Jun Zhou, Jing Chen, Kun Pan, Cuicui Zhao, Xiaochao Li
{"title":"On the security of key derivation functions in office","authors":"Jun Zhou, Jing Chen, Kun Pan, Cuicui Zhao, Xiaochao Li","doi":"10.1109/ICASID.2012.6325279","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325279","url":null,"abstract":"In Microsoft Office, the file security is mainly protected by user authentication and files encryption. The cryptographic keys are usually derived from a password. Thus, password based key derivation function (PBKDF) is the core of the security scheme. However, the security of the PBKDF of Office is not yet ensured. In this paper, the PBKDF algorithm is analyzed through the game-playing approach and upper bounded of the Adversary's Advantage over the KDF and random function. Based on that, we discussed the practical safety of the Office encrypted files, and show that Office is secure when the user password is longer than 6 characters.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of Physical layers on wireless body area network","authors":"Miaoxin Li, Mingjie Zhuang","doi":"10.1109/ICASID.2012.6325342","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325342","url":null,"abstract":"As a branch of WSN and an important part of the internet of things (IOT), the wireless body area network (WBAN) was originally created to improve the level of personal health care. And with the development of wireless technologies, the application of the WBAN has expanded to entertainment, leisure, military and other fields. So far, IEEE 802 Task Group has published a new IEEE 802.15.6 standard. The standard defines a Medium Access Control (MAC) layer supporting three Physical (PRY) layers. The three PRY layers are narrowband (NB) PRY, ultra wideband (UWB) PRY and human body communication (RBC) PRY. In this paper, the concept and applications of WBAN are introduced; comparisons between 802.11, 802.15.1, 802.15.4 and 802.15.6 are made; and a brief description about the three PRY layers specifications is given. Some existing questions and challenges the WBAN confronts are also analyzed.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved IEEE 802.11 DCF protocol based on TCP/UDP hybrid stream","authors":"Yong Zhang, Yongtao Hu, Bin Wu","doi":"10.1109/ICASID.2012.6325337","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325337","url":null,"abstract":"As a conventional MAC control protocol for wireless networks, IEEE 802.11 DCF hasn't taken account into the requirement, which TCP/UDP hybrid stream access needs for MAC frame length. The TCP/UDP hybrid stream's transmission delay would increase significantly, that always generate failure of TCP stream transmitting. This paper proposes an improved IEEE 802.11 DCF protocol and theory model based on TCP/UDP hybrid streams. The improved protocol mentioned differentiates length between TCP package and UDP package, and adaptively adjusts MAC frame length, which avoids lost packages retransmission and delay from TCP/UDP hybrid stream. The simulation we made to verify that prior estimate for TCP/UDP packages quantities in sole channel can promote throughput of network more than 10% with transmission delay elimination.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121425726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diffusion and wave propagation patterns in computational verb cellular networks","authors":"Kun Wen, Xuezhi Wu, Tao Yang","doi":"10.1109/ICASID.2012.6325330","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325330","url":null,"abstract":"In this paper, on the basis of the computational verb theory, we set special local verb rules and specific initial conditions to try to simulate some phenomena in two dimensional computational verb cellular networks then we get some diffusion and wave propagation patterns. We pick up three typical types to be shown in this paper, that is, ripple propagation patterns, target wave propagation patterns and diamond propagation patterns. And we use ripple propagation patterns to model raindrops ripple. Compared to the traditional physical methods of water wave modeling, the 2D CVCNs could model the phenomena by an easier way. The models which are based on the 2D CVCN reveal that computational verb cellular networks have good capabilities for physical modeling.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of ideal diode","authors":"D. Ma, J. Xing","doi":"10.1109/ICASID.2012.6325307","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325307","url":null,"abstract":"This article describes a P-channel MOSFET ideal diode circuit. The P-channel MOSFET on-resistance that connects the input and output is only 100mΩ in the circuit. In order to ensure the drop voltage from the input to the output is equal to V1(when I1 = 2A, V1 = 256mV), the circuit uses a high-gain amplifier to adjust the gate voltage of the P-channel MOS transistor(MP0). And the circuit also uses a high side current sensing comparator to limit the current that flows through the P-channel MOSFET. The maximum forward current achieves 2A, and the maximum reverse leakage current is 2μA. Simulation results using a 0.5μm BCD process are presented and discussed.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of multi-channel temperature detecting system","authors":"Yuanyuan Chen, Jing Chen","doi":"10.1109/ICASID.2012.6325292","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325292","url":null,"abstract":"There are many occasions we need to test its temperature in real time, such as, grain storage, boilers, etc. The design is mainly studied the establishment and application of multi-channel temperature measurement system. Besides, it has chosen the STC89C52 as the core control chip, and the DS18B20 chips as sensors, also uses Shift register that called 74HC595 to drive the LED, and uses the chip LM7805 to make the voltage of system more stable. Finally, uses the MAX232 chip to convert the level, and to download the program to the microcontroller. The system is so rapid, accurate, reliable, economic, simple that finally realized the multi-channel temperature measurement. The results show that by laboratory test. The temperature ranges from - 55 ° C to 125 ° C, In - 10 ~ + 85 ° C range, the precision of temperature is ±0.5°C. The system is suitable for common occasions of multichannel temperature measure, has great potential for development and practical significance.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121733535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of copy-move forgery image using Gabor descriptor","authors":"Hao-Chiang Hsu, Min Wang","doi":"10.1109/ICASID.2012.6325319","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325319","url":null,"abstract":"In this paper a new forgery detection system which uses a novel feature extraction and located algorithm is proposed. The Gabor feature of image is used to detect the forged image caused by copy and move operations. The Gabor filter with different scaling factors, rotation angles and frequencies are considered to generate the Gabor feature representation of an image. For comparing two images, their Gabor features are applied to find if there is any similarity between them. To reduce the processing time and detect the small copy and move area, an image is divided into small blocks. In each block, it extracts a new descriptor and key points from the Gabor feature of the block image. Furthermore, the proposed method can also locate the duplicated regions precisely and detects the rotation angles and scale factors of the forged image. Experimental result shows that the proposed method can achieve high correct rate, estimated rotation angle and scaling factor. The proposed method has robustness and reliability.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved DCT based zero-watermarking algorithm for text image","authors":"Gui Feng, X. Huang","doi":"10.1109/ICASID.2012.6325285","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325285","url":null,"abstract":"An improved zero-watermarking algorithm, which solving the contradiction between the watermark embedding capacity of and invisibility, was proposed. The zero-watermarking algorithm needn't to modify the carrier; so many watermarking methods can be used and without the need to consider the embedding capacity, and robustness is better than the normal watermarking algorithm. The steps of proposed zero-watermarking algorithm are as follows: first, the text carrier is translated into the corresponding binary image, then use DCT combined with the logistic mapping to construct zero-watermark, the similarity criteria was used for the watermark detection. After many attacking experiments, performance of the algorithm shows that the robustness, invisibility and the watermark capacity of the algorithm, can meet the requirements of practical need.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134521393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and design of high-performance relaxation OSC","authors":"Y. Du, J. Xing","doi":"10.1109/ICASID.2012.6325312","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325312","url":null,"abstract":"A high PSRR, low temperature drift relaxation oscillator is proposed, which operates at a typical frequency of 167KHZ. Under all process Corners, and with the change of power supply from 3V to 6V and temperature from -45°C to 105 °C the frequency error is less than ±1.8%. Trimming circuit is used to guarantee the accuracy of frequency after taping out. Based on the TSMC 0.18μm BCD process, the circuit is simulated to verify the correctness of the design.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification persons-security components of ID card","authors":"R. Holy, J. Kalikova, M. Kalika","doi":"10.1109/ICASID.2012.6325277","DOIUrl":"https://doi.org/10.1109/ICASID.2012.6325277","url":null,"abstract":"Personal identification is everyday struggle between each identified individual and the security personnel. This is equally important on academic grounds where unauthorized individuals could access university resources and university research. Even in case that every member of the academic staff is a holder of the university identification card used for access to restricted areas, computers, library or cafeterias, this identity card can be lost, stolen or borrowed to someone else. Therefore added security in form of combination of more complex chip card architecture and biometric is desired to ensure a proper level of protection.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}