Po-Chun Chang, K. Chung, Wei-Ning Yang, Yong-Huai Huang
{"title":"Bitrate-Saving Intra Coding for Depth Video Compression in H.264/MVC Based on D-NOSE Models","authors":"Po-Chun Chang, K. Chung, Wei-Ning Yang, Yong-Huai Huang","doi":"10.1109/ISBAST.2013.28","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.28","url":null,"abstract":"The DIBR technique generates a 3-D perception through a 2-D color and a depth map sequences. Compressing depth map sequence is necessary for storage and transmission considerations. However, the tradeoff between bit rate reduction and quality degradation from compression should be addressed. We propose a bit rate-saving intra coding scheme which modifies, prior to compression, each depth map to minimize the prediction errors. Empirical results show that the proposed intra coding scheme can substantially reduce the bit rate while preserving the quality of the rendered virtual view.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Multimedia Technology in Case-Based Medical E-Learning","authors":"Zong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin","doi":"10.1109/ISBAST.2013.18","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.18","url":null,"abstract":"The study proposes a new interactive-video e-learning system, and the experiment targets are medical interns. The medical interns are necessary to learn through a variety of clinical cases. The system provides the function of case-based multimedia teaching materials. The medical records are depending on different cases, and instructors can online upload and edit them. The record includes text, image, documentary, and the interactive video. Students can know case histories and learn medical treatment from the materials. The proposed interactive-video enables students to interact with video contents while watching the documentaries. It can be used to enhance the effectiveness of learning, and also be used to assess learning outcomes.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124328882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code","authors":"L. Leng, A. Teoh, Ming Li, M. Khan","doi":"10.1109/ISBAST.2013.40","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.40","url":null,"abstract":"Recently two-dimensional (2D) Palm Hash Code was proposed as a cancelable palm print coding scheme for secure palm print verification. However, there is vertical correlation between the vertically adjacent entries of 2DPalmHash Code. Armed with the statistical correlation analysis, an attacker can break into the palm print verification system easier than using brute-force attack. This paper analyzes the relation between the vertical correlation of 2DPalmHash Code and the corresponding vertical correlation of Gabor feature matrix. To suppress the vertical correlation of 2DPalmHash Code, both the real part and imaginary part of Gabor feature matrices, which are extracted along the orientations approaching vertical orientation, are transposed, respectively. The orientation rang suitable for transposition for vertical correlation suppression is determined by both correlation analysis and experimental results.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Identity-Based Sequential Aggregate Signature Scheme from RSA","authors":"Jia-Lun Tsai, N. Lo, Tzong-Chen Wu","doi":"10.1109/ISBAST.2013.25","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.25","url":null,"abstract":"An identity-based sequential aggregate signature (IBSAS) scheme provides a shorter aggregate signature for multiple signers in which each signer has signed his/her own message and all generated signatures are aggregated in sequence. During aggregate signature verification process, a verifier can identify the generated order and the validity of signatures. In 2012, Dou et al. first proposed two new IBSAS schemes based on RSA. One scheme is non-interactive and the other is interactive. This study discovers that the non-interactive IBSAS scheme of Dou et al. is vulnerable to a forgery attack. In our attack, a legal but malicious signer is capable to forge an IBSAS without knowing the other signers' private keys. In order to overcome the weakness, we propose a non-interactive IBSAS scheme based on the identity-based signature scheme of Qian and Cao. We then show that our non-interactive IBSAS scheme is secure against proposed forgery attack.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130780914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of \"A Robust Smart-Card-Based Remote User Password Authentication Scheme\"","authors":"S. Kumari, F. B. Muhaya, M. Khan, R. Kumar","doi":"10.1109/ISBAST.2013.43","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.43","url":null,"abstract":"Smart card is a widely accepted user authentication tool to ensure only authorized access to resources available via open networks. In 2010, Sood et al. and Song independently examined a smart card based authentication scheme proposed by Xu et al. They showed that in Xu et al.'s scheme an internal user of the system could turn hostile to impersonate other users of the system. Sood et al. and Song also proposed schemes in order to improve scheme proposed by Xu et al.'s. Recently, Chen et al. identified some security problems in the improvements proposed by Sood et al. and Song. To fix these problems Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand, lost smart card attack. Undoubtedly, in their scheme user can also verify the legitimacy of server but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide user anonymity and confidentiality to air messages. In addition, an attacker can guess a user's password from his lost/stolen smart card.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multibit Color-Mapping Steganography Using Depth-First Search","authors":"Hanzhou Wu, Hongxia Wang","doi":"10.1109/ISBAST.2013.39","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.39","url":null,"abstract":"This paper proposes a novel multibit color-mapping steganographic scheme for palette images. Each color in the palette is considered to be a graph node, and a color-graph is constructed according to small color-difference. Some color-nodes in the color-graph are mapped to one bit-sequence with an indefinite length by exploiting a layer-by-layer depth-first search technique. Accordingly, some colors in the palette can be used to represent several secret bits. The major idea of data-embedding process is to modify colors of image pixels. For any pixel to be exploited, a data-hider can always find a bit-sequence mapped by a suitable color that is a prefix of the corresponding secret bit-sequence and replace the original color with the suitable color. Experimental results show that secret data can be embedded and extracted successfully without introducing visual artifacts, and the proposed scheme can gain a larger capacity or maintain quite good image quality.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards","authors":"Xiong Li, J. Niu, M. Khan, Junguo Liao","doi":"10.1109/ISBAST.2013.27","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.27","url":null,"abstract":"Remote user authentication is an important and efficient method to ensure security for many network-based application systems. So far, several dynamic identity based authentication schemes have been proposed to protect the user's anonymity. Recently, Sood pointed out the security weaknesses of a dynamic identity based authentication scheme, which was proposed by Wang et al. presented an improved scheme. However, in this paper, we demonstrate that Sood's scheme cannot resist leak of verifier attack, impersonation attack and server spoofing attack. Furthermore, Sood's scheme cannot achieve mutual authentication between the user and the server. Consequently, in this paper, we propose a new dynamic identity based user authentication scheme using elliptic curve cryptosystem to resolve all the aforementioned problems.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"754 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Anonymous Car Rental System Based on NFC","authors":"Jia-Ning Luo, Ming-Hour Yang, Ming Yang","doi":"10.1109/ISBAST.2013.19","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.19","url":null,"abstract":"In this paper, we propose an anonymous car rental protocol based on NFC technology. Our main contributions include: (1) Anonymity. Users provide their personal information to a trusted third party (TTP) only. The car hire providers cannot get users' real identity. (2) Unlink ability. Car rental companies are unable to establish any link between users' rental records and users' identity simply by analyzing the rental history. (3) Trace ability. If there are consumer disputes or accidents, the rental company can request that TTP reveal users' identity. (4) Flexibility. Users are free to choose their preferred vehicle. A customer has to register his identity with a TTP via his NFC phone. He should request a temporary anonymous license from TTP and sends it to the rental company. If the license is valid, the company issues a ticket for a specific vehicle to the user over the air. The vehicle authenticates the ticket through the user's NFC phone. Last, after the ticket is authenticated, the user is allowed to drive the car. When a car is returned, the rental company can collect the charges through TTP. If consumer disputes arise or there are accidents, the provider can request that TTP reveal the user's identity.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Geocasting Forwarding Scheme for Mobile Nodes in VANETs","authors":"Tz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung","doi":"10.1109/ISBAST.2013.15","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.15","url":null,"abstract":"In this paper, we propose a geocasting forwarding scheme for mobile nodes in vehicle ad hoc networks. Geocasting is used for sending messages to nodes in a specified area. In this paper, we invest the concept of Fermat point region, a region that the sum of distances of the vertices of the triangle to this region is minimum, to forward packets. The Fermat point regions (FPRs) are used as routing regions to forward data packets to the specified area with the greedy routing algorithm. Performance evaluations show that it can improve the packet transmission efficiency during packet geocasting.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133191664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei-Ting Liao, Wen-Yen Lin, W. Cheng, K. Lei, Ming-Yih Lee
{"title":"Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers","authors":"Wei-Ting Liao, Wen-Yen Lin, W. Cheng, K. Lei, Ming-Yih Lee","doi":"10.1109/ISBAST.2013.33","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.33","url":null,"abstract":"In this paper, we analyze the precision of the tilting angles transferred from a 3-axis accelerometer with the previously proposed CORDIC-based tilting angle identification algorithm. We found out two issues of the original 2D-CORDIC operations which would increase the errors of the calculated angles. Hence, we propose the solutions to further enhance the precision of tilting angles calculated in the algorithm. We also evaluate the performance of our algorithm on 5 different platforms with different processor cores ranging from low-end micro-controllers to high-end desktop CPU. The results indicate that the algorithm is extremely suitable for implementation on low cost and low power micro-controllers to perform the real-time and in-line tilting angle computations for its low computation complexity and low memory requirements. As the results, precise tilting angles can be obtained in real-time with a low cost embedded system to be applied in various applications including medical care systems.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133287578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}