2011 7th International Conference on Information Assurance and Security (IAS)最新文献

筛选
英文 中文
Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication 脉冲主动均值(PAM):一种支持双重安全认证的PIN特征提取算法
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-08 DOI: 10.1109/ISIAS.2011.6122821
S. Safie, J. Soraghan, L. Petropoulakis
{"title":"Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication","authors":"S. Safie, J. Soraghan, L. Petropoulakis","doi":"10.1109/ISIAS.2011.6122821","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122821","url":null,"abstract":"This paper presents a new feature extraction technique called Pulse Active Mean (PAM) implemented on Electrocardiograms (ECG) for biometric authentication. A doubly secure ECG authentication framework is proposed which makes use of the important attributes of the PAM algorithm as a personal identification number (PIN). The PIN is used to extract different locations of ECG characteristics generating unique feature vectors. The presence of the correct PIN and ECG signals make the proposed authentication framework doubly secure. The performance of PAM is evaluated by comparing its receiver operating characteristic (ROC) curve with traditional temporal and amplitude feature extraction techniques on 100 Physikalisch-Technische Bundesanstalt (PTB) subjects. The evaluation of the biometric performance when different values of PIN are presented is also investigated. It is shown in this paper that different PIN values generate different feature vector sets while still providing consistent authentication performance","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
State of the art: Signature verification system 最新技术:签名验证系统
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122804
Tee Wilkin, S. Ooi
{"title":"State of the art: Signature verification system","authors":"Tee Wilkin, S. Ooi","doi":"10.1109/ISIAS.2011.6122804","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122804","url":null,"abstract":"This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous signature verification systems algorithms and methods been proposed in the last decade. This paper will mainly focus on discussing the signature verification techniques from year 2000 onwards to make a novice summary and conclusion for them.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116779472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
H.264/AVC digital fingerprinting based on content adaptive embedding 基于内容自适应嵌入的H.264/AVC数字指纹识别
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122780
K. A. Saadi, A. Bouridane, A. Guessoum
{"title":"H.264/AVC digital fingerprinting based on content adaptive embedding","authors":"K. A. Saadi, A. Bouridane, A. Guessoum","doi":"10.1109/ISIAS.2011.6122780","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122780","url":null,"abstract":"Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. This paper presents active fingerprinting which combines robust watermarking and independent Gaussian fingerprints generated by Tardos algorithm to secure the distributed copy of the H.264 /AVC compressed video. This approach is derived from [1], It relies mainly on improving the visual quality by eliminating the perceivable distortion that exists in the fingerprinted copies as well as the copies after collusion attacks produced by using unbounded Gaussian fingerprints. In order to remove this perceptual distortion, in this paper, we propose a content adaptive watermaking method which takes full advantage of both Intra and Inter frames information of the video content. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel system for fingerprint privacy protection1 一种新的指纹隐私保护系统[j]
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122830
Sheng Li, A. Kot
{"title":"A novel system for fingerprint privacy protection1","authors":"Sheng Li, A. Kot","doi":"10.1109/ISIAS.2011.6122830","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122830","url":null,"abstract":"This paper proposes a novel system for protecting the fingerprint privacy without using a token or key. In the enrollment, two fingerprints are captured from two of an user's fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint and the primary cores from both fingerprints. Based on these extracted information, a combined minutiae template is generated and stored in a database. In the authentication, the user needs to provide two query fingerprints from the same two fingers which are used in the enrollment. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is also difficult for the attacker to distinguish our template from the minutiae of an original fingerprint. We evaluate the performance of our system over the FVC2002 DB2_A database. The results show that the False Rejection Rate of our system is 3% when the False Acceptance Rate is 0.01%.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Robust video watermarking against JPEG compression in 3D-DWT domain 3D-DWT域抗JPEG压缩的鲁棒视频水印
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122790
Yadollah Zamanidoost, A. Navarro, Z. R. Hesabi, Nima Rahimi Froshani, F. Farnia
{"title":"Robust video watermarking against JPEG compression in 3D-DWT domain","authors":"Yadollah Zamanidoost, A. Navarro, Z. R. Hesabi, Nima Rahimi Froshani, F. Farnia","doi":"10.1109/ISIAS.2011.6122790","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122790","url":null,"abstract":"A 3D-DWT video watermarking technique is proposed in this article. The algorithm is implemented on the basis of human vision system (HVS). To improve the robustness of watermark against JPEG compression, the most recently proposed techniques embed watermark in to the low-frequency components of the video frames. However, these components hold significant information of the video. Directly replacing the low-frequency components with watermark may introduce undesirable degradation to video quality. Simulation results demonstrate that the embedded watermarks can be almost fully extracted from the JPEG-compressed frames with very high compression ratio. Furthermore, the algorithm is robust against uniform noise attack, frame dropping and frame swapping.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis on Lightweight Block Cipher, KTANTAN 轻量级分组密码分析
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122793
Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani
{"title":"Analysis on Lightweight Block Cipher, KTANTAN","authors":"Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani","doi":"10.1109/ISIAS.2011.6122793","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122793","url":null,"abstract":"In this research, we present the analysis on Lightweight Block Cipher; KTANTAN. This block cipher consists of three algorithms with block sizes of 32/48/64-bit and utilizes an 80-bit key. NIST Statistical Test Suite is used to determine the randomness of output sequence produced by all algorithms. Nine data categories are applied to generate the output sequence. From our analysis, we found out that all three algorithms are not random based on the 1% significance level.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards data centric mobile security 走向以数据为中心的移动安全
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122796
A. Dehghantanha, N. Udzir, R. Mahmod
{"title":"Towards data centric mobile security","authors":"A. Dehghantanha, N. Udzir, R. Mahmod","doi":"10.1109/ISIAS.2011.6122796","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122796","url":null,"abstract":"Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at enhanced. So the security of mobile devices needs to be improved. This paper discusses various components and functions of mobile devices such as SMS, wireless and applications and describes possible vulnerabilities threatening them precisely. Malware threats are explained and their effects on mobile devices are studied. Finally, to protect all the vulnerabilities and prevent application and malware threats, data-centric security model is provided as a solution to ensure confidentiality, integrity and availability of data stored on mobile devices.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Extending Dempster Shafer method by multilayer decision template in classifier fusion 基于多层决策模板的Dempster Shafer方法在分类器融合中的扩展
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122807
Mehdi Salkhordeh Haghighi, Abedin Vahedian, H. Yazdi
{"title":"Extending Dempster Shafer method by multilayer decision template in classifier fusion","authors":"Mehdi Salkhordeh Haghighi, Abedin Vahedian, H. Yazdi","doi":"10.1109/ISIAS.2011.6122807","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122807","url":null,"abstract":"In this paper, a new classifier fusion method is introduced based on a decision template structure as an extension to Dempster Shafer method. It employs multilayer neural networks as base classifiers. The idea relies on the fact that in a multilayer neural network, behavior of each layer can be a guide for modeling decision-making process. The new decision template based method constructs decision template for each layer of the neural networks including all hidden layers such that a complete model of the base classifiers decision making process is built. In the combiner part, a new strategy based on extension to Dempster Shafer method is introduced. Efficiency of this method is compared with some known benchmark datasets.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Biometric driven initiative system for passive continuous authentication 生物识别驱动的被动连续认证主动系统
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122809
M. Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao
{"title":"Biometric driven initiative system for passive continuous authentication","authors":"M. Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao","doi":"10.1109/ISIAS.2011.6122809","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122809","url":null,"abstract":"In this paper, a passive continuous authentication system based on both the hard and the soft biometrics is implemented. The passive continuous authentication system keeps verifying the user without interrupting the user concentrating on his work. It also provides the capacity for the machine to recognize who is in front of the terminal, reduces the potential security leak of the user is temporarily absent front the terminal, and denies the invader to login the system with the stolen account and password. Our system forces to logoff the user when the authentication result identifies the user leaves his seat, but the system won't logoff the user if the user only turns his face to some other directions. The reliability of the system is verified by 7 registered users. According to the experimental results, combining the soft and the hard biometrics in our theoretical framework achieves the goal of continuous authentication efficiently and correctly.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of bypassing malware defences and malware detections 调查绕过恶意软件防御和恶意软件检测
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122815
Farid Daryabar, A. Dehghantanha, N. Udzir
{"title":"Investigation of bypassing malware defences and malware detections","authors":"Farid Daryabar, A. Dehghantanha, N. Udzir","doi":"10.1109/ISIAS.2011.6122815","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122815","url":null,"abstract":"Nowadays, malware incident is one of the most expensive damages caused by attackers. Malwares are caused different attacks, so considerations and implementations of malware defences for internal networks are important. In this papers, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and comparison of different channels and methods when malware might reach the host from outside the networks are demonstrated. After that, bypassing HTTP/SSL and SMTP malware defences as channels are discussed. Finally, as it is important to find and detect new and unknown malware before the malware gets in to the victims, a new malware detection technique base on honeynet systems is surveyed.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信