首页 > 最新文献

2011 7th International Conference on Information Assurance and Security (IAS)最新文献

英文 中文
Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication 脉冲主动均值(PAM):一种支持双重安全认证的PIN特征提取算法
Pub Date : 2011-12-08 DOI: 10.1109/ISIAS.2011.6122821
S. Safie, J. Soraghan, L. Petropoulakis
This paper presents a new feature extraction technique called Pulse Active Mean (PAM) implemented on Electrocardiograms (ECG) for biometric authentication. A doubly secure ECG authentication framework is proposed which makes use of the important attributes of the PAM algorithm as a personal identification number (PIN). The PIN is used to extract different locations of ECG characteristics generating unique feature vectors. The presence of the correct PIN and ECG signals make the proposed authentication framework doubly secure. The performance of PAM is evaluated by comparing its receiver operating characteristic (ROC) curve with traditional temporal and amplitude feature extraction techniques on 100 Physikalisch-Technische Bundesanstalt (PTB) subjects. The evaluation of the biometric performance when different values of PIN are presented is also investigated. It is shown in this paper that different PIN values generate different feature vector sets while still providing consistent authentication performance
本文提出了一种新的特征提取技术——脉冲有效均值(PAM),该技术应用于心电图的生物特征识别。提出了一种利用PAM算法的重要属性作为个人识别码(PIN)的双重安全心电认证框架。利用PIN提取不同位置的心电特征,生成唯一的特征向量。正确的PIN和心电信号的存在使所提出的认证框架具有双重安全性。通过对100名PTB (Physikalisch-Technische Bundesanstalt)受试者的受试者工作特征(ROC)曲线与传统的时间和幅度特征提取技术进行比较,评价了PAM的性能。研究了不同PIN值对生物识别性能的影响。本文表明,不同的PIN值在提供一致的认证性能的同时,会产生不同的特征向量集
{"title":"Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication","authors":"S. Safie, J. Soraghan, L. Petropoulakis","doi":"10.1109/ISIAS.2011.6122821","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122821","url":null,"abstract":"This paper presents a new feature extraction technique called Pulse Active Mean (PAM) implemented on Electrocardiograms (ECG) for biometric authentication. A doubly secure ECG authentication framework is proposed which makes use of the important attributes of the PAM algorithm as a personal identification number (PIN). The PIN is used to extract different locations of ECG characteristics generating unique feature vectors. The presence of the correct PIN and ECG signals make the proposed authentication framework doubly secure. The performance of PAM is evaluated by comparing its receiver operating characteristic (ROC) curve with traditional temporal and amplitude feature extraction techniques on 100 Physikalisch-Technische Bundesanstalt (PTB) subjects. The evaluation of the biometric performance when different values of PIN are presented is also investigated. It is shown in this paper that different PIN values generate different feature vector sets while still providing consistent authentication performance","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
State of the art: Signature verification system 最新技术:签名验证系统
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122804
Tee Wilkin, S. Ooi
This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous signature verification systems algorithms and methods been proposed in the last decade. This paper will mainly focus on discussing the signature verification techniques from year 2000 onwards to make a novice summary and conclusion for them.
本文综述了从2000年到2010年提出的一些在线/动态和离线/静态签名验证系统。在过去的十年中,有许多签名验证系统、算法和方法被提出。本文将重点讨论2000年以来的签名验证技术,对其进行初步的总结和总结。
{"title":"State of the art: Signature verification system","authors":"Tee Wilkin, S. Ooi","doi":"10.1109/ISIAS.2011.6122804","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122804","url":null,"abstract":"This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous signature verification systems algorithms and methods been proposed in the last decade. This paper will mainly focus on discussing the signature verification techniques from year 2000 onwards to make a novice summary and conclusion for them.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116779472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
H.264/AVC digital fingerprinting based on content adaptive embedding 基于内容自适应嵌入的H.264/AVC数字指纹识别
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122780
K. A. Saadi, A. Bouridane, A. Guessoum
Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. This paper presents active fingerprinting which combines robust watermarking and independent Gaussian fingerprints generated by Tardos algorithm to secure the distributed copy of the H.264 /AVC compressed video. This approach is derived from [1], It relies mainly on improving the visual quality by eliminating the perceivable distortion that exists in the fingerprinted copies as well as the copies after collusion attacks produced by using unbounded Gaussian fingerprints. In order to remove this perceptual distortion, in this paper, we propose a content adaptive watermaking method which takes full advantage of both Intra and Inter frames information of the video content. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.
数字指纹是一种追踪多媒体内容分发并防止未经授权再分发的技术。将唯一的识别信息嵌入到多媒体信号的每个分布式副本中,作为数字指纹。针对H.264 /AVC压缩视频的分布式拷贝,提出了一种结合鲁棒水印和Tardos算法生成的独立高斯指纹的主动指纹识别技术。该方法来源于[1],主要依靠消除指纹副本中存在的可感知失真,以及利用无界高斯指纹产生串谋攻击后的副本,从而提高视觉质量。为了消除这种感知失真,本文提出了一种充分利用视频内容帧内和帧间信息的内容自适应生成方法。在保持视觉质量不变的情况下,进行了线性和非线性合谋攻击,以证明所提出的技术对合谋攻击的鲁棒性。
{"title":"H.264/AVC digital fingerprinting based on content adaptive embedding","authors":"K. A. Saadi, A. Bouridane, A. Guessoum","doi":"10.1109/ISIAS.2011.6122780","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122780","url":null,"abstract":"Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. This paper presents active fingerprinting which combines robust watermarking and independent Gaussian fingerprints generated by Tardos algorithm to secure the distributed copy of the H.264 /AVC compressed video. This approach is derived from [1], It relies mainly on improving the visual quality by eliminating the perceivable distortion that exists in the fingerprinted copies as well as the copies after collusion attacks produced by using unbounded Gaussian fingerprints. In order to remove this perceptual distortion, in this paper, we propose a content adaptive watermaking method which takes full advantage of both Intra and Inter frames information of the video content. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel system for fingerprint privacy protection1 一种新的指纹隐私保护系统[j]
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122830
Sheng Li, A. Kot
This paper proposes a novel system for protecting the fingerprint privacy without using a token or key. In the enrollment, two fingerprints are captured from two of an user's fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint and the primary cores from both fingerprints. Based on these extracted information, a combined minutiae template is generated and stored in a database. In the authentication, the user needs to provide two query fingerprints from the same two fingers which are used in the enrollment. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is also difficult for the attacker to distinguish our template from the minutiae of an original fingerprint. We evaluate the performance of our system over the FVC2002 DB2_A database. The results show that the False Rejection Rate of our system is 3% when the False Acceptance Rate is 0.01%.
提出了一种不使用令牌和密钥的指纹隐私保护系统。在注册中,从用户的两个手指上捕获两个指纹。我们从一个指纹中提取细节位置,从另一个指纹中提取方向,从两个指纹中提取主要核心。基于这些提取的信息,生成一个组合的细节模板并存储在数据库中。认证时,用户需要提供注册时使用的同一手指的两个查询指纹。通过存储组合的细节模板,当数据库被盗时,单个指纹的完整细节特征不会受到损害。此外,由于拓扑结构的相似性,攻击者也很难将我们的模板与原始指纹的细节区分开来。我们在FVC2002 DB2_A数据库上评估系统的性能。结果表明,当误接受率为0.01%时,系统的误拒率为3%。
{"title":"A novel system for fingerprint privacy protection1","authors":"Sheng Li, A. Kot","doi":"10.1109/ISIAS.2011.6122830","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122830","url":null,"abstract":"This paper proposes a novel system for protecting the fingerprint privacy without using a token or key. In the enrollment, two fingerprints are captured from two of an user's fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint and the primary cores from both fingerprints. Based on these extracted information, a combined minutiae template is generated and stored in a database. In the authentication, the user needs to provide two query fingerprints from the same two fingers which are used in the enrollment. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is also difficult for the attacker to distinguish our template from the minutiae of an original fingerprint. We evaluate the performance of our system over the FVC2002 DB2_A database. The results show that the False Rejection Rate of our system is 3% when the False Acceptance Rate is 0.01%.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Robust video watermarking against JPEG compression in 3D-DWT domain 3D-DWT域抗JPEG压缩的鲁棒视频水印
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122790
Yadollah Zamanidoost, A. Navarro, Z. R. Hesabi, Nima Rahimi Froshani, F. Farnia
A 3D-DWT video watermarking technique is proposed in this article. The algorithm is implemented on the basis of human vision system (HVS). To improve the robustness of watermark against JPEG compression, the most recently proposed techniques embed watermark in to the low-frequency components of the video frames. However, these components hold significant information of the video. Directly replacing the low-frequency components with watermark may introduce undesirable degradation to video quality. Simulation results demonstrate that the embedded watermarks can be almost fully extracted from the JPEG-compressed frames with very high compression ratio. Furthermore, the algorithm is robust against uniform noise attack, frame dropping and frame swapping.
本文提出了一种3D-DWT视频水印技术。该算法是基于人类视觉系统(HVS)实现的。为了提高水印对JPEG压缩的鲁棒性,最新提出的技术是将水印嵌入到视频帧的低频分量中。然而,这些组件保存着视频的重要信息。直接用水印代替低频分量会对视频质量造成不良影响。仿真结果表明,在jpeg压缩比非常高的情况下,可以几乎完全提取出嵌入的水印。此外,该算法对均匀噪声攻击、丢帧和换帧具有较强的鲁棒性。
{"title":"Robust video watermarking against JPEG compression in 3D-DWT domain","authors":"Yadollah Zamanidoost, A. Navarro, Z. R. Hesabi, Nima Rahimi Froshani, F. Farnia","doi":"10.1109/ISIAS.2011.6122790","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122790","url":null,"abstract":"A 3D-DWT video watermarking technique is proposed in this article. The algorithm is implemented on the basis of human vision system (HVS). To improve the robustness of watermark against JPEG compression, the most recently proposed techniques embed watermark in to the low-frequency components of the video frames. However, these components hold significant information of the video. Directly replacing the low-frequency components with watermark may introduce undesirable degradation to video quality. Simulation results demonstrate that the embedded watermarks can be almost fully extracted from the JPEG-compressed frames with very high compression ratio. Furthermore, the algorithm is robust against uniform noise attack, frame dropping and frame swapping.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis on Lightweight Block Cipher, KTANTAN 轻量级分组密码分析
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122793
Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani
In this research, we present the analysis on Lightweight Block Cipher; KTANTAN. This block cipher consists of three algorithms with block sizes of 32/48/64-bit and utilizes an 80-bit key. NIST Statistical Test Suite is used to determine the randomness of output sequence produced by all algorithms. Nine data categories are applied to generate the output sequence. From our analysis, we found out that all three algorithms are not random based on the 1% significance level.
在本研究中,我们对轻量级分组密码进行了分析;KTANTAN。该分组密码由三种算法组成,块大小为32/48/64位,并使用80位密钥。NIST统计测试套件用于确定所有算法产生的输出序列的随机性。将应用9个数据类别来生成输出序列。从我们的分析中,我们发现这三种算法都不是基于1%显著性水平的随机算法。
{"title":"Analysis on Lightweight Block Cipher, KTANTAN","authors":"Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani","doi":"10.1109/ISIAS.2011.6122793","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122793","url":null,"abstract":"In this research, we present the analysis on Lightweight Block Cipher; KTANTAN. This block cipher consists of three algorithms with block sizes of 32/48/64-bit and utilizes an 80-bit key. NIST Statistical Test Suite is used to determine the randomness of output sequence produced by all algorithms. Nine data categories are applied to generate the output sequence. From our analysis, we found out that all three algorithms are not random based on the 1% significance level.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards data centric mobile security 走向以数据为中心的移动安全
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122796
A. Dehghantanha, N. Udzir, R. Mahmod
Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at enhanced. So the security of mobile devices needs to be improved. This paper discusses various components and functions of mobile devices such as SMS, wireless and applications and describes possible vulnerabilities threatening them precisely. Malware threats are explained and their effects on mobile devices are studied. Finally, to protect all the vulnerabilities and prevent application and malware threats, data-centric security model is provided as a solution to ensure confidentiality, integrity and availability of data stored on mobile devices.
最近,移动设备的使用迅速增加,随着移动设备功能的增强,它将进一步增长。因此,移动设备的安全性有待提高。本文讨论了移动设备的各种组件和功能,如短信、无线和应用程序,并准确地描述了可能威胁它们的漏洞。解释了恶意软件的威胁,并研究了它们对移动设备的影响。最后,为了保护所有的漏洞,防止应用程序和恶意软件的威胁,提供了以数据为中心的安全模型作为解决方案,以确保存储在移动设备上的数据的机密性、完整性和可用性。
{"title":"Towards data centric mobile security","authors":"A. Dehghantanha, N. Udzir, R. Mahmod","doi":"10.1109/ISIAS.2011.6122796","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122796","url":null,"abstract":"Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at enhanced. So the security of mobile devices needs to be improved. This paper discusses various components and functions of mobile devices such as SMS, wireless and applications and describes possible vulnerabilities threatening them precisely. Malware threats are explained and their effects on mobile devices are studied. Finally, to protect all the vulnerabilities and prevent application and malware threats, data-centric security model is provided as a solution to ensure confidentiality, integrity and availability of data stored on mobile devices.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Extending Dempster Shafer method by multilayer decision template in classifier fusion 基于多层决策模板的Dempster Shafer方法在分类器融合中的扩展
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122807
Mehdi Salkhordeh Haghighi, Abedin Vahedian, H. Yazdi
In this paper, a new classifier fusion method is introduced based on a decision template structure as an extension to Dempster Shafer method. It employs multilayer neural networks as base classifiers. The idea relies on the fact that in a multilayer neural network, behavior of each layer can be a guide for modeling decision-making process. The new decision template based method constructs decision template for each layer of the neural networks including all hidden layers such that a complete model of the base classifiers decision making process is built. In the combiner part, a new strategy based on extension to Dempster Shafer method is introduced. Efficiency of this method is compared with some known benchmark datasets.
本文提出了一种基于决策模板结构的分类器融合方法,作为Dempster Shafer方法的扩展。它采用多层神经网络作为基本分类器。这个想法依赖于这样一个事实,即在多层神经网络中,每层的行为可以作为建模决策过程的指导。基于决策模板的方法为神经网络的每一层(包括所有隐层)构建决策模板,从而建立了一个完整的基分类器决策过程模型。在组合部分,介绍了一种基于Dempster Shafer方法扩展的新策略。将该方法与一些已知的基准数据集进行了效率比较。
{"title":"Extending Dempster Shafer method by multilayer decision template in classifier fusion","authors":"Mehdi Salkhordeh Haghighi, Abedin Vahedian, H. Yazdi","doi":"10.1109/ISIAS.2011.6122807","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122807","url":null,"abstract":"In this paper, a new classifier fusion method is introduced based on a decision template structure as an extension to Dempster Shafer method. It employs multilayer neural networks as base classifiers. The idea relies on the fact that in a multilayer neural network, behavior of each layer can be a guide for modeling decision-making process. The new decision template based method constructs decision template for each layer of the neural networks including all hidden layers such that a complete model of the base classifiers decision making process is built. In the combiner part, a new strategy based on extension to Dempster Shafer method is introduced. Efficiency of this method is compared with some known benchmark datasets.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Biometric driven initiative system for passive continuous authentication 生物识别驱动的被动连续认证主动系统
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122809
M. Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao
In this paper, a passive continuous authentication system based on both the hard and the soft biometrics is implemented. The passive continuous authentication system keeps verifying the user without interrupting the user concentrating on his work. It also provides the capacity for the machine to recognize who is in front of the terminal, reduces the potential security leak of the user is temporarily absent front the terminal, and denies the invader to login the system with the stolen account and password. Our system forces to logoff the user when the authentication result identifies the user leaves his seat, but the system won't logoff the user if the user only turns his face to some other directions. The reliability of the system is verified by 7 registered users. According to the experimental results, combining the soft and the hard biometrics in our theoretical framework achieves the goal of continuous authentication efficiently and correctly.
本文实现了一种基于硬生物特征和软生物特征的被动连续认证系统。被动连续认证系统在不中断用户专心工作的情况下,持续对用户进行验证。它还提供了机器识别谁在终端前的能力,减少了用户暂时不在终端前的潜在安全漏洞,并拒绝入侵者使用被盗的帐户和密码登录系统。当身份验证结果确定用户离开座位时,系统强制注销用户,但如果用户只是将脸转向其他方向,系统不会注销用户。系统的可靠性由7个注册用户验证。实验结果表明,在我们的理论框架下,将软硬生物识别技术结合起来,有效、正确地实现了连续认证的目标。
{"title":"Biometric driven initiative system for passive continuous authentication","authors":"M. Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao","doi":"10.1109/ISIAS.2011.6122809","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122809","url":null,"abstract":"In this paper, a passive continuous authentication system based on both the hard and the soft biometrics is implemented. The passive continuous authentication system keeps verifying the user without interrupting the user concentrating on his work. It also provides the capacity for the machine to recognize who is in front of the terminal, reduces the potential security leak of the user is temporarily absent front the terminal, and denies the invader to login the system with the stolen account and password. Our system forces to logoff the user when the authentication result identifies the user leaves his seat, but the system won't logoff the user if the user only turns his face to some other directions. The reliability of the system is verified by 7 registered users. According to the experimental results, combining the soft and the hard biometrics in our theoretical framework achieves the goal of continuous authentication efficiently and correctly.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of bypassing malware defences and malware detections 调查绕过恶意软件防御和恶意软件检测
Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122815
Farid Daryabar, A. Dehghantanha, N. Udzir
Nowadays, malware incident is one of the most expensive damages caused by attackers. Malwares are caused different attacks, so considerations and implementations of malware defences for internal networks are important. In this papers, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and comparison of different channels and methods when malware might reach the host from outside the networks are demonstrated. After that, bypassing HTTP/SSL and SMTP malware defences as channels are discussed. Finally, as it is important to find and detect new and unknown malware before the malware gets in to the victims, a new malware detection technique base on honeynet systems is surveyed.
如今,恶意软件事件是攻击者造成的最昂贵的损失之一。恶意软件引起不同的攻击,因此考虑和实现内部网络的恶意软件防御是很重要的。在本文中,不同的技术,如重新包装,逆向工程和十六进制编辑绕过基于主机的反病毒(AV)签名,并描述和比较不同的渠道和方法,当恶意软件可能从外部网络到达主机演示。之后,将讨论绕过HTTP/SSL和SMTP恶意软件防御作为通道。最后,考虑到在恶意软件进入受害者之前发现和检测新的和未知的恶意软件的重要性,研究了一种新的基于蜜网系统的恶意软件检测技术。
{"title":"Investigation of bypassing malware defences and malware detections","authors":"Farid Daryabar, A. Dehghantanha, N. Udzir","doi":"10.1109/ISIAS.2011.6122815","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122815","url":null,"abstract":"Nowadays, malware incident is one of the most expensive damages caused by attackers. Malwares are caused different attacks, so considerations and implementations of malware defences for internal networks are important. In this papers, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and comparison of different channels and methods when malware might reach the host from outside the networks are demonstrated. After that, bypassing HTTP/SSL and SMTP malware defences as channels are discussed. Finally, as it is important to find and detect new and unknown malware before the malware gets in to the victims, a new malware detection technique base on honeynet systems is surveyed.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2011 7th International Conference on Information Assurance and Security (IAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1