Welcome to Information Security and Computer Fraud

Information Security and Computer Fraud is a peer-reviewed, open access journal that provides rapid publication of articles in all areas of information security and computer fraud. The goal of this journal is to provide a platform for scientists and academicians all over the world to promote, share, and discuss various new issues and developments in different areas of information security and computer fraud.

ISSN (Print): 2376-9602

ISSN (Online): 2376-9629

Editor-in-Chief: Sergii Kavun

Website: http://www.sciepub.com/journal/ISCF

   

Article

The Security File System in Smart TV Operating System

1School of Electronic Information Engineering, Tianjin University, Tianjin, China

2Tianjin Broadcast and Television Network Co., Ltd


Information Security and Computer Fraud. 2014, 2(3), 48-51
doi: 10.12691/iscf-2-3-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Wang Xin, Yao Suying. The Security File System in Smart TV Operating System. Information Security and Computer Fraud. 2014; 2(3):48-51. doi: 10.12691/iscf-2-3-3.

Correspondence to: Wang  Xin, School of Electronic Information Engineering, Tianjin University, Tianjin, China. Email: pyhiloveyou@126.com

Abstract

Modern smart TV devices have put a wealth of information and ever increasing opportunities for social interaction at the fingertips of users. At the center of this revolution are smart phone, smart TV and tablet computers, which give people a nearly constant connection to the Internet. As smart TV usage increases, more developers become involved in implementing application for smart TV. Security for application running on the smart TV is important. The smart TV operating system provides great flexibility not only for application developers but also for users. Most of Smart TV Operating Systems are open source operating system designed for Digital TV available on a variety of smart TV devices. As with PCs, there are a variety of security threats that can affect the smart TV device such as application based threat, web based threat, network based threat and file data threat. In this paper, we mainly focus on file data threat, in order to keep the data integrity the information should not be amended, damaged and loss in transmission process. We present the security file system in the Smart TV Operating System.

Keywords

References

[1]  Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “Security control for TVOS”, 2014 2nd Asian Pacific Conference on Mechatronics and Control Engineering.
 
[2]  Wang Xin, Yao Suying, Wang Xu, Chen Delin, Sun Jun, Hua Zhong, Wang Dongfei, “TVOS Content Security Analysis and Protection in Smart TV”, 2014 2nd International Conference on Mechatronics and Control Engineering.
 
[3]  Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “The Security Model of Broadcast Illtelligent Terminal Application and Technology Realization on TVOS”, 2014 2nd International Conference on Mechatronics and Control Engineering.
 
[4]  Felix Rohrer, Nebiyu Feleke, Yuting Zhang, Kenneth Nimley,Lou Chitkushev, Tanya Zlateva1. Android Security Analysis and Protectionin Finance and Healthcare. //Boston University MET
 
[5]  ChenDelin, Li Zheng, Wang Ying, Zhao Liangfu, Zhang Dingjing. “The main technical characteristics and software architecture of NGB TVOS”, “Radio and television information”, 2013-10National Academy of Broadcasting Science
 
Show More References
[6]  NGB TVOS1.0 Version of cooperation and development. The next generation of radio and television (NGB) Intelligent Technology TV operating system v1.0.0, the State Press and Publication Administration
 
[7]  GY/T267-2012.NGB Technical specification of terminal middleware, the State Press and Publication Administration
 
[8]  Wang Mingmin, Zhu Yunbin. “To explore the implementation model and techniques of intelligent television terminal security under NGB environment”, “Radio and TV Technology”, 2012-10.
 
[9]  Ning Hua, Li Wei, Wang Kun, Lei Mingyu. “Research on intelligent terminal security system”, “Modern telecommunication technology”, 2012-5.
 
[10]  Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, P.Madhusudan. Verifying Security Invariants in ExpressOS // University of Illinois at Urbana-Champaign
 
[11]  Bernhard J. Berger, Michaela Bunke, and Karsten Sohr. An Android Security Case Study with Bauhaus // 2011 18th Working Conference on Reverse Engineering.
 
[12]  Zhiguo Wan, Jun’e Liu, Rui Zhang, and Robert H. Deng. “A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting” // IEEE TRANSACTIONS ON MULTIMEDIA VOL. 15,NO. 6, OCTOBER 2013
 
[13]  Eun-Jun Yoon, Kee-Young Yoo. “ECC-based Key Exchange Protocol for IPTV Service” // ICIC 2011
 
[14]  Stephen D. WolthusenFraunhofer-IGD. “Security Policy Enforcement at the File System Level in the Windows NT Operating System Family”.
 
[15]  Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek. “Dual RSA and Its Security Analysis” //IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 8, AUGUST 2007.
 
Show Less References

Article

Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey

1Computer Engineering Department, American University of the Middle East, Egaila, Kuwait


Information Security and Computer Fraud. 2015, 3(1), 1-7
doi: 10.12691/iscf-3-1-1
Copyright © 2015 Science and Education Publishing

Cite this paper:
Chadi RIMAN, Pierre E. ABI-CHAR. Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey. Information Security and Computer Fraud. 2015; 3(1):1-7. doi: 10.12691/iscf-3-1-1.

Correspondence to: Pierre  E. ABI-CHAR, Computer Engineering Department, American University of the Middle East, Egaila, Kuwait. Email: chadi.riman@aum.edu.kw, Pierre.abichar@aum.edu.kw

Abstract

Nowadays, network security is increasing rapidly and becoming an important and challenging issue. Information and internet security threats and attacks are becoming difficult to be detected. Therefore, encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. In this paper we implemented four encrypt techniques AES, DES, 3DES and E-DES algorithms and compared their performance. A comparative analysis on the above symmetric encryption algorithms has been made. These algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Experiments results are given to analyses the effectiveness of each algorithm. The comparison is made on the basis of these parameters: speed, block size, and key size etc. Educational-DES has better performance than other DES, 3DES, and AES algorithms.

Keywords

References

[1]  Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, pp. 280-286, December 2008.
 
[2]  W. Stallings, Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, 2006.
 
[3]  Singh S Preet, Mani Raman, “Comparison of Data Encryption Algorithms”, International Journal of Computer science and Communications, Vol. 2, No.1, January-June 2011, pp. 125-127.
 
[4]  Cornwell Jason W, “Blowfish Survey”, Department of Computer science, Columbus State university, Columbus, GA, 2010.
 
[5]  Tamimi A. Al., “Performance Analysis of Data Encryption Algorithms”, Oct 2008.
 
Show More References
[6]  Nadeem Aamer, “Performance Comparison of Data Encryption Algorithms”, Oct 2008.
 
[7]  Dhawan Priya, “Performance Comparison: Security Design Choices”, Microsoft Developer Network October 2002.
 
[8]  Singh Gurjeevan, Kumar Ashwani, Sandha K.S. “A Study of New Trends in Blowfish Algorithm” International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.321-326.
 
[9]  Agrawal Monika, Mishra Pradeep, “A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pp. 877-882.
 
[10]  Seth Shashi Mehrotra, Mishra Rajan, “Comparative analysis of Encryption algorithm for data communication”, International Journal of Computer Science and Technology, vol. 2, Issue 2, June 2011, pp. 292-294.
 
[11]  Mandal Pratap Chandra, “Superiority of Blowfish Algorithm” IJARCSSE, volume 2, Issue 9, September 2012, pp. 196-201.
 
[12]  Apoorva, Kumar Yogesh, “Comparative Study of Different Symmetric Key Cryptography”, IJAIEM, vol. 2, Issue 7, July 2013, pp. 204-206.
 
[13]  Abdul D.S, Kader H.M Abdul, Hadhoud, M.M., “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA, Volume 8, 2009, pp. 58-64
 
[14]  Thakur Jawahar, Kumar Nagesh. “DES, AES and Blowfish Symmetric Key Cryptography algorithm Simulation Based Performance Analysis”, IJETAE, vol. 1, Issue 2, DEC. 2011, pp. 6-12.
 
[15]  Marwaha Mohit, Bedi Rajeev, Singh Amritpal, Singh Tejinder, “Comparative Analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology/IV/III/July-Sep, 2013/16-18.
 
[16]  Alam Md Imran, Khan Mohammad Rafeek. “Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013, pp.713-720.
 
[17]  Saini Bahar, “Survey On Performance Analysis of Various Cryptographic Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 4, April 2014, pp. 1-4.
 
[18]  Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, Journal Of Computing, Volume 2, ISSUE 3, pp. 152-157, March 2010.
 
[19]  Priyanka Arora, Arun Singh and Himanshu Tiyagi, “Evaluation and Comparison of Security Issues on Cloud Computing Environment”, World of Computer Science and Information Technology Journal (WCSIT), Vol. 2, No. 5, pp. 179-183, 2012.
 
[20]  W. Tuchman, A Brief History of the Data Encryption Standard, Internet besieged: countering cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co. New York, NY, USA, 1998, pp. 275-280.
 
[21]  http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_4-2/goodbye_des.html.
 
[22]  http://www.differencebetween.net/technology/difference-between-des-and-aes/.
 
[23]  C. Riman and H. Hallal. “DES Based Educational Data Encryption System”, International Conference on Security and Management SAM 2013 (WORLDCOMP’13), Las Vegas, USA, July 2013.
 
Show Less References

Article

Novel Chaos Based Steganography for Images Using Matrix Encoding and Cat Mapping Techniques

1Department of CSE K.S.R.M College of Engineering Kadapa, Y.S.R. District., A.P., India


Information Security and Computer Fraud. 2015, 3(1), 8-14
doi: 10.12691/iscf-3-1-2
Copyright © 2015 Science and Education Publishing

Cite this paper:
V. Lokeswara Reddy. Novel Chaos Based Steganography for Images Using Matrix Encoding and Cat Mapping Techniques. Information Security and Computer Fraud. 2015; 3(1):8-14. doi: 10.12691/iscf-3-1-2.

Correspondence to: V.  Lokeswara Reddy, Department of CSE K.S.R.M College of Engineering Kadapa, Y.S.R. District., A.P., India. Email: VL_REDDY@YAHOO.COM

Abstract

Steganography is an ancient technique of data hiding. Steganography is a technique in which secret data is hidden into vessel image without any suspicion. Most of the traditional approaches are achieving limited data hiding. To expand the information covering up proposed mechanism uses various techniques. Proposed mechanism is increasing the info disappearing ability and also provides high imperceptibility towards steganalysis. The key goal connected with steganography is usually providing the protection for hidden information from adversary. The integrity and confidentiality of the electronic information offers occur underneath immense hazard. Steganography will be the art along with technology associated with coated composing. Steganography utilizes text, pictures, audio tracks, video etc. as being a protect moderate. The proposed mechanism is based on image steganography technique. It is implemented based on the Canny Edge Detection. Pixel positions of edges in conjunction with Chaotic Cat Mapping [10] are used for the steganography technique. Proposed mechanism is using edge adaptive image steganography [3] by combining the benefits of matrix encoding and LSBM [8,9].

Keywords

References

[1]  John Shrewd, “A computational way to deal with edge identification”, IEEE Exchanges on pattern analysis and Machine Intelligence, Vol. 8, No. 6, pp.679-698, Nov. 198.
 
[2]  Ron Crandall, “Some Notes on Steganography”, Posted on Steganography Mailing List, 1998. Source: http://www.dia.unisa.it/~ads/corsosecurity/ www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf
 
[3]  Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010, pp. 201-214.
 
[4]  Grant Kelly, Bruce McKenzie, “Security, privacy and confidentiality issues on the internet”, Source: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937.
 
[5]  C.V. Serdean, M. Tomlinson, J. Wade, A.M. Ambroze, “Protecting Intellectual Rights: Digital Watermarking in the wavelet domain”, IEEE Int. Workshop Trends and Recent Achievements in IT, pp. 16-18, 2002.
 
Show More References
[6]  Ratnakirti Roya,*, Anirban Sarkara, Suvamoy Changdera, “Chaos based Edge Adaptive Image Steganography”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013.
 
[7]  Qian-chuan Zhong, Qing-xin Zhu , Ping-Li Zhang , “A Spatial Domain Color Watermarking Scheme based on Chaos”, International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 137-142, 2008.
 
[8]  X. Li, B. Yang, D. Cheng, and T. Zeng, “A generalization of lsb matching”, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009.
 
[9]  R. L. Tataru, D. Battikh, S. El Assad, H. Noura, O. Deforges, “Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences”, Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 85-88, 2012.
 
[10]  Sahar Mazloom, Amir-Masud Eftekhari-Moghadam, “Color Image Cryptosystem using Chaotic Maps”, IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing, pp. 142-147, 2011.
 
[11]  Chen Wei-bin, Zhang Xin, “Image Encryption Algorithm based on Henon Chaotic System”, International Conference on Image Analysis and Signal Processing (IASP), pp. 94-97, 2009.
 
Show Less References