2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
Visibility Estimation Based on Mean Shift 基于均值移位的可见性估计
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.81
Wenbing Chen, Xiaolei Zhang, Jianwei Yang
{"title":"Visibility Estimation Based on Mean Shift","authors":"Wenbing Chen, Xiaolei Zhang, Jianwei Yang","doi":"10.1109/IAS.2009.81","DOIUrl":"https://doi.org/10.1109/IAS.2009.81","url":null,"abstract":"An algorithm is developed to estimate visibility from images captured by video cameras. We propose to smooth the captured image by mean shift and extract the landmark edge by an improved ADM. Then the visibility is estimated in terms of a simplified visibility definition. In comparison with traditional methods, our method not only remove the noise in landmark boundary region, but also make boundary region be more uniform and the extracted edge be more salient. Experimental results illustrate the effectiveness of our approach in visibility estimation.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods 一种基于可逆对比度映射和直方图嵌入的有效无损隐藏技术
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.113
T. Lu, Ying-Hsuan Huang
{"title":"An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods","authors":"T. Lu, Ying-Hsuan Huang","doi":"10.1109/IAS.2009.113","DOIUrl":"https://doi.org/10.1109/IAS.2009.113","url":null,"abstract":"Lossless data hiding is a technique that used to embed secret message into media for generating the stego image. The receiver who obtains the stego image can extract the secret message from it and restore the original media via the extraction and recovery image algorithms. Coltuc and Chassery combined look-up table and reversible contrast mapping technique to generate a very fast watermarking embedding scheme in 2007. Their scheme is simple and the hiding capacity is high. In addition, the image quality of the stego image generated by their scheme is fine. However, in their method, absolute difference is used to control image distortion. If the value of the absolute difference is low, then the hiding capacity will be limited and decreased. Therefore, we apply the histogram technique to improve Coltuc and Chassery’s scheme. The experimental results show that the image quality of the proposed scheme is better than that of Coltuc and Chassery’s scheme.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Position Verification in Multi-hop Vehicular Networks 多跳车辆网络中的位置验证
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.345
Deepa Susan Rajan, Chetan Yeole, Harshad Nakade, Huirong Fu, Ye Zhu
{"title":"Position Verification in Multi-hop Vehicular Networks","authors":"Deepa Susan Rajan, Chetan Yeole, Harshad Nakade, Huirong Fu, Ye Zhu","doi":"10.1109/IAS.2009.345","DOIUrl":"https://doi.org/10.1109/IAS.2009.345","url":null,"abstract":"Inter-vehicle communication is an emerging field of research which focuses on different ways of increasing safety and efficiency in future intelligent highways. However, the security in these inter vehicular communication is a major issue. Since the vehicular network does not have a fixed infrastructure, developing a security scheme in a highly dynamically changing environment is a major challenge. In this paper we are proposing two algorithms for verifying the position information claimed by other vehicles in a multi-hop vehicular network.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Quantum No-key Protocol with Identification 具有身份的实用量子无密钥协议
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.106
Yang Wu, Li Yang
{"title":"Practical Quantum No-key Protocol with Identification","authors":"Yang Wu, Li Yang","doi":"10.1109/IAS.2009.106","DOIUrl":"https://doi.org/10.1109/IAS.2009.106","url":null,"abstract":"Quantum no-key protocol is a quantum realization of Shamir’s idea of no-key cryptosystem, which can be used to transport quantum and classical message secretly. It is beyond computational security. We give a practical quantum no-key protocol with mutual identification. In order to prevent MIM (man-in-the-middle) attack, we realize secure information transmission and identification by utilizing a short pre-shared secret bit sequence. And we use pseudo-random sequences to mix the photons which are used for information transmission and the photons which are used for identification. Pseudo-random sequence partly protects the secret sequence and makes our protocol more practical while do not weaken the security. We post a schematic diagram of the experimental set-up which is based on fiber communication system. Our protocol does not need entanglement, multi-qubit operation or classical communication.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Watermarking Relational Databases for Ownership Protection Based on DWT 基于DWT的所有权保护关系数据库水印
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.220
Chuanxian Jiang, Xiaowei Chen, Zhi Li
{"title":"Watermarking Relational Databases for Ownership Protection Based on DWT","authors":"Chuanxian Jiang, Xiaowei Chen, Zhi Li","doi":"10.1109/IAS.2009.220","DOIUrl":"https://doi.org/10.1109/IAS.2009.220","url":null,"abstract":"This paper primarily researches on the feasibility of embedding watermark to relational databases in the Discrete Wavelet Transform (DWT) domain. Watermark embedding is known to be difficult for relational databases. This paper focuses on the analysis of the wavelet high frequency coefficients of corresponding data and gives the definition of the intensive factor. By employing the linear correlation detecting method, this paper proposes the watermarking algorithm, which can embed the watermark into relational database successfully in DWT domain. The watermark can be distributed to different parts of the relational database. Experiments show that the embedded digital watermarks in the proposed algorithm are invisible and some degree of the robustness of the proposed algorithm against the commonly attacks that are used in databases processing.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Emergency Command System for Geologic Disasters Prevention 地质灾害防治应急指挥系统
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.51
Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng
{"title":"Emergency Command System for Geologic Disasters Prevention","authors":"Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng","doi":"10.1109/IAS.2009.51","DOIUrl":"https://doi.org/10.1109/IAS.2009.51","url":null,"abstract":"The emergency command system is an important part in the project of warning, monitoring and geologic disasters prevention in the Three Gorges Reservoir Area, because it can provide a reliable technical guarantee. This paper describes a multimedia emergency command system based on satellite IP link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124576083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression 基于遗传算法和Cox回归的医疗信息系统威胁识别
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.313
R. Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, P. Bath, Z. Ismail
{"title":"Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression","authors":"R. Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, P. Bath, Z. Ismail","doi":"10.1109/IAS.2009.313","DOIUrl":"https://doi.org/10.1109/IAS.2009.313","url":null,"abstract":"Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks 一种高效的移动Ad Hoc网络匿名路由协议
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.267
Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang
{"title":"An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks","authors":"Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang","doi":"10.1109/IAS.2009.267","DOIUrl":"https://doi.org/10.1109/IAS.2009.267","url":null,"abstract":"Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations 基于不完全语言偏好关系的群体决策方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.204
Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang
{"title":"An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations","authors":"Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang","doi":"10.1109/IAS.2009.204","DOIUrl":"https://doi.org/10.1109/IAS.2009.204","url":null,"abstract":"This study not only applies Multi-Criteria Decision Making with Incomplete Linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise comparison algorithms to construct but also expansion group decision making model. When the decision maker is carrying out the pairwise comparison, the following problems can be avoided: time pressure, lack of complete information, the decision maker is lack of this professional knowledge, or the information provided is unreal and thus it is difficult to obtain information.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Hardware/Software Codesign of Resource Constrained Real-Time Systems 资源受限实时系统的软硬件协同设计
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.19
Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh
{"title":"Hardware/Software Codesign of Resource Constrained Real-Time Systems","authors":"Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh","doi":"10.1109/IAS.2009.19","DOIUrl":"https://doi.org/10.1109/IAS.2009.19","url":null,"abstract":"System-level design methods can provide a systematic and effective way of evaluating various design options, thus shortening the product development time. This paper relaxes the HC algorithm by considering the K best candidates in each clustering iteration to alleviate the possibility of being trapped in local minimum during hardware/software (HW/SW) partition. We also present an architecture mapping algorithm together with the defined sensitivity measure to further reduce the hardware requirement. Simulation results show that the complexity of exploration time can be greatly reduced with only little performance loss as compared to the exhaustive search. The proposed algorithm can thus provide a good compromise between exploration time and accuracy.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信