{"title":"Secure and usable authentication on mobile devices","authors":"R. Schlöglhofer, J. Sametinger","doi":"10.1145/2428955.2429004","DOIUrl":"https://doi.org/10.1145/2428955.2429004","url":null,"abstract":"Mobile devices contain a multitude of sensitive data and provide access to even more data as well as services somewhere on the Internet. Even if only temporarily in the hands of non-entitled persons, privacy is at stake. Authentication protects against unauthorized usage. Today's operating systems of mobile devices offer authentication mechanisms. However, they are either vulnerable in some situations or not user friendly enough to be widely adopted. In this paper we suggest a novel authentication system which meets both the requirements of security and usability. For that purpose, we have analyzed existing authentication methods as well as targeting attacks. The resulting Android application SecureLock is a generic authentication system, which offers PIN and password, but also a property-based authentication method by means of NFC tags, and a novel image-based method called GesturePuzzle. The application has been evaluated and compared with other approaches for security and usability.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAPHE: simple accelerometer based wireless pairing with heuristic trees","authors":"B. Groza, R. Mayrhofer","doi":"10.1145/2428955.2428989","DOIUrl":"https://doi.org/10.1145/2428955.2428989","url":null,"abstract":"Accelerometers provide a good source of entropy for bootstrapping a secure communication channel in autonomous and spontaneous interactions between mobile devices that share a common context but were not previously associated. We propose two simple and efficient key exchange protocols based on accelerometer data that use only simple hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial as it allows a more effective recovery of the shared key. While the first protocol seems to give just some performance improvements, the second, which we call hashed heuristic tree, is more secure than previous proposals since it increases the difference in protocol execution between benign and malicious parties. Nevertheless, the hashed heuristic tree is an entirely new approach which has the advantage of allowing different heuristics in the search, leaving plenty of room for future variants and optimizations.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards face unlock: on the difficulty of reliably detecting faces on mobile phones","authors":"R. Findling, R. Mayrhofer","doi":"10.1145/2428955.2429008","DOIUrl":"https://doi.org/10.1145/2428955.2429008","url":null,"abstract":"Currently, reliable face detection and recognition are becoming more important on mobile devices -- e.g. to unlock the screen. However, using only frontal face images for authentication purposes can no longer be considered secure under the assumption of easy availability of frontal snapshots of the respective device owners from social networks or other media. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures. In this paper, we analyze current methods to face detection and recognition regarding their usability in the mobile domain, and then propose an approach to a Face Unlock system on a smart phone intended to be more secure than current approaches while still being convenient to use: we use both frontal and profile face information available during a pan shot around the user's head, by combining camera images and movement sensor data. Current results to face detection are promising, but reliable face recognition needs further research.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An accurate lecture video segmentation method by using sift and adaptive threshold","authors":"H. Jeong, Tak-Eun Kim, Myoung-Ho Kim","doi":"10.1145/2428955.2429011","DOIUrl":"https://doi.org/10.1145/2428955.2429011","url":null,"abstract":"Much research has been done in the past for segmenting lecture videos by detecting slide transitions. However, they do not perform well on certain kinds of videos recorded under non-stationary settings: the changes of a camera position or focus during a lecture. Since such non-stationary settings greatly affect visual properties of slides, the existing approaches utilizing global features and a global threshold, often have trouble in computing similarities between slides. In this paper, we propose a highly accurate method for lecture video segmentation by using SIFT and an adaptive threshold. By using SIFT, we can reliably match two slides whose contents are the same but are visually different. We also propose an adaptive threshold selection algorithm that detects slide transitions accurately by considering characteristics of features. Through various experiments that use real lecture videos, we show that our method provides 30% improvement in the average F1-score over other existing methods.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective","authors":"Le Sun, Jaipal Singh, O. Hussain","doi":"10.1145/2428955.2429005","DOIUrl":"https://doi.org/10.1145/2428955.2429005","url":null,"abstract":"Cloud computing is a new paradigm for service-based computing and is gaining popularity. An efficient way for the assurances of the expected service levels in cloud computing is to establish a tailor-made Service Level Agreement (SLA) and to ensure the commitment of SLAs by service providers. In this paper, we conduct a survey of the state of the art in cloud SLA assurance from two aspects -- pre- and post-interaction phases, based on which research gaps in existing approaches are identified. New research requirements for SLA assurance are then presented.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazuha Yamada, Y. Yamashita, M. Toyoura, Xiaoyang Mao, Satoshi Takatsu, Chihiro Sugawara
{"title":"Be-code: information embedding for logo images","authors":"Kazuha Yamada, Y. Yamashita, M. Toyoura, Xiaoyang Mao, Satoshi Takatsu, Chihiro Sugawara","doi":"10.1145/2428955.2429015","DOIUrl":"https://doi.org/10.1145/2428955.2429015","url":null,"abstract":"2D image codes are widely used for inputting information to mobile devices with cameras. QR code is a typical example of such codes. Conventional image codes do not have semantics in images themselves. Such codes may spoil the quality of design when attached on commercial products. We propose a novel code, Be-code, for embedding data into logo images. Be-code is generated from a logo image by modifying some of the edge pixels according to the bits to be embedded, but avoiding causing obvious change to the appearance of the original logo image. Algorithm for extracting information from the camera captured Be-code is also presented. The original logo image is not required in decoding. In experiments, embedded data could be decoded at a high success rate.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vanessa El-Khoury, Martin Jergler, David Coquil, H. Kosch
{"title":"Semantic video content annotation at the object level","authors":"Vanessa El-Khoury, Martin Jergler, David Coquil, H. Kosch","doi":"10.1145/2428955.2428991","DOIUrl":"https://doi.org/10.1145/2428955.2428991","url":null,"abstract":"A vital prerequisite for fine-grained video content processing (indexing, querying, retrieval, adaptation, etc.) is the production of accurate metadata describing its structure and semantics. Several annotation tools were presented in the literature generating metadata at different granularities (i.e. scenes, shots, frames, objects). These tools have a number of limitations with respect to the annotation of objects. Though they provide functionalities to localize and annotate an object in a frame, the propagation of this information in the next frames still requires human intervention. Furthermore, they are based on video models that lack expressiveness along the spatial and semantic dimensions. To address these shortcomings, we propose the Semantic Video Content Annotation Tool (SVCAT) for structural and high-level semantic annotation. SVCAT is a semi-automatic annotation tool compliant with the MPEG-7 standard, which produces metadata according to an object-based video content model described in this paper. In particular, the novelty of SVCAT lies in its automatic propagation of the object localization and description metadata realized by tracking their contour through the video, thus drastically alleviating the task of the annotator. Experimental results show that SVCAT provides accurate metadata to object-based applications, particularly exact contours of multiple deformable objects.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The adoption of mobile tourism services: an empirical study","authors":"Shang Gao, Per Christian Røinend, J. Krogstie","doi":"10.1145/2428955.2428972","DOIUrl":"https://doi.org/10.1145/2428955.2428972","url":null,"abstract":"This study is investigating the adoption of mobile tourism services in Norway. By expanding the Technology Acceptance Model (TAM), a research model, called mobile services acceptance model including seven research hypotheses is presented. The proposed research model and research hypotheses were empirically tested using data collected from a survey of 47 users of a mobile tourism service called extended Mobile Tourist Service Recommender (MTSR) in a city in Norway. The findings indicated that the fitness of the research model is good and strong support was found for the seven research hypotheses. Among all the factors, the personal initiatives and characteristics had the most significant influence on the intention to use MTSR.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Selene Uras, Daniele Ardu, Gavino Paddeu, M. Deriu
{"title":"Do not judge an interactive book by its cover: a field research","authors":"Selene Uras, Daniele Ardu, Gavino Paddeu, M. Deriu","doi":"10.1145/2428955.2428966","DOIUrl":"https://doi.org/10.1145/2428955.2428966","url":null,"abstract":"In this paper we report the results of a field research performed on Wonderbook (WB), an augmented book created for the local science festival and appositely developed to transmit formative concepts concerning ICT (Information Communication Technology). We believe that it is important to establish whether interactive installations enriched with enjoyable contents could be an efficacy modality to transmit learning concepts, thus we have performed a field analysis comprising different measures such as field observation, semi-structured interviews, focus groups organized before and after the visit to the festival, self reports (both drawings and written compositions); we have also collected log file data of the interactive application to have also an objective measure. We especially focus on gathering the maximum number of information both from the interactive process and from the pre-existing knowledge in order to be able to evaluate the efficacy of WB to transmit learning concepts.\u0000 We believe that this research could be useful for developing and evaluating the potentiality of similar interactive installations used in formative contexts.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barolli, Evjola Spaho, Makoto Ikeda, Elis Kulla, F. Xhafa, M. Younas
{"title":"A fuzzy-based data replication system for QoS improvement in MANETs","authors":"L. Barolli, Evjola Spaho, Makoto Ikeda, Elis Kulla, F. Xhafa, M. Younas","doi":"10.1145/2428955.2428997","DOIUrl":"https://doi.org/10.1145/2428955.2428997","url":null,"abstract":"In Mobile Ad hoc Networks (MANETs), mobile wireless devices communicate together in an autonomous fashion. The transmission is done by multi-hop routes. Because of mobility and limited resources in MANET, it is difficult to guarantee the QoS requirements. In this work, we propose a fuzzy-based system, which improves the QoS of MANETs via data replication. We aim to support critical requirement applications based on MANETs such as disaster management scenarios in which data retrieval is an important requirement to support real time decision making. There are several techniques to optimize data replication strategy for this task. In this paper, we use fuzzy logic and build a system which has three input linguistic parameters and one output linguistic parameter. We evaluate by simulations the proposed system. The simulation results show that the proposed system has a good decision.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"66 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}