IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

筛选
英文 中文
Visual robust oblivious watermarking technique 视觉鲁棒无关水印技术
C. Kung, H.H. Hsiao, W. Cheng, Y. Yan
{"title":"Visual robust oblivious watermarking technique","authors":"C. Kung, H.H. Hsiao, W. Cheng, Y. Yan","doi":"10.1109/CCST.2003.1297597","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297597","url":null,"abstract":"With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125767490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysis 使用扫描电子显微镜/能量色散x射线分析底火混合物和枪弹残留物
H. Meng, Hsei-chang Lee, Yu-Liang Chen
{"title":"The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysis","authors":"H. Meng, Hsei-chang Lee, Yu-Liang Chen","doi":"10.1109/CCST.2003.1297587","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297587","url":null,"abstract":"Although the analysis of GSR using SEM/EDX has been thoroughly studied, no literature on the SEM/EDX analysis of primer mixtures of center-fired cartridges has been reported. Thus, not only GSR but also primer mixtures generated from both reference cartridges and confiscated illegal cartridges were analyzed in this work. The aim of this work is to obtain elemental composition data of primer mixtures of handgun cartridges frequently encountered in Taiwan and to provide procedures for identifying cartridge used in criminal activities through elemental analysis of GSR and primer mixtures of suspected cartridge. Twenty-five kinds of cartridges with noncorrosive primers or lead-free primers were disassembled or test-fired to collect primer mixtures or GSR, respectively. Bullet and propellants of unfired ammunition were removed, the cartridge case was deprimed, and primer mixtures were then recovered. Gunshot residue samples were collected from shooter's hand, spent cartridge case, and target surface after test firing. Both primer mixture and GSR samples were then subjected to SEM/EDX analysis. The results revealed that all of the noncorrosive primer mixtures and GSR generated from cartridges with these primers contained unique elemental composition of lead (Pb), barium (Ba), and antimony (Sb). Only Ba and Sb were detected in two kinds of lead-free primer mixtures and GSR generated from cartridges with these primers, where none of Pb, Ba, and Sb were detected in samples from the other four kinds of lead-free cartridges. Characteristic elements of Pb, Ba, and Sb were detected in all primer and GSR samples collected from illegal cartridges and were not detected in samples from police duty cartridges. These results indicated that lead-free cartridges have not yet been used by criminals in Taiwan. The significant elemental difference between GSRs from different sources is especially useful in identifying possible shooter while the fired bullet is missing.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting offensive routers: a straightforward approach 检测攻击性路由器:一个简单的方法
B.-T. Wang, H. Schulzrinne
{"title":"Detecting offensive routers: a straightforward approach","authors":"B.-T. Wang, H. Schulzrinne","doi":"10.1109/CCST.2003.1297604","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297604","url":null,"abstract":"Packet dropping attack (PDA) is a network attack that utilizes compromised network elements to degrade network performance or quality by intentionally dropping a certain amount of IP packets. The major distinction of the PDA from traditional denial-of service (DoS) attack is that some victims do not even discern that they are under attack. Offensive router detection (ORD) is a mechanism capable of detecting offensive routers that are performing the PDA. The ORD mechanism is based on the principle of conservation of flow in the network, and employs a new proposed ICMP message, Caddie message, which records packet forwarding information in the Caddie messages. Therefore, after analyzing the information, we can identify routers that are abnormally dropping packets. We show the advantages of the ORD mechanism over other existing network monitoring mechanisms and discusses storage and bandwidth overhead issues. We also demonstrate the advantages and the effectiveness of the approach by simulating the functionality of the ORD mechanism to detect four different packet-dropping patterns.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Light-weight authentication and billing in mobile communications 移动通信中的轻量级认证和计费
Hsing-Bai Chen, Sue-Chen Hsueh
{"title":"Light-weight authentication and billing in mobile communications","authors":"Hsing-Bai Chen, Sue-Chen Hsueh","doi":"10.1109/CCST.2003.1297567","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297567","url":null,"abstract":"We present an efficient scheme for mobile devices to conduct transactions demanding high security. The use of cryptographic mechanisms is minimized by applying block-ciphers and one-way hash primitives, which can be operated with low-end processors and very little working space. Undeniable billing can be achieved by applying one-way hash chains. Owing to one-way hash functions, the integrity of the masked transactions and the billing information can be verified, even when the masked information is transmitted in public. Complicated cryptographic mechanisms, also the regulations among roaming countries, thus can be eliminated so that a light-weight billing can be achieved.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A simple key agreement protocol 一个简单的密钥协议协议
Eun-Kyung Ryu, Kee-Won Kim, K. Yoo
{"title":"A simple key agreement protocol","authors":"Eun-Kyung Ryu, Kee-Won Kim, K. Yoo","doi":"10.1109/CCST.2003.1297548","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297548","url":null,"abstract":"We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network, allowing low-entropy passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromise. Besides, it is secure against an adversary who captured a host's password file. Since user passwords are stored in a verifier form, the adversary cannot use it directly to compromise security. The proposed scheme here shows that it is more efficient in computational time and communication overhead over the existing schemes.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131062982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Audio content based feature extraction on subband domain 基于子带域的音频内容特征提取
J.-R.J. Shieh
{"title":"Audio content based feature extraction on subband domain","authors":"J.-R.J. Shieh","doi":"10.1109/CCST.2003.1297618","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297618","url":null,"abstract":"Content-based audio feature extraction is key to obtaining important message from audio information. Research in the past several years has focused on the use of speech recognition techniques that are not directly applicable to compressed audio bit stream. However, subband coding based MPEG-1 audio layer III (MP3) is now useful for any system with limited channel capacity for its high quality to bit rate ratio. It has been widely adopted in audio-on-demand, music link via ISDN and digital satellite broadcasting. Message collection is easier if audio content can be extract directly on subband domain. Several useful algorithms are proposed here to manifest this idea.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Contingency planning: emergency preparedness for terrorist attacks 应急计划:针对恐怖袭击的应急准备
H.-M. Wang
{"title":"Contingency planning: emergency preparedness for terrorist attacks","authors":"H.-M. Wang","doi":"10.1109/CCST.2003.1297616","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297616","url":null,"abstract":"The terrorist attack is one type of emergency caused by humans. This emergency is rare, but can cause catastrophic effects. In the aftermath of 9-11, it is proprietary security personnel's responsibility to help every employee get back to \"business as normal\" while at the same time, being prepared for possible terrorist attacks. An up-to-date contingency plan is expected to help security managers to fulfill this role. Security managers should reassess or develop the contingency plan by using the Federal Emergency Management Agency's (FEMA) guidebook. They are encouraged to adopt the Homeland Security Advisory System, or alternatively to develop a simple color-coded system, to response the threats of terrorist attack in stages. They are suggested to consider three factors-top executive's commitment, adequate trainings, and coordination with public agencies-in the planning.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114229205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assigning cryptographic keys to access control in a multi-attribute hierarchy 在多属性层次结构中为访问控制分配加密密钥
Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang
{"title":"Assigning cryptographic keys to access control in a multi-attribute hierarchy","authors":"Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang","doi":"10.1109/CCST.2003.1297582","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297582","url":null,"abstract":"We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of information and communication security forensic technology capability in Taiwan 台湾地区信息通信安全取证技术能力研究
I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin
{"title":"A study of information and communication security forensic technology capability in Taiwan","authors":"I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin","doi":"10.1109/CCST.2003.1297591","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297591","url":null,"abstract":"There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face recognition in a transformed domain 变换域中的人脸识别
M. Faúndez-Zanuy
{"title":"Face recognition in a transformed domain","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2003.1297575","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297575","url":null,"abstract":"This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信