Forthcoming articles

 


International Journal of Information Privacy, Security and Integrity

 

These articles have been peer-reviewed and accepted for publication in IJIPSI, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJIPSI are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Information Privacy, Security and Integrity (4 papers in press)

 

Regular Issues

 

  • A SECURE ONE TIME PASSWORD PROTOCOL SCHEMA   Order a copy of this article
    by Nawaf Aljohani, Joseph Shelton, Kaushik Roy 
    Abstract: Since the invention of the internet, text-based passwords have been utilized to authenticate users. This method is the most prevalent form of authentication but it has many drawbacks. An alternative password protocol is necessary to overcome the drawbacks in the traditional password system. This research proposes a novel password protocol that overcomes most password attacks. This research highlights many password attacks and shows how the proposed protocol mitigates them. Instead of a single static password being used to authenticate an individual, passwords are created based on the users input in three password boxes and the proposed protocol reorders the textboxes randomly. A hacker can capture a password generated by login requests, but password attacks will be mitigated due to the non-deterministic random order in each login request. The proposed password protocol architecture makes any captured data worthless.
    Keywords: Text-based passwords; Password schema; Password-based authentication; Static password; Keyloggers; Observe attack; Guessing attack; Intercepting network; Non-deterministic.

  • Extending Disposable Feature Templates for Mitigating Replay Attacks   Order a copy of this article
    by Joseph Shelton, John Jenkins, Kaushik Roy 
    Abstract: Replay attacks on biometric based access control systems are dangerous if counter-measures are not instilled to mitigate these attacks. An attacker can capture packets along an unsecure network and replay them at a later time to gain unauthorized access. Traditional biometric systems use a single feature extraction method to represent an individual, making captured data hard to change. Previous work has been done to represent an individual using a set of randomly chosen, unique extractors for each access attempt. However, there are a limited number of unique extractors that can be created. This work seeks to extend the number of unique representations that can be created by evolving a set of unique masks to apply on unique representations of templates. The results on this work shows that templates with masks applied on them are unique enough from one another to mitigate replay attacks while maintaining a high recognition accuracy.
    Keywords: periocular recognition; genetic and evolutionary computations; feature extraction; feature selection; cyber security; biometrics; artificial intelligence; replay attacks; privacy; authentication.

  • Security and Privacy Implications of Do Not Track   Order a copy of this article
    by Alexander Pons, Andrew Del A Rosa, Silvia Vidaurre, Luis Vargas, Eugene Pons 
    Abstract: In todays world where the lines between privacy and security are becoming blurred, what control if any is maintained by the consumer. User privacy in regards to internet tracking is a new and continuous topic among many technological discussions. While this issue is fairly new, the discussion on topics related to privacy and user tracking have existed for some time. As technology progresses, transparency on the manner in which user information is acquired and applied to formulate a user profile, is an issue of concern. Many companies promote their adherence to privacy and their respect towards the Do Not Track option available in most browsers, but how much transparency in the process is afforded to the consumer. The study conducted focuses on the level of understanding consumers have in regards to privacy issues and the cost and benefit of implementing a technology that users might not understand or use.
    Keywords: Privacy; Security; Internet; Web; Tracking; Awareness; Marketing; Digital footprint.

  • Text Based Steganography   Order a copy of this article
    by Robert Lockwood, Kevin Curran 
    Abstract: Steganography is the art of hiding information within other less conspicuous information to prevent eavesdropping by way of hiding its existence in the first place. Image based steganography is the most common form but text based steganography can also be used. Text Based Steganography can be generally classified as format based, linguistic and random/statistical generation. In general random and statistical generated methods create a cover text but do not necessarily make semantic sense; that is the subject matter of each sentence has little or no relation to the next sentence. Linguistic Steganography can use natural language processing to hide information but again is still subject to analysis particularly if the basis for the cover text is an existing document. Here we examine the leading methods of text based steganography. We evaluate a variety of steganographic techniques including Open Space Encoding, Synonym Replacement, UK / US English Translation Algorithm and Wayners Mimic Functions using five benchmarks which compare speed, capacity, complexity, compromisability and size. We find that the best methods to hide information should not use a single scheme, but a hybrid of many schemes. In order to further hide information, text should be compressed, encrypted and then hidden in a cover document.
    Keywords: Steganography; Text based steganography; cryptography; security.