Skip to main content

Showing 1–6 of 6 results for author: Orozco, A L S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.07891  [pdf

    cs.CV cs.CR cs.LG

    Digital Video Manipulation Detection Technique Based on Compression Algorithms

    Authors: Edgar Gonzalez Fernandez, Ana Lucila Sandoval Orozco, Luis Javier Garcia Villalba

    Abstract: Digital images and videos play a very important role in everyday life. Nowadays, people have access the affordable mobile devices equipped with advanced integrated cameras and powerful image processing applications. Technological development facilitates not only the generation of multimedia content, but also the intentional modification of it, either with recreational or malicious purposes. This i… ▽ More

    Submitted 3 February, 2024; originally announced March 2024.

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, Vol. 23, No. 3, pp. 2596-2605, December 2021

  2. Adaptive Artificial Immune Networks for Mitigating DoS flooding Attacks

    Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: Denial of service attacks pose a threat in constant growth. This is mainly due to their tendency to gain in sophistication, ease of implementation, obfuscation and the recent improvements in occultation of fingerprints. On the other hand, progress towards self-organizing networks, and the different techniques involved in their development, such as software-defined networking, network-function virt… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Journal ref: J. Maestre Vidal, A. L. Sandoval Orozco, L. J. García Villalba: Adaptive Artificial Immune Networks for Mitigating DoS Flooding Attacks. Swarm and Evolutionary Computation. Vol. 38, pp. 3894-108, February 2018

  3. Compression effects and scene details on the source camera identification of digital videos

    Authors: Raquel Ramos López, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: The continuous growth of technologies like 4G or 5G has led to a massive use of mobile devices such as smartphones and tablets. This phenomenon, combined with the fact that people use mobile phones for a longer period of time, results in mobile phones becoming the main source of creation of visual information. However, its reliability as a true representation of reality cannot be taken for granted… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Journal ref: Expert Systems with Applications, Vol. 170, pp. 114515, May 2021

  4. arXiv:2402.06661  [pdf

    cs.CR cs.LG cs.MM eess.IV

    Authentication and integrity of smartphone videos through multimedia container structure analysis

    Authors: Carlos Quinto Huamán, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: Nowadays, mobile devices have become the natural substitute for the digital camera, as they capture everyday situations easily and quickly, encouraging users to express themselves through images and videos. These videos can be shared across different platforms exposing them to any kind of intentional manipulation by criminals who are aware of the weaknesses of forensic techniques to accuse an inno… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Journal ref: Quinto Huamán, A. L. Sandoval Orozco, L. J. García Villalba: Authentication and Integrity of Smartphone Videos Through Multimedia Container Structure Analysis. Future Generation Computer Systems. Vol. 108, pp. 15-33, July 2020

  5. A security framework for Ethereum smart contracts

    Authors: Antonio López Vivar, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Abstract: The use of blockchain and smart contracts have not stopped growing in recent years. Like all software that begins to expand its use, it is also beginning to be targeted by hackers who will try to exploit vulnerabilities in both the underlying technology and the smart contract code itself. While many tools already exist for analyzing vulnerabilities in smart contracts, the heterogeneity and variety… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Journal ref: Computer Communications. Vol. 172, pp. 119-129, April 2021

  6. arXiv:1101.5411  [pdf, ps, other

    cs.DM

    Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes

    Authors: Luis Javier García Villalba, José René Fuentes Cortez, Ana Lucila Sandoval Orozco, Mario Blaum

    Abstract: In a previous work it was shown that the best measure for the efficiency of a single burst-correcting code is obtained using the Gallager bound as opposed to the Reiger bound. In this paper, an efficient algorithm that searches for the best (shortened) cyclic burst-correcting codes is presented. Using this algorithm, extensive tables that either tie existing constructions or improve them are obtai… ▽ More

    Submitted 27 January, 2011; originally announced January 2011.