首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
Combining hand biometric traits for personal identification 结合手部生物特征进行个人识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335547
Miguel A. Ferrer, A. Morales, C. Travieso, J. B. Alonso
The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture and vein pattern of hand dorsum is presented.
自2003年以来,手部生物特征融合一直是一个非常活跃的研究课题。本文第一部分简要介绍了结合手部生物特征的技术。总结表明,为了提高基于手的生物识别方案的性能,增加新的基于手的特征有明显的趋势,因此,本文提出了一种结合手几何、掌纹、手指纹理和手背静脉模式的实验。
{"title":"Combining hand biometric traits for personal identification","authors":"Miguel A. Ferrer, A. Morales, C. Travieso, J. B. Alonso","doi":"10.1109/CCST.2009.5335547","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335547","url":null,"abstract":"The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture and vein pattern of hand dorsum is presented.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Standardised procedures for evaluating PIDS — An update 评估PIDS的标准化程序-更新
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335535
J. Thompson, Craig Devine, Carinna Brown, S. Tarr
The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development of these standards and subsequent evaluations is discussed. Particular emphasis is given to the new standard for rapidly deployable PIDS and the current ongoing trial of several free-standing PIDS, using a purpose-built evaluation area. The evaluation area is comprised of 100m long, 7m wide tarmac and gravel strips, which run parallel to each other and allow a comparison of the performance of the same PIDS technology types over different surfaces. This will be the first free-standing PIDS evaluation conducted against the newly developed evaluation standard. It is expected to yield results on the effects that different surfaces may have on the performance of free-standing PIDS.
英国内政部科学发展部门与国家基础设施保护中心合作,一直在开发一套测试屏障安装、地面、独立和快速部署的周边入侵者检测系统(PIDS)的标准。这些标准允许在性能基础上比较不同的技术。讨论了这些标准的制定进展和随后的评价。特别强调了快速部署PIDS的新标准和目前正在使用专门建造的评价区试验几个独立的PIDS。评估区域由100米长、7米宽的柏油路和砾石条组成,它们彼此平行,可以比较相同的pid技术类型在不同表面上的性能。这将是根据新制定的评价标准进行的第一次独立的pid评价。期望得到不同表面对独立式pid性能影响的结果。
{"title":"Standardised procedures for evaluating PIDS — An update","authors":"J. Thompson, Craig Devine, Carinna Brown, S. Tarr","doi":"10.1109/CCST.2009.5335535","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335535","url":null,"abstract":"The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development of these standards and subsequent evaluations is discussed. Particular emphasis is given to the new standard for rapidly deployable PIDS and the current ongoing trial of several free-standing PIDS, using a purpose-built evaluation area. The evaluation area is comprised of 100m long, 7m wide tarmac and gravel strips, which run parallel to each other and allow a comparison of the performance of the same PIDS technology types over different surfaces. This will be the first free-standing PIDS evaluation conducted against the newly developed evaluation standard. It is expected to yield results on the effects that different surfaces may have on the performance of free-standing PIDS.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Facial Expression Recognition System 自动面部表情识别系统
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335546
Andrew H. Ryan, J. F. Cohn, S. Lucey, Jason M. Saragih, P. Lucey, F. de la Torre, Adam Rossi
Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop “non-intrusive” technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve investigative capabilities. Facial expressions have the ability to communicate emotion and regulate interpersonal behavior. Over the past 30 years, scientists have developed human-observer based methods that can be used to classify and correlate facial expressions with human emotion. However, these methods have proven to be labor intensive, qualitative, and difficult to standardize. The Facial Action Coding System (FACS) developed by Paul Ekman and Wallace V. Friesen is the most widely used and validated method for measuring and describing facial behaviors. The Automated Facial Expression Recognition System (AFERS) automates the manual practice of FACS, leveraging the research and technology behind the CMU/PITT Automated Facial Image Analysis System (AFA) system developed by Dr. Jeffery Cohn and his colleagues at the Robotics Institute of Carnegie Mellon University. This portable, near real-time system will detect the seven universal expressions of emotion (figure 1), providing investigators with indicators of the presence of deception during the interview process. In addition, the system will include features such as full video support, snapshot generation, and case management utilities, enabling users to re-evaluate interviews in detail at a later date.
对个人在面谈和审讯期间所受待遇的高度关注,促使人们努力发展“非侵入性”技术,以便在各种敏感环境中迅速评估个人陈述的可信度。有可能精确集中调查资源的方法或流程将推进卓越的行动并提高调查能力。面部表情具有交流情绪和调节人际行为的能力。在过去的30年里,科学家们开发了基于人类观察者的方法,可以用来对面部表情与人类情绪进行分类和关联。然而,这些方法已被证明是劳动密集型的,定性的,难以标准化。由Paul Ekman和Wallace V. Friesen开发的面部动作编码系统(FACS)是测量和描述面部行为的最广泛使用和验证的方法。自动面部表情识别系统(AFERS)利用卡内基梅隆大学机器人研究所Jeffery Cohn博士及其同事开发的CMU/PITT自动面部图像分析系统(AFA)系统背后的研究和技术,使FACS的手动操作自动化。这种便携式、接近实时的系统将检测七种普遍的情绪表达(图1),为调查人员提供在采访过程中是否存在欺骗的指标。此外,该系统还将包括完整视频支持、快照生成和案例管理实用程序等功能,使用户能够在以后详细地重新评估面试。
{"title":"Automated Facial Expression Recognition System","authors":"Andrew H. Ryan, J. F. Cohn, S. Lucey, Jason M. Saragih, P. Lucey, F. de la Torre, Adam Rossi","doi":"10.1109/CCST.2009.5335546","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335546","url":null,"abstract":"Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop “non-intrusive” technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve investigative capabilities. Facial expressions have the ability to communicate emotion and regulate interpersonal behavior. Over the past 30 years, scientists have developed human-observer based methods that can be used to classify and correlate facial expressions with human emotion. However, these methods have proven to be labor intensive, qualitative, and difficult to standardize. The Facial Action Coding System (FACS) developed by Paul Ekman and Wallace V. Friesen is the most widely used and validated method for measuring and describing facial behaviors. The Automated Facial Expression Recognition System (AFERS) automates the manual practice of FACS, leveraging the research and technology behind the CMU/PITT Automated Facial Image Analysis System (AFA) system developed by Dr. Jeffery Cohn and his colleagues at the Robotics Institute of Carnegie Mellon University. This portable, near real-time system will detect the seven universal expressions of emotion (figure 1), providing investigators with indicators of the presence of deception during the interview process. In addition, the system will include features such as full video support, snapshot generation, and case management utilities, enabling users to re-evaluate interviews in detail at a later date.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Threat modeling for virtual directory services 虚拟目录服务的威胁建模
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335550
W. Claycomb, Dongwan Shin
Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual directories remain largely unstudied. In this paper, we present an analysis of four types of attacks on virtual directory services. In doing so, we describe how each is performed, and discuss how to detect and prevent each type of attack. This first step towards protecting virtual directory services is critical to protecting the information contained in the source directories - information which could potentially contain sensitive data and be used for authentication and/or access control decisions.
目录服务是负责提供有关用户帐户、计算机帐户、联系人等信息的公司计算对象。虚拟目录是整合这些数据的强大工具,可以在必要时对其进行修改,并以高度自定义的方式将其呈现给最终用户。虽然针对目录服务的攻击已经被识别出来,但针对虚拟目录的攻击和漏洞在很大程度上仍未被研究。在本文中,我们对虚拟目录服务的四种类型的攻击进行了分析。在此过程中,我们将描述每种攻击是如何执行的,并讨论如何检测和预防每种类型的攻击。保护虚拟目录服务的第一步对于保护源目录中包含的信息至关重要——这些信息可能包含敏感数据,并用于身份验证和/或访问控制决策。
{"title":"Threat modeling for virtual directory services","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/CCST.2009.5335550","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335550","url":null,"abstract":"Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual directories remain largely unstudied. In this paper, we present an analysis of four types of attacks on virtual directory services. In doing so, we describe how each is performed, and discuss how to detect and prevent each type of attack. This first step towards protecting virtual directory services is critical to protecting the information contained in the source directories - information which could potentially contain sensitive data and be used for authentication and/or access control decisions.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure device pairing using audio 使用音频保护设备配对
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335562
W. Claycomb, Dongwan Shin
Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using locationlimited channels to transmit secure pairing information that can be verified as originating from the intended device, enabling users to establish secure channels over insecure mediums. Of particular interest is using audio as a location-limited channel, due to the widespread deployment of audio capabilities on mobile devices. We describe a solution for secure device pairing using audio, called UbiSound, which only requires a single audio transmission to authenticate both devices. We describe our communication protocol, implementation details and results, and discuss how our solution is resistant to a number of attacks. Additionally, we emphasize how our solution is usable for visually impaired users.
移动设备之间的安全设备配对是一项具有挑战性的任务。缺乏可信的权威和较低的计算能力使得移动设备难以在泛在计算环境中建立安全的通信通道。已经提出了使用位置限制通道来传输安全配对信息的解决方案,这些信息可以被验证为来自预期设备,从而使用户能够在不安全的介质上建立安全通道。由于音频功能在移动设备上的广泛部署,我们特别感兴趣的是将音频用作位置受限的信道。我们描述了一种使用音频的安全设备配对解决方案,称为UbiSound,它只需要一个音频传输来验证两个设备。我们描述了我们的通信协议、实现细节和结果,并讨论了我们的解决方案如何抵抗多种攻击。此外,我们强调我们的解决方案如何对视障用户可用。
{"title":"Secure device pairing using audio","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/CCST.2009.5335562","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335562","url":null,"abstract":"Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using locationlimited channels to transmit secure pairing information that can be verified as originating from the intended device, enabling users to establish secure channels over insecure mediums. Of particular interest is using audio as a location-limited channel, due to the widespread deployment of audio capabilities on mobile devices. We describe a solution for secure device pairing using audio, called UbiSound, which only requires a single audio transmission to authenticate both devices. We describe our communication protocol, implementation details and results, and discuss how our solution is resistant to a number of attacks. Additionally, we emphasize how our solution is usable for visually impaired users.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The application research of airport security information management system on the field of civil aviation security 机场安全信息管理系统在民航安全领域的应用研究
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335522
Wu Wei
The airport security information management system (ASIMS) has been playing very important role i preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database in order to supply proper information to the airport. With the development of aviation security technology, many advance security device are emerged and increase the security level significantly. But at the same time, mass data is poured into the existing ASIMS. The system raise higher requirement to data transmission and data-mining technologies. Based on the investigation and research on the existing ASIMS, the paper concludes the functions and configuration of the system used in airport and presents some problems of the system for further modifying when system is constructed and related standards are established. All the efforts are to make the system serve for the aviation security more efficient, safe and effective.
机场安全信息管理系统(ASIMS)在防止飞机被劫持、恐怖袭击和其他非法干扰行为方面发挥着非常重要的作用。该系统通过对安检点采集的数据进行分析和挖掘,并存储在中央服务器数据库中,将机场的各种安检信息整合为一个有机整体,为机场提供合适的信息。随着航空安检技术的发展,出现了许多先进的安检装置,大大提高了安检水平。但与此同时,大量数据被注入到现有的ASIMS中。该系统对数据传输和数据挖掘技术提出了更高的要求。本文在对现有ASIMS系统进行调查研究的基础上,总结了该系统在机场应用的功能和配置,并提出了该系统存在的问题,以便在系统建设和制定相关标准时进行进一步修改。所有这些努力都是为了使该系统更加高效、安全、有效地为航空安全服务。
{"title":"The application research of airport security information management system on the field of civil aviation security","authors":"Wu Wei","doi":"10.1109/CCST.2009.5335522","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335522","url":null,"abstract":"The airport security information management system (ASIMS) has been playing very important role i preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database in order to supply proper information to the airport. With the development of aviation security technology, many advance security device are emerged and increase the security level significantly. But at the same time, mass data is poured into the existing ASIMS. The system raise higher requirement to data transmission and data-mining technologies. Based on the investigation and research on the existing ASIMS, the paper concludes the functions and configuration of the system used in airport and presents some problems of the system for further modifying when system is constructed and related standards are established. All the efforts are to make the system serve for the aviation security more efficient, safe and effective.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Home system and personal health information management 家庭系统和个人健康信息管理
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335525
R. Volner, V. Smrž, P. Bores
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other.
安防网络智能一词被广泛应用于通信安防网络领域。基于安全网络智能的概念,智能流、智能路由、智能web交换等一系列新的、潜在的概念和产品已经被引入。许多智能系统专注于特定的安全服务、功能或设备,并没有提供真正的端到端服务网络智能。真正的安全网络智能需要的不仅仅是一组不相连的元素,它需要一个相互连接和功能耦合的架构,使各个功能层能够相互交互和通信。
{"title":"Home system and personal health information management","authors":"R. Volner, V. Smrž, P. Bores","doi":"10.1109/CCST.2009.5335525","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335525","url":null,"abstract":"The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129634570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy friendly applications using citizen cards based on cryptographic smartcards 使用基于加密智能卡的公民卡的隐私友好应用程序
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335541
R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza
Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.
市民卡现在正在部署。目前正在开发使用这种卡片的几种应用程序。市民可透过身份证提供不同的服务,包括政府所需的服务,以及私人公司的申请。不幸的是,现在有大量的应用程序无法使用这些卡提供的安全性,因为它们要求保持最终用户的匿名性。在不需要访问个人数据以提供本地服务的情况下,可以根据应用类型(例如限制于某些年龄)或数据保护法强制执行此要求。作者在本文中提出了两种解决方案,从已经部署的市民卡中获益,降低开发新卡的成本,以及维护卡系统。
{"title":"Privacy friendly applications using citizen cards based on cryptographic smartcards","authors":"R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza","doi":"10.1109/CCST.2009.5335541","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335541","url":null,"abstract":"Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity and quality improvement in blind second generation watermarking 盲二代水印的容量和质量改进
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335552
M. A. El-Iskandarani, S. Darwish, A. Abubahia
For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes the consideration of good image quality. In the proposed scheme, the host image is normalized by fast technique to resist geometric attacks and reduce the computational time. The normalized image is then transformed using parametric bi-orthogonal integer lifting wavelet transform (LWT) to increase security. The high-capacity watermark is embedded carefully into the salient features by utilizing least significant bits (LSBs) method to maximize the robustness and quality. Experimental results show the reliability of the proposed scheme against variety kinds of attacks including image processing attacks and geometric attacks.
数字图像水印方案要成为有效的知识产权保护工具,必须满足图像质量、水印鲁棒性和容量、嵌入安全性和提取灵活性的要求。针对这些要求,本文提出了一种考虑图像质量的高容量第二代知识产权盲水印方案。在该方案中,采用快速归一化技术对主机图像进行归一化,以抵抗几何攻击,减少计算时间。然后使用参数双正交整数提升小波变换(LWT)对归一化后的图像进行变换以提高安全性。利用最小有效位(least significant bits, LSBs)方法将高容量水印小心地嵌入到显著特征中,使水印的鲁棒性和质量达到最大。实验结果表明,该方案能够有效抵御各种攻击,包括图像处理攻击和几何攻击。
{"title":"Capacity and quality improvement in blind second generation watermarking","authors":"M. A. El-Iskandarani, S. Darwish, A. Abubahia","doi":"10.1109/CCST.2009.5335552","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335552","url":null,"abstract":"For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes the consideration of good image quality. In the proposed scheme, the host image is normalized by fast technique to resist geometric attacks and reduce the computational time. The normalized image is then transformed using parametric bi-orthogonal integer lifting wavelet transform (LWT) to increase security. The high-capacity watermark is embedded carefully into the salient features by utilizing least significant bits (LSBs) method to maximize the robustness and quality. Experimental results show the reliability of the proposed scheme against variety kinds of attacks including image processing attacks and geometric attacks.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125233010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The integrated security system of the Senate of the Italian Republic 意大利共和国参议院的综合安全系统
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335556
Giovanni Contardi, F. Garzia, R. Cusani
The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)
一个复杂场地的安全很大程度上依赖于综合技术系统的使用。集成系统的任何弱点都涉及到站点本身安全性的弱点。为此,有必要设计和实现高度集成、高效、可靠的安防系统。作者阐述了意大利共和国参议院综合安全系统的设计与实现工作。
{"title":"The integrated security system of the Senate of the Italian Republic","authors":"Giovanni Contardi, F. Garzia, R. Cusani","doi":"10.1109/CCST.2009.5335556","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335556","url":null,"abstract":"The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1