Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks
نویسندگان
چکیده
The most common digital media exchanged via the Internet is in text form. Arabic language considered one of sensitive languages content modification due to presence diacritics that can cause a change meaning. In this paper, an intelligent scheme proposed for improving reliability and security Internet. core mechanism depends on integrating hidden Markov model zero watermarking techniques. watermark key will be generated by utilizing extracted features analysis process using third order word level model. Embedding detection processes performed logically without effect original text. implemented PHP with VS code IDE. simulation results, varying sizes standard datasets, show obtain high provide better accuracy illegal tampering attacks. Comparison results other baseline techniques added value scheme.
منابع مشابه
Securing Circuits against Constant-Rate Tampering
We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. (Eurocrypt 2006), we consider adversaries who may choose an arbitrary set of wires to corrupt, and may set each such wire to 0 or to 1, or may toggle with the wire. We prove that such adversaries, who continuously tam...
متن کاملGaussian Mixture Modeling for Detecting Integrity Attacks in Smart Grids
The thematics focusing on inserting intelligence in cyber-physical critical infrastructures (CI) have been receiving a lot of attention in the recent years. This paper presents a methodology able to differentiate between the normal state of a system composed of interdependent infrastructures and states that appear to be normal but the system (or parts of it) has been compromised. The system und...
متن کاملLearning under p-Tampering Attacks
Recently, Mahloujifar and Mahmoody (TCC’17) studied attacks against learning algorithms using a special case of Valiant’s malicious noise, called p-tampering, in which the adversary gets to change any training example with independent probability p but is limited to only choose ‘adversarial’ examples with correct labels. They obtained p-tampering attacks that increase the error probability in t...
متن کاملSecuring Against Insider Attacks
e are all creatures of habit; the way we think and the views we take are conditioned by our education, society as a whole, and, at a much deeper level, our cultural memories or instinct. It is sometimes surprising how much the past can unconsciously affect today’s thinking. George Santayana famously observed, “Those who cannot remember the past are condemned to repeat it.” But when it comes to ...
متن کاملCumulative Sum Algorithm for Detecting SYN Flooding Attacks
SYN flooding attacks generate enormous packets by a large number of agents and can easily exhaust the computing and communication resources of a victim within a short period of time. In this paper, we propose a lightweight method for detecting SYN flooding attack by non-parametric cumulative sum algorithm. We experiment with real SYN flooding attack data set in order to evaluate our method. The...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.019594