2008 International Symposium on Biometrics and Security Technologies最新文献

筛选
英文 中文
Performance comparison of four anomaly detectors in detecting self-propagating malware on endpoints 四种异常检测器检测端点上自传播恶意软件的性能比较
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547650
A. Ashfaq, S. A. Khayam
{"title":"Performance comparison of four anomaly detectors in detecting self-propagating malware on endpoints","authors":"A. Ashfaq, S. A. Khayam","doi":"10.1109/ISBAST.2008.4547650","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547650","url":null,"abstract":"Malware detection has emerged been an active area of research over the last few years. Numerous malware detection techniques have been proposed to combat this rapidly evolving threat. Notable of these detection techniques are rate limiting [10], [11] , the sample entropy based malware detection [8], maximum entropy estimation [9] and the TRW algorithm that employs sequential hypothesis testing [4]. Most of these techniques (except rate limiting) have been designed and tested on the network periphery (e.g., gateway router etc.) Recently, network endpoint comprising home and office computers have become the most prevalent and effective launch pads and carriers of malware infections. Moreover, endpoints represent the last (and sometimes the only effective) line of defense against the spread and detection of malware. Therefore, it is important that contemporary anomaly detectors' performances be evaluated on endpoints and under high and low-rate worm propagation attacks. This paper compares the ab2ove four anomaly detection techniques using real endpoint and worm traffic data collected on operational endpoints.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116663699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient and secure remote mutual authentication scheme with smart cards 一个高效、安全的智能卡远程互鉴方案
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547656
M. Khan
{"title":"An efficient and secure remote mutual authentication scheme with smart cards","authors":"M. Khan","doi":"10.1109/ISBAST.2008.4547656","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547656","url":null,"abstract":"Recently, Wu-Chieu proposed a user friendly remote user authentication scheme with smart cards. In this paper, we demonstrate that their scheme is vulnerable and susceptible to the attack and has some practical pitfalls. Their scheme performs unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suspects from the server spoofing attack. Furthermore, their scheme is slow in detecting the wrong input-password, and users cannot change their passwords. To solve the problems found in Wu-Chieu's scheme, we propose an efficient and secure remote mutual authentication scheme by using one-way hash functions. The computational cost and efficiency of the proposed scheme are better than other related published schemes.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards an automated multiagent system to monitor user activities against insider threat 朝着一个自动化的多代理系统,以监控用户的活动,防止内部威胁
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547660
G. Ali, N. A. Shaikh, Z. Shaikh
{"title":"Towards an automated multiagent system to monitor user activities against insider threat","authors":"G. Ali, N. A. Shaikh, Z. Shaikh","doi":"10.1109/ISBAST.2008.4547660","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547660","url":null,"abstract":"The major problems faced by the networks are the hurdles generated by the native users. Survey has proved that the professional security measures are mainly focusing outside threats instead of the insiders. The traditional insider threat protection models do not work efficiently. There is need of an autonomous, robust and flexible model against insider threat. This paper presents an Agent-based User- Profiling model that monitors behaviour of the authorized users in an organization to avoid the risk. The profiling agents in the model record all actions of the authorized user and present all recorded behaviour to the manager agent for further processing. The manager agent creates and updates profiles of the enterprise users to monitor the behaviour so that the threat may be avoided, detected or recovered.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Face recognition techniques (FRT) based on face ratio under controlled conditions 受控条件下基于人脸比例的人脸识别技术
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547653
A.A. Khan, Noorzaman, A. Aziz, M. Dawood
{"title":"Face recognition techniques (FRT) based on face ratio under controlled conditions","authors":"A.A. Khan, Noorzaman, A. Aziz, M. Dawood","doi":"10.1109/ISBAST.2008.4547653","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547653","url":null,"abstract":"Human (2D/3D) face image play a vital role in face recognition (FR). It lies in biometric sciences for human recognition for its authentication and security. The aim of this paper is to present a new emerging face recognition algorithm, this algorithm uses the ratio's of face for the recognition and generate an eight word character code and this code is latterly used as a bar code. This bar can be used further as authentic code for any human being. Our approach is based on pure mathematical face ratio using control conditions.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comprehensive overview of various lip synchronization techniques 全面概述各种唇同步技术
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547666
S. Aggarwal, A. Jindal
{"title":"Comprehensive overview of various lip synchronization techniques","authors":"S. Aggarwal, A. Jindal","doi":"10.1109/ISBAST.2008.4547666","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547666","url":null,"abstract":"The modeling and the presentation of multimedia scenarios are challenges of multimedia applications. One of the central characteristics of multimedia data is that they are heavily time-dependent on temporal relationships that must be maintained during playout. In order to flexibly and efficiently present multimedia data streams to users, media streams must be segmented into media objects and time constraints among these objects must be specified and maintained. There is a lack of unified vision of the whole issue and it is difficult to evaluate and compare existing systems. There exists no common terminology and there has been a lack of comparative work. This was the motivation for the overview of the various lip synchronization techniques in a systematic manner. This paper enables the comparison of different synchronization schemes from unified vision.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Wavelet based palmprint authentication system 基于小波的掌纹认证系统
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547667
Hassan Masood, Mustafa Mumtaz, M. Asif, Afzal Butt, Atif Bin Mansoor, Shoab A. Khan
{"title":"Wavelet based palmprint authentication system","authors":"Hassan Masood, Mustafa Mumtaz, M. Asif, Afzal Butt, Atif Bin Mansoor, Shoab A. Khan","doi":"10.1109/ISBAST.2008.4547667","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547667","url":null,"abstract":"Palmprint based personal verification has quickly entered the biometric family due to its ease of acquisition, high user acceptance and reliability. This paper proposes a palm print based identification system using the textural information, employing different wavelet transforms. The transforms employed have been analyzed for their individual as well as combined performances at feature level. The wavelets used for the analysis are Biorthogonal, Symlet and Discrete Meyer. The analysis of these wavelets is carried out on 500 images, acquired through indigenously made image acquisition system. 500 palmprint obtained from 50 users with 10 samples each have been collected over a period of six months and have been evaluated for the performance of the proposed system. The experimental results obtained from the data have demonstrated the feasibility of the proposed system by exhibiting Genuine Acceptance Rate, GAR of 97.12%.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Pattern recognition using moiré fringe topography and rasrerstereography 基于条纹地形和光栅立体成像的模式识别
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547657
Syed Arif Kamal
{"title":"Pattern recognition using moiré fringe topography and rasrerstereography","authors":"Syed Arif Kamal","doi":"10.1109/ISBAST.2008.4547657","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547657","url":null,"abstract":"Moire fringe topography and rasterstereography are 3-D optical imaging techniques, which provide height and curvature maps of the subject or the object under study. These are non-contact and non-invasive techniques, which project moire and raster grids on the body. The distorted grids contain height and curvature information, which may be recovered using image-processing algorithms. These technique are being applied to face recognition. The information may be stored in the database and not easily accessible to ordinary citizen. Hence, the chances of fake pictures or fabricated patterns are minimized. Techniques are developed to project, simultaneously, moire and raster grids and analyze height and curvature information, separately, using selective optical filtering, which could be used to record height and curvature patterns during a certain action, e. g., uttering a standard word. Edge-based algorithms, combined with moire contours and raster patterns, allow study of face movements through changing height and curvature maps. A multiple-level screening of suspects using these technologies is proposed.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122073666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A new robust digital image watermarking technique based on the Discrete Cosine Transform and Neural Network 基于离散余弦变换和神经网络的鲁棒数字图像水印技术
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547632
A. R. Naghsh Nilchi, A. Taheri
{"title":"A new robust digital image watermarking technique based on the Discrete Cosine Transform and Neural Network","authors":"A. R. Naghsh Nilchi, A. Taheri","doi":"10.1109/ISBAST.2008.4547632","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547632","url":null,"abstract":"This paper presents a new robust digital image watermarking technique based on discrete cosine transform (DCT) and neural network. The neural network is full counter propagation neural network (FCNN). FCNN has been used to simulate the perceptual and visual characteristics of the original image. The perceptual features of the original image have been used to determine the highest changeable threshold values of DCT coefficients. The highest changeable threshold values have been used to embed the watermark in DCT coefficients of the original image. The watermark is a binary image. The pixel values of this image are inserted as zero and one values in the DCT coefficients of the image. The implementation results have shown that this watermarking algorithm has an acceptable robustness versus different kinds of watermarking attacks.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122355942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Cryptanalysis of the chaotic-based key agreement protocols 基于混沌的密钥协议的密码分析
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547651
Xianfeng Guo, Jiashu Zhang
{"title":"Cryptanalysis of the chaotic-based key agreement protocols","authors":"Xianfeng Guo, Jiashu Zhang","doi":"10.1109/ISBAST.2008.4547651","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547651","url":null,"abstract":"Recently, Han-Chang showed that Xiao-Liao-Deng's key agreement protocol based on chaotic maps is vulnerable to man-in-the-middle attack and proposed two improved schemes. One works in clock synchronization, and the other can work without synchronization. They claimed that their schemes are secure against replaying attacks and can establish a shared session key. However, we point out that all the aforementioned schemes are Non-contributory, i.e. the malicious party can predetermine the shared session key by the vice of several Chebyshev polynomials passing through the same point. In particular, we demonstrate that the asynchronous key agreement protocol can't resist replaying attack. Therefore, the use of these schemes for secure applications may be discouraged.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An approach to gait recognition 一种步态识别方法
2008 International Symposium on Biometrics and Security Technologies Pub Date : 2008-04-23 DOI: 10.1109/ISBAST.2008.4547636
C. Nandini, C. N. Ravikumar
{"title":"An approach to gait recognition","authors":"C. Nandini, C. N. Ravikumar","doi":"10.1109/ISBAST.2008.4547636","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547636","url":null,"abstract":"Human gait is a spatio-temporal phenomenon and typifies the motion characteristics of an individual. The gait of a person is easily recognizable when extracted from a sideview of the person. Accordingly, gait-recognition algorithms work best when presented with images where the person walks parallel to the camera (i.e. the image plane).A set of stances or key frames that occur during the walk cycle of an individual is chosen. This paper presents a novel approach adopted in automatic gait recognition in which the silhouette extracted is represented using, maximal information compression index lambda which is nothing but the eigen value for the direction normal to the principle component direction of feature pair (x,y) and extracts the periodicity of the gait and are tested on the data sets and is found to be quite satisfactory in natural walk conditions.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132588231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信