2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
2-Level-Wavelet-Based License Plate Edge Detection 基于二级小波的车牌边缘检测
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.295
Ming-Kan Wu, J. Wei, Hao-Chung Shih, Chian C. Ho
{"title":"2-Level-Wavelet-Based License Plate Edge Detection","authors":"Ming-Kan Wu, J. Wei, Hao-Chung Shih, Chian C. Ho","doi":"10.1109/IAS.2009.295","DOIUrl":"https://doi.org/10.1109/IAS.2009.295","url":null,"abstract":"Against well-known vertical Sobel operator adopted by most License Plate Detection (LPD) algorithms, this paper presents a robust and real-time method to enhance both edge density and intensity of license plates under various outdoor environments. The proposed method applies HL subband feature of 2D Discrete Wavelet Transform (DWT) twice to significantly highlight the vertical edges of license plates and suppress the surrounding background noise. Then, license plates can easily be extracted and located by the orthogonal projection histogram analysis with local recursive Otsu segmentation and morphological closing operator. Experimental results show LPD system based on the proposed 2-level 2D Haar DWT is better than that based on conventional vertical Sobel operator or 1-level 2D Haar DWT in terms of the detection rate.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
E-government Security Management: Key Factors and Countermeasure 电子政务安全管理:关键因素及对策
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.146
Jin-fu Wang
{"title":"E-government Security Management: Key Factors and Countermeasure","authors":"Jin-fu Wang","doi":"10.1109/IAS.2009.146","DOIUrl":"https://doi.org/10.1109/IAS.2009.146","url":null,"abstract":"Almost all of United Nations member countries now operating government web sites--called e-government. Its implementation is based on information technology which is now as important as tanks, ships, and aircraft in any nation’s defense. So nowadays, with the fast development of information technology, e-government security is considered one of the crucial factors for achieving an advanced stage of e-government. As the number of e-government services introduced to the user increases, a higher level of e-government security is required. This article aims to formulate the key factors for security management. Firstly introduce the concept of e-government and information security, presents a review of ICT management in the public sector, information security management and e-government in recent literature by focusing on issues and trends. The paper then for successful e-government security management analysis the key factors. Put forward a managerial conceptual framework followed. Finally, the corresponding countermeasures for e-government management are proposed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121660259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising 一种自适应阈值联合多尺度图像去噪算法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.157
Jin He, Yinpei Sun, Ying Luo, Qun Zhang
{"title":"A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising","authors":"Jin He, Yinpei Sun, Ying Luo, Qun Zhang","doi":"10.1109/IAS.2009.157","DOIUrl":"https://doi.org/10.1109/IAS.2009.157","url":null,"abstract":"Curvelet transform is one of the recently developed multiscale transform, which can well deal with the singularity of line and provides optimally sparse representation of images with edges. But now the image denoising based on curvelet transform is almost used the Monte Carlo threshold, it is not used the feature of images’ curvelet coefficients effectively, so the best result can not be reached. Meanwhile, the wavelet transform codes homogeneous areas better than the curvelet transform. In this paper a joint multiscale algorithm with auto-adapted Monte Carlo threshold is proposed. This algorithm is implemented by combining the wavelet transform and the fast discrete curvelet transform, in which the auto-adapted Monte Carlo threshold is used. Experimental results show that this method eliminate white Gaussian noise effectively, improves Peak Signal to Noise Ratio (PSNR) and realizes the balance between protecting image details and wiping off noise better.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Threats and Countermeasures for Intra-vehicle Networks 车载网络的安全威胁与对策
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.350
David Wampler, Huirong Fu, Ye Zhu
{"title":"Security Threats and Countermeasures for Intra-vehicle Networks","authors":"David Wampler, Huirong Fu, Ye Zhu","doi":"10.1109/IAS.2009.350","DOIUrl":"https://doi.org/10.1109/IAS.2009.350","url":null,"abstract":"Controller Area Network (CAN) is the leading serial bus system for embedded control. More than two billion CAN nodes have been sold since the protocol's development in the early 1980s. CAN is a mainstream network and was internationally standardized (ISO 11898–1) in 1993. This paper describes an approach to implementing security services on top of a higher level Controller Area Network (CAN) protocol, in particular, CANopen. Since the CAN network is an open, unsecured network, every node has access to all data on the bus. A system which produces and consumes sensitive data is not well suited for this environment. Therefore, a general-purpose security solution is needed which will allow secure nodes access to the basic security services such as authentication, integrity, and confidentiality.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126064720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proxy Re-encryption Scheme Based on SK Identity Based Encryption 基于SK身份加密的代理重加密方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234980
Xu An Wang, Xiaoyuan Yang
{"title":"Proxy Re-encryption Scheme Based on SK Identity Based Encryption","authors":"Xu An Wang, Xiaoyuan Yang","doi":"10.1109/ICCSIT.2009.5234980","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234980","url":null,"abstract":"The concept of proxy re-cryptography comes from the work of Blaze,Bleumer, and Strauss in 1998cite{Blaze:98}. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBEcite{Matsuo:07}. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working groupcite{P1363.3:08}. One feature of their schemes is that they are all based on BB1 identity based encryptioncite{BB04a}. We reconsider the problem of constructing proxy re-encryption based onSK identity based encryption. Surprisingly, if we consider the help of PKG, then it is easy to construct proxy re-encryption based on SK identity based encryption. Interestingly , our proxy re-encryption scheme even can achieve CCA2 secure, which makes it is unique.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm 一种基于重排序DCT系数和SPIHT算法的多重描述编码框架
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.56
Lin-Lin Tang, Zhe-ming Lu, Faxin Yu
{"title":"A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm","authors":"Lin-Lin Tang, Zhe-ming Lu, Faxin Yu","doi":"10.1109/IAS.2009.56","DOIUrl":"https://doi.org/10.1109/IAS.2009.56","url":null,"abstract":"A novel MDC algorithm based on Discrete Cosine Transform (DCT) and the Set Partition in Hierarchical Trees (SPIHT) is proposed in this paper. Different from the commonly used DCT algorithm, all the transformed coefficients are reshaped into the wavelet decomposition structure to facilitate the use of the SPIHT algorithm. Then the direction-based information is used to form the three different channels. By using different bit rates to encode the information from three different orientations, i.e., vertical, horizontal and diagonal directions, the redundancy is introduced into the three channels. Every channel contains the hybrid information from three different directions. Experimental results show the advantages of this novel algorithm and the theoretical analysis has also been studied.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115426470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation 基于脉冲调幅的视频信息伪装处理算法研究
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.308
Y. Qiu, Jin Tian, Liuyu Qian
{"title":"Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation","authors":"Y. Qiu, Jin Tian, Liuyu Qian","doi":"10.1109/IAS.2009.308","DOIUrl":"https://doi.org/10.1109/IAS.2009.308","url":null,"abstract":"In this paper, the video information camouflage processing method based on the pulse amplitude modulation was studied aim at the electromagnetic characteristic of computer video information. Camouflage information modulation function was proposed, the matching vision relation between character information and background color was determined, and the image fusion processing algorithm of camouflage modulation information and useful information was confirmed. Finally, the correctness and effectiveness of theoretical analysis was validated through simulation and experiments.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deadlock Detection Based on Resource Allocation Graph 基于资源分配图的死锁检测
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.64
Qinqin Ni, Weizhen Sun, Sen Ma
{"title":"Deadlock Detection Based on Resource Allocation Graph","authors":"Qinqin Ni, Weizhen Sun, Sen Ma","doi":"10.1109/IAS.2009.64","DOIUrl":"https://doi.org/10.1109/IAS.2009.64","url":null,"abstract":"Deadlock occurs randomly and is difficult to detect, it always has a negative impact on the effective execution of operating system. This paper uses the principle of adjacency matrix, path matrix and strongly-connected component of simple directed graph in graph theory, gives a model of detecting deadlock by exploring strongly-connected component from resource allocation graph. The experiment shows that it can detect resources and processes involved in deadlock effectively by this detection method. The paper provides a new idea for the research of operating system algorithms, and a new way for auxiliary teaching and practical engineering.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117191529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Dynamic Layering Scheme of Multicast Key Management 一种组播密钥管理的动态分层方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.344
Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu
{"title":"A Dynamic Layering Scheme of Multicast Key Management","authors":"Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu","doi":"10.1109/IAS.2009.344","DOIUrl":"https://doi.org/10.1109/IAS.2009.344","url":null,"abstract":"Group key management is a difficult task in implementing large and dynamic secure multicast. In this paper, a new scheme is proposed in the basis of in-depth analysis of the requirements of the secure multicast and group key management. The scheme is based on the multicast group security architecture and multicast security group key management architecture proposed by IETF. This scheme constructs group key based on pairings and distributes the group key using HSAH function polynomial, and manages group key making use of the dynamic layering GCKS. The scheme is better in security, lower in computation cost and communication cost. The analysis comparison proves that the scheme has strong scalability and efficiency.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"56 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120809133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A High Quality Reversible Data Hiding Method Using Interpolation Technique 基于插值技术的高质量可逆数据隐藏方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.79
C. Yang, Chun-Hao Hsu
{"title":"A High Quality Reversible Data Hiding Method Using Interpolation Technique","authors":"C. Yang, Chun-Hao Hsu","doi":"10.1109/IAS.2009.79","DOIUrl":"https://doi.org/10.1109/IAS.2009.79","url":null,"abstract":"We propose a high quality and imperceptible reversible data hiding method in this paper. We divide the cover image into 5 by 5 blocks with non-overlapping boundaries, shrink them, and generate back to 5 by 5 blocks by interpolation technique. If the absolute value of the difference between the interpolation value and the original gray level is less than a threshold in the middle of the four 3 by 3 overlapping blocks of each 5 by 5 block. We may embed one bit of the secret data in this position. We apply PRNG to shuffle the hidden data before embedding. Simply follow the embedding steps to extract the embedded data where the location is embedded then shuffle back the order to find the hidden data. The experiment results demonstrate our method is quite imperceptible with high quality and can obtain the original cover image after extracting all hidden secret data.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信