2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

筛选
英文 中文
A review of recent advances on multimedia watermarking security and design implications for digital Quran computing 综述了多媒体水印安全及其对数字古兰经计算的设计意义
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013139
O. Tayan, Y. Alginahi
{"title":"A review of recent advances on multimedia watermarking security and design implications for digital Quran computing","authors":"O. Tayan, Y. Alginahi","doi":"10.1109/ISBAST.2014.7013139","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013139","url":null,"abstract":"The explosion in the online propagation of digital multimedia suggests that such data is vulnerable to threats, data-manipulation and attack. This problem is further exacerbated when dealing with highly sensitive digital multimedia content such as the Holy Quran, in which the modification/corruption of a single character, diacritic or symbol would regard the entire content as invalid. Hence, the protection of sensitive data and Quran multimedia data in particular is essential to ensure that only the original non-tampered data is propagated with no distortion. Protection schemes include verifying integrity, proof-of-authenticity, tamper-detection and copyright protection. A technique in the literature used to provide the necessary security for such digital content is known as digital watermarking. This paper reviews the state-of-the-art in digital text, image and audio watermarking applicable to sensitive digital content and discusses how those approaches can achieve the required protection, measured against relevant performance metrics and set according to their respective environments and digital formats being used. The main goal of this paper is to provide an effective study by which to develop new techniques and approaches for the protection of sensitive multimedia content.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A unified approach for unconstrained off-angle iris recognition 一种无约束非角度虹膜识别的统一方法
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013091
Sim Hiew Moi, H. Asmuni, Rohayanti Hassan, R. Othman
{"title":"A unified approach for unconstrained off-angle iris recognition","authors":"Sim Hiew Moi, H. Asmuni, Rohayanti Hassan, R. Othman","doi":"10.1109/ISBAST.2014.7013091","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013091","url":null,"abstract":"Improving the performance of non-idealistic iris recognition has recently become one of the main focus in iris biometric research. In real-world iris image acquisitions, it is common and unavoidable to capture off-angle iris images. Such off-angle iris images are categorized as non-idealistic because they substantially degrade the performance of iris recognition. In this paper, we present a unified framework designed to improve off-angle iris recognition performance. We propose combination of least square ellipse fitting (LSEF) technique and the geometric calibration (GC) technique for the iris segmentation. For off-angle images, the improper location of iris and pupil interferes with the ability to effectively segment the inner boundary and outer boundary of the iris image. With the proposed techniques, inner and outer boundaries are fitted iteratively. For feature extraction, we propose a NeuWave Network (inspired by the Haar wavelet decomposition and neural network). The iris features are represented using the wavelet coefficients. Each different angle of the iris have its own significant coefficient and these coefficient, with a set of weights, then forms the iris template. The approach is evaluated based on recognition accuracy measured by the false rejection, false acceptance rate, and decidability index. We evaluate the algorithms with WVU-IBIDC datasets.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
JPEG mage encryption with Elliptic Curve Cryptography JPEG图像加密与椭圆曲线加密
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013111
Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari
{"title":"JPEG mage encryption with Elliptic Curve Cryptography","authors":"Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013111","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013111","url":null,"abstract":"Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Geometrical and eigenvector features for ear recognition 耳朵识别的几何特征和特征向量特征
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013094
F. Kurniawan, M. Rahim, M. Khalil
{"title":"Geometrical and eigenvector features for ear recognition","authors":"F. Kurniawan, M. Rahim, M. Khalil","doi":"10.1109/ISBAST.2014.7013094","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013094","url":null,"abstract":"Unconstrained ear biometric means an ear image that has variance in view and pose. This situation is challenging in ear recognition because one ear has various presentation. In this study, two features are considered to handle unconstrained ear image. The features called geometrical feature and eigenvector features. In eigenvector feature, the ear is extracted from six regions then the eigenvector is computed from each of those regions. Each region has capability to represent particular part of the ear image. Another feature is called geometrical feature that reflecting the shape of ear image. The widely used classifier is utilized and it trained with both features. Proposed method outcome is measured to evaluate the recognition rates among single features and fused features. The experiment is carried out on benchmark database collected by University of Science and Technology Beijing (USTB). It shows the proposed method can achieved promising result.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Offline handwriting segmentation for writer identification 脱机手写分割写作者识别
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013086
E. Cermeño, Silvana Mallor, J. A. Sigüenza
{"title":"Offline handwriting segmentation for writer identification","authors":"E. Cermeño, Silvana Mallor, J. A. Sigüenza","doi":"10.1109/ISBAST.2014.7013086","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013086","url":null,"abstract":"In this paper we present a new technique for off-line text-independent handwriting analysis based on segmentation. Segmentation is a common step used in different research works in order to generate connected components that will be processed to extract features (geometry, concavity etc.). Our work focuses in the segmentation process and the information that can be directly extracted from the way a writer joins or separates ink connected components without need of analyzing the components themselves. The proposed multi-segmentation method shows good results tested on its own with real documents from police corps database and suggest an improved way to apply segmentation to other connected component based systems.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131975231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rushing attack against routing protocols in Mobile Ad-Hoc Networks 针对移动Ad-Hoc网络路由协议的匆忙攻击
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013125
S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari
{"title":"Rushing attack against routing protocols in Mobile Ad-Hoc Networks","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013125","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013125","url":null,"abstract":"Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routing protocols in MANETs. Although there are many researches over Rushing attacks, the security research community suffers from a famine of evidence to present the exact position of this kind of attacks in MANETs clearly. Therefore, we paid particular attention to this issue to clarify the position of Rushing attacks against routing protocols and the functionality of this category of attacks. We hope that our document be useful for other researchers in understanding mentioned issue in face with this class of attacks.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"644 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Effective mining on large databases for intrusion detection 针对入侵检测的大型数据库有效挖掘
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013122
Reza Adinehnia, N. Udzir, L. S. Affendey, I. Ishak, Z. Hanapi
{"title":"Effective mining on large databases for intrusion detection","authors":"Reza Adinehnia, N. Udzir, L. S. Affendey, I. Ishak, Z. Hanapi","doi":"10.1109/ISBAST.2014.7013122","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013122","url":null,"abstract":"Data mining is a common automated way of generating normal patterns for intrusion detection systems. In this work a large dataset is customized to be suitable for both sequence mining and association rule learning. These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system.Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. The main contribution of this work is the evaluation of the association rule learning that can be used for further studies in the field of database intrusion detection systems.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers 基于签名的集成数据挖掘分类器异常入侵检测
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013127
W. Yassin, N. Udzir, Azizol Abdullah, Mohd Taufik Abdullah, H. Zulzalil, Z. Muda
{"title":"Signature-Based Anomaly intrusion detection using Integrated data mining classifiers","authors":"W. Yassin, N. Udzir, Azizol Abdullah, Mohd Taufik Abdullah, H. Zulzalil, Z. Muda","doi":"10.1109/ISBAST.2014.7013127","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013127","url":null,"abstract":"As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to find those intrusive activities as fast as possible with precision. Unfortunately, besides minimizing false alarms; the performance issues related to heavy computational process has become drawbacks to be resolved in this kind of detection systems. In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. Integratingdata mining classifiers such as Naive Bayes and Random Forest can beutilized to decrease false alarms as well as generate signatures based on detection resultsfor future prediction and reducing processing time. Results from a number of experiments using DARPA 1999 and ISCX 2012 benchmark dataset have validated that SADS own better detection capabilities with lower processing duration as contrast to conventional anomaly-based detection method.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Matching reduction of 2DPalmHash Code 2DPalmHash码的匹配约简
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013107
L. Leng, Ming Li, A. Teoh
{"title":"Matching reduction of 2DPalmHash Code","authors":"L. Leng, Ming Li, A. Teoh","doi":"10.1109/ISBAST.2014.7013107","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013107","url":null,"abstract":"2DPalmHash Code (2DPHC), which is constructed based on Gabor filter, is a cancelable palmprint coding scheme for secure palmprint verification. In this scheme, multiple-translated matchings between two 2DPHCs are performed to remedy the vertical and horizontal dislocation problems of Gabor feature matrix. According to the analysis, vertical translation matching fixes the vertical dislocation, but the horizontal translation matching does not work out horizontal dislocation. Therefore, the computation of multiple-translated matching of 2DPHC can be reduced by discarding the horizontal translation matching. The matching reduction not only reduces the computational complexity of matching, but also improves the verification performance and enhances the changeability capacity of 2DPHC as a cancelable scheme.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using a biometric system to check-in and check-out luggage at airports 使用生物识别系统在机场办理登机手续和托运行李
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013095
R. Hans
{"title":"Using a biometric system to check-in and check-out luggage at airports","authors":"R. Hans","doi":"10.1109/ISBAST.2014.7013095","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013095","url":null,"abstract":"The airline industry is losing millions of dollars each year due to lost or stolen passenger luggage. The current system used for both checking-in and checking-out passengers' luggage has not proven to be effective in curbing luggage loss. On the other hand numerous businesses, including airlines, have turned into biometrics for effective access control and user authentication. It is on the basis of this undisputed success of biometric systems that this research study proposes the extended use of a fingerprint biometric system for passenger luggage check-in and check-out at the airports. The use of biometrics at various international airports in other business areas has yielded positive results. Therefore, the usage of a biometric system for luggage check-in and check-out would be one way of nipping luggage theft in the bud. There are various returns on investing in the proposed biometric system for passenger luggage control at the airports. These returns include, curbing luggage theft resulting in savings of millions of dollars on luggage loss, and improving passenger satisfaction as well as passenger service. The usage of the proposed biometric system at the airports which have not started using biometrics has some limitations. These limitations include the perceived private invasion and user acceptance limitations.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信