The paper presents a novel and robust video watermarking scheme for copyright protection based on chaos, DWT and JND model of HVS. Firstly, in order to ensure security of watermarking and reduce the quantity of computation in the embedding process, we adopt a technique called chaotic selection to select the embedding frames from the video. To every selected frame, we transform it by DWT and detect the variation status of the coefficient in low frequency domain. Because HVS isn't too sensitive to the motive things, we choose those coefficients whose variations are large as the embedding coefficients. Finally, the watermarking signals are embedded and detected according to the JND model. The experimental results show that the proposed watermarking algorithm is robust to additive noise, MPEG compression, frame deleting and so on.
{"title":"Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model","authors":"Shuguo Yang, Shenghe Sun, Chunxia Li","doi":"10.1109/CIS.2007.143","DOIUrl":"https://doi.org/10.1109/CIS.2007.143","url":null,"abstract":"The paper presents a novel and robust video watermarking scheme for copyright protection based on chaos, DWT and JND model of HVS. Firstly, in order to ensure security of watermarking and reduce the quantity of computation in the embedding process, we adopt a technique called chaotic selection to select the embedding frames from the video. To every selected frame, we transform it by DWT and detect the variation status of the coefficient in low frequency domain. Because HVS isn't too sensitive to the motive things, we choose those coefficients whose variations are large as the embedding coefficients. Finally, the watermarking signals are embedded and detected according to the JND model. The experimental results show that the proposed watermarking algorithm is robust to additive noise, MPEG compression, frame deleting and so on.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131580690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a hybrid approach for real- time Network Intrusion Detection Systems (NIDS). We adopt Random Forest (RF) for feature selection and Minimax Probability Machine (MPM) for intrusion detection. RF provides the variable importance by numeric values so that the irrelevant features can be eliminated. However, the NIDS based on RF is slow to build intrusion detection model. We employ MPM, since MPM has been shown a better performance, compared with RF in terms of model building time. To validate the feasibility, we carry out several times of experiments with KDD 1999 intrusion detection dataset. The experimental results show the proposed approach is faster and more lightweight than the previous approaches while guaranteeing high detection rates so that it is suitable for real-time NIDS.
{"title":"A Hybrid Approach for Real-Time Network Intrusion Detection Systems","authors":"Jia Li, M. Xie","doi":"10.1109/CIS.2007.10","DOIUrl":"https://doi.org/10.1109/CIS.2007.10","url":null,"abstract":"This paper proposes a hybrid approach for real- time Network Intrusion Detection Systems (NIDS). We adopt Random Forest (RF) for feature selection and Minimax Probability Machine (MPM) for intrusion detection. RF provides the variable importance by numeric values so that the irrelevant features can be eliminated. However, the NIDS based on RF is slow to build intrusion detection model. We employ MPM, since MPM has been shown a better performance, compared with RF in terms of model building time. To validate the feasibility, we carry out several times of experiments with KDD 1999 intrusion detection dataset. The experimental results show the proposed approach is faster and more lightweight than the previous approaches while guaranteeing high detection rates so that it is suitable for real-time NIDS.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"94 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometric technologies have shown much more impor- tance in various application. Among them, iris recognition is considered as one of the most reliable and accurate tech- nologies. As the first step of iris recognition, the location of iris will affect the performance of the whole system. This paper proposes an improved algorithm to locate iris and eyelids. Morphological operation is applied to remove eye- lashes in process of iris boundary location. And optimal step length is calculated to reduce search time. Experimen- tal results demonstrate that the proposed iris location algo- rithm is able to achieve a good performance with accuracy more than 97.6%.
{"title":"An Improved Algorithm for Iris Location","authors":"Xuehu Yan, Shenghong Chen, X. Niu","doi":"10.1109/CIS.2007.98","DOIUrl":"https://doi.org/10.1109/CIS.2007.98","url":null,"abstract":"Biometric technologies have shown much more impor- tance in various application. Among them, iris recognition is considered as one of the most reliable and accurate tech- nologies. As the first step of iris recognition, the location of iris will affect the performance of the whole system. This paper proposes an improved algorithm to locate iris and eyelids. Morphological operation is applied to remove eye- lashes in process of iris boundary location. And optimal step length is calculated to reduce search time. Experimen- tal results demonstrate that the proposed iris location algo- rithm is able to achieve a good performance with accuracy more than 97.6%.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet; therefore, more energy can be saved.
{"title":"SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks","authors":"Shih-I Huang, S. Shieh","doi":"10.1109/CIS.2007.207","DOIUrl":"https://doi.org/10.1109/CIS.2007.207","url":null,"abstract":"This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet; therefore, more energy can be saved.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.
{"title":"Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves","authors":"Zuowen Tan","doi":"10.1109/CIS.2007.78","DOIUrl":"https://doi.org/10.1109/CIS.2007.78","url":null,"abstract":"In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently semi-supervised learning has been gain a surge of interests, but there is a few of research on semi- supervised learning using geodesic distance. The simplest semi-supervised classification algorithm is geodesic nearest neighbors (GNN). However the naive implementation of GNN algorithm is sensitive to the neighborhood scale parameter and suffers from the dilemma of neighborhood scale parameter selection. In this paper, instead of searching for the best neighborhood parameter, we propose a pruned-GNN, which utilize the non-negative reconstructing coefficients to prune the neighborhood graph in order to facilitate the selection of neighborhood scale parameter. Experimental results on several benchmark databases have shown that the proposed pruned-GNN can produce promising accuracies.
{"title":"Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification","authors":"Chun-Guang Li, Jun Guo, Honggang Zhang","doi":"10.1109/CIS.2007.102","DOIUrl":"https://doi.org/10.1109/CIS.2007.102","url":null,"abstract":"Recently semi-supervised learning has been gain a surge of interests, but there is a few of research on semi- supervised learning using geodesic distance. The simplest semi-supervised classification algorithm is geodesic nearest neighbors (GNN). However the naive implementation of GNN algorithm is sensitive to the neighborhood scale parameter and suffers from the dilemma of neighborhood scale parameter selection. In this paper, instead of searching for the best neighborhood parameter, we propose a pruned-GNN, which utilize the non-negative reconstructing coefficients to prune the neighborhood graph in order to facilitate the selection of neighborhood scale parameter. Experimental results on several benchmark databases have shown that the proposed pruned-GNN can produce promising accuracies.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"47 28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video surveillance has become more and more prevalent. It is a basic problem to get the number of access people in scenes. When occlusions occur, it becomes difficult to count people. We propose a fast and robust people counting method, and implement a system. In our system, we use group tracking to compensate weakness of multiple human segmentation, which can handle complete occlusion. Our system can run in real-time about 30fps for CIF video, with counting accuracy defined by frame above 95%.
{"title":"A Fast and Robust People Counting Method in Video Surveillance","authors":"Enwei Zhang, Feng Chen","doi":"10.1109/CIS.2007.85","DOIUrl":"https://doi.org/10.1109/CIS.2007.85","url":null,"abstract":"Video surveillance has become more and more prevalent. It is a basic problem to get the number of access people in scenes. When occlusions occur, it becomes difficult to count people. We propose a fast and robust people counting method, and implement a system. In our system, we use group tracking to compensate weakness of multiple human segmentation, which can handle complete occlusion. Our system can run in real-time about 30fps for CIF video, with counting accuracy defined by frame above 95%.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development and application of H.264 standard, the technology of H.264-based video data security becomes increasingly important. This paper proposes a new selective encryption scheme based on H.264, it combines the AES OFB mode with the sign encryption algorithm, and encrypts DCs and parts of ACs respectively. This method not only keeps advantages of former selective encryption algorithms in computational complexity and error-propagation prevention, but also efficiently make up for the deficiency in security and compression performance. Experimental results show that the proposed method exhibits low complexity and good security, and it has little effect on compression ratio and supports error- propagation prevention. Moreover, it is suitable for secure transmission of mobile multimedia and wireless multimedia network based on H.264.
{"title":"Design of a New Selective Video Encryption Scheme Based on H.264","authors":"Yajun Wang, Mian Cai, Feng Tang","doi":"10.1109/CIS.2007.99","DOIUrl":"https://doi.org/10.1109/CIS.2007.99","url":null,"abstract":"With the development and application of H.264 standard, the technology of H.264-based video data security becomes increasingly important. This paper proposes a new selective encryption scheme based on H.264, it combines the AES OFB mode with the sign encryption algorithm, and encrypts DCs and parts of ACs respectively. This method not only keeps advantages of former selective encryption algorithms in computational complexity and error-propagation prevention, but also efficiently make up for the deficiency in security and compression performance. Experimental results show that the proposed method exhibits low complexity and good security, and it has little effect on compression ratio and supports error- propagation prevention. Moreover, it is suitable for secure transmission of mobile multimedia and wireless multimedia network based on H.264.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin
In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.
{"title":"An Artificial Intelligence Based Approach for Risk Management Using Attack Graph","authors":"Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin","doi":"10.1109/CIS.2007.145","DOIUrl":"https://doi.org/10.1109/CIS.2007.145","url":null,"abstract":"In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Level set method is being applied actively in image field due to its mathematical perfection and maturity. In this paper, based on Mumford-Shah model with Level Set method, the finite difference and third order TVD (total variation diminishing) Runge-Kutta schemes are employed for space and time discretization respectively to solve the model equation. The computation of license plate localization shows that better edge detection results from level set method are obtained compared to those from other edge detection methods such as Roberts, Sobel and Canny. This study result is very valuable to edge detection, object localization and tracing. Keywords: level set method; license plate recognition; object localization
{"title":"Level Set Method for License Plate Localization Technology","authors":"Yuwang Yang, Jun Tao, Jing-Yu Yang","doi":"10.1109/CIS.2007.65","DOIUrl":"https://doi.org/10.1109/CIS.2007.65","url":null,"abstract":"Level set method is being applied actively in image field due to its mathematical perfection and maturity. In this paper, based on Mumford-Shah model with Level Set method, the finite difference and third order TVD (total variation diminishing) Runge-Kutta schemes are employed for space and time discretization respectively to solve the model equation. The computation of license plate localization shows that better edge detection results from level set method are obtained compared to those from other edge detection methods such as Roberts, Sobel and Canny. This study result is very valuable to edge detection, object localization and tracing. Keywords: level set method; license plate recognition; object localization","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}