Your conditions: Information Security
  • SteganoDDPM: A high-quality image steganography self-learning method using diffusion model

    Subjects: Computer Science >> Information Security Subjects: Computer Science >> Computer Application Technology submitted time 2024-04-23

    Abstract: Image steganography has become a focal point of interest for researchers due to its capacity for the covert transmission of sensitive data. Traditional diffusion models often struggle with image steganography tasks involving paired data, as their core principle of gradually removing noise is not directly suited for maintaining the correspondence between carrier and secret information. To address this challenge, this paper conducts an in-depth analysis of the principles behind diffusion models and proposes a novel framework for an image steganography diffusion model. The study begins by mathematically representing the steganography tasks of paired images, introducing two optimization objectives: minimizing the secrecy leakage function and embedding distortion function. Subsequently, it identifies three key issues that need to be addressed in paired image steganography tasks and, through specific constraint mechanisms and optimization strategies, enables the diffusion model to effectively handle paired data. This enhances the quality of the generated stego-images and resolves issues such as image clarity. Finally, on public datasets like CelebA, the proposed model is compared with existing generation model-based image steganography techniques, analyzing its implementation effects and performance parameters. Experimental results indicate that, compared to current technologies, the model framework proposed in this study not only improves image quality but also achieves significant enhancements in multiple performance metrics, including the imperceptibility and anti-detection capabilities of the images. Specifically, the PSNR of its stego-images reaches 93.14dB, and the extracted images’ PSNR reaches 91.23dB, an approximate improvement of 30% over existing technologies; the attack success rate is reduced to 2.4x10-38. These experimental outcomes validate the efficacy and superiority of the method in image steganography tasks.

  • Large-Scale Chinese Data Benchmark for Face Video Anti-Forgery Identification

    Subjects: Computer Science >> Information Security submitted time 2024-01-22

    Abstract: With the rapid development of AIGC (Artificial Intelligence Generated Content) technology, hyper-realistic forged facial videos have become capable of deceiving human visual perception. As a result, a significant number of facial anti-forgery detection algorithms have been proposed for the identification of these fake facial videos. However, effectively evaluating the efficacy and applicability of these forgery detection algorithms remains a substantial challenge. To effectively promote the quantitative assessment of facial anti-forgery detection performance and the iterative development of anti-forgery technologies, this paper introduces a large-scale Chinese data benchmark for facial video anti-forgery identification and releases the world's first CHN-DF Chinese dataset (https://github.com/HengruiLou/CHN-DF), filling the gap in facial video anti-forgery datasets in terms of large-scale Chinese data. The paper details the process of constructing the CHN-DF dataset and the Chinese data evaluation benchmark and validates the complexity and realism of the CHN-DF dataset through experiments. It is hoped that this evaluation benchmark will assist researchers in building more practical and effective facial video anti-forgery detection models, thereby advancing the technology in the field of anti-forgery detection. Additionally, this paper addresses the challenges posed by Chinese face video anti- forgery detection benchmark datasets and anti-forgery detection technology. It also proposes potential future research directions, offering valuable insights to advance the development of face video anti-forgery detection technology.
     

  • Artificial Intelligence in Website Fingerprinting: A Review

    Subjects: Computer Science >> Information Security submitted time 2023-05-30

    Abstract: Since the emergence of the Internet, the issue of anonymity has been a matter of public concern. From ensuring the fairness of electronic elections to protecting user privacy, anonymity has become increasingly important. With the emergence of anonymous networks, the public has the assurance of anonymity. However, with the continuous development of anti-anonymity technology, anonymity faces threats. This paper summarizes the development of anonymity and its protection and countermeasures in anonymous networks. The paper mainly discusses the development of website fingerprinting technology and the application of artificial intelligence technology in anonymous networks by analyzing the effect of anonymity on the Internet.

  • DASICS - Secure Processor Design White Paper

    Subjects: Computer Science >> Information Security submitted time 2023-04-18

    Abstract:开源、共享和协同的软件开发模式促进了互联网、人工智能等领域繁荣发展,但在这种模式下软件开发的复杂性日益增加,体现在依靠大量开发者共同开发一个软件、频繁调用第三方代码库以及管理维护庞大的整体代码量。这种复杂的软件开发模式导致了在开发层面很大概率会引入安全漏洞。例如软件开发者不可避免地需要调用第三方代码库,却缺乏对第三方代码库的安全性的保证,导致了由于调用不可靠的第三方代码库引入了可以被攻击者利用的漏洞,带来信息泄漏和篡改的风险。一旦一个经常使用的第三发库发现漏洞,受影响的往往是大量使用这个库开发的软件。软件安全漏洞中最主要是内存访问漏洞。针对这些内存访问漏洞带来的软件安全挑战,学术界和工业界提出了一系列软硬件内存防护方法。这些防护方法一方面通过数据流完整性技术(Data Flow Integrity,简称 DFI),对非可信的软件代码的数据流进行严格的检查和限制,通过对数据边界的越界检查或者数据来源的合规性检查等来防止对内存的非法操作。这其中代表性的工作包括工业界中 Intel 公司提出的 MPX 和 MPK 技术、ARM 公司的 MTE 技术以及英国剑桥大学主导的 CHERI 安全体系结构等。另一方面通过控制流完整性技术(Control Flow Integrity,简称 CFI)来防止恶意的控制流劫持,例如 Intel 的 CET 技术、ARM 公司的 BTI 技术和 PA 等技术。但是这些内存防护方法不同程度地存在着隔离划分对象粒度过粗、安全元数据容易遭受攻击或者硬件实现/性能开销过大以及需要对现有第三方代码进行大幅修改和重新编译的问题。我们提出了 DASICS 安全处理器设计方案,以解决现有安全防护技术的隔离对象粒度过粗、元数据安全性低、性能开销过大的问题,并关注先前工作较少关注的权限动态划分、同一级地址空间内的内存保护和跨层调用检查。实现一种基于代码片段做权限动态划分的安全处理器设计,提供硬件辅助的高效软件内存防护,保障第三方代码的安全调用和运行,为基于开源开放的软件开发提供坚实的安全保障和支撑。

  • DASICS - Secure Processor Design White Paper

    Subjects: Computer Science >> Computer System Architecture Subjects: Computer Science >> Information Security submitted time 2023-04-18

    Abstract:开源、共享和协同的软件开发模式促进了互联网、人工智能等领域繁荣发展,但在这种模式下软件开发的复杂性日益增加,体现在依靠大量开发者共同开发一个软件、频繁调用第三方代码库以及管理维护庞大的整体代码量。这种复杂的软件开发模式导致了在开发层面很大概率会引入安全漏洞。例如软件开发者不可避免地需要调用第三方代码库,却缺乏对第三方代码库的安全性的保证,导致了由于调用不可靠的第三方代码库引入了可以被攻击者利用的漏洞,带来信息泄漏和篡改的风险。一旦一个经常使用的第三发库发现漏洞,受影响的往往是大量使用这个库开发的软件。软件安全漏洞中最主要是内存访问漏洞。针对这些内存访问漏洞带来的软件安全挑战,学术界和工业界提出了一系列软硬件内存防护方法。这些防护方法一方面通过数据流完整性技术(Data Flow Integrity,简称 DFI),对非可信的软件代码的数据流进行严格的检查和限制,通过对数据边界的越界检查或者数据来源的合规性检查等来防止对内存的非法操作。这其中代表性的工作包括工业界中 Intel 公司提出的 MPX 和 MPK 技术、ARM 公司的 MTE 技术以及英国剑桥大学主导的 CHERI 安全体系结构等。另一方面通过控制流完整性技术(Control Flow Integrity,简称 CFI)来防止恶意的控制流劫持,例如 Intel 的 CET 技术、ARM 公司的 BTI 技术和 PA 等技术。但是这些内存防护方法不同程度地存在着隔离划分对象粒度过粗、安全元数据容易遭受攻击或者硬件实现/性能开销过大以及需要对现有第三方代码进行大幅修改和重新编译的问题。我们提出了 DASICS 安全处理器设计方案,以解决现有安全防护技术的隔离对象粒度过粗、元数据安全性低、性能开销过大的问题,并关注先前工作较少关注的权限动态划分、同一级地址空间内的内存保护和跨层调用检查。实现一种基于代码片段做权限动态划分的安全处理器设计,提供硬件辅助的高效软件内存防护,保障第三方代码的安全调用和运行,为基于开源开放的软件开发提供坚实的安全保障和支撑。

  • A Novel Two-Party Comparison Protocol Against Untrusted Parties

    Subjects: Computer Science >> Information Security submitted time 2023-04-08

    Abstract: Secure two-party comparison is widely used to build various secure computing protocols (e.g., secure training, secure inference). In existing secure two-party comparison protocols, there is always one party that obtains a comparison result first, and then the party notifies the comparison result to the other one, thus, they are difficult to prevent one party that obtains the comparison result first from tampering with the comparison result. To this end, this paper first proposes a new paradigm for secure two-party comparison against untrusted parties. Then, a secure two-party comparison protocol (TOMS) satisfying the new paradigm is designed based on the threshold Paillier cryptosystem. Each party in TOMS obtains the same comparison result without revealing their own data. Moreover, TOMS prevents any party from tampering with the comparison results. Strictly theoretical analyses demonstrate the security and correctness of TOMS. Finally, the experimental results show that TOMS outperforms the existing secure two-party comparison methods in terms of computational efficiency and functionality, and is 50 times faster than previous methods.

  • AI赋能的网络攻击分析与分类

    Subjects: Computer Science >> Information Security submitted time 2022-01-26

    Abstract:

    "

  • 着眼新时代发展 铸信息安全战略之盾

    Subjects: Computer Science >> Information Security submitted time 2018-01-11 Cooperative journals: 《智库理论与实践》

    Abstract:[目的/意义]信息技术发展高速迅猛,在人们享受科技带来的便利同时,随之而来的是日益严峻的信息安全形势。这也给我国从网络大国向网络强国迈进提出了新的挑战。[方法/过程]本文分析了当前新时代形势下所面临的非传统安全问题:“外联网”威胁网络疆域;大数据技术驱动或引发新的危机;依赖开源谨防关键技术发展受制于人。[结果/结论]基于此,本文对国家信息安全发展给出了一些可供参考的对策性建议。

  • Intranet IDS honeypot integrated system

    Subjects: Computer Science >> Information Security submitted time 2017-08-28

    Abstract: In order to deal with the increasingly serious internal security problems, we have created an integrated honeypot system, which is based on the third generation honeynet deployment, with IDS and firewall to build, the use of honeynets gateway transfer attack traffic, the establishment of Multiple honeypots server, the first time to detect and warn the administrator, so that the emergency response to meet the P2DR model of the protection time is greater than the detection plus response time, analysis and record the means of attack, to achieve the security of the security and other network security The

  • Optical hiding with visual cryptography

    Subjects: Physics >> Electromagnetism, Optics, Acoustics, Heat Transfer, Classical Mechanics, and Fluid Dynamics Subjects: Computer Science >> Information Security submitted time 2017-03-28

    Abstract:Classical optical hiding methods are symmetric, being apt to realize but not secure. The security is improved in existing non-symmetric hiding techniques, yet all of them fails in convenient extractions, still not optically realized so far. Here, we propose an asymmetric optical hiding method based on visual cryptography, achieving the high security and the easy extraction at the same time. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof, and image-covered, this complex hiding procedure leading to the high security. Correspondingly, during the extraction process, the covered phase-keys are illuminated with laser beams and then incoherent superposed to extract the hidden information directly by human visual system, without complicated optical implementations and any additional computation, resulting in the convenience of extracting. Optical experiments verify that both the high security and the easy extraction are obtainable in the visual-cryptography-based optical hiding.

  • 面向信息过滤的多通道网络流分类研究

    Subjects: Computer Science >> Information Security submitted time 2017-03-10

    Abstract:随着信息技术的飞速发展,信息安全问题越来越得到全社会的重视。其中网络内容安全是最突出的问题之一,而作为网络内容安全处理核心技术的网络数据流过滤技术也面临着新的挑战。本文从网络数据流过滤问题出发,研究利用多通道信息进行网络数据流分类的技术,包括以下三方面的工作:(1)多通道 网络流分类模型研究,提出了可融合网络结构信息和网络内容信息的流分类模型;(2)分类模型索引技术 研究,提出一种基于 R-Tree 分类模型索引结构,极大地提高了网络数据流的判别速度;(3)多通道网络流 过滤系统 F9 实验平台建设,该系统支持多通道网络流判别过滤,可作为新模型与算法的实验平台。以上三 方面的工作从模型构造,模型索引,和模型实现三方面系统研究了面向信息过滤的多通道网络流分类系统。

  • 面向系统确保的属性可计算方法

    Subjects: Computer Science >> Information Security submitted time 2017-03-10

    Abstract:由于系统运行环境的复杂化、用户的多样性以及软件正确性的不可判定,确保系统完全按照预期提供服务非常困难,因此安全评估方法与建模技术就成为系统确保研究中的重要内容和关键支撑技术,被用来尝试解决现有评估方法存在的局部性和状态爆炸以及对互联网的内容访问控制评估方法的缺失等问题。本文首先概述安全评估的相关工作,然后介绍我们的研究工作-信息内容安全的控制模型和定量评价方法以及混杂检测中的机密性与完整性模型。

  • 计算机病毒攻击技术

    Subjects: Computer Science >> Computer Network Subjects: Computer Science >> Information Security submitted time 2016-05-03

    Abstract:随着计算机技术和网络技术发展及应用范围的不断扩大,计算机和网络所受到的攻击也日益增长。本文阐述了网络攻击的主要步骤和分类,在此基础上对实验室已经做过的安全相关的内容做个总结,包括系统级和网络级的攻击。针对系统的缓冲区溢出攻击、对网络的地址解析协议攻击、对web 应用的跨站请求伪造以及攻击完成后攻击者隐藏自身的Rootkit 这四种攻击,主要研究其攻击的背景、原理、具体的实施等,最后对最新的web 安全十大威胁做了简单的介绍。