Skip to main content

Showing 1–8 of 8 results for author: Villalba, L J G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.07891  [pdf

    cs.CV cs.CR cs.LG

    Digital Video Manipulation Detection Technique Based on Compression Algorithms

    Authors: Edgar Gonzalez Fernandez, Ana Lucila Sandoval Orozco, Luis Javier Garcia Villalba

    Abstract: Digital images and videos play a very important role in everyday life. Nowadays, people have access the affordable mobile devices equipped with advanced integrated cameras and powerful image processing applications. Technological development facilitates not only the generation of multimedia content, but also the intentional modification of it, either with recreational or malicious purposes. This i… ▽ More

    Submitted 3 February, 2024; originally announced March 2024.

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, Vol. 23, No. 3, pp. 2596-2605, December 2021

  2. Adaptive Artificial Immune Networks for Mitigating DoS flooding Attacks

    Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: Denial of service attacks pose a threat in constant growth. This is mainly due to their tendency to gain in sophistication, ease of implementation, obfuscation and the recent improvements in occultation of fingerprints. On the other hand, progress towards self-organizing networks, and the different techniques involved in their development, such as software-defined networking, network-function virt… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Journal ref: J. Maestre Vidal, A. L. Sandoval Orozco, L. J. García Villalba: Adaptive Artificial Immune Networks for Mitigating DoS Flooding Attacks. Swarm and Evolutionary Computation. Vol. 38, pp. 3894-108, February 2018

  3. Compression effects and scene details on the source camera identification of digital videos

    Authors: Raquel Ramos López, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: The continuous growth of technologies like 4G or 5G has led to a massive use of mobile devices such as smartphones and tablets. This phenomenon, combined with the fact that people use mobile phones for a longer period of time, results in mobile phones becoming the main source of creation of visual information. However, its reliability as a true representation of reality cannot be taken for granted… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Journal ref: Expert Systems with Applications, Vol. 170, pp. 114515, May 2021

  4. arXiv:2402.06661  [pdf

    cs.CR cs.LG cs.MM eess.IV

    Authentication and integrity of smartphone videos through multimedia container structure analysis

    Authors: Carlos Quinto Huamán, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: Nowadays, mobile devices have become the natural substitute for the digital camera, as they capture everyday situations easily and quickly, encouraging users to express themselves through images and videos. These videos can be shared across different platforms exposing them to any kind of intentional manipulation by criminals who are aware of the weaknesses of forensic techniques to accuse an inno… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Journal ref: Quinto Huamán, A. L. Sandoval Orozco, L. J. García Villalba: Authentication and Integrity of Smartphone Videos Through Multimedia Container Structure Analysis. Future Generation Computer Systems. Vol. 108, pp. 15-33, July 2020

  5. A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences

    Authors: Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García Villalba

    Abstract: This paper introduces a malware detection system for smartphones based on studying the dynamic behavior of suspicious applications. The main goal is to prevent the installation of the malicious software on the victim systems. The approach focuses on identifying malware addressed against the Android platform. For that purpose, only the system calls performed during the boot process of the recently… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Journal ref: Knowledge-Based Systems. Vol. 150, pp. 198-217, June 2018

  6. A security framework for Ethereum smart contracts

    Authors: Antonio López Vivar, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: The use of blockchain and smart contracts have not stopped growing in recent years. Like all software that begins to expand its use, it is also beginning to be targeted by hackers who will try to exploit vulnerabilities in both the underlying technology and the smart contract code itself. While many tools already exist for analyzing vulnerabilities in smart contracts, the heterogeneity and variety… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Journal ref: Computer Communications. Vol. 172, pp. 119-129, April 2021

  7. arXiv:2402.02240  [pdf

    cs.CR stat.CO

    Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes

    Authors: Elena Almaraz Luengo, Luis Javier García Villalba

    Abstract: Security in different applications is closely related to the goodness of the sequences generated for such purposes. Not only in Cryptography but also in other areas, it is necessary to obtain long sequences of random numbers or that, at least, behave as such. To decide whether the generator used produces sequences that are random, unpredictable and independent, statistical checks are needed. Diffe… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

    Journal ref: ACM Computing Surveys, Vol. 54, No. 80, pp. 12420, May 2021

  8. arXiv:1101.5411  [pdf, ps, other

    cs.DM

    Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes

    Authors: Luis Javier García Villalba, José René Fuentes Cortez, Ana Lucila Sandoval Orozco, Mario Blaum

    Abstract: In a previous work it was shown that the best measure for the efficiency of a single burst-correcting code is obtained using the Gallager bound as opposed to the Reiger bound. In this paper, an efficient algorithm that searches for the best (shortened) cyclic burst-correcting codes is presented. Using this algorithm, extensive tables that either tie existing constructions or improve them are obtai… ▽ More

    Submitted 27 January, 2011; originally announced January 2011.