Reliable detection of compressed and encrypted data
نویسندگان
چکیده
Abstract Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted fragments. Typically, current approaches employ statistics derived from byte-level distribution, entropy estimation, However, modern content types use compression techniques which alter distribution pushing it closer the uniform distribution. The result is that exhibit unreliable encryption detection performance when compressed appear in dataset. Furthermore, proposed are typically evaluated over few fragment sizes, making hard assess their practical applicability. This paper compares existing statistical tests on a large, standardized dataset shows consistently fail distinguish both small large sizes. We address these shortcomings design EnCoD , learning-based classifier can data. evaluate of 16 different file sizes ranging 512B 8KB. Our results highlight outperforms by wide margin, with accuracy $$\sim 82\%$$ ∼ 82 % for fragments up 92\%$$ 92 8KB Moreover, pinpoint exact format given fragment, rather than performing only binary classification like previous approaches.
منابع مشابه
Encrypted Reversible Data Hiding on Compressed Image
The paper presents a new approach in Image steganography. Information security is the important research field. Steganography process hides message into cover file and forms a stego file. In image steganography there is a need of method which will increase the security, reduce the distortion in the stego file and recovers the data without any loss. In the era of multimedia and internet there is...
متن کاملReliable Distortion Detection in Compressed Fingerprint Videos
Distortions in fingerprint images arising due to the elasticity of fingerprints and pressure and movement of fingers during image capture lead to great difficulties in establishing a match between two images of a single fingerprint. In this paper, we propose a novel approach to detect and estimate distortion occurring in fingerprint videos. Our approach directly works on MPEG1,2 encoded fingerp...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملBlockiness detection in compressed data
A novel frequency domain technique for image blocking artifact detection is presented in this paper. The algorithm detects the regions of the image which present visible blocking artifacts. This detection is performed in the frequency domain and uses the estimated relative quantization error calculated when the DCT coefficients are modeled by a Laplacian probability function. Experimental resul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Neural Computing and Applications
سال: 2022
ISSN: ['0941-0643', '1433-3058']
DOI: https://doi.org/10.1007/s00521-022-07586-7