{"title":"A review of recent advances on multimedia watermarking security and design implications for digital Quran computing","authors":"O. Tayan, Y. Alginahi","doi":"10.1109/ISBAST.2014.7013139","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013139","url":null,"abstract":"The explosion in the online propagation of digital multimedia suggests that such data is vulnerable to threats, data-manipulation and attack. This problem is further exacerbated when dealing with highly sensitive digital multimedia content such as the Holy Quran, in which the modification/corruption of a single character, diacritic or symbol would regard the entire content as invalid. Hence, the protection of sensitive data and Quran multimedia data in particular is essential to ensure that only the original non-tampered data is propagated with no distortion. Protection schemes include verifying integrity, proof-of-authenticity, tamper-detection and copyright protection. A technique in the literature used to provide the necessary security for such digital content is known as digital watermarking. This paper reviews the state-of-the-art in digital text, image and audio watermarking applicable to sensitive digital content and discusses how those approaches can achieve the required protection, measured against relevant performance metrics and set according to their respective environments and digital formats being used. The main goal of this paper is to provide an effective study by which to develop new techniques and approaches for the protection of sensitive multimedia content.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sim Hiew Moi, H. Asmuni, Rohayanti Hassan, R. Othman
{"title":"A unified approach for unconstrained off-angle iris recognition","authors":"Sim Hiew Moi, H. Asmuni, Rohayanti Hassan, R. Othman","doi":"10.1109/ISBAST.2014.7013091","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013091","url":null,"abstract":"Improving the performance of non-idealistic iris recognition has recently become one of the main focus in iris biometric research. In real-world iris image acquisitions, it is common and unavoidable to capture off-angle iris images. Such off-angle iris images are categorized as non-idealistic because they substantially degrade the performance of iris recognition. In this paper, we present a unified framework designed to improve off-angle iris recognition performance. We propose combination of least square ellipse fitting (LSEF) technique and the geometric calibration (GC) technique for the iris segmentation. For off-angle images, the improper location of iris and pupil interferes with the ability to effectively segment the inner boundary and outer boundary of the iris image. With the proposed techniques, inner and outer boundaries are fitted iteratively. For feature extraction, we propose a NeuWave Network (inspired by the Haar wavelet decomposition and neural network). The iris features are represented using the wavelet coefficients. Each different angle of the iris have its own significant coefficient and these coefficient, with a set of weights, then forms the iris template. The approach is evaluated based on recognition accuracy measured by the false rejection, false acceptance rate, and decidability index. We evaluate the algorithms with WVU-IBIDC datasets.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari
{"title":"JPEG mage encryption with Elliptic Curve Cryptography","authors":"Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013111","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013111","url":null,"abstract":"Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometrical and eigenvector features for ear recognition","authors":"F. Kurniawan, M. Rahim, M. Khalil","doi":"10.1109/ISBAST.2014.7013094","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013094","url":null,"abstract":"Unconstrained ear biometric means an ear image that has variance in view and pose. This situation is challenging in ear recognition because one ear has various presentation. In this study, two features are considered to handle unconstrained ear image. The features called geometrical feature and eigenvector features. In eigenvector feature, the ear is extracted from six regions then the eigenvector is computed from each of those regions. Each region has capability to represent particular part of the ear image. Another feature is called geometrical feature that reflecting the shape of ear image. The widely used classifier is utilized and it trained with both features. Proposed method outcome is measured to evaluate the recognition rates among single features and fused features. The experiment is carried out on benchmark database collected by University of Science and Technology Beijing (USTB). It shows the proposed method can achieved promising result.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offline handwriting segmentation for writer identification","authors":"E. Cermeño, Silvana Mallor, J. A. Sigüenza","doi":"10.1109/ISBAST.2014.7013086","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013086","url":null,"abstract":"In this paper we present a new technique for off-line text-independent handwriting analysis based on segmentation. Segmentation is a common step used in different research works in order to generate connected components that will be processed to extract features (geometry, concavity etc.). Our work focuses in the segmentation process and the information that can be directly extracted from the way a writer joins or separates ink connected components without need of analyzing the components themselves. The proposed multi-segmentation method shows good results tested on its own with real documents from police corps database and suggest an improved way to apply segmentation to other connected component based systems.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131975231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rushing attack against routing protocols in Mobile Ad-Hoc Networks","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013125","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013125","url":null,"abstract":"Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routing protocols in MANETs. Although there are many researches over Rushing attacks, the security research community suffers from a famine of evidence to present the exact position of this kind of attacks in MANETs clearly. Therefore, we paid particular attention to this issue to clarify the position of Rushing attacks against routing protocols and the functionality of this category of attacks. We hope that our document be useful for other researchers in understanding mentioned issue in face with this class of attacks.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"644 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reza Adinehnia, N. Udzir, L. S. Affendey, I. Ishak, Z. Hanapi
{"title":"Effective mining on large databases for intrusion detection","authors":"Reza Adinehnia, N. Udzir, L. S. Affendey, I. Ishak, Z. Hanapi","doi":"10.1109/ISBAST.2014.7013122","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013122","url":null,"abstract":"Data mining is a common automated way of generating normal patterns for intrusion detection systems. In this work a large dataset is customized to be suitable for both sequence mining and association rule learning. These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system.Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. The main contribution of this work is the evaluation of the association rule learning that can be used for further studies in the field of database intrusion detection systems.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Yassin, N. Udzir, Azizol Abdullah, Mohd Taufik Abdullah, H. Zulzalil, Z. Muda
{"title":"Signature-Based Anomaly intrusion detection using Integrated data mining classifiers","authors":"W. Yassin, N. Udzir, Azizol Abdullah, Mohd Taufik Abdullah, H. Zulzalil, Z. Muda","doi":"10.1109/ISBAST.2014.7013127","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013127","url":null,"abstract":"As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to find those intrusive activities as fast as possible with precision. Unfortunately, besides minimizing false alarms; the performance issues related to heavy computational process has become drawbacks to be resolved in this kind of detection systems. In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. Integratingdata mining classifiers such as Naive Bayes and Random Forest can beutilized to decrease false alarms as well as generate signatures based on detection resultsfor future prediction and reducing processing time. Results from a number of experiments using DARPA 1999 and ISCX 2012 benchmark dataset have validated that SADS own better detection capabilities with lower processing duration as contrast to conventional anomaly-based detection method.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matching reduction of 2DPalmHash Code","authors":"L. Leng, Ming Li, A. Teoh","doi":"10.1109/ISBAST.2014.7013107","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013107","url":null,"abstract":"2DPalmHash Code (2DPHC), which is constructed based on Gabor filter, is a cancelable palmprint coding scheme for secure palmprint verification. In this scheme, multiple-translated matchings between two 2DPHCs are performed to remedy the vertical and horizontal dislocation problems of Gabor feature matrix. According to the analysis, vertical translation matching fixes the vertical dislocation, but the horizontal translation matching does not work out horizontal dislocation. Therefore, the computation of multiple-translated matching of 2DPHC can be reduced by discarding the horizontal translation matching. The matching reduction not only reduces the computational complexity of matching, but also improves the verification performance and enhances the changeability capacity of 2DPHC as a cancelable scheme.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a biometric system to check-in and check-out luggage at airports","authors":"R. Hans","doi":"10.1109/ISBAST.2014.7013095","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013095","url":null,"abstract":"The airline industry is losing millions of dollars each year due to lost or stolen passenger luggage. The current system used for both checking-in and checking-out passengers' luggage has not proven to be effective in curbing luggage loss. On the other hand numerous businesses, including airlines, have turned into biometrics for effective access control and user authentication. It is on the basis of this undisputed success of biometric systems that this research study proposes the extended use of a fingerprint biometric system for passenger luggage check-in and check-out at the airports. The use of biometrics at various international airports in other business areas has yielded positive results. Therefore, the usage of a biometric system for luggage check-in and check-out would be one way of nipping luggage theft in the bud. There are various returns on investing in the proposed biometric system for passenger luggage control at the airports. These returns include, curbing luggage theft resulting in savings of millions of dollars on luggage loss, and improving passenger satisfaction as well as passenger service. The usage of the proposed biometric system at the airports which have not started using biometrics has some limitations. These limitations include the perceived private invasion and user acceptance limitations.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}