 Divide the Model by FCM Clustering
2.5 Constructing Feature Vertex
3 Watermark Embedding and Extraction
3.1 Watermark Embedding
3.2 Watermark Extraction
3.3 Model Recovery
4 Experimental Comparison and Results
4.1 Optimal Number of Clusters
4.2 Capacity Comparisons of the Methods
4.3 Imperceptibility Comparisons of the Methods
4.4 Robustness Comparisons of the Methods
5 Conclusion
Acknowledgement
References
A Reversible Information Hiding Scheme Based on Index Encryption Strategy in VQ-Image
Abstract
1 Introduction
2 Related Works
2.1 VQ Encoding
2.2 Yan et al.βs Image Encryption Method VQ
2.3 Reversible Data Hiding
3 The Proposed Method
3.1 Image Encryption
3.2 Information Hiding
3.3 Image Decryption and Information Extracting
4 Experimental Result
5 Conclusion
Acknowledgement
References
Introduction of Reversible Data Hiding Schemes
Abstract
1 Introduction
2 Difference Expansion (DE) Scheme
3 Histogram Shifting (HS) Scheme
4 Pixel Value Ordering (PVO) Scheme
5 Dual-Image Based Scheme
6 Interpolation-Based Scheme
7 Conclusions
References
Study on the Factors Affecting Sharing Behavior of Social Media Platform Users
Abstract
1 Introduction
2 Methodology
2.1 Research Framework
2.2 Sampling Design
3 Empirical Results
3.1 Parameter of Back Propagation Neural Network
3.2 Back Propagation Neural Network Model
3.3 Back Propagation Neural Network Model
3.4 Sensitivity Analysis
4 Concluding Remarks
References
Intelligent Computing
A Survey of Bus Arrival Time Prediction Methods
Abstract
1 Introduction
2 A Model Discussion on Predicting the Arrival of Traffic Between Destinations
2.1 Historical Model
2.2 Dynamic Model
2.3 Statistical Model
2.3.1 Regression Model
2.3.2 Kalman Filter
2.3.3 Polynomial Model
2.3.4 Other Model
2.4 Machine Learning Model
2.4.1 Artificial Neural Network
2.4.2 Support Vector Machine
2.4.3 Deep Neural Network
2.4.4 K-nearest
2.4.5 Radial Basis Function
2.4.6 Hybrid Models
3 Affecting the Arrival Factor
4 Comparison Method
5 Observation and Discussion
6 Conclusion
References
Applying Talent Quality-Management System (TTQS) and Information Visualization to e-Learning Partner Project
Abstract
1 Introduction
2 Literature Review
2.1 Introduction of e-Learning Partner Plan
2.2 TTQS
2.3 Information Visualization
3 Methodology
3.1 Samples and Procedure
3.2 Measures and Variables
4 Results
4.1 Basic Statistics
4.2 ANOVA and Post Hoc Tests
4.3 Visualization
5 Discussion
5.1 TTQS
5.2 Retention
6 Conclusions
References
The Application of Traveling Gravity Model on International Tourism
Abstract
1 Introduction
1.1 Background and Motivation
2 Empirical Model
2.1 Hypothesis
2.2 Regression Model
3 Empirical Results
3.1 Data Source
3.2 Results from the Regression Analysis
4 Conclusion and Suggestions
4.1 Conclusion
4.2 Suggestions
Prediction of Breast Cancer Recurrence Using Ensemble Machine Learning Classifiers
Abstract
1 Introduction
2 Breast Cancer Statistics
3 Related Studies of Machine Learning on Breast Cancer Dataset
4 Methodology
4.1 Data Mining Concept
4.2 Tools Used
4.3 Data Pre-processing
4.4 Attribute Selection
4.5 Ensemble Method
5 Experimental Result
6 Conclusion
References
An Impact of Capital Gains Tax for Securities on Taiwan Stock Market by Overreaction, Lock-in Effect and Market Microstructures
Abstract
1 Introduction
2 Literature Review
3 Empirical Model
3.1 GJR Models
3.2 CLRM Model and DID Model
3.3 Market Microstructures
4 Empirical Results
4.1 Data Sources and Descriptive Statistics
4.2 Investorsβ Personal Psychology (P) β Overreaction Effect
4.3 Investorsβ Behavior (B) - Lock-in Effect
4.4 Stock Market Environment (E) - Market Microstructures
5 Concluding Remarks
References
Analysis of the Influence of Strengthening Visual Message Oriented Design on Way-Finding Problems
Abstract
1 Introduction
2 Message Processing and Information Orientation
2.1 Elements of Message Recognition and Identification
2.2 Message Processing and Information Marking System
2.3 Message Processing and Related Information Technology
2.4 Design of Visual Messages
2.5 Design of Nodes Data Collection
2.6 Assessment and Data Analysis
3 Conclusion
Ethical Approval
References
Face Forgery Detection Based on Deep Learning
1 Introduction
2 Related Work
3 The Proposed Scheme
3.1 Hand-Crafted Features Combined with Deep Learning
3.2 The Analysis of Feature Continuity Between Frames
4 Experiment and Comparison
5 Conclusions
References
A Study of Text-Overlaid Image Compositions Information System About Enterprise Documents, Logo and Slogan
Abstract
1 Introduction
2 Text-Overlaid Image Compositions Information System
2.1 Corporate Identity and Logo
2.1.1 The Concept of Corporate Identification
2.1.2 Corporate Identification Components
2.1.3 The Importance of the Corporate Logo
2.2 The Meaning and Importance of Advertising Slogans
2.3 Aesthetic Quantitative Balance Analysis
2.4 Method and Results
2.5 Evaluation
3 Conclusion
Ethical Approval
References
Multimodal Presentation Attack Detection Based on Mouth Motion and Speech Recognition
Abstract
1 Introduction
2 Fusion of Multimodal Biometric System
3 The Proposed Method
3.1 Mouth Motion Detection
3.2 Speech Recognition
3.3 The Complete Processes
4 Experimental Results
5 Conclusions
References
Unsupervised Learning: Using Clustering Algorithms to Detect Peer to Peer Botnet Flows
1 Introduction
2 Background
2.1 Botnet
2.2 Peer 2 Peer (P2P) Botnets
2.3 Cluster Analysis: Simple K-means, Farthest First and DB Scan
2.4 Previous Work
3 Methodology
3.1 Approach Using Unsupervised Learning
3.2 Feature Extraction from Flows
3.3 Feature Selection
3.4 Clusters Evaluation Measurements
4 Results and Discussion
4.1 Dataset Assemble for Testing
4.2 Unsupervised Learning Method: Cluster Analysis
4.3 Unsupervised Learning Comparison
5 Conclusion
5.1 Future Work
References
Intrusion Detection, Privacy and Cryptography
Achieve Web Search Privacy by Obfuscation
1 Introduction
2 Related Work
2.1 Obfuscation-Based Private Web Search (OB-PWS)
2.2 Quantity Privacy of OB-PWS
2.3 Attack Pattern
3 TrackMeNot Background
3.1 Mechanism of TMN
3.2 Weakness and Strengths
4 Methodology
4.1 Semantic Distance Measure
4.2 Separate User Queries
4.3 Enhance TMN
5 Experiment
5.1 Dataset and Setup
5.2 Experiment Results
5.3 Clustering Result of TMN
6 Conclusion
References
Cryptanalysis of Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
1 Introduction
2 Preliminaries
2.1 Bilinear Maps
2.2 Proxy Re-Encryption with Keyword Search Scheme
3 The Cryptanalysis Protocol
3.1 The Error of the Protocol
3.2 The New Protocol
4 Conclusion
References
An Effective Target Recovery Method from a Source Location in Geo-Indistinguishable Surroundings
Abstract
1 Introduction
2 Preliminary and Background
2.1 Differential Privacy
2.2 Geo-Indistinguishability
2.3 Location Privacy
2.4 Location Privacy Protection Techniques
2.5 Points of Interest Retrieve
2.6 Advanced Centralized Cloaking
3 The Proposed Scheme
3.1 System Architecture
3.2 System Environment
3.3 Target Recovery Methods
3.4 Effective Target Recovery Method
4 Performance Evaluation
4.1 Experimental Environment
4.2 Obfuscation Result
4.3 Number of Search Rounds
4.4 Number of Searched Users
5 Conclusion
Acknowledgement
References
Practical Authentication Scheme Preserving Privacy Protection for the Internet of Things
Abstract
1 Introduction
2 Our Proposed Privacy Protection Authentication Scheme
2.1 Initialization Phase
2.2 Registration Phase
2.3 Login and Authentication Phase
3 Discussions
3.1 System Simulation and Implementation
3.2 Security Analysis
4 Conclusion
Acknowledgements
References
Author Index
π SIMILAR VOLUMES
<p>In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Se
<p><p>This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 3<sup>rd</sup> International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), which was held in the beautiful and historic city of LeΓ³n, Spain, in Novembe
<p><span>This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly fo
<p><span>This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly those focusing on th
<span>This book features a collection of high-quality, peer-reviewed papers presented at the Third International Conference on Intelligent Computing and Communication (ICICC 2019) held at the School of Engineering, Dayananda Sagar University, Bengaluru, India, on 7 β 8 June 2019. Discussing advanced