Preface

With the exponential growth of wireless communications, the Internet of Things (IoT), cloud computing, and the increasingly important roles played by electronic commerce in business and industry, information security and privacy in communication, computing, and storage are increasingly becoming the most critical challenges in technology innovation. Information security is the key prerequisite for the sustained development and successful exploitation of information technology since only a robust and secure information system can ensure access control, the confidentiality of data, user authentication, integrity, non-repudiation, and privacy. However, with the mind-boggling evolution and transformation of the communication and computing world, there has been a paradigm change in the field of information security as well. The context and purview of security have moved from a narrow and bounded environment encompassing a known and disciplined user community to one of worldwide scope with a body of users that is largely unknown and not necessarily trusted. Importantly, security control now must deal with circumstances over which there is largely no control. In this regard, information security exhibits a similarity with liability assurance. They both operate in a threat environment generally known at the top level, including attacks over a broad spectrum of sources. However, the real challenge they face is that the exact details and time of an attack are unknown until an incident occurs. It is not difficult to understand why the field of security has become increasingly complex with the evolution of new communication and computing technologies.

On the other hand, data privacy protection has the objective of safeguarding sensitive personal information from any unauthorized access or accidental disclosure. While access control mechanisms may serve as privacy preservation methods, the issue of data privacy is far more complex, involving ethics and trust. In the era of ubiquitous and pervasive computing and communication, and with the advent of artificial intelligence, applications have the increasing capability of tracking, analyzing, predicting, and even manipulating the behavior of humans. This has created an unprecedented challenge to the technology and systems for privacy protection. For protecting the privacy of sensitive user data, Privacy by Design is a key principle that organizations have started implementing so that the technical and organizational measures and controls are taken care of right at the design phase of any information processing system.

The chapters of this volume highlight different schemes and methods of cryptography, privacy preservation of data, watermarking methods to defend against various attacks on digital artworks, and role-based access controls. The subject matter discussed in these chapters illustrates the complexities involved in the algorithms, protocols, and architectures of different security and privacy protection systems and their various applications in the real world.

In Chapter 1, "Introductory Chapter: Data Privacy Preservation on the Internet of Things", Jaydip Sen and Subhasis Dasgupta present a short survey of the existing machine learning-based approaches and mechanisms for the privacy preservation of data in the IoT. The authors discuss various systems built on centralized architectures and distributed encryption mechanisms for protecting the privacy of sensitive user data in the IoT environment. The chapter also discusses some emerging trends and future directions of research in the field of data privacy.

In Chapter 2, "Adversarial Attacks on Image Classification Models: FGSM and Patch Attacks and Their Impact", Jaydip Sen and Subhasis Dasgupta discuss the concept of adversarial attacks on convolutional neural network-based image classification models. The authors focus on two specific attacks, the fast gradient sign method (FGSM) and the adversarial patch attack, and illustrate how adversely these attacks can affect the accuracy of three powerful pre-trained image classification models.

In Chapter 3, "Recent Results on Some Word Oriented Stream Ciphers: SNOW 1.0, SNOW 2.0 and SNOW 3G", Nandi et al. propose three word-oriented stream ciphers: SNOW 1.0, SNOW 2.0, and SNOW 3G. The authors discuss each protocol's working principle, implementation details, and security analysis. The security analysis made by the authors also includes all possible security vulnerabilities to which these three protocols are exposed. Finally, the authors argue that since SNOW 3G is the protocol for ensuring confidentiality and integrity protection to the users and messages in the telecom networks including 3G, 4G, and 5G systems, a thorough understanding of its security vulnerabilities and cryptanalysis is vital.

In Chapter 4, "Role of Access Control in Information Security: A Security Analysis Approach", Mahendra Pratap Singh presents a propositional logic-based framework for analyzing a role-based access control (RBAC) system that uses machine learning algorithms. The approach proposed by the author establishes relationships between RBAC policies and security policies by mapping them through propositional rules. The chapter demonstrates the effectiveness of the proposition on various datasets with defined RBAC policies.

In Chapter 5, "Enhanced Hybrid Privacy Preserving Data Mining Technique", Kundeti et al. propose a privacy-preserving data mining scheme called enhanced hybrid privacy preserving data mining (EHPPDM). The proposed approach integrates various approaches to privacy protection such as randomization, perturbation, anonymization, and so on. The experimental results show that the proposed hybrid approach is more effective in protecting the privacy of the users compared to the individual approaches.

In Chapter 6, "Review on Watermarking Techniques Aiming Authentication of Digital Image Artistic Works Minted as NFTs into Blockchains", Joceli Mayer presents an overview of various watermarking techniques for defending against attacks on digital artworks such as images, videos, and animations. Digital piracy attacks infringe on the authenticity of such artworks and can have a very detrimental effect. Because of this, the author analyzes the watermarking mechanisms from the point of view of their transparency, robustness, and payload. In particular, the author discusses the fragile watermarking techniques, spread spectrum, and least significant bits technique. Moreover, the author discusses a secure certification protocol for watermarking that is used with NFT minting for ensuring more robustness and security.

In Chapter 7, "Perspective Chapter: Text Watermark Analysis – Concept, Technique, and Applications", Preethi Nanjundan and Jossy P. George discuss various theories and methods involved in text watermarking and their applications. Some of the research challenges in this field including protection of information integrity, information accessibility, preservation of originality of the content, information security, and preservation of the privacy of data are also highlighted.

**V**

memory requirement.

Finally, in Chapter 8, "Application of Computational Intelligence in Visual Quality Optimization Watermarking and Coding Tools to Improve the Medical IoT Platforms Using ECC Cybersecurity Based CoAP Protocol", Allali et al. investigate the possibility and feasibility of a soft computing-based image watermarking method for an IoT framework in the medical and healthcare domain. The proposed scheme can accommodate multiple concurrent users in securely accessing their privacy-sensitive data in public places like stadiums and marketplaces. The scheme, built of digital watermarking and elliptic curve cryptography (ECC), ensures high data communication and storage security while optimizing execution time, bandwidth needed in communication, energy, and

I am hopeful that researchers, engineers, doctoral students, and faculty members of graduate schools and universities working in cryptography, data privacy protection, authentication, and data integrity will find this volume useful. However, this is not a text for beginners in the fields of cryptography, security, and privacy. The chapters in the volume deal with advanced topics and the readers are expected to have the requisite

I sincerely thank all authors for their valuable contributions. It is their cooperation and scholastic contributions that have made the publication of this book possible. I express my thanks to Publishing Process Manager Mr. Dominik Samardzija at IntechOpen for his support, patience, and cooperation during the long period of the publication of the volume. My sincere thanks also go to Commissioning Editor Ms. Mirena Calmic for having faith in me and delegating to me the critical responsibility of editorship of yet another academic volume. I would also like to acknowledge the support and cooperation I received from my faculty colleagues and graduate students of the School of Data Science, Praxis Business School, Kolkata, India. My family members have always been the sources of my inspiration and motivation. I dedicate this volume to my beloved sister, Ms. Nabanita Sen, who unfortunately left us on 27 September 2021 due to the deadly disease of cancer. My sister had always been my pillar of strength. Finally, I gratefully acknowledge the support and motivation I received from my wife Ms. Nalanda Sen, my daughter Ms. Ritabrata Sen, and my mother Ms. Krishna Sen. Without their support, motivation, and inspiration the

> **Jaydip Sen** Professor,

Kolkata, India

**Joceli Mayer** Professor,

Florianópolis, Brazil

Department of Data Science, Praxis Business School,

Department of Electrical Engineering, Federal University of Santa Catarina,

background knowledge of the topics covered in the book.

publication of this volume would not have been possible.

Finally, in Chapter 8, "Application of Computational Intelligence in Visual Quality Optimization Watermarking and Coding Tools to Improve the Medical IoT Platforms Using ECC Cybersecurity Based CoAP Protocol", Allali et al. investigate the possibility and feasibility of a soft computing-based image watermarking method for an IoT framework in the medical and healthcare domain. The proposed scheme can accommodate multiple concurrent users in securely accessing their privacy-sensitive data in public places like stadiums and marketplaces. The scheme, built of digital watermarking and elliptic curve cryptography (ECC), ensures high data communication and storage security while optimizing execution time, bandwidth needed in communication, energy, and memory requirement.

I am hopeful that researchers, engineers, doctoral students, and faculty members of graduate schools and universities working in cryptography, data privacy protection, authentication, and data integrity will find this volume useful. However, this is not a text for beginners in the fields of cryptography, security, and privacy. The chapters in the volume deal with advanced topics and the readers are expected to have the requisite background knowledge of the topics covered in the book.

I sincerely thank all authors for their valuable contributions. It is their cooperation and scholastic contributions that have made the publication of this book possible. I express my thanks to Publishing Process Manager Mr. Dominik Samardzija at IntechOpen for his support, patience, and cooperation during the long period of the publication of the volume. My sincere thanks also go to Commissioning Editor Ms. Mirena Calmic for having faith in me and delegating to me the critical responsibility of editorship of yet another academic volume. I would also like to acknowledge the support and cooperation I received from my faculty colleagues and graduate students of the School of Data Science, Praxis Business School, Kolkata, India. My family members have always been the sources of my inspiration and motivation. I dedicate this volume to my beloved sister, Ms. Nabanita Sen, who unfortunately left us on 27 September 2021 due to the deadly disease of cancer. My sister had always been my pillar of strength. Finally, I gratefully acknowledge the support and motivation I received from my wife Ms. Nalanda Sen, my daughter Ms. Ritabrata Sen, and my mother Ms. Krishna Sen. Without their support, motivation, and inspiration the publication of this volume would not have been possible.

> **Jaydip Sen** Professor, Department of Data Science, Praxis Business School, Kolkata, India

**Joceli Mayer** Professor, Department of Electrical Engineering, Federal University of Santa Catarina, Florianópolis, Brazil

**1**

Section 1

Attacks and Defense

Mechanisms

Section 1
