首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
Face Identification based on TV videos 基于电视视频的人脸识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335553
Marcos del Pozo-Baños, C. Travieso, J. B. Alonso, Miguel A. Ferrer
Face recognition has been a main object of study, producing robust systems with high reliability. However, these systems face the inconvenience of long processing times which are, in many cases, unwanted. This paper presents a simple face recognition approach from TV video files based on the redundancy of information and a face recognition system used in regular face pictures. More precisely, the model relies on the Wavelet Transform for parameterize faces and Support Vector Machines in order to classify them. After some experiments, the model has shown perfect accuracy in subject detection and recognition, with maximum delay of around 2 seconds.
人脸识别一直是研究的主要对象,产生了具有高可靠性的鲁棒系统。然而,这些系统面临着处理时间过长的不便,在许多情况下,这是不希望的。本文提出了一种基于信息冗余的简单的电视视频文件人脸识别方法和一种用于常规人脸图像的人脸识别系统。更准确地说,该模型依靠小波变换参数化人脸和支持向量机来对人脸进行分类。经过一些实验,该模型在受试者检测和识别方面表现出了很好的准确性,最大延迟在2秒左右。
{"title":"Face Identification based on TV videos","authors":"Marcos del Pozo-Baños, C. Travieso, J. B. Alonso, Miguel A. Ferrer","doi":"10.1109/CCST.2009.5335553","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335553","url":null,"abstract":"Face recognition has been a main object of study, producing robust systems with high reliability. However, these systems face the inconvenience of long processing times which are, in many cases, unwanted. This paper presents a simple face recognition approach from TV video files based on the redundancy of information and a face recognition system used in regular face pictures. More precisely, the model relies on the Wavelet Transform for parameterize faces and Support Vector Machines in order to classify them. After some experiments, the model has shown perfect accuracy in subject detection and recognition, with maximum delay of around 2 seconds.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliable wireless error correction technique for secure image transmission 可靠的无线纠错技术,用于安全图像传输
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335544
M. A. El-Iskandarani, S. Darwish, S. Abuguba
Robust and secure transmission strategy for high-quality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission scheme that combines chaotic encryption and turbo coding technique into one processing step is proposed. In the proposed scheme, selective encryption algorithm based on two-dimensional chaotic map is utilized for data security. Furthermore, error correction technique based on turbo coding is employed as channel coding for data communication in order to solve the problem of limited bandwidth and throughput. Simulation results show that the proposed scheme achieves high degree of robustness against channel impairments and improve image quality with acceptable data rates.
高质量图像在无线网络中的鲁棒和安全传输策略被认为是一个巨大的挑战。然而,大多数加密图像传输方案没有很好地考虑传输过程中误码的影响,这一问题被认为是一个需要有效编码方案来解决的问题。本文提出了一种改进的无线图像传输方案,该方案将混沌加密和turbo编码技术结合到一个处理步骤中。该方案采用基于二维混沌映射的选择性加密算法来保证数据的安全性。此外,为了解决带宽和吞吐量有限的问题,采用基于turbo编码的纠错技术作为数据通信的信道编码。仿真结果表明,该方案对信道损伤具有较高的鲁棒性,并在可接受的数据速率下提高了图像质量。
{"title":"Reliable wireless error correction technique for secure image transmission","authors":"M. A. El-Iskandarani, S. Darwish, S. Abuguba","doi":"10.1109/CCST.2009.5335544","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335544","url":null,"abstract":"Robust and secure transmission strategy for high-quality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission scheme that combines chaotic encryption and turbo coding technique into one processing step is proposed. In the proposed scheme, selective encryption algorithm based on two-dimensional chaotic map is utilized for data security. Furthermore, error correction technique based on turbo coding is employed as channel coding for data communication in order to solve the problem of limited bandwidth and throughput. Simulation results show that the proposed scheme achieves high degree of robustness against channel impairments and improve image quality with acceptable data rates.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"2 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Radar techniques for human gait automatic recognition 雷达技术用于人体步态自动识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335534
J. Fortuny-Guasch, P. F. Sammartino, J. Petit
In this paper we extend the investigation on the use of Doppler signatures for human motion detection. As it is well known, human movements generate additional Doppler frequencies on top of the main Doppler carrier. In recent times research has been trying to exploit this effect for dynamic feature extraction and, consequently, automatic target recognition. Here a simulation tool is developed and measurements are presented as a term of comparison. Several scenarios that model arbitrary trajectories and multiple targets are analyzed. Finally we provide an insight into the potential using more than one sensor. This may improve dramatically the performance of the system as it does in many other radar applications.
本文扩展了多普勒特征在人体运动检测中的应用研究。众所周知,人体运动在主多普勒载波上产生额外的多普勒频率。近年来,研究人员一直试图利用这一效应进行动态特征提取,从而实现目标的自动识别。这里开发了一个模拟工具,并将测量结果作为比较项。分析了几种模拟任意轨迹和多目标的情况。最后,我们提供了一个洞察使用多个传感器的潜力。这可能大大提高系统的性能,因为它在许多其他雷达应用。
{"title":"Radar techniques for human gait automatic recognition","authors":"J. Fortuny-Guasch, P. F. Sammartino, J. Petit","doi":"10.1109/CCST.2009.5335534","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335534","url":null,"abstract":"In this paper we extend the investigation on the use of Doppler signatures for human motion detection. As it is well known, human movements generate additional Doppler frequencies on top of the main Doppler carrier. In recent times research has been trying to exploit this effect for dynamic feature extraction and, consequently, automatic target recognition. Here a simulation tool is developed and measurements are presented as a term of comparison. Several scenarios that model arbitrary trajectories and multiple targets are analyzed. Finally we provide an insight into the potential using more than one sensor. This may improve dramatically the performance of the system as it does in many other radar applications.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimum tuning of defense settings for common attacks on the web applications 针对web应用程序常见攻击的防御设置进行优化调优
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335560
Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.
来自不同来源的统计数据表明,大约75%的网络攻击发生在web应用程序中,并且这一趋势正在增长。web应用程序的不安全编码或应用程序本身的漏洞尚未修补,都存在较高的安全风险。除了检查源代码的白盒测试、漏洞扫描的黑盒测试或渗透测试外,还可以选择在服务器前端设置防御设施,例如:应用层入侵防御系统,或应用软件和硬件防火墙,以增强防御机制或获得更多时间来修补漏洞。本文利用现代企业广泛使用的应用防火墙,提出了一种优化调优方法。探讨了跨站脚本签名和SQL注入等目前常用的几种攻击方法,并引入了一种新的设置设备参数的方法来加强防御。为了增强后端应用服务器的安全性,我们使用关键字过滤和重处理来排除黑名单,并调整系统设置,使其能够有效地阻止攻击或降低攻击成功的可能性。此外,我们还通过漏洞扫描工具模拟了对网页浏览和应用程序的攻击,以测试应用系统的安全性,并确保对最佳调优参数进行必要的防御。这一概念在我们实施验证测试时确实产生了良好的结果。作为参考,值得推广。
{"title":"Optimum tuning of defense settings for common attacks on the web applications","authors":"Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen","doi":"10.1109/CCST.2009.5335560","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335560","url":null,"abstract":"Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Utilization of audio source localization in security systems 音频源定位在安全系统中的应用
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335518
Petr Dostálek, V. Vasek, V. Kresálek, M. Navrátil
Paper deals with utilization of audio source localization in security systems especially dedicated for additional securing of larger objects like squares or military basis for instance. Proposed detection system supposes that intruder makes uniquely determinable noise which can be picked up by microphone array. On the basis of real-time signal analysis from each microphone unit direction to acoustic source can be determined. In this paper is presented time-delay estimation method of the direction of arrival of the sound wave which is used in many other practical applications. Experimental part proposes design of the evaluation system consisting of microphone sensory system and standard personal computer equipped with Advantech PCI-1716 multifunction data acquisition card.
论文讨论了音频源定位在安全系统中的应用,特别是用于诸如广场或军事基础等较大物体的额外安全。该检测系统假设入侵者发出唯一可确定的噪声,该噪声可被麦克风阵列拾取。在实时信号分析的基础上,可以确定从各传声器单元到声源的方向。本文提出了声波到达方向的时延估计方法,该方法在许多实际应用中得到了应用。实验部分提出了由麦克风传感系统和配备研华PCI-1716多功能数据采集卡的标准个人计算机组成的评价系统设计。
{"title":"Utilization of audio source localization in security systems","authors":"Petr Dostálek, V. Vasek, V. Kresálek, M. Navrátil","doi":"10.1109/CCST.2009.5335518","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335518","url":null,"abstract":"Paper deals with utilization of audio source localization in security systems especially dedicated for additional securing of larger objects like squares or military basis for instance. Proposed detection system supposes that intruder makes uniquely determinable noise which can be picked up by microphone array. On the basis of real-time signal analysis from each microphone unit direction to acoustic source can be determined. In this paper is presented time-delay estimation method of the direction of arrival of the sound wave which is used in many other practical applications. Experimental part proposes design of the evaluation system consisting of microphone sensory system and standard personal computer equipped with Advantech PCI-1716 multifunction data acquisition card.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applying decision analysis process to exterior physical security system technology design and selection 将决策分析过程应用于外部物理安全系统的技术设计与选择
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335519
Han Lin, D. Burnett, D. Sheaffer, E. Arnold
Developing and evaluating exterior physical security system alternatives can be a daunting task. Once alternatives are identified, they must be evaluated not to only the set of threats they provide against, but also to other factors such as cost, performance, schedule and environmental impact. This article describes a systematic approach of applying decision analysis tools and techniques to develop, and quantitatively evaluate a set of design alternatives and its associated security technologies. The intent is to provide an annotated checklist to guide security system designers when dealing with uncertainties in exterior physical security system design.
开发和评估外部物理安全系统的替代方案可能是一项艰巨的任务。一旦确定了替代方案,就必须对它们进行评估,不仅要考虑它们所提供的一系列威胁,还要考虑成本、性能、进度和环境影响等其他因素。本文描述了一种应用决策分析工具和技术来开发和定量评估一组设计备选方案及其相关安全技术的系统方法。目的是提供一个注释清单,指导安全系统设计人员在处理外部物理安全系统设计中的不确定性时。
{"title":"Applying decision analysis process to exterior physical security system technology design and selection","authors":"Han Lin, D. Burnett, D. Sheaffer, E. Arnold","doi":"10.1109/CCST.2009.5335519","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335519","url":null,"abstract":"Developing and evaluating exterior physical security system alternatives can be a daunting task. Once alternatives are identified, they must be evaluated not to only the set of threats they provide against, but also to other factors such as cost, performance, schedule and environmental impact. This article describes a systematic approach of applying decision analysis tools and techniques to develop, and quantitatively evaluate a set of design alternatives and its associated security technologies. The intent is to provide an annotated checklist to guide security system designers when dealing with uncertainties in exterior physical security system design.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Selected problems of color image demosaicing in security imaging 安全成像中彩色图像去马赛克的选择问题
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335521
M. Klima, Petr Dostál
The color TV security cameras are mostly based upon a single-sensor configuration with on-chip CFA (color filter array, Bayer configuration). The impact of different spatial sampling rasters in R G B channels causes an additional image distortion. In the field of security technology the identification task is among very frequent and above-mentioned sampling effect can affect it significantly. There are numerous interpolation algorithms suitable for the demosaicing - recalculation of full resolution R G B rasters. The paper is devoted to the comparison of several selected demosaicing algorithms usually applied in image enhancement of natural images where the subjective image quality is crucial. Our approach is oriented to the evaluation of identification limits in presence of noise and we are studying the noise resistivity of various demosaicing algorithms. We have chosen following demosaicing algorithms: Adaptive Homogeneity-Directed Demosaicing Algorithm and Demosaicing With Directional Filtering and a posteriori Decision and three different types of noise: Photon noise, Thermal noise and salt pepper. In order to evaluate the subjective image quality two approaches are used. The first approach is a standard subjective quality assessment we have applied the identification threshold evaluation. As the second one the objective quality metric of noisy image subjective quality SSIM, Structural SIMilarity index [1] is used. Both identification threshold and subjective quality dependencies are compared in order to evaluate a correlation degree. As test images we have chosen the car registration plate as an example of identification task esp. when the camera is recording images under low-light-level conditions. To keep the noise level precisely defined the test pictures were recorded almost noise-free and the noise was added consequently. The NEF (Nikon Electronic Format) picture format was applied to eliminate in-built image processing in camera.
彩色电视安全摄像机大多基于片上CFA(彩色滤波阵列,拜耳配置)的单传感器配置。在rgb通道中,不同空间采样光栅的影响会导致额外的图像失真。在安全技术领域中,识别任务是非常频繁的,而上述采样效应对识别任务的影响很大。有许多插值算法适用于全分辨率rgb光栅的去马赛克-重计算。本文对自然图像增强中常用的几种去马赛克算法进行了比较,其中主观图像质量是至关重要的。我们的方法是面向评估存在噪声的识别极限,我们正在研究各种反马赛克算法的噪声电阻率。我们选择了以下去马赛克算法:自适应同质定向去马赛克算法和带方向滤波和后检决策的去马赛克,以及三种不同类型的噪声:光子噪声,热噪声和盐胡椒噪声。为了评价主观图像质量,采用了两种方法。第一种方法是标准的主观质量评价,我们应用了识别阈值评价。采用结构相似度指数[1]作为噪声图像主观质量的第二个客观质量度量。通过比较识别阈值和主观质量依赖关系来评价相关程度。作为测试图像,我们选择了汽车车牌作为识别任务的例子,特别是当相机在低光照条件下记录图像时。为了保持噪声水平的精确定义,测试图像的记录几乎是无噪声的,因此添加了噪声。采用NEF(尼康电子格式)图像格式,消除了相机内置的图像处理。
{"title":"Selected problems of color image demosaicing in security imaging","authors":"M. Klima, Petr Dostál","doi":"10.1109/CCST.2009.5335521","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335521","url":null,"abstract":"The color TV security cameras are mostly based upon a single-sensor configuration with on-chip CFA (color filter array, Bayer configuration). The impact of different spatial sampling rasters in R G B channels causes an additional image distortion. In the field of security technology the identification task is among very frequent and above-mentioned sampling effect can affect it significantly. There are numerous interpolation algorithms suitable for the demosaicing - recalculation of full resolution R G B rasters. The paper is devoted to the comparison of several selected demosaicing algorithms usually applied in image enhancement of natural images where the subjective image quality is crucial. Our approach is oriented to the evaluation of identification limits in presence of noise and we are studying the noise resistivity of various demosaicing algorithms. We have chosen following demosaicing algorithms: Adaptive Homogeneity-Directed Demosaicing Algorithm and Demosaicing With Directional Filtering and a posteriori Decision and three different types of noise: Photon noise, Thermal noise and salt pepper. In order to evaluate the subjective image quality two approaches are used. The first approach is a standard subjective quality assessment we have applied the identification threshold evaluation. As the second one the objective quality metric of noisy image subjective quality SSIM, Structural SIMilarity index [1] is used. Both identification threshold and subjective quality dependencies are compared in order to evaluate a correlation degree. As test images we have chosen the car registration plate as an example of identification task esp. when the camera is recording images under low-light-level conditions. To keep the noise level precisely defined the test pictures were recorded almost noise-free and the noise was added consequently. The NEF (Nikon Electronic Format) picture format was applied to eliminate in-built image processing in camera.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Alternate encryption scheme for VoIP traffic VoIP流量的备选加密方案
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335543
N. Thanthry, G. Gopalakrishnan, R. Pendse
Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing security solutions for VoIP such as IPSec, Secure Real Time Protocol (SRTP) and ZRTP use the standard symmetric encryption algorithms for encrypting voice traffic. In this paper, the authors propose an alternate encryption scheme that uses PKI architecture for the initial authentication and key exchange, and encrypts the real-time traffic with a symmetric algorithm using a unique key for each packet. The proposed algorithm expected to be less complex compared to the traditional encryption schemes in addition to enhancing the security of the communication. Initial analysis carried out by the authors indicates that the proposed scheme helps in improving the voice quality to a certain extent while maintaining the security of the communication.
IP语音正迅速成为传统电路交换PSTN网络的有力竞争者。与需要专用线路的PSTN网络不同,VoIP可以共享为承载数据流量和其他流量类别而布置的网络。考虑到网络通信很容易被黑客入侵,保护VoIP和其他实时通信是必要的。现有的VoIP安全解决方案,如IPSec、SRTP (Secure Real Time Protocol)、ZRTP等,大多采用标准的对称加密算法对语音流量进行加密。在本文中,作者提出了一种替代加密方案,该方案使用PKI体系结构进行初始认证和密钥交换,并使用对称算法对每个数据包使用唯一密钥进行实时流量加密。与传统的加密方案相比,该算法在提高通信安全性的同时,简化了加密方案的复杂度。初步分析表明,该方案在保证通信安全性的同时,在一定程度上提高了语音质量。
{"title":"Alternate encryption scheme for VoIP traffic","authors":"N. Thanthry, G. Gopalakrishnan, R. Pendse","doi":"10.1109/CCST.2009.5335543","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335543","url":null,"abstract":"Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing security solutions for VoIP such as IPSec, Secure Real Time Protocol (SRTP) and ZRTP use the standard symmetric encryption algorithms for encrypting voice traffic. In this paper, the authors propose an alternate encryption scheme that uses PKI architecture for the initial authentication and key exchange, and encrypts the real-time traffic with a symmetric algorithm using a unique key for each packet. The proposed algorithm expected to be less complex compared to the traditional encryption schemes in addition to enhancing the security of the communication. Initial analysis carried out by the authors indicates that the proposed scheme helps in improving the voice quality to a certain extent while maintaining the security of the communication.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124035605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The role of systems engineering in security systems design 系统工程在安全系统设计中的作用
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335555
L. Cano, Daniel A. Pritchard1, D. E. Ellis
To design today's complex networks and computerbased physical protection systems require the application of sound Systems Engineering principles and discipline. This paper provides an introduction to using several Systems Engineering tools to design advanced security systems. Examples are given for specific design tasks, and concepts from the US Department of Defense Architecture Framework are introduced.
为了设计当今复杂的网络和基于计算机的物理保护系统,需要应用完善的系统工程原理和学科。本文介绍了如何使用几种系统工程工具来设计先进的安全系统。针对具体的设计任务给出了实例,并介绍了美国国防部架构框架的概念。
{"title":"The role of systems engineering in security systems design","authors":"L. Cano, Daniel A. Pritchard1, D. E. Ellis","doi":"10.1109/CCST.2009.5335555","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335555","url":null,"abstract":"To design today's complex networks and computerbased physical protection systems require the application of sound Systems Engineering principles and discipline. This paper provides an introduction to using several Systems Engineering tools to design advanced security systems. Examples are given for specific design tasks, and concepts from the US Department of Defense Architecture Framework are introduced.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silhouette-based hand recognition on mobile devices 移动设备上基于轮廓的手部识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335548
A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera
Hand Biometric Recognition not only gathers a good performance in identifying individuals but also it is known to be a non-invasive biometric technique. Furthermore, there exist new trends towards mobile implementation developments, focusing on embedding current biometric systems in mobile devices. This paper aims to implement hand biometric recognition with mobile devices.
手部生物识别不仅在个体识别方面具有良好的性能,而且是一种非侵入性的生物识别技术。此外,移动应用的发展也有新的趋势,重点是在移动设备中嵌入当前的生物识别系统。本文旨在利用移动设备实现手部生物特征识别。
{"title":"Silhouette-based hand recognition on mobile devices","authors":"A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera","doi":"10.1109/CCST.2009.5335548","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335548","url":null,"abstract":"Hand Biometric Recognition not only gathers a good performance in identifying individuals but also it is known to be a non-invasive biometric technique. Furthermore, there exist new trends towards mobile implementation developments, focusing on embedding current biometric systems in mobile devices. This paper aims to implement hand biometric recognition with mobile devices.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134264393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1