{"title":"Quality-Optimized Authentication of Scalable Media Streams with Flexible Transcoding over Wireless Networks","authors":"Xiaowei Yi, Mingyu Li, Gang Zheng, C. Zheng","doi":"10.1109/MUSIC.2012.33","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.33","url":null,"abstract":"Media authentication is becoming an increasingly important issue in wireless transmission. Authenticated media content is required to be transcoded at intermediate to accommodate heterogeneous applications. In this paper, an efficient stream authentication approach is proposed for scalable lossy media streams. At first, we describe a joint coding and stream authentication (JCSA) media transmission framework for flexible and secure transcoding. After that, we propose a generalized quality-optimized stream authentication (QOSA) model to achieve optimal end-to-end quality and minimize the authentication overhead. Furthermore, an implementation on the consultative committee for space data systems image data compression (CCSDS IDC) coder is realized by using graph-based and error-correction coding based (ECC-based) authentication. Experimental results demonstrate that the proposed scheme is able to provide high packet-loss robustness at the cost of a very low overhead.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments","authors":"Sigrid Schefer-Wenzl, Mark Strembeck","doi":"10.1109/MUSIC.2012.29","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.29","url":null,"abstract":"With ubiquitous computing technologies, business processes become more mobile and distributed and are executed in varying contexts. Context-aware access control mechanisms are an important prerequisite to protect sensitive data and services in secure ubiquitous computing environments. In an IT-supported workflow, process-related context constraints are a means to consider context information in access control decisions. A context constraint specifies that certain conditions must be fulfilled to permit the execution of a particular task. However, standard process modeling languages do not support the notion of context constraints in business processes. In this paper, we integrate context constraints with process-related role-based access control (RBAC) models and thereby support context-dependent task execution.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131572524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Credit Card Fraud Detection: Personalized or Aggregated Model","authors":"M. I. Alowais, Lay-Ki Soon","doi":"10.1109/MUSIC.2012.27","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.27","url":null,"abstract":"Banking industry suffers lost in millions of dollars each year caused by credit card fraud. Tremendous effort, time and money have been spent to detect fraud where there are studies done on creating personalized model for each credit card holder to identify fraud. These studies claimed that each card holder carries different spending behavior which necessitates personalized model. However, to the best of our knowledge, there has not been any study conducted to verify this hypothesis. Hence, in this paper, we investigate the effectiveness of personalized models compared to the aggregated models in identify fraud for different individuals. For this purpose, we have collected some actual transactions and some other data through an online questionnaire. We have then constructed personalized and aggregated models. The performance of these models is evaluated using test data set to compare their accuracy in identifying fraud for different individuals. To our surprise, the experimental results show that aggregated models outperforms personalized models. Besides, we have also compared the performance of the random forest and Naïve Bayes in creating the models for fraud detection. Generally, random forest performs better than the Naïve Bayes for the aggregated model while Naïve Bayes performs better in the personalized models.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizing User Behavior in Weibo","authors":"Zhengbiao Guo, Zhitang Li, Hao Tu, Long Li","doi":"10.1109/MUSIC.2012.18","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.18","url":null,"abstract":"Online social networks (OSNs) have become the most popular services on the Internet, and such systems have become part of users' life all over the world. They visit such systems every day and spend more and more time on them. So understanding users' behavior is important to understand such systems. This paper presents results from our measurement on the large-scale OSN spanned by Weibo, the most prevalent and largest microblog system in China at present. Here we talked about two topics: (I) who use Weibo, and (II) what is the users' behavior. We spend one year to persistently observe Weibo, and using API to collect more than 20 million users' profiles to find out that they are and what is their behavior, which is rarely discussed by other researchers. Our studies reveal the users' behavior in Weibo, and we believe our findings make opportunities for in-depth studies of online social network and improve design of such systems.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116830354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yo-Ping Huang, Shin-Liang Lai, Tsun-Wei Chang, M. Horng
{"title":"Query-by-Humming/Singing of MIDI and Audio Files by Fuzzy Inference System","authors":"Yo-Ping Huang, Shin-Liang Lai, Tsun-Wei Chang, M. Horng","doi":"10.1109/MUSIC.2012.15","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.15","url":null,"abstract":"Music Information Retrieval (MIR) is a crucial topic in the domain of information retrieval. According to major characteristics of music, Query-by-Humming system retrieves interesting music by finding melody that contains similar or equal melody to the humming query. Basing on the designed fuzzy inference model a novel Query-by-Humming/Singing system is proposed to extract pitch contour information from WAV and MIDI files in this paper. To verify the effectiveness of the presented work, the MIREX QBSH Database is employed as our experimental database and a large amount of human vocal data is used as query to test the robustness of MIR. Then, the Longest Common Subsequence (LCS) is served as an approximate matching algorithm to identify the most related top 5 music as an evaluation standard for the system. Experimental results show that the proposed system achieves 85% accuracy in the top 5 retrievals.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-level Fuzzy Comprehensive Evaluation Approach for Message Verification in VANETs","authors":"Bo-Chao Cheng, Guo-Tan Liao, Chun-Yu Chen, Huan Chen","doi":"10.1109/MUSIC.2012.38","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.38","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) are a promising new research area with the potential to revolutionize intelligent transportation systems (ITS) in the near future. Equipping vehicles with computers and wireless communication devices, VANETs have led to new applications including real-time monitoring of traffic, dynamic route scheduling and emergency information dissemination. However, the security of communicated information is of paramount importance. In this paper, we propose a novel VANET trust system that utilizes the multi-level fuzzy comprehensive evaluation (FCE) model together with an Analytic Hierarchy Process (AHP) to evaluate the trustworthiness and accuracy of information propagating in a VANET. Experimental results demonstrate that the proposed approach can detect malicious nodes efficiently without complicated key exchange processes and does not compromise on privacy.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124652584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-Oriented Wireless Multimedia Sensor Network Middleware Using Infra-Red Cameras","authors":"Fatemeh Sheikhha, M. Moghaddam","doi":"10.1109/MUSIC.2012.47","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.47","url":null,"abstract":"Wireless multimedia sensor networks (WMSNs) provide new trends in data capturing. WMSNs characteristics such as limited resources and restricted power in addition to multimedia specifications such as high-bandwidth and real-time constraints have made programming for such networks complicated. To provide a high-level interface for programmers and end users a middleware is needed between OS layer and applications to hide low-level details. None of the existing middle-wares has focused especially on multimedia ones. In this article, we propose a middleware named SAWM based on network architecture suitable for WMSNs. This Network architecture is a three layered one that is composed of infra-red sensors, visual sensors and smart cameras. SAWM is a service-oriented agent-based middleware. It looks at the network as a service provider composed of several services that programmers just need to put needed services in an order and create a relation between them to make an execution flow. As a result code updates can be easily done and less memory is used for keeping programming codes. The proposed model is evaluated using a case study trying to commit a monitoring task.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128770356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Density Maps: Determining Where to Sample in Participatory Sensing Systems","authors":"D. Mendez, M. Labrador","doi":"10.1109/MUSIC.2012.14","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.14","url":null,"abstract":"Participatory sensing (PS) systems are a new emerging sensing paradigm based on the participation of cellular users. While they present interesting characteristics, such as spatiotemporal granularity and low cost, they also create new problems and challenges. One key challenge in PS systems is that of the determination of the locations and number of users where to obtain samples from so that we can accurately represent the variable of interest with a low number of participants. This paper proposes the use of density maps, based on the current estimations of the variable, to address this challenge. The density maps are then utilized by the incentive mechanism in order to encourage the participation of those users indicated in the map. Our results show how the density maps greatly improve the quality of the estimations while maintaining a stable and low total number of users in the system.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122817016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Head-Mounted Display for Action Sports","authors":"R. Hoskinson, Etienne Naugle","doi":"10.1109/MUSIC.2012.9","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.9","url":null,"abstract":"We describe a highly portable head-mounted display designed for use in action sports such as skiing and snowboarding. The low field-of-view, monocular display is designed to keep distraction to a minimum and not impede the mobility of the wearer. Implications of the location of the monocular display are discussed. The driving electronics and power source are small enough so that no tethering is needed, all electronics are attached to the display.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UVote: A Ubiquitous E-voting System","authors":"Reem Abdelkader, M. Youssef","doi":"10.1109/MUSIC.2012.20","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.20","url":null,"abstract":"Traditional e-voting systems replace the paper-based process with an electronic one at official voting locations. Remote e-voting, where the voter can vote from any location, increases both participation rates in the elections and the user's satisfaction as it eases the voting process and saves time. However, having a remote e-voting system increases the security vulnerabilities. Those vulnerabilities include harder user authentication, possibility of malicious software on the user's devices, network malicious nodes, coercion, and vote-selling. We introduce UVote as a ubiquitous, convenient, verifiable, and incoercible democratic e-voting system. UVote works as a front-end to many of the current traditional e-voting systems, providing the user with a convenient voting solution with guarantees on security, achieving the best of both worlds. The key design principal in UVote is redundancy at system architecture different components, including voting devices, vote verification, and allowing voting multiple times. We present the UVote architecture and how it leverages redundancy to achieve its goals. We also analyze the different possible attacks and how UVote combats them. Evaluation of the system performance shows that these advantages come with minimal performance overhead. This highlights that UVote is a truly ubiquitous e-voting system.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}