首页 > 最新文献

2009 International Conference on Computer and Communications Security最新文献

英文 中文
Research and Realization of the Bank Self-service Terminal Based on XFS Standard 基于XFS标准的银行自助终端的研究与实现
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.8
Zeng Fanfeng, Sun Liwei
This paper discusses adding a new logic processing module which is in line with the WOSA/XFS Standard to the existing self-service terminal. In this module, the mapping relationship of the SP¿Service Provider¿and service call function have been realized because the use of reflection mechanisms, thereby ensuring that the application function has nothing to do with the hardware devices. All that have effectively raise the scalability and manageability of the self-service system to expand, delete and update
本文讨论了在现有的自助服务终端上增加一个新的符合WOSA/XFS标准的逻辑处理模块。在该模块中,由于使用了反射机制,实现了SP服务提供商与服务调用功能的映射关系,从而保证了应用功能与硬件设备无关。这些都有效地提高了自助服务系统的可扩展性和可管理性,便于扩展、删除和更新
{"title":"Research and Realization of the Bank Self-service Terminal Based on XFS Standard","authors":"Zeng Fanfeng, Sun Liwei","doi":"10.1109/ICCCS.2009.8","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.8","url":null,"abstract":"This paper discusses adding a new logic processing module which is in line with the WOSA/XFS Standard to the existing self-service terminal. In this module, the mapping relationship of the SP¿Service Provider¿and service call function have been realized because the use of reflection mechanisms, thereby ensuring that the application function has nothing to do with the hardware devices. All that have effectively raise the scalability and manageability of the self-service system to expand, delete and update","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"158 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of the Customer Relationship Management in Enterprise under the E-Commerce 电子商务环境下企业客户关系管理研究
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.49
Ma Jibin, Sun Yonghao, Wu Xu-yan, Chen Xiaoyan
Fierce market competition forces enterprises to put more and more attentions to the demands of the customer so that the customer relationship management (CRM) becomes increasingly important. Customer relationship management (CRM) is a huge information resource of modern business activity, and almost all the information required in business activity comes from CRM. At the same time, the development of E-Commerce makes CRM become more important to the corporation. Through introducing the importance of the customer satisfaction to the enterprises, this article described the concept of CRM, discussed the relationship between CRM and E-Commerce and at last concluded that CRM is not only a completely new management idea and skill, but also an important part of E-Commerce. Moreover, the specific measures were proposed about the customer relationship management under the E-Commerce environment, which is useful to the development of the enterprises. Lastly but not the least, the inspection mechanism of developing the customer relationship management was introduced to inspect the result of implementing the Customer Relationship Management Under the E-Commerce Environment , which gives the enterprises an effective and perfect method to develop Customer Relationship.
激烈的市场竞争迫使企业越来越重视客户的需求,客户关系管理(CRM)变得越来越重要。客户关系管理(CRM)是现代商业活动的巨大信息资源,商业活动所需的信息几乎都来自于客户关系管理。与此同时,电子商务的发展使得客户关系管理对企业的重要性日益凸显。本文通过介绍客户满意度对企业的重要性,阐述了客户关系管理的概念,讨论了客户关系管理与电子商务的关系,最后得出客户关系管理是一种全新的管理理念和管理技巧,也是电子商务的重要组成部分。并提出了电子商务环境下客户关系管理的具体措施,对企业的发展有一定的借鉴意义。最后,引入客户关系管理开展的检查机制,对电子商务环境下客户关系管理的实施效果进行检查,为企业开展客户关系提供了一种有效而完善的方法。
{"title":"Research of the Customer Relationship Management in Enterprise under the E-Commerce","authors":"Ma Jibin, Sun Yonghao, Wu Xu-yan, Chen Xiaoyan","doi":"10.1109/ICCCS.2009.49","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.49","url":null,"abstract":"Fierce market competition forces enterprises to put more and more attentions to the demands of the customer so that the customer relationship management (CRM) becomes increasingly important. Customer relationship management (CRM) is a huge information resource of modern business activity, and almost all the information required in business activity comes from CRM. At the same time, the development of E-Commerce makes CRM become more important to the corporation. Through introducing the importance of the customer satisfaction to the enterprises, this article described the concept of CRM, discussed the relationship between CRM and E-Commerce and at last concluded that CRM is not only a completely new management idea and skill, but also an important part of E-Commerce. Moreover, the specific measures were proposed about the customer relationship management under the E-Commerce environment, which is useful to the development of the enterprises. Lastly but not the least, the inspection mechanism of developing the customer relationship management was introduced to inspect the result of implementing the Customer Relationship Management Under the E-Commerce Environment , which gives the enterprises an effective and perfect method to develop Customer Relationship.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Research of Intrusion Detection Based on Support Vector Machine 基于支持向量机的入侵检测研究
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.43
Liang Bo, C. Yuan
Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning method is avoided and ensures the stronger extension ability which makes intrusion detection system to have the better detecting performance.
入侵检测在网络安全中占有重要的地位,因此得到了迅速的发展。将基于统计学习理论的支持向量机方法应用于入侵检测系统中,有效地对检测数据进行分类,达到了支持向量机能够准确预测系统异常状态的目的。该方法避免了传统机器学习方法的局限性,保证了更强的扩展能力,使入侵检测系统具有更好的检测性能。
{"title":"The Research of Intrusion Detection Based on Support Vector Machine","authors":"Liang Bo, C. Yuan","doi":"10.1109/ICCCS.2009.43","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.43","url":null,"abstract":"Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning method is avoided and ensures the stronger extension ability which makes intrusion detection system to have the better detecting performance.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"115 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120828019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Image Encryption and Steganography Scheme 一种新的图像加密和隐写方案
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.29
Hongmei Tang, Gaochan Jin, Cuixia Wu, Peijiao Song
With the development of network technique, the research of information security technique is becoming more and more important. In this paper, we proposed a new image encryption and steganography scheme. First, the secret message is encrypted through the combination of a new gray value substitution operation and position permutation which makes the encryption system strong. And then the processed secret message is hidden in the cover image to fulfill steganography. Experimental results show that the scheme proposed in this paper has a high security level and better image stego-image quality.
随着网络技术的发展,信息安全技术的研究变得越来越重要。本文提出了一种新的图像加密和隐写方案。首先,通过一种新的灰度值替换操作和位置置换相结合的方法对秘密信息进行加密,使加密系统具有很强的安全性。然后将处理后的密文隐藏在封面图像中,实现隐写。实验结果表明,该方案具有较高的安全性和较好的图像隐写质量。
{"title":"A New Image Encryption and Steganography Scheme","authors":"Hongmei Tang, Gaochan Jin, Cuixia Wu, Peijiao Song","doi":"10.1109/ICCCS.2009.29","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.29","url":null,"abstract":"With the development of network technique, the research of information security technique is becoming more and more important. In this paper, we proposed a new image encryption and steganography scheme. First, the secret message is encrypted through the combination of a new gray value substitution operation and position permutation which makes the encryption system strong. And then the processed secret message is hidden in the cover image to fulfill steganography. Experimental results show that the scheme proposed in this paper has a high security level and better image stego-image quality.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis and Specification for Civil Aviation Information System 民航信息系统分析与规范
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.31
Zhao Yifei, Zhang De, Yue Ren-tian, S. Yongliang
The significance of building the civil aviation information systems is discussed. Followed by the comparison of China's civil aviation information systems with foreign countries, the important factors of the information system are put forward. By making classification and researching of information systems mainly from airlines, airports and air traffic control, the future development of China's civil aviation information systems is concluded.
论述了建设民航信息系统的意义。通过与国外民航信息系统的比较,提出了我国民航信息系统建设的重要因素。通过对主要从航空公司、机场和空管三个方面的信息系统进行分类和研究,总结了中国民航信息系统的未来发展。
{"title":"Analysis and Specification for Civil Aviation Information System","authors":"Zhao Yifei, Zhang De, Yue Ren-tian, S. Yongliang","doi":"10.1109/ICCCS.2009.31","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.31","url":null,"abstract":"The significance of building the civil aviation information systems is discussed. Followed by the comparison of China's civil aviation information systems with foreign countries, the important factors of the information system are put forward. By making classification and researching of information systems mainly from airlines, airports and air traffic control, the future development of China's civil aviation information systems is concluded.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography 一种改进的基于椭圆曲线密码的代理签名方案
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.36
Xue Sun, Mingping Xia
The proxy signer has the capability to sign on behalf of the original signer in the proxy signature scheme. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). In this paper, we propose a new proxy signature based on elliptic curve cryptography (ECC) In order to overcome the security threats and weaknesses in existing schemes. The scheme uses enhanced one-way hash function based on elliptic curves discrete logarithm problem (ECDLP), which has a low computational cost and small key size. This paper discusses related security, working efficiency and reliability issues.
代理签名者能够在代理签名方案中代表原始签名者进行签名。椭圆曲线数字签名算法(ECDSA)是数字签名算法(DSA)的椭圆曲线模拟。本文提出了一种新的基于椭圆曲线密码(ECC)的代理签名,以克服现有方案的安全威胁和弱点。该方案采用基于椭圆曲线离散对数问题(ECDLP)的增强型单向哈希函数,具有计算成本低、密钥大小小的优点。本文讨论了相关的安全性、工作效率和可靠性问题。
{"title":"An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography","authors":"Xue Sun, Mingping Xia","doi":"10.1109/ICCCS.2009.36","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.36","url":null,"abstract":"The proxy signer has the capability to sign on behalf of the original signer in the proxy signature scheme. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). In this paper, we propose a new proxy signature based on elliptic curve cryptography (ECC) In order to overcome the security threats and weaknesses in existing schemes. The scheme uses enhanced one-way hash function based on elliptic curves discrete logarithm problem (ECDLP), which has a low computational cost and small key size. This paper discusses related security, working efficiency and reliability issues.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129455032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design of the Handled Virtual Instrument Based on Embedded Technology 基于嵌入式技术的手柄式虚拟仪器设计
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.9
Jiang YuXiang, Han Xi
Virtual technology of measurement instrument is a significant technology in the field of information technology application. Taking the embedded microprocessor as the core CPU, this paper adopts the modularization design method and proposes a new system structure of handled virtual instrument combined with hardware circuit design technology, embedded operating system program technology and driver program technology. Further more, this paper solves the high speed and stable transition problem of data under the system environment.
测量仪器虚拟技术是信息技术应用领域的一项重要技术。本文以嵌入式微处理器为核心CPU,采用模块化设计方法,结合硬件电路设计技术、嵌入式操作系统编程技术和驱动程序技术,提出了一种新的处理式虚拟仪器系统结构。进一步解决了系统环境下数据的高速稳定转换问题。
{"title":"Design of the Handled Virtual Instrument Based on Embedded Technology","authors":"Jiang YuXiang, Han Xi","doi":"10.1109/ICCCS.2009.9","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.9","url":null,"abstract":"Virtual technology of measurement instrument is a significant technology in the field of information technology application. Taking the embedded microprocessor as the core CPU, this paper adopts the modularization design method and proposes a new system structure of handled virtual instrument combined with hardware circuit design technology, embedded operating system program technology and driver program technology. Further more, this paper solves the high speed and stable transition problem of data under the system environment.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Processing Methods for Time Frequency Peak Filtering 时频峰值滤波的数据处理方法
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.38
Ling Hongbo, Li Yue, Ye Wenhai
Time-frequency peak filtering is a valid method for attenuation of random noise in the bandlimited nonstationary deterministic signals. In order to reduce the zero-drift errors resulted from processing practical data by TFPF, the fixed zero scaling method is used here to implement TFPF. The zero-drift error generated in the two procedures of TFPF, frequency modulation and peak filtering in time-frequency plane, is related to signal scaling and length of discrete Fourier transform. The quantized error is in inverse ratio to length of discrete Fourier transform, and the zero-drift error is rooted in the varying value scaled from zero. The fixed zero signal scaling is convert the zero to the fixed value in span of instantaneous frequency to decrease the error resulting from discretization and to improve uneven two dimensional signal by TFPF. The segment TFPF technique is used to ensure the amplitude is even in one segment, which can reduce the discretization error in filtered signal and recover the weak signal. The results of simulation and processing seismic common shot data show that the improved TFPF can attenuate the strong random noise and have the less zero-drift errors. This improvement further to make the TFPF practicability.
时频峰值滤波是抑制带限非平稳确定性信号中随机噪声的有效方法。为了减小TFPF处理实际数据时产生的零漂误差,本文采用定零标度方法实现TFPF。TFPF的调频和时频面峰值滤波两个步骤产生的零漂移误差与信号的尺度和离散傅里叶变换的长度有关。量化误差与离散傅里叶变换的长度成反比,零漂移误差来源于从零开始缩放的变化值。固定零信号的标度是将零转换为瞬时频率范围内的固定值,以减小离散化带来的误差,并利用TFPF改善二维信号的不均匀性。采用分段TFPF技术,保证了一段内的幅值均匀,减小了滤波信号的离散误差,恢复了弱信号。模拟和处理地震共炮资料的结果表明,改进后的TFPF能有效地衰减强随机噪声,零漂移误差较小。这一改进进一步提高了TFPF的实用性。
{"title":"Data Processing Methods for Time Frequency Peak Filtering","authors":"Ling Hongbo, Li Yue, Ye Wenhai","doi":"10.1109/ICCCS.2009.38","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.38","url":null,"abstract":"Time-frequency peak filtering is a valid method for attenuation of random noise in the bandlimited nonstationary deterministic signals. In order to reduce the zero-drift errors resulted from processing practical data by TFPF, the fixed zero scaling method is used here to implement TFPF. The zero-drift error generated in the two procedures of TFPF, frequency modulation and peak filtering in time-frequency plane, is related to signal scaling and length of discrete Fourier transform. The quantized error is in inverse ratio to length of discrete Fourier transform, and the zero-drift error is rooted in the varying value scaled from zero. The fixed zero signal scaling is convert the zero to the fixed value in span of instantaneous frequency to decrease the error resulting from discretization and to improve uneven two dimensional signal by TFPF. The segment TFPF technique is used to ensure the amplitude is even in one segment, which can reduce the discretization error in filtered signal and recover the weak signal. The results of simulation and processing seismic common shot data show that the improved TFPF can attenuate the strong random noise and have the less zero-drift errors. This improvement further to make the TFPF practicability.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD 基于BEMD的抗几何攻击鲁棒图像水印算法
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.19
D. Minghui, Zhen Jing-bo
In this paper, we introduce a robust image watermarking method based on bi-dimensional empirical mode decomposition (BEMD) against geometric distortion. Based on the characteristics of the image theory and human visual system, the proposed method makes use of orthogonal properties of empirical mode decomposition to achieve the BEMD transform on the image. The image is decomposed into a series of IMFs and residue which contain the different frequency parts of the image. So the watermark is adaptively weighed to the different positions of the middle frequency IMF region. The method makes use of the multi-scale analysis characteristics of image BEMD theory and the person’s sense of vision and shows excellent advantage against shearing attack. The method could show the watermark clearly when half of the image has been cut. Experimental results show this method excellent robustness for image shearing. The watermark thus generated is invisible and performs well in StirMark test and is robust to geometrical attacks. Compared with other watermarking algorithms, this algorithm is more robust, especially against geometric distortion, while having excellent frequency properties.
本文提出了一种基于二维经验模态分解(BEMD)的抗几何畸变鲁棒图像水印方法。该方法结合图像理论和人类视觉系统的特点,利用经验模态分解的正交特性对图像进行BEMD变换。将图像分解为一系列包含图像不同频率部分的imf和残差。因此,水印可以自适应地对中频IMF区域的不同位置进行加权。该方法利用了图像BEMD理论的多尺度分析特点和人的视觉特征,在抗剪切攻击方面具有优异的优势。该方法可以在截断图像一半的情况下清晰地显示水印。实验结果表明,该方法对图像剪切具有良好的鲁棒性。所生成的水印具有不可见性,在StirMark测试中表现良好,对几何攻击具有较强的鲁棒性。与其他水印算法相比,该算法具有更强的鲁棒性,特别是对几何失真的抗干扰能力,同时具有良好的频率特性。
{"title":"Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD","authors":"D. Minghui, Zhen Jing-bo","doi":"10.1109/ICCCS.2009.19","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.19","url":null,"abstract":"In this paper, we introduce a robust image watermarking method based on bi-dimensional empirical mode decomposition (BEMD) against geometric distortion. Based on the characteristics of the image theory and human visual system, the proposed method makes use of orthogonal properties of empirical mode decomposition to achieve the BEMD transform on the image. The image is decomposed into a series of IMFs and residue which contain the different frequency parts of the image. So the watermark is adaptively weighed to the different positions of the middle frequency IMF region. The method makes use of the multi-scale analysis characteristics of image BEMD theory and the person’s sense of vision and shows excellent advantage against shearing attack. The method could show the watermark clearly when half of the image has been cut. Experimental results show this method excellent robustness for image shearing. The watermark thus generated is invisible and performs well in StirMark test and is robust to geometrical attacks. Compared with other watermarking algorithms, this algorithm is more robust, especially against geometric distortion, while having excellent frequency properties.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies DRM安全策略的模糊效用因子评估与群仿真
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.23
Zhiyong Zhang, J. Pu, Qingtao Wu, Lili Zhang, Danmei Niu
In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors' weights for DRM security policies were proposed based on Fuzzy Analytic Hierarchy Process, and then Swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.
近十年来,DRM(数字版权管理)一直致力于解决数字内容或资产的恶意复制、自由传播和无限制滥用等问题的安全技术。然而,在内容提供者端或用户端实现的一些日益增强的安全策略并没有为内容价值链中的参与者带来最佳效用。提出了基于模糊层次分析法的DRM安全策略效用因子权重评估的层次结构及其算法,并结合权重值对典型安全策略的采用进行了群仿真实验。仿真结果表明,所提出的模糊评价方法有效地实现了安全策略组合的合理最优决策。
{"title":"Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies","authors":"Zhiyong Zhang, J. Pu, Qingtao Wu, Lili Zhang, Danmei Niu","doi":"10.1109/ICCCS.2009.23","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.23","url":null,"abstract":"In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors' weights for DRM security policies were proposed based on Fuzzy Analytic Hierarchy Process, and then Swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1