{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:11:55Z","timestamp":1742940715562,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_36","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"430-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing"],"prefix":"10.1007","author":[{"given":"Quan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yonghong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"36_CR1","unstructured":"Cabuk, S.: Network covert channels: design, analysis, detection, and elimination. ETD Collection for Purdue University (2006)"},{"issue":"2","key":"36_CR2","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/TSE.1987.233153","volume":"13","author":"CG Girling","year":"1987","unstructured":"Girling, C.G.: Covert channels in LAN\u2019s. IEEE Trans. Softw. Eng. 13(2), 292\u2013296 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"36_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1513601.1513604","volume":"12","author":"S Cabuk","year":"2009","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert channel detection. ACM Trans. Inf. Syst. Secur. 12(4), 1\u201329 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"36_CR4","unstructured":"Peng, P., Ning, P., Reeves, D.S.: On the secrecy of timing-based active watermarking trace-back techniques. In: IEEE Symposium on Security and Privacy (S&P), vol. 15 (2006)"},{"issue":"6","key":"36_CR5","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TDSC.2010.46","volume":"8","author":"S Gianvecchio","year":"2011","unstructured":"Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Secure Comput. 8(6), 785\u2013797 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"36_CR6","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","volume":"13","author":"PL Shrestha","year":"2016","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., Sharif, H.: A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Secure Comput. 13(2), 274\u2013283 (2016). https:\/\/doi.org\/10.1109\/TDSC.2015.2423680","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.neucom.2017.02.004","volume":"239","author":"L Chen","year":"2017","unstructured":"Chen, L., Li, Z., Yang, J.F.: Compressive perceptual hashing tracking. Neurocomputing 239, 69\u201380 (2017)","journal-title":"Neurocomputing"},{"key":"36_CR8","unstructured":"Neelima, A., Singh, K.M., et al.: Perceptual hash function based on scale-invariant feature transform and singular value decomposition. Comput. J. 59(9), 1275\u20131281 (2016)"},{"issue":"7","key":"36_CR9","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2015","unstructured":"Wang, X., Pang, K., Zhou, X., et al.: A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Forensics Secur. 10(7), 1336\u20131349 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9\u201310","key":"36_CR10","doi-asserted-by":"publisher","first-page":"3672","DOI":"10.1080\/01431161.2018.1552812","volume":"40","author":"J Ji","year":"2019","unstructured":"Ji, J., Yao, Y., Wei, J., Han, L., et al.: Perceptual hashing for SAR segmentation. Int. J. Remote Sens. 40(9\u201310), 3672\u20133688 (2019)","journal-title":"Int. J. Remote Sens."},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.sigpro.2017.07.019","volume":"142","author":"C Qin","year":"2018","unstructured":"Qin, C., Sun, M., Chang, C.: Perceptual hashing for color images based on hybrid extraction of structural features. Signal Processing 142, 194\u2013205 (2018)","journal-title":"Signal Processing"},{"key":"36_CR12","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.neucom.2017.07.019","volume":"272","author":"W Fang","year":"2018","unstructured":"Fang, W., Hu, H.M., Hu, Z.H.: Perceptual hash-based feature description for person re-identification. Neurocomputing 272, 520\u2013531 (2018)","journal-title":"Neurocomputing"},{"issue":"1","key":"36_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10207-013-0211-z","volume":"13","author":"N Saikia","year":"2013","unstructured":"Saikia, N., Bora, P.K.: Perceptual hash function for scalable video. Int. J. Inf. Secur. 13(1), 81\u201393 (2013). https:\/\/doi.org\/10.1007\/s10207-013-0211-z","journal-title":"Int. J. Inf. Secur."},{"key":"36_CR14","unstructured":"Major, R.D.: Pre-distribution identification of broadcast television content using audio fingerprints (2014)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Yang, G., Chen, X., Yang, D.: Efficient music identification by utilizing space-saving audio fingerprinting system. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2014)","DOI":"10.1109\/ICME.2014.6890236"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), pp. 178\u2013187 (2004)","DOI":"10.1145\/1030083.1030108"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Sellke, S.H., Wang, C.-C., Bagchi, S., Shroff, N.: TCP\/IP timing channels: theory to implementation. IEEE INFOCOM, 2204\u20132212 (2009)","DOI":"10.1109\/INFCOM.2009.5062145"},{"key":"36_CR18","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Proceedings of the 15th USENIX Security Symposium. 59\u201375 (2006)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:49:59Z","timestamp":1612828199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}