2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
RSA/Shift Secured IFFT/FFT Based OFDM Wireless System 基于RSA/Shift安全IFFT/FFT的OFDM无线系统
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.356
D. Rajaveerappa, A. Almarimi
{"title":"RSA/Shift Secured IFFT/FFT Based OFDM Wireless System","authors":"D. Rajaveerappa, A. Almarimi","doi":"10.1109/IAS.2009.356","DOIUrl":"https://doi.org/10.1109/IAS.2009.356","url":null,"abstract":"The research on wireless system is to improve the reliability and performance of wireless radio links. The effects of (multi-path) radio propagation, modulation, and coding and signal processing techniques on the spectrum efficiency and performance of wireless radio networks are studied, in particular Orthogonal Frequency Division Multiplexing (OFDM) and related transmission methods. But the multimedia information is not secured in the wireless environment compared to that of wired environment. In this paper, we have carried out a new method of cryptographic algorithm over a future generation (4G and above) wireless system called the OFDM (FFT (Fast Fourier Transform) / IFFT (Inverse FFT)) technique using Walsh Hadamard spreading codes. We have done the simulation in MATLAB programming and the BER (Bit Error Rate) vs. SNR (Signal-to-Noise Ratio) performance is studied for multimedia signals (such as text, audio and image) in an AWGN wireless channel. We have also developed an algorithm for generating the Walsh codes and the RSA secret keys. We found the results of our simulation are very much satisfactory for practical implementation in wireless systems.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure Access Control Scheme of RFID System Application RFID系统应用的安全访问控制方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.223
Yu-Chih Huang
{"title":"Secure Access Control Scheme of RFID System Application","authors":"Yu-Chih Huang","doi":"10.1109/IAS.2009.223","DOIUrl":"https://doi.org/10.1109/IAS.2009.223","url":null,"abstract":"Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and supply chain application in the future. RFID is intimate linking real and virtual also creates considerable security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and/or privacy were proposed. In this paper, we surveys the literature of hash-based access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Collusion-Resilient Fingerprinting Using Cropping and Subsampling 基于裁剪和子采样的共谋弹性指纹识别
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.343
Yueh-Hong Chen, Hsiang-Cheh Huang
{"title":"Collusion-Resilient Fingerprinting Using Cropping and Subsampling","authors":"Yueh-Hong Chen, Hsiang-Cheh Huang","doi":"10.1109/IAS.2009.343","DOIUrl":"https://doi.org/10.1109/IAS.2009.343","url":null,"abstract":"Valuable images are usually acquired with higher resolution and deeper color depth. Hence, in this paper, we proposed a scheme based on cropping and downsampling to prevent the embedded fingerprints from average attack. We first generate an resized original image for each user with cropping and downsampling. This resized original image belonging to a particular user is then embedded with the fingerprint related to this user. With this method, a coalition of users can still apply average attack on their own fingerprinted images, but the more number of images used, the lower the perceptual quality of the result image will become. The effectiveness of the proposed method is well illustrated by experimental results.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Browser-Side Countermeasures for Deceptive Phishing Attack 欺骗性网络钓鱼攻击的浏览器端对策
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.12
Huajun Huang, Shaohong Zhong, Junshan Tan
{"title":"Browser-Side Countermeasures for Deceptive Phishing Attack","authors":"Huajun Huang, Shaohong Zhong, Junshan Tan","doi":"10.1109/IAS.2009.12","DOIUrl":"https://doi.org/10.1109/IAS.2009.12","url":null,"abstract":"Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing browser-side anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133263412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Towards Secure Content Based Dissemination of XML Documents 基于内容的XML文档安全传播研究
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.138
Mohammad Ashiqur Rahaman, H. Plate, Y. Roudier, A. Schaad
{"title":"Towards Secure Content Based Dissemination of XML Documents","authors":"Mohammad Ashiqur Rahaman, H. Plate, Y. Roudier, A. Schaad","doi":"10.1109/IAS.2009.138","DOIUrl":"https://doi.org/10.1109/IAS.2009.138","url":null,"abstract":"Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector,healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging task. This paper describes a publish/subscribe middleware infrastructure to achieve a content-based dissemination of XML documents. Our approach relies on the dissemination of XML documents based on their semantics, as described by concepts that form an interoperable description of documents. This infrastructure leverages our earlier scheme [1] for protecting the integrity and confidentiality of XML content during dissemination.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems 一种适用于软实时系统的自适应模糊调度和模糊pid性能控制模型
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.269
Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xingmei Zhao
{"title":"An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems","authors":"Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xingmei Zhao","doi":"10.1109/IAS.2009.269","DOIUrl":"https://doi.org/10.1109/IAS.2009.269","url":null,"abstract":"Considering the unsteadiness and unpredictability of a practical task running environment due to the unsteadiness of network communication and the estimation deviation, it is necessary to introduce fuzzy concept and theory to the scheduling and performance control of the soft real-time application systems oriented communication and network fields. In this paper, a new adaptive soft real-time task scheduling model with the fuzzy-PID feedback controller was presented. In this model, we used the fuzzy scheduling algorithm in which the scheduling turn of a ready task is decided by the fuzzy inference result of its criticality and deadline distance. Meanwhile,in the adaptive control part, we used the fuzzy-PID controller that combines the fuzzy feedback controller and PID controller instead of traditonal PID controller. The simulation test shows that our presented model can enable a soft real-time systems which has the mulit-level service characteristic reach the steady state faster and has less miss ratio to more important tasks.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Curvelet Domain Watermark Detection Using Alpha-Stable Models 基于稳定模型的曲线域水印检测
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.21
Chengzhi Deng, Huasheng Zhu, Shengqian Wang
{"title":"Curvelet Domain Watermark Detection Using Alpha-Stable Models","authors":"Chengzhi Deng, Huasheng Zhu, Shengqian Wang","doi":"10.1109/IAS.2009.21","DOIUrl":"https://doi.org/10.1109/IAS.2009.21","url":null,"abstract":"This paper address issues that arise in copyright protection systems of digital images, which employ blind watermark verification structures in the curvelet domain. First, we observe that statistical distribution with heavy algebraic tails, such as the alpha-stable family, are in many cases more accurate modeling tools for the curvelet coefficients than families with exponential tails such as generalized Gaussian. Motivated by our modeling results, we then design a new processor for blind watermark detection using the Cauchy member of the alpha-stable family. We analyze the performance of the new detector in terms of the associated probabilities of detection and false alarm and we compare it to the performance of the generalized Gaussian detector and the traditional correlation-based detector by performance experiments. The experiments prove that Cauchy detector is superior to the others.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Moving Object Tracking Using Symmetric Mask-Based Scheme 基于对称掩码的运动目标跟踪
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.150
Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu
{"title":"Moving Object Tracking Using Symmetric Mask-Based Scheme","authors":"Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu","doi":"10.1109/IAS.2009.150","DOIUrl":"https://doi.org/10.1109/IAS.2009.150","url":null,"abstract":"This work presents a new approach, symmetric mask-based scheme (SMBS), for moving object detection and tracking based on the symmetric mask-based discrete wavelet transform (SMDWT). This work presents a fast algorithm, called 2-D SMDWT, to improve the critical issue of the 2-D lifting-based Discrete Wavelet Transform (LDWT), and then obtains the benefit of low latency, reduced complexity, and low transpose memory for object detection. The successful moving object detection in a real surrounding environment is a difficult task due to noise issues such as fake motion or Gaussian noise. The SMBS approach can effectively reduce noises with low computing cost in both indoor and outdoor environments. The experimental results indicate that the proposed method can provide precise moving object detection and tracking.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Insider Attacks Using Non-negative Matrix Factorization 利用非负矩阵分解检测内部攻击
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.262
J. Platoš, V. Snás̃el, P. Krömer, A. Abraham
{"title":"Detecting Insider Attacks Using Non-negative Matrix Factorization","authors":"J. Platoš, V. Snás̃el, P. Krömer, A. Abraham","doi":"10.1109/IAS.2009.262","DOIUrl":"https://doi.org/10.1109/IAS.2009.262","url":null,"abstract":"It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative Matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the Non-negative Matrix Factorization approach could be also an ideal candidate to detect internal threats.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134424815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Small Moving Infrared Target Detection Algorithm under Low SNR Background 低信噪比背景下红外运动小目标检测算法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.239
Kai Wang, Yan Liu, Xiaowei Sun
{"title":"Small Moving Infrared Target Detection Algorithm under Low SNR Background","authors":"Kai Wang, Yan Liu, Xiaowei Sun","doi":"10.1109/IAS.2009.239","DOIUrl":"https://doi.org/10.1109/IAS.2009.239","url":null,"abstract":"In the infrared imaging guidance system, small targets of infrared image is disturbed by the background and noise, which results in low SNR and brings difficulty to target detection. Therefore, firstly we use mathematical morphology filtering based Top-Hat transform to suppress the background of the digital infrared image. After that, we get the union resulted from WTT and BTT. And then, using adaptive threshold segmentation algorithm, we obtain the image which contains the small target. The experimental results prove that, when the SNR reaches 2, this approach presented by this paper is an effective method for small infrared moving target detection.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133079864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信