{"title":"A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid","authors":"F. Knirsch, D. Engel, Z. Erkin","doi":"10.1109/WIFS.2017.8267646","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267646","url":null,"abstract":"Aggregating data in the smart grid is an important issue for obtaining the total consumption of a group of households. In order to aggregate data in a privacy preserving manner, it has to be assured that individual contributions are untraceable and only the sum is visible to an aggregator. For billing, network security and statistical analysis data from different types of customers (e.g., industrial, residential) has to be aggregated separately. This paper presents a fault-tolerant and efficient scheme for aggregating data over different groups while preserving the privacy of the households. We propose to build on the Chinese Remainder Theorem for aggregating over groups and on a fault-tolerant and tree-based approach for increasing efficiency. The resulting protocol is evaluated in terms of privacy, complexity and real-world applicability, such as dynamic joins and leaves.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust secure storage of data sources with perfect secrecy","authors":"Sebastian Baur, H. Boche","doi":"10.1109/WIFS.2017.8267669","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267669","url":null,"abstract":"We consider a secure storage process, that makes use of a biometrie source or a physical unclonable function (PUF) source respectively, from an information theoretic point of view. We consider the storage of the output of a data source that is not necessarily uniformly distributed. We compare different definitions of achievability for the storage model and derive the corresponding capacity region when perfect secrecy is required. The model is generalized to a compound model, taking into account PUF source uncertainty. We also derive the capacity region for the compound storage model requiring perfect secrecy.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracing images back to their social network of origin: A CNN-based approach","authors":"Irene Amerini, Tiberio Uricchio, R. Caldelli","doi":"10.1109/WIFS.2017.8267660","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267660","url":null,"abstract":"Recovering information about the history of a digital content, such as an image or a video, can be strategic to address an investigation from the early stages. Storage devices, smart-phones and PCs, belonging to a suspect, are usually confiscated as soon as a warrant is issued. Any multimedia content found is analyzed in depth, in order to trace back its provenance and, if possible, its original source. This is particularly important when dealing with social networks, where most of the user-generated photos and videos are uploaded and shared daily. Being able to discern if images are downloaded from a social network or directly captured by a digital camera, can be crucial in leading consecutive investigations. In this paper, we propose a novel method based on convolutional neural networks (CNN) to determine the image provenance, whether it originates from a social network, a messaging application or directly from a photo-camera. By considering only the visual content, the method works irrespective of an eventual manipulation of metadata performed by an attacker. We have tested the proposed technique on three publicly available datasets of images downloaded from seven popular social networks, obtaining state-of-the-art results.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaju Huang, Daqing Hou, S. Schuckers, Timothy Law, Adam Sherwin
{"title":"Benchmarking keystroke authentication algorithms","authors":"Jiaju Huang, Daqing Hou, S. Schuckers, Timothy Law, Adam Sherwin","doi":"10.1109/WIFS.2017.8267670","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267670","url":null,"abstract":"Free-text keystroke dynamics is a behavioral biometric that has the strong potential to offer unobtrusive and continuous user authentication. Such behavioral biometrics are important as they may serve as an additional layer of protection over other one-stop authentication methods such as the user ID and passwords. Unfortunately, evaluation and comparison of keystroke dynamics algorithms are still lacking due to the absence of large, shared free-text datasets. In this research, we present a novel keystroke dynamics algorithm, based on kernel density estimation (KDE), and contrast it with two other state-of-the-art algorithms, namely Gunetti & Picardi's and Buffalo's SVM algorithms, using three published datasets, as well as our own new, unconstrained dataset that is an order of magnitude larger than the previous ones. We modify the algorithms when necessary such that they have comparable settings, including profile and test sample sizes. Both Gunetti & Picardi's and our own KDE algorithms have performed much better than Buffalo's SVM algorithm. Although much simpler, the newly developed KDE algorithm is shown to perform similarly as Gunetti & Picardi's algorithm on the three constrained datasets, but the best on our new unconstrained dataset. All three algorithms perform significantly better on the three prior datasets, which are constrained in one way or another, than our new dataset, which is truly unconstrained. This highlights the importance of our unconstrained dataset in representing the real-world scenarios for keystroke dynamics. Lastly, the new KDE algorithm degrades the least in performance on our new dataset.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132168296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nandakumar, N. Ratha, Sharath Pankanti, S. Darnell
{"title":"Secure one-time biometrie tokens for non-repudiable multi-party transactions","authors":"K. Nandakumar, N. Ratha, Sharath Pankanti, S. Darnell","doi":"10.1109/WIFS.2017.8267654","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267654","url":null,"abstract":"Numerous applications require users to interact with a multitude of entities in order to avail a service. In such applications, the identity of the user is typically verified through physical or digital tokens, which are prone to both identity theft (lost or stolen tokens) and repudiation claims by malicious users. The use of biometrics can provide non-repudiability by ensuring that a purchaser is the bonafide user of the service. However, in applications entailing multiple stakeholders, there may be privacy issues with sharing user's biometrics data. While this concern can be addressed by storing the user's biometric data on the token itself, strong mechanisms are required to ensure that token is both secure and tamper-proof. In this paper, we propose a single use biometric token that relies on Shamir's secret sharing algorithm and blockchain technology to ensure that the encrypted biometric template contained in the token is secure, tamper-proof, and any attempt to use the issued token is irrefutably logged to prove subsequently that the user indeed availed the service. We also analyze issues related to the system security, user privacy, and usability of the proposed solution.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensitivity analysis in keystroke dynamics using convolutional neural networks","authors":"Hayreddin Çeker, S. Upadhyaya","doi":"10.1109/WIFS.2017.8267667","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267667","url":null,"abstract":"Biometrics has become ubiquitous and spurred common use in many authentication mechanisms. Keystroke dynamics is a form of behavioral biometrics that can be used for user authentication while actively working at a terminal. The proposed mechanisms involve digraph, trigraph and n-graph analysis as separate solutions or suggest a fusion mechanism with certain limitations. However, deep learning can be used as a unifying machine learning technique that consolidates the power of all different features since it has shown tremendous results in image recognition and natural language processing. In this paper, we investigate the applicability of deep learning on three different datasets by using convolutional neural networks and Gaussian data augmentation technique. We achieve 10% higher accuracy and 7.3% lower equal error rate (EER) than existing methods. Also, our sensitivity analysis indicates that the convolution operation and the fully-connected layer are the most prominent factors that affect the accuracy and the convergence rate of a network trained with keystroke data.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128532120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolas Rahmouni, Vincent Nozick, J. Yamagishi, I. Echizen
{"title":"Distinguishing computer graphics from natural images using convolution neural networks","authors":"Nicolas Rahmouni, Vincent Nozick, J. Yamagishi, I. Echizen","doi":"10.1109/WIFS.2017.8267647","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267647","url":null,"abstract":"This paper presents a deep-learning method for distinguishing computer generated graphics from real photographic images. The proposed method uses a Convolutional Neural Network (CNN) with a custom pooling layer to optimize current best-performing algorithms feature extraction scheme. Local estimates of class probabilities are computed and aggregated to predict the label of the whole picture. We evaluate our work on recent photo-realistic computer graphics and show that it outperforms state of the art methods for both local and full image classification.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125658200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latent fingerprint segmentation based on convolutional neural networks","authors":"Yanming Zhu, Xuefei Yin, X. Jia, Jiankun Hu","doi":"10.1109/WIFS.2017.8267655","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267655","url":null,"abstract":"Latent fingerprints are important evidences used by law enforcement agencies to identify suspects for centuries. However, due to the poor image quality and complex background noise, separating the fingerprint region-of-interest from complex background is a very challenging problem. This paper proposes a new latent fingerprint segmentation method based on Convolutional Neural Networks (ConvNets). The latent fingerprint segmentation problem is formulated as a classification system, in which a set of elaborately designed ConvNets is learned to classify each patch as either fingerprint or background. Considering the spatial correlation between fingerprint patches, we proposed to train the set of ConveNets using multi-sized overlapping patches to utilize complementary information. Then, a score map is calculated based on the classification results to evaluate the possibility of a pixel belonging to the fingerprint foreground. Finally, a segmentation mask is generated by thresholding the score map and used to delineate the latent fingerprint boundary. Experimental results on NIST SD27 latent database demonstrate that the proposed method outperforms the existing benchmarks in terms of both false detection rate (FDR) and overall segmentation accuracy. Thanks to the off-line training and short segmentation running time, the proposed method is applicable to applications such as latent fingerprint matching.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Bondi, F. Pérez-González, Paolo Bestagini, S. Tubaro
{"title":"Design of projection matrices for PRNU compression","authors":"L. Bondi, F. Pérez-González, Paolo Bestagini, S. Tubaro","doi":"10.1109/WIFS.2017.8267652","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267652","url":null,"abstract":"Photo Response Non-Uniformity (PRNU) is the defacto standard in image source identification, allowing scientists, researchers, forensics investigators and courts to bind a picture under investigation to the specific camera sensor that took the shot at first place. Caused by silicon sensor imperfections, PRNU is characterized as a Gaussian i.i.d weak multiplicative noise embedded into every digital photo at acquisition time. Despite PRNU nearly-flat spectral characteristics, it undergoes several interpolations steps while image is demosaicked and optionally JPEG compressed. In this paper we propose a novel approach to the design of projection matrices tailored to PRNU compression. Joint effect of interpolation and projection on cross-correlation test is first analyzed, in order to derive those conditions that maximize detection while reducing false-alarm probability. A design methodology to build effective projection matrices is then presented, taking into account computational complexity. Validation of the proposed approach is finally performed against state-of-the-art methods on a well known public image dataset.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124110416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended beamforming by sum and difference composite co-array for radio surveillance","authors":"Sho Iwazaki, K. Ichige","doi":"10.1109/WIFS.2017.8267658","DOIUrl":"https://doi.org/10.1109/WIFS.2017.8267658","url":null,"abstract":"This paper presents a way of extended digital beamforming technique by non-uniform array antenna used for radio surveillance. We try to enhance the array degree of freedom (DOF) by combining the concepts of extended (sum and difference) co-arrays, so that we can create a better beampattern with narrower mainbeam and more number of nulls. Performance of the proposed array configuration is evaluated through computer simulation of digital beamforming. We also study the way of modulation/demodulation which is effective for the extended arrays.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}