Cipher-Text Classification with Data Mining

被引:0
|
作者
Khadivi, Pejman [1 ]
Momtazpour, Marjan [1 ]
机构
[1] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan 8415683111, Iran
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography plays an important role in information technology. With the explosive growth of Internet, the importance of information and network security is increased. The principle goal of cryptography is information hiding and block-cipher algorithms achieve this goal through information recoding. However, various kinds of information have distinctive features, which are employed in classification tasks. If these features are transformed to the cipher-text, cipher-texts may be classified to their original classes. In this paper, a classification strategy is proposed for cipher-text classification. The proposed strategy is evaluated through simulations. Different classifiers (SVM, KNN, and LDA) are used for this purpose.
引用
收藏
页码:64 / 66
页数:3
相关论文
共 50 条
  • [1] Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks
    Hariss, Khalil
    Noura, Hassan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 14403 - 14449
  • [2] Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud
    Ibrahim, Zaid Abdulsalam
    Ilyas, Muhammad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (01): : 939 - 956
  • [3] Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks
    Khalil Hariss
    Hassan Noura
    [J]. Multimedia Tools and Applications, 2022, 81 : 14403 - 14449
  • [4] Cipher-text only attack on hopping window time domain scramblers
    Ghasemzadeh, Hamzeh
    Mehrara, Hamed
    Khas, Mehdi Tajik
    [J]. 2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2014, : 194 - 199
  • [5] A location privacy protection method based on cipher-text retrieval in cloud environment
    Zhang, Yongbing
    Zhang, Qiuyu
    Jiang, Yilong
    Yan, Yan
    [J]. SECURITY AND PRIVACY, 2022, 5 (05)
  • [6] A fine-grained reversible data hiding in encrypted domain based on the cipher-text redundancy of encryption process
    Kong, Yong-jun
    Zhang, Min-qing
    Jiang, Zong-bao
    Zhang, Xiong
    Jiang, Chao
    Di, Fu-qiang
    [J]. HELIYON, 2024, 10 (11)
  • [7] A technology of text classification of data mining
    Yang, Bin
    Meng, Zhi-qing
    [J]. Xiangtan Daxue Ziran Kexue Xuebao, 2001, 23 (04): : 34 - 37
  • [8] Research and Implementation of Security Cipher-text Clustered Index Based on B plus Tree
    Zhang, Kejun
    Zhang, Guoliang
    Jiang, Chen
    Yang, Yunsong
    [J]. 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 274 - 278
  • [9] Combining text mining and data mining for bug report classification
    Zhou, Yu
    Tong, Yanxiang
    Gu, Ruihang
    Gall, Harald
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2016, 28 (03) : 150 - 176
  • [10] Combining Text Mining and Data Mining for Bug Report Classification
    Zhou, Yu
    Tong, Yanxiang
    Gu, Ruihang
    Gall, Harald
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2014, : 311 - 320