{"title":"Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel","authors":"Xuedou Yu","doi":"10.1109/IAS.2009.255","DOIUrl":"https://doi.org/10.1109/IAS.2009.255","url":null,"abstract":"In this paper, the intrusion detection system is introduced, and point out two important prerequisite that the IDS work normally must depend on, and in view of the prerequisite, the paper proposed a solution which is based on k-nearest neighbor algorithm of kernel and the active defence technology anti-host intrusion. The solution can distinguish normal event from the unknown event efficiently, and can detect unknown event more accurately.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Algorithm of Digital Filtering Based on Video Information Security","authors":"Jin Tian, Y. Qiu, Liuyu Qian","doi":"10.1109/IAS.2009.307","DOIUrl":"https://doi.org/10.1109/IAS.2009.307","url":null,"abstract":"In this paper, on the basis of the spot pulse width corresponded with character video information vertical stroke, the safe bandwidth of video information is confirmed, filtering image quality appraisal model which takes difference threshold limit value as distinction parameter is built by Weber – Fechner law, the corresponding relation of filtering stop-band cut-off frequency and character is determined, the FIR digital filter is designed. In addition, aim at the periodic variation characteristic of the insertion loss which the digital filter inherent, a combinatorial filtering method combine digital filter and analog filter is presented. At last, the correctness and effectiveness of theoretical analysis are validated through simulations and experiments.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114902204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Accelerated RC4 Scheme Using “Ultra Gridsec” and “HIMAN” and use this Scheme to Secure “HIMAN” Data","authors":"H. Kholidy, K. Alghathbar","doi":"10.1109/IAS.2009.140","DOIUrl":"https://doi.org/10.1109/IAS.2009.140","url":null,"abstract":"in most applications, security attributes are pretty difficult to meet but security becomes even a bigger challenge when talking about Grid Computing. Providing secure communication between elements of a computational Grid, by encrypting data passes between them using enhanced encryption algorithms that do not affect the Performance of the grid middleware completely comparable to the actual execution time.In this paper we will cover two points. First, accelerating RC4 encryption algorithm using our developed Grid Security Scheme \"ULTRA GRIDSEC\" and our developed \"HIMAN\" middleware and show that RC4 was accelerated by about 873.52% comparable to that accelerated by \"GRIDCRYPT\" Scheme that applied by \"Alchemi\" middleware developed by Melbourne University. Second, using the accelerated RC4 scheme to secure communication between elements of \"HIMAN\", the stream ciphering algorithms like RC4 are the most suitable encryption algorithms for applying inside \"HIMAN\" as we will show.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface","authors":"Kefeng Fan, Subing Zhang, W. Mo","doi":"10.1109/IAS.2009.31","DOIUrl":"https://doi.org/10.1109/IAS.2009.31","url":null,"abstract":"A digital certificate scheme in content protection system for high definition digital interfaces is proposed. Before transferring the encryption content, the device interface is firstly confirmed whether it is passed the certification. After the certification, then transfers the content. The interface of the receiver detects whether the recognition management unit has passed the certification. The digital content is ensured by the recognition management unit, which can prevent the invalid capturing the information. In the period of certification, the characteristics of the certificate are fully made use of. The application shows the system is high secure, which can be used in the high definition digital interface.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115682949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Zamani, A. Manaf, R. Ahmad, A. Zeki, Pritheega Magalingam
{"title":"A Novel Approach for Audio Watermarking","authors":"M. Zamani, A. Manaf, R. Ahmad, A. Zeki, Pritheega Magalingam","doi":"10.1109/IAS.2009.22","DOIUrl":"https://doi.org/10.1109/IAS.2009.22","url":null,"abstract":"This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Protection Scheme for SVC Content Based on Network Coding","authors":"Ji Lu, Song Xiao, Chengke Wu","doi":"10.1109/IAS.2009.37","DOIUrl":"https://doi.org/10.1109/IAS.2009.37","url":null,"abstract":"How to protect the video streaming for reasonable usage is a necessary technology in multimedia services over network. However, most the previous schemes are too complicated and time-consuming to apply in real multimedia content protection system. Network Coding (NC) is a new technology which codes the input information at intermediate nodes and can make the network information flow achieve the upper bound of max-flow min-cut theory. Random Linear Network Coding (RLNC) is a practical approach of NC with advantage of decentralized operation. In this paper, we proposed a novel scalable video streaming protection algorithm with an efficient packetization scheme and a distribution scheme according to authority levels of different users based on RLNC approach. The algorithm classified the packetized packets into different levels and employed three kinds of permission matrix (PM) to control the distribution of video streaming. The implementation of the proposed algorithm was described in detail to show the efficiency and low complexity of the method.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Moment Based Registration Scheme Utilizing Support Vector Machine","authors":"Jianzhen Wu","doi":"10.1109/IAS.2009.175","DOIUrl":"https://doi.org/10.1109/IAS.2009.175","url":null,"abstract":"A novel image registration scheme is proposed in this paper. Six low order image moments are used as image global pattern features and are feed into support vector machine to estimate translation, rotation and scaling parameters. Simulation results show that the proposed registration scheme is accurate and robust to noise.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"54 50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng
{"title":"Emergency Command System for Geologic Disasters Prevention","authors":"Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng","doi":"10.1109/IAS.2009.51","DOIUrl":"https://doi.org/10.1109/IAS.2009.51","url":null,"abstract":"The emergency command system is an important part in the project of warning, monitoring and geologic disasters prevention in the Three Gorges Reservoir Area, because it can provide a reliable technical guarantee. This paper describes a multimedia emergency command system based on satellite IP link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124576083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain","authors":"Pang Baomao, Shi Haoshan","doi":"10.1109/IAS.2009.317","DOIUrl":"https://doi.org/10.1109/IAS.2009.317","url":null,"abstract":"Chinese words segmentation is an important technique for Chinese web data mining. After the research made on some Chinese word segmentation nowadays, an improved algorithm is proposed in this paper. The algorithm updates dictionary by using Two-way Markov Chain, and does word segmentation by applying an improved Forward Maximum Matching Method based on word frequency statistic. The simulation shows this algorithm can finish word segmentation for a given text quickly and accurately.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research on the Measurement of China Internet Illegal and Harmful Content","authors":"Qiang Song, Gang Li","doi":"10.1109/IAS.2009.230","DOIUrl":"https://doi.org/10.1109/IAS.2009.230","url":null,"abstract":"Although the Internet allows people to release, convey and obtain information freely and conveniently, the excessive spread of illegal and harmful information negatively affects the Internet development and obstructs Internet culture from thriving. On the basis of analyzing the root cause of illegal and harmful content on the Internet, this article helps to establish an index system for measuring them. At the same time, it suggests methods to collect data on measurement indicators.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123928396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}