{"title":"An Emperical Traffic Model of M2M Mobile Streaming Services","authors":"R. Liu, D. Rao, Zhenglei Huang, D. Yang","doi":"10.1109/MINES.2012.60","DOIUrl":"https://doi.org/10.1109/MINES.2012.60","url":null,"abstract":"M2M video streaming service has been widely used. In order to evaluate the impact of the uplink traffic caused by M2M video streaming on the mobile network, it is necessary to establish the traffic model of the M2M mobile video services. There are two main types of traffic models in the existing video traffic model. The traffic model based on the self-similarity of video streaming is too complex to be simulate. The traffic model based on probability density did not consider the frame size of MPEG-4 videos. This paper selected several distributions with heavy-tail to fit several video sources. The video sources are selected according to the requirements of the M2M service aspects and the limitation of the mobile network resources. The distributions include Gamma distribution, Pareto distribution, lognormal distribution and Weibull distribution. After comparing the fitness figure, fitness figure deference ratio, mean frame size similarity, we find that lognormal distribution is able to reflect the characteristic of the video source frame size. Further, based on the analysis on the mean bit rate and frame rate, considering the recommendation of bandwidth for video from 3GPP, the frame rate of the traffic model is given in the paper. In summary, a traffic model including frame size and frame rate is presented in the paper. Fitting results show that the distribution presented in the paper is 0.07%~2% degree better than the distribution presented in 3GPP specification. The mean frame size of the model is 99% similar to the mean frame size of the video source. Further, the distribution used in traffic model is a commonly used mathematical distribution in major of simulation software.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"126 38","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114053240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Motif-Based Framework for Characterizing the Evolution of Social Networks","authors":"Leiming Yan, Jinwei Wang","doi":"10.1109/MINES.2012.32","DOIUrl":"https://doi.org/10.1109/MINES.2012.32","url":null,"abstract":"Social network computing has become popular in recent years. The study of evolving patterns of networks is facing a challenge: how to find the evolving features so as to extract significant evolving patterns. In this work, a novel framework based on network motifs is proposed to characterize the evolution of networks, capture the behavioral tendencies that contribute to the evolution of the network, and then identify evolving significantly behaviors. We show the results of extensive exploration on a real social news network, which demonstrate that the proposed scheme will contribute to the understanding of the evolving characteristic of social networks.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smoke Detection Algorithm Based on Discrete Wavelet Transform and Correlation Analysis","authors":"Wu Meng-Yu, Han Ning, Luo Qin-Juan","doi":"10.1109/MINES.2012.46","DOIUrl":"https://doi.org/10.1109/MINES.2012.46","url":null,"abstract":"A smoke detection algorithm based on Discrete Wavelet Transform and Correlation Analysis is presented to distinguish smoke and other smoke-like objects, especially cloud. Firstly, based on Gaussian mixture model, the target region of image is picked up. Secondly, we use Discrete Wavelet Transform to discriminate low frequency content and high frequency content of the images. At last, the high frequency information is analyzed by correlation. According to this algorithm, the motion region is smoke or not can be distinguished effectively and reliably. Experimental results show that the proposed method can improve the accuracy of smoke detection and reduce the false alarm.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114643971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Analysis of a Response Mechanism for TCG TOCTOU Attacks","authors":"Xiaolin Chang, Bin Xing, Ying Qin","doi":"10.1109/MINES.2012.116","DOIUrl":"https://doi.org/10.1109/MINES.2012.116","url":null,"abstract":"LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security capability was evaluated only through experiments. The uncertainty in real experiments may hide the design-level errors. In this paper we explore applying model checking based formal verification techniques to verify whether LWRM can achieve the declared security properties. We first propose a method of modeling LWRM, a kernel-space mechanism, in PROMELA language. Then we detect the design-level vulnerabilities by using SPIN. At last we verify our analysis via experiments and present the challenges to mitigate the vulnerabilities.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiahui Pan, Jiajun Cheng, Youqing Xia, Xin Zhang, Hui Wang
{"title":"Which Feature is Better? TF*IDF Feature or Topic Feature in Text Clustering","authors":"Xiahui Pan, Jiajun Cheng, Youqing Xia, Xin Zhang, Hui Wang","doi":"10.1109/MINES.2012.249","DOIUrl":"https://doi.org/10.1109/MINES.2012.249","url":null,"abstract":"In this paper, we conduct a comparative study on two different text features in text corpus clustering: TF*IDF feature and Topic feature. The former is mainly used in similarity-based text corpus clustering methods, while the latter, which is produced by LDA model, is used to identify the topics of texts. We conduct clustering experiments on 20-newsgroups (20NG) datasets. Based on the dataset, two typical text clustering methods are respectively employed to compare the clustering performance of the above two text features. The experiments demonstrate if the optimal topic number is chosen, the topic feature outperforms in the clustering accuracy.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Expert System of Maritime Solid Bulk Cargoes Safety Management Based on the Web","authors":"Qiang Zhang, Xuehai Wei","doi":"10.1109/MINES.2012.188","DOIUrl":"https://doi.org/10.1109/MINES.2012.188","url":null,"abstract":"Under the background of the accidents frequently occurring when carrying solid bulk cargoes by sea, this paper analyzed the existing related rules and international codes about maritime solid bulk cargoes. On the basis of the maritime experts' experiences and laboratory test data, it established a maritime solid bulk cargoes safety management expert database. In addition, the connection of the expert system database can be reused efficiently and safely through the database pond technology and optimization strategy. Furthermore, it combined JSP/Servlet technology with M/V/C mode and other methods to realize the expert system of maritime solid bulk cargoes safety management (MSBCSM Expert System) based on the web.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128295260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evaluation of Bilingual Education in Colleges and Universities from a New Perspective","authors":"Chen Lv, Hong-yu Liu, Yi-yan Li, Nan Li, Yanez Lv","doi":"10.1109/MINES.2012.223","DOIUrl":"https://doi.org/10.1109/MINES.2012.223","url":null,"abstract":"Since year 2000, our country, to improve students' English abilities, promoted bilingual education in Universities and Colleges. In response, teachers from all over the country have been working in this domain and published tens of thousands of relative research papers and articles. Recently, more researchers are concerned with the appraisal of bilingual education in order to find out its effectiveness. However, most of these researchers stand on the perspective of the course itself, which made their results relatively parochial. In teaching practice, the author found that factors should be evaluated from a higher perspective. This paper attempts to give an evaluation system to assess the bilingual education of a school from much thorough aspects.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132757031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongzhen Zheng, Fenlin Liu, Xiangyang Luo, Chunfang Yang
{"title":"A Method Based on Feature Matching to Identify Steganography Software","authors":"Yongzhen Zheng, Fenlin Liu, Xiangyang Luo, Chunfang Yang","doi":"10.1109/MINES.2012.26","DOIUrl":"https://doi.org/10.1109/MINES.2012.26","url":null,"abstract":"Reliable identification of steganography software is an important research direction of steganography forensics, how to identify the steganography software based on the characteristics of steganography algorithm is the difficulty in the research of identifying the steganography software. In this paper, based on the principles of LSB Steganography algorithm (include LSB Replacement and LSB Matching), we propose an approach to identify steganography software by Feature Matching. First, we take the process of change operations to the pixels in the LSB steganography algorithm as Core Instructions which are taken as the feature of the software, and we have analyzed the implementation of Core Instructions in a variety of typical steganography software based on LSB Steganography algorithm, then build the corresponding feature for each of implementations. And then we would determine whether the software is a LSB steganography software according to the existence of codes matched with the feature. The experimental results show that the method in this paper can reliably identify a variety of common steganography software based on LSB Steganography algorithm.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yubo Song, Xiaoyun Zhu, Yelin Hong, Haoyue Zhang, Hangbo Tan
{"title":"A Mobile Communication Honeypot Observing System","authors":"Yubo Song, Xiaoyun Zhu, Yelin Hong, Haoyue Zhang, Hangbo Tan","doi":"10.1109/MINES.2012.31","DOIUrl":"https://doi.org/10.1109/MINES.2012.31","url":null,"abstract":"We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The system applies the idea of active honeypot theory and combines with communication protection. We initially clarify the high safety protection performance of our honeypot monitoring system in the following steps: we simulates the wireless access environment and then capture the mobile phones; after that, our system can search for potential attacks, as well as analyze and monitor their communication behaviors. We discuss the feasibility and efficiency of our system by testing an Android smart phone which carries a malware that can embezzle the phone's address book. After initially triggering the malware, we use our honeypot system to show the monitoring result. Our honeypot monitoring system for mobile communication, which is mainly applied in radio link safety protection, can effectively find potential hazards and optimize protective environment. Our system will play an important role in various aspects such as commercial activities promotion and personal information protection.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TransSec: Security Image Transportation in Visual Sensor Networks","authors":"Songtao Ye, Junfei Liu, Jin Zhang","doi":"10.1109/MINES.2012.241","DOIUrl":"https://doi.org/10.1109/MINES.2012.241","url":null,"abstract":"Distributed imaging using sensor arrays has grown rapidly over past several years. Because image data is characterized by is high volume, an architecture of two tiered visual sensor network is proposed, where storage nodes gather image data from nearby sensors and process sink's query to transmit a time-specific image. However the importance of storage nodes is attractive to attackers. In this paper, we propose a TransSec protocol to prevent attackers from deleting or distorting a time-specific image. To preserve privacy, we use a binary quadratic equation based technique to encode each image timestamp such that attackers cannot delete sensitive images without knowing their exact timestamp. To preserve integrity, we propose a new checksum chain that allows a sink to verify whether the result of a query contains exactly the data items and recover missing data items.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}