2013 International Symposium on Biometrics and Security Technologies最新文献

筛选
英文 中文
Bitrate-Saving Intra Coding for Depth Video Compression in H.264/MVC Based on D-NOSE Models 基于D-NOSE模型的H.264/MVC中深度视频压缩的帧内编码
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.28
Po-Chun Chang, K. Chung, Wei-Ning Yang, Yong-Huai Huang
{"title":"Bitrate-Saving Intra Coding for Depth Video Compression in H.264/MVC Based on D-NOSE Models","authors":"Po-Chun Chang, K. Chung, Wei-Ning Yang, Yong-Huai Huang","doi":"10.1109/ISBAST.2013.28","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.28","url":null,"abstract":"The DIBR technique generates a 3-D perception through a 2-D color and a depth map sequences. Compressing depth map sequence is necessary for storage and transmission considerations. However, the tradeoff between bit rate reduction and quality degradation from compression should be addressed. We propose a bit rate-saving intra coding scheme which modifies, prior to compression, each depth map to minimize the prediction errors. Empirical results show that the proposed intra coding scheme can substantially reduce the bit rate while preserving the quality of the rendered virtual view.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Multimedia Technology in Case-Based Medical E-Learning 基于案例的医学电子学习中的交互式多媒体技术
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.18
Zong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin
{"title":"Interactive Multimedia Technology in Case-Based Medical E-Learning","authors":"Zong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin","doi":"10.1109/ISBAST.2013.18","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.18","url":null,"abstract":"The study proposes a new interactive-video e-learning system, and the experiment targets are medical interns. The medical interns are necessary to learn through a variety of clinical cases. The system provides the function of case-based multimedia teaching materials. The medical records are depending on different cases, and instructors can online upload and edit them. The record includes text, image, documentary, and the interactive video. Students can know case histories and learn medical treatment from the materials. The proposed interactive-video enables students to interact with video contents while watching the documentaries. It can be used to enhance the effectiveness of learning, and also be used to assess learning outcomes.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124328882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code 基于2DPalmHash码相关分析的转位方向范围
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.40
L. Leng, A. Teoh, Ming Li, M. Khan
{"title":"Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code","authors":"L. Leng, A. Teoh, Ming Li, M. Khan","doi":"10.1109/ISBAST.2013.40","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.40","url":null,"abstract":"Recently two-dimensional (2D) Palm Hash Code was proposed as a cancelable palm print coding scheme for secure palm print verification. However, there is vertical correlation between the vertically adjacent entries of 2DPalmHash Code. Armed with the statistical correlation analysis, an attacker can break into the palm print verification system easier than using brute-force attack. This paper analyzes the relation between the vertical correlation of 2DPalmHash Code and the corresponding vertical correlation of Gabor feature matrix. To suppress the vertical correlation of 2DPalmHash Code, both the real part and imaginary part of Gabor feature matrices, which are extracted along the orientations approaching vertical orientation, are transposed, respectively. The orientation rang suitable for transposition for vertical correlation suppression is determined by both correlation analysis and experimental results.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
New Identity-Based Sequential Aggregate Signature Scheme from RSA 基于RSA的新的基于身份的顺序聚合签名方案
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.25
Jia-Lun Tsai, N. Lo, Tzong-Chen Wu
{"title":"New Identity-Based Sequential Aggregate Signature Scheme from RSA","authors":"Jia-Lun Tsai, N. Lo, Tzong-Chen Wu","doi":"10.1109/ISBAST.2013.25","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.25","url":null,"abstract":"An identity-based sequential aggregate signature (IBSAS) scheme provides a shorter aggregate signature for multiple signers in which each signer has signed his/her own message and all generated signatures are aggregated in sequence. During aggregate signature verification process, a verifier can identify the generated order and the validity of signatures. In 2012, Dou et al. first proposed two new IBSAS schemes based on RSA. One scheme is non-interactive and the other is interactive. This study discovers that the non-interactive IBSAS scheme of Dou et al. is vulnerable to a forgery attack. In our attack, a legal but malicious signer is capable to forge an IBSAS without knowing the other signers' private keys. In order to overcome the weakness, we propose a non-interactive IBSAS scheme based on the identity-based signature scheme of Qian and Cao. We then show that our non-interactive IBSAS scheme is secure against proposed forgery attack.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130780914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme" “基于智能卡的鲁棒远程用户密码认证方案”的密码分析
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.43
S. Kumari, F. B. Muhaya, M. Khan, R. Kumar
{"title":"Cryptanalysis of \"A Robust Smart-Card-Based Remote User Password Authentication Scheme\"","authors":"S. Kumari, F. B. Muhaya, M. Khan, R. Kumar","doi":"10.1109/ISBAST.2013.43","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.43","url":null,"abstract":"Smart card is a widely accepted user authentication tool to ensure only authorized access to resources available via open networks. In 2010, Sood et al. and Song independently examined a smart card based authentication scheme proposed by Xu et al. They showed that in Xu et al.'s scheme an internal user of the system could turn hostile to impersonate other users of the system. Sood et al. and Song also proposed schemes in order to improve scheme proposed by Xu et al.'s. Recently, Chen et al. identified some security problems in the improvements proposed by Sood et al. and Song. To fix these problems Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand, lost smart card attack. Undoubtedly, in their scheme user can also verify the legitimacy of server but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide user anonymity and confidentiality to air messages. In addition, an attacker can guess a user's password from his lost/stolen smart card.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multibit Color-Mapping Steganography Using Depth-First Search 使用深度优先搜索的多比特彩色映射隐写
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.39
Hanzhou Wu, Hongxia Wang
{"title":"Multibit Color-Mapping Steganography Using Depth-First Search","authors":"Hanzhou Wu, Hongxia Wang","doi":"10.1109/ISBAST.2013.39","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.39","url":null,"abstract":"This paper proposes a novel multibit color-mapping steganographic scheme for palette images. Each color in the palette is considered to be a graph node, and a color-graph is constructed according to small color-difference. Some color-nodes in the color-graph are mapped to one bit-sequence with an indefinite length by exploiting a layer-by-layer depth-first search technique. Accordingly, some colors in the palette can be used to represent several secret bits. The major idea of data-embedding process is to modify colors of image pixels. For any pixel to be exploited, a data-hider can always find a bit-sequence mapped by a suitable color that is a prefix of the corresponding secret bit-sequence and replace the original color with the suitable color. Experimental results show that secret data can be embedded and extracted successfully without introducing visual artifacts, and the proposed scheme can gain a larger capacity or maintain quite good image quality.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards 基于智能卡的动态身份认证方案的安全性分析与改进
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.27
Xiong Li, J. Niu, M. Khan, Junguo Liao
{"title":"Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards","authors":"Xiong Li, J. Niu, M. Khan, Junguo Liao","doi":"10.1109/ISBAST.2013.27","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.27","url":null,"abstract":"Remote user authentication is an important and efficient method to ensure security for many network-based application systems. So far, several dynamic identity based authentication schemes have been proposed to protect the user's anonymity. Recently, Sood pointed out the security weaknesses of a dynamic identity based authentication scheme, which was proposed by Wang et al. presented an improved scheme. However, in this paper, we demonstrate that Sood's scheme cannot resist leak of verifier attack, impersonation attack and server spoofing attack. Furthermore, Sood's scheme cannot achieve mutual authentication between the user and the server. Consequently, in this paper, we propose a new dynamic identity based user authentication scheme using elliptic curve cryptosystem to resolve all the aforementioned problems.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"754 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Anonymous Car Rental System Based on NFC 基于NFC的匿名租车系统
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.19
Jia-Ning Luo, Ming-Hour Yang, Ming Yang
{"title":"An Anonymous Car Rental System Based on NFC","authors":"Jia-Ning Luo, Ming-Hour Yang, Ming Yang","doi":"10.1109/ISBAST.2013.19","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.19","url":null,"abstract":"In this paper, we propose an anonymous car rental protocol based on NFC technology. Our main contributions include: (1) Anonymity. Users provide their personal information to a trusted third party (TTP) only. The car hire providers cannot get users' real identity. (2) Unlink ability. Car rental companies are unable to establish any link between users' rental records and users' identity simply by analyzing the rental history. (3) Trace ability. If there are consumer disputes or accidents, the rental company can request that TTP reveal users' identity. (4) Flexibility. Users are free to choose their preferred vehicle. A customer has to register his identity with a TTP via his NFC phone. He should request a temporary anonymous license from TTP and sends it to the rental company. If the license is valid, the company issues a ticket for a specific vehicle to the user over the air. The vehicle authenticates the ticket through the user's NFC phone. Last, after the ticket is authenticated, the user is allowed to drive the car. When a car is returned, the rental company can collect the charges through TTP. If consumer disputes arise or there are accidents, the provider can request that TTP reveal the user's identity.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Geocasting Forwarding Scheme for Mobile Nodes in VANETs vanet中移动节点的地理映射转发方案
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.15
Tz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung
{"title":"A Geocasting Forwarding Scheme for Mobile Nodes in VANETs","authors":"Tz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung","doi":"10.1109/ISBAST.2013.15","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.15","url":null,"abstract":"In this paper, we propose a geocasting forwarding scheme for mobile nodes in vehicle ad hoc networks. Geocasting is used for sending messages to nodes in a specified area. In this paper, we invest the concept of Fermat point region, a region that the sum of distances of the vertices of the triangle to this region is minimum, to forward packets. The Fermat point regions (FPRs) are used as routing regions to forward data packets to the specified area with the greedy routing algorithm. Performance evaluations show that it can improve the packet transmission efficiency during packet geocasting.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133191664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers 基于cordic的三轴加速度计倾斜角度识别算法精度提高及性能评价
2013 International Symposium on Biometrics and Security Technologies Pub Date : 2013-07-02 DOI: 10.1109/ISBAST.2013.33
Wei-Ting Liao, Wen-Yen Lin, W. Cheng, K. Lei, Ming-Yih Lee
{"title":"Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers","authors":"Wei-Ting Liao, Wen-Yen Lin, W. Cheng, K. Lei, Ming-Yih Lee","doi":"10.1109/ISBAST.2013.33","DOIUrl":"https://doi.org/10.1109/ISBAST.2013.33","url":null,"abstract":"In this paper, we analyze the precision of the tilting angles transferred from a 3-axis accelerometer with the previously proposed CORDIC-based tilting angle identification algorithm. We found out two issues of the original 2D-CORDIC operations which would increase the errors of the calculated angles. Hence, we propose the solutions to further enhance the precision of tilting angles calculated in the algorithm. We also evaluate the performance of our algorithm on 5 different platforms with different processor cores ranging from low-end micro-controllers to high-end desktop CPU. The results indicate that the algorithm is extremely suitable for implementation on low cost and low power micro-controllers to perform the real-time and in-line tilting angle computations for its low computation complexity and low memory requirements. As the results, precise tilting angles can be obtained in real-time with a low cost embedded system to be applied in various applications including medical care systems.","PeriodicalId":336156,"journal":{"name":"2013 International Symposium on Biometrics and Security Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133287578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信