IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

筛选
英文 中文
Proxy certificates-based digital fingerprinting scheme for mobile communication 基于代理证书的移动通信数字指纹方案
Jae-Gwi Choi, K. Sakurai, Ji-Hwan Park
{"title":"Proxy certificates-based digital fingerprinting scheme for mobile communication","authors":"Jae-Gwi Choi, K. Sakurai, Ji-Hwan Park","doi":"10.1109/CCST.2003.1297624","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297624","url":null,"abstract":"Protection of intellectual property in digital contents has been a subject of research for many years and led to the development of various techniques. Digital fingerprinting scheme is an important class of these techniques. The goal of fingerprinting scheme is to deter people from illegally redistributing digital data. But, the problem of known anonymous fingerprinting schemes is that, being based on computationally unspecified black boxes: secure multiparty computation or minimum disclosure proofs of knowledge. Their complexity is much too high to be implemental in real application. Still less, buyer's memory and computation power is very small in mobile communication. We present an anonymous fingerprinting scheme for mobile communication using mobile agent, which is efficient and feasible from a practical view. The basic primitive used is a proxy certificates. Our proposal satisfies that (1) only the buyer can know the fingerprinted copy however the mobile agent executes its computations instead of him/her, and (2) it reduces amount of the buyer's computations to the minimum and risk about exposure of the buyer's private information which will be occurred owing to delegation.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A detection algorithm for road feature extraction using EO-1 hyperspectral images 一种基于EO-1高光谱图像的道路特征提取检测算法
Tzu-Lung Sun
{"title":"A detection algorithm for road feature extraction using EO-1 hyperspectral images","authors":"Tzu-Lung Sun","doi":"10.1109/CCST.2003.1297541","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297541","url":null,"abstract":"The proposed method takes advantage of spectral information content in the hyperspectral images, EO-1 hyperion, to find road candidates. The assumption of this approach assumes that each pixel in the hyperspectral images is composed of a linear mixing of the reflectance from various components of the Earth's surface. The algorithm derived from the statistical and linear model is used to highlight the targets - road features and to suppress the background features of a scene. After road detection, all potential road candidates have been presented in the detected image. The objective is to avoid predicting uncertain road points and setting complex criteria to form the road network. Finally, the detected road segments will be traced and connected to generate skeletonized results. This proposed approach could be used to detect other linear features, such as a drainage network, from the hyperspectral imagery as well. In this way, the vectorized image could be produced to provide additional thematic layers for further spatial analysis in GIS applications.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Achieving database accountability and traceability using the bitemporal relation 使用双时态关系实现数据库问责制和可追溯性
Huifen. Chen, K. Farn, Dwen-Ren Tsai
{"title":"Achieving database accountability and traceability using the bitemporal relation","authors":"Huifen. Chen, K. Farn, Dwen-Ren Tsai","doi":"10.1109/CCST.2003.1297552","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297552","url":null,"abstract":"Database systems have become the most crucial constructing components of data stores underlying modern application systems. Popular role-based access control model by Sandhu R.S. and E.J. Coyne proposed a way to manage users' access rights. However, employees playing several roles sometimes acquire access rights above their duties. These employees, for their own benefits, are capable of accessing data illegally, modifying or inserting data temporary then illegally outputting data, and finally changing data back to their original status that satisfy integrity of database contents. Usually databases are updated through record overwriting or deleting and are difficult to trace each user transaction. Hence, owners of these database systems, potentially, might become victims of data temporary misuse by criminals. Ooi, Goh, and Tan proposed a dimension space transformation concept based on indexing bitemporal databases1998, which states the concept of transforming one-dimensional time domain to two-dimensional x-y coordinates. We first study state-of-the-art of access control methods, then address role conflicts in access rights, and finally discuss the Bitemporal relation with valid and process time attributes. We further propose an approach, recording database usage trails and transparent to general users, to accomplish all record queries and changes, including insertion, deletion, modification, and retrieving, referenced Ooi, Goh, and Tan's work. Hopefully, this approach might facilitate achieving forensic objects of database traceability and accountability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127088190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virus detection using data mining techinques 使用数据挖掘技术进行病毒检测
Jau-Hwang Wang, P. Deng, Yi-Shen Fan, L. Jaw, Yu-Ching Liu
{"title":"Virus detection using data mining techinques","authors":"Jau-Hwang Wang, P. Deng, Yi-Shen Fan, L. Jaw, Yu-Ching Liu","doi":"10.1109/CCST.2003.1297538","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297538","url":null,"abstract":"Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the Web or reading e-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. An automatic heuristic method to detect unknown computer virus based on data mining techniques, namely decision tree and naive Bayesian network algorithms, is proposed and experiments are carried to evaluate the effectiveness the proposed approach.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
A real-time security surveillance system for personal authentication 一种用于个人身份验证的实时安全监控系统
Y. Chien, Yea-Shuan Huang, S. Jeng, Yao-Hong Tasi, Hung-Xin Zhao
{"title":"A real-time security surveillance system for personal authentication","authors":"Y. Chien, Yea-Shuan Huang, S. Jeng, Yao-Hong Tasi, Hung-Xin Zhao","doi":"10.1109/CCST.2003.1297558","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297558","url":null,"abstract":"We introduce a human surveillance system, which integrated technologies of face tracking, face detection, and face recognition to authenticate personal identity in real time. The system located all of the faces in the view quickly and tracked them all the time even though people crossed. Facial features of a selected target were estimated, and the personal identity was justified. In our designation, spatial and temporal information over a number of continuous frames were accumulated and combined to make the system more stable and robust to unexpected human activities. More than 60 persons of an experiment were trained and recognized in the natural environment. Each of them was effectively authenticated by the system in terms of recognition accuracy and performance.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementing the RSA algorithm on the TI TMS320C55x family RSA算法在TI TMS320C55x系列芯片上的实现
Ren-Junn Hwang, Feng-Fu Su, Loang-Shing Huang, Jen-Kang Peng
{"title":"Implementing the RSA algorithm on the TI TMS320C55x family","authors":"Ren-Junn Hwang, Feng-Fu Su, Loang-Shing Huang, Jen-Kang Peng","doi":"10.1109/CCST.2003.1297621","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297621","url":null,"abstract":"As the rapid progressing of mobile communication systems, personal communication systems have been brought new problems on the security aspects by the new communication technologies. Public-key cryptography technologies offer solutions to many of the existing security problems in communication system. The RSA algorithm is the most popular public-key cryptosystem. We consider how to effectively implement the RSA algorithm on assembler of Texas Instruments TMS320C55x family. Many wireless and mobile devices include the TMS320C55x chip. We propose an efficient method to implement modular exponentiation operation based on TMS320C55x. By the experiments, our implementation method can perform about 6 times of 1024 bits RSA encryption/decryption operations in one second.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A robust watermarking and image authentication technique 一种鲁棒的水印和图像认证技术
C. Kung, T. Truong, J. Jeng
{"title":"A robust watermarking and image authentication technique","authors":"C. Kung, T. Truong, J. Jeng","doi":"10.1109/CCST.2003.1297593","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297593","url":null,"abstract":"In the past several years, there has been an explosive growth in digital imaging technology and applications. Since digital images and video are now widely distributed via the Internet and various public channels, there is an urgent need for copyright protection against unauthorized data reproduction. Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information. Furthermore, it can also provide an alternative solution for image authentication. A robust watermarking and image authentication technique is proposed. The proposed scheme includes two parts. The first is a robust watermarking scheme performed in the frequency domain, which can be used to prove the ownership. The second is a standard signature process, which can be used to prove the integrity of the image. The input of the signature process is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Specification of a video test imagery library (VITAL) 视频测试图像库规范(VITAL)
D. Baker, N. Thomas
{"title":"Specification of a video test imagery library (VITAL)","authors":"D. Baker, N. Thomas","doi":"10.1109/CCST.2003.1297613","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297613","url":null,"abstract":"One function of the Police Scientific Development Branch (PSDB) is to improve the expertise of the UK Government when it purchases intelligent CCTV systems for security and policing applications. To meet this aim, PSDB evaluates and reports on the performance of such systems. To help PSDB to assess these systems rapidly, PSDB is creating a library of representative video footage to form the basis of a video test imagery library (VITAL). In the future, VITAL is used to help to establish baseline standards for performance. PSDB also intends that extracts of VITAL is published on the Internet to guide researchers on the types of footage that require automatic classification. PSDB expects VITAL footage to centre on four scenarios: parked vehicle detection; abandoned luggage detection; outdoor, sterile-zone intruder detection; and doorway surveillance. The contents of the standard video footage is taken from a larger collection set, and be weighted to contain examples of imagery that are on the boundaries of the processing capabilities of current machine-vision technology. PSDB is generating a comprehensive specification through wide consultation and plans to start collecting VITAL imagery in the autumn of 2003.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security of ZLYH-key authentication scheme ZLYH-key认证方案的安全性
Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo
{"title":"Security of ZLYH-key authentication scheme","authors":"Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo","doi":"10.1109/CCST.2003.1297545","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297545","url":null,"abstract":"In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motion tracking of multi-objects for access surveillance based on the panoramic imaging system 基于全景成像系统的门禁监控多目标运动跟踪
Min-Cheng Pan, Yau-Liang Tsai, Yingping Huang
{"title":"Motion tracking of multi-objects for access surveillance based on the panoramic imaging system","authors":"Min-Cheng Pan, Yau-Liang Tsai, Yingping Huang","doi":"10.1109/CCST.2003.1297561","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297561","url":null,"abstract":"Panoramic images, especially focused images, have many applications in surveillance, robot navigation, art, etc. Described here is a CCD camera with a hyperboloidal mirror for acquiring panoramic focused images. This optical imaging system can greatly simplify the process of acquiring an omni-directional view in real time, thereby presenting panoramic still images or offering a panoramic full motion video. With this panoramic imaging system, we propose a novel approach for motion tracking of multiobjects mainly based on the idea of tracking windows. Experimental results are presented with a sequence of frames to demonstrate the superior performance of the proposed algorithm.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信