{"id":"https://openalex.org/W4407729526","doi":"https://doi.org/10.1186/s42400-024-00300-1","title":"The secret behind instant messaging: video identification attack against complex protocols","display_name":"The secret behind instant messaging: video identification attack against complex protocols","publication_year":2025,"publication_date":"2025-02-20","ids":{"openalex":"https://openalex.org/W4407729526","doi":"https://doi.org/10.1186/s42400-024-00300-1"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00300-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00300-1","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00300-1","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00300-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022518232","display_name":"Ruiqi Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["BD","CN"],"is_corresponding":true,"raw_author_name":"Ruiqi Huang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4210090971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["BD","CN"],"is_corresponding":false,"raw_author_name":"Hua Wu","raw_affiliation_strings":["Purple Mountain Laboratories for Network and Communication Security, Nanjing, No.9, Muozhou East Road, Jiangning District, Nanjing, 211111, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, No.9, Muozhou East Road, Jiangning District, Nanjing, 211111, Jiangsu, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4210090971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056258363","display_name":"Xiaohui Wang","orcid":"https://orcid.org/0000-0002-9706-4240"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["BD","CN"],"is_corresponding":false,"raw_author_name":"Xiaohui Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4210090971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042490620","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0002-6860-4420"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["BD","CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing, 2 Southeast University Road, Nanjing, 211189, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing, 2 Southeast University Road, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4210090971"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4210090971"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["BD","CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No.2, Southeast University Road, Jiangning District, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4210090971"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022518232"],"corresponding_institution_ids":["https://openalex.org/I4210090971","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":1.2134,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76082543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/instant-messaging","display_name":"Instant messaging","score":0.8027054071426392},{"id":"https://openalex.org/keywords/instant","display_name":"Instant","score":0.7169086933135986},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6416475772857666},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6309372186660767},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5774655938148499},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3560921549797058},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28841838240623474},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.06624138355255127}],"concepts":[{"id":"https://openalex.org/C2985487447","wikidata":"https://www.wikidata.org/wiki/Q58199","display_name":"Instant messaging","level":2,"score":0.8027054071426392},{"id":"https://openalex.org/C2779432360","wikidata":"https://www.wikidata.org/wiki/Q16963779","display_name":"Instant","level":2,"score":0.7169086933135986},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6416475772857666},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6309372186660767},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5774655938148499},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3560921549797058},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28841838240623474},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.06624138355255127},{"id":"https://openalex.org/C31903555","wikidata":"https://www.wikidata.org/wiki/Q1637030","display_name":"Food science","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00300-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00300-1","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00300-1","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4f2bbfc5de2748c5b584dbf9b9967511","is_oa":true,"landing_page_url":"https://doaj.org/article/4f2bbfc5de2748c5b584dbf9b9967511","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-18 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00300-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00300-1","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00300-1","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4302849700","display_name":null,"funder_award_id":"2021YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7713054969","display_name":null,"funder_award_id":"2021YFB3101403","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407729526.pdf","grobid_xml":"https://content.openalex.org/works/W4407729526.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1973383140","https://openalex.org/W2008019505","https://openalex.org/W2256681573","https://openalex.org/W2576601013","https://openalex.org/W2598137689","https://openalex.org/W2793336017","https://openalex.org/W2809211034","https://openalex.org/W2887134435","https://openalex.org/W2892151818","https://openalex.org/W2902920262","https://openalex.org/W2915352631","https://openalex.org/W2946081518","https://openalex.org/W3023568338","https://openalex.org/W3106188540","https://openalex.org/W3115798030","https://openalex.org/W3130451179","https://openalex.org/W3154321031","https://openalex.org/W3160694858","https://openalex.org/W4226055875","https://openalex.org/W4226326522","https://openalex.org/W4226445560","https://openalex.org/W4288084520","https://openalex.org/W4381744274","https://openalex.org/W4387730157","https://openalex.org/W4387869540","https://openalex.org/W4387869943","https://openalex.org/W4390475366"],"related_works":["https://openalex.org/W2799193527","https://openalex.org/W4249679496","https://openalex.org/W27875163","https://openalex.org/W4238418407","https://openalex.org/W2361008199","https://openalex.org/W2018813611","https://openalex.org/W2367021266","https://openalex.org/W2165646497","https://openalex.org/W1977341556","https://openalex.org/W3119772354"],"abstract_inverted_index":{"Abstract":[0],"People":[1],"conveniently":[2],"share":[3],"and":[4,93,101,130,139,143],"watch":[5],"videos":[6,33,97,134],"through":[7],"Instant":[8],"Messaging(IM)":[9],"software,":[10,85],"which":[11,65,86],"is":[12],"likely":[13],"to":[14,25],"reveal":[15],"their":[16],"preferences.":[17],"Identifying":[18],"IM":[19,44,52,84,116],"video":[20,49,63,70,79,88,106],"content":[21,71,80,89],"can":[22],"enable":[23],"attackers":[24],"snoop":[26],"on":[27,35,113],"user":[28],"privacy.":[29],"Existing":[30],"methods":[31],"identify":[32],"based":[34],"the":[36,40,111,153,157],"features":[37,95],"embodied":[38],"in":[39,104],"DASH":[41],"stream.":[42],"However,":[43],"software":[45,53],"does":[46],"not":[47],"transmit":[48],"using":[50],"DASH.":[51],"uses":[54],"various":[55],"transmission":[56,99],"protocols":[57,61],"or":[58],"even":[59,144],"private":[60],"for":[62,69,83,132,149],"transmission,":[64],"poses":[66],"a":[67,78,105],"challenge":[68],"identification.":[72],"In":[73],"this":[74],"paper,":[75],"we":[76],"propose":[77],"identification":[81,147],"framework":[82],"obtains":[87],"by":[90],"extracting":[91],"unique":[92],"stable":[94],"of":[96,128],"as":[98],"fingerprints":[100],"matching":[102],"them":[103],"fingerprint":[107],"database.":[108],"We":[109],"evaluate":[110],"method":[112,124],"two":[114],"popular":[115],"software.":[117],"The":[118],"experimental":[119,154],"results":[120,155],"show":[121],"that":[122],"our":[123],"has":[125],"an":[126],"accuracy":[127,148],"98.05%":[129],"99.49%":[131],"ciphertext":[133],"transmitted":[135],"over":[136],"GQUIC":[137],"protocol":[138],"HTTPS":[140],"protocol,":[141],"respectively,":[142],"reaches":[145],"100%":[146],"plaintext":[150],"videos.":[151],"Furthermore,":[152],"outperform":[156],"existing":[158],"methods.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
