6 research outputs found

    An Efficient Multistage Fusion Approach for Smartphone Security Analysis

    Get PDF
    Android smartphone ecosystem is inundated with innumerable applications mainly developed by third party contenders leading to high vulnerability of these devices. In addition, proliferation of smartphone usage along with their potential applications in diverse field entice malware community to develop new malwares to attack these devices. In order to overcome these issues, an android malware detection framework is proposed wherein an efficient multistage fusion approach is introduced. For this, a robust unified feature vector is created by fusion of transformed feature matrices corresponding to multi-cue using non-linear graph based cross-diffusion. Unified feature is further subjected to multiple classifiers to obtain their classification scores. Classifier scores are further optimally fused employing Dezert-Smarandache Theory (DSmT). Strength of suggested model is assessed both qualitatively and quantitatively by ten-fold cross-validation on the benchmarked datasets. On an average of outcome, we achieved detection accuracy of 98.97% and F-measure of 0.9936.&nbsp

    A Multistage High Capacity Reversible Data Hiding Technique Without Overhead Communication

    Get PDF
    Reversible Data Hiding(RDH) has been extensively investigated, recently, due to its numerous applications in the field of defence, medical, law enforcement and image authentication. However, most of RDH techniques suffer from low secret data hiding capacity and communication overhead. For this, multistage high-capacity reversible data hiding technique without overhead is proposed in this manuscript. Proposed reversible data hiding approach exploits histogram peaks for embedding the secret data along with overhead bits both in plain and encrypted domain. First, marked image is obtained by embedding secret data in the plain domain which is further processed using affine cipher maintaining correlation among the pixels. In second stage, overhead bits are embedded in the encrypted marked image. High embedding capacity is achieved through exploiting histogram peak for embedding multiple bits of secret data. Proposed approach is experimentally validated on different datasets and results are compared with the state-of-the-art techniques over different images

    A Novel Traffic Based Framework for Smartphone Security Analysis

    Get PDF
    Android Operating system (OS) has grown into the most predominant smartphone platform due to its flexibility and open source characteristics. Because of its openness, it has become prone to numerous attackers and malware designers who are constantly trying to elicit confidential information by articulating a plethora of attacks through these designed malwares. Detection of these malwares to protect the smartphone is the core function of the smartphone security analysis. This paper proposes a novel traffic-based framework that exploits the network traffic features to detect these malwares. Here, a unified feature (UF) is created by graph-based cross-diffusion of generated order and sparse matrices corresponding to the network traffic features. Generated unified feature is then given to three classifiers to get corresponding classifier scores. The robustness of the suggested framework when evaluated on the standard datasets outperforms contemporary techniques to achieve an average accuracy of 98.74 per cent
    corecore