首页 > 最新文献

2014 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Splicing forgeries localization through the use of first digit features 拼接通过使用第一数字特征来伪造定位
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084318
Irene Amerini, Rudy Becarelli, R. Caldelli, A. D. Mastio
One of the principal problems in image forensics is determining if a particular image is authentic or not and, if manipulated, to localize which parts have been altered. In fact, localization is basic within the process of image examination because it permits to link the modified zone with the corresponding image area and, above all, with the meaning of it. Forensic instruments dealing with copy-move manipulation quite always provides a localization map, but, on the contrary, only a few tools, devised to detect a splicing operation, are able to give information about localization too. In this paper, a method to distinguish and then localize a single and a double JPEG compression in portions of an image through the use of the DCT coefficients first digit features and employing a Support Vector Machine (SVM) classifier is proposed. Experimental results and a comparison with a state-of-the-art technique are provided to witness the performances offered by the proposed method in terms of forgery localization.
图像取证的主要问题之一是确定一个特定的图像是否是真实的,如果被操纵,定位哪些部分被改变了。事实上,在图像检查过程中,定位是基本的,因为它允许将修改区域与相应的图像区域联系起来,首先是与它的含义联系起来。处理复制-移动操作的法医工具总是提供定位地图,但相反,只有少数工具能够检测拼接操作,也能够提供关于定位的信息。本文提出了一种利用DCT系数第一数字特征和支持向量机(SVM)分类器来区分和定位图像中单个和双JPEG压缩的方法。实验结果和与最新技术的比较证明了该方法在伪造定位方面所提供的性能。
{"title":"Splicing forgeries localization through the use of first digit features","authors":"Irene Amerini, Rudy Becarelli, R. Caldelli, A. D. Mastio","doi":"10.1109/WIFS.2014.7084318","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084318","url":null,"abstract":"One of the principal problems in image forensics is determining if a particular image is authentic or not and, if manipulated, to localize which parts have been altered. In fact, localization is basic within the process of image examination because it permits to link the modified zone with the corresponding image area and, above all, with the meaning of it. Forensic instruments dealing with copy-move manipulation quite always provides a localization map, but, on the contrary, only a few tools, devised to detect a splicing operation, are able to give information about localization too. In this paper, a method to distinguish and then localize a single and a double JPEG compression in portions of an image through the use of the DCT coefficients first digit features and employing a Support Vector Machine (SVM) classifier is proposed. Experimental results and a comparison with a state-of-the-art technique are provided to witness the performances offered by the proposed method in terms of forgery localization.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
Botnet identification via universal anomaly detection 通过通用异常检测识别僵尸网络
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084311
Shachar Siboni, A. Cohen
The problem of identifying and detecting Botnets Command and Control (C&C) channels is considered. A Botnet is a logical network of compromised machines (Bots) which are remotely controlled by an attacker (Botmaster) using a C&C infrastructure in order to perform malicious activities. Accordingly, a key objective is to identify and block the C&C before any real harm is caused. We propose an anomaly detection algorithm and apply it to timing data, which can be collected without deep inspection, from open as well as encrypted flows. The suggested algorithm utilizes the Lempel Ziv universal compression algorithm in order to optimally give a probability assignment for normal traffic (during learning), then estimate the likelihood of new sequences (during operation) and classify them accordingly. Furthermore, the algorithm is generic and can be applied to any sequence of events, not necessarily traffic-related. We evaluate the detection algorithm on real-world network traces, showing how a universal, low complexity C&C identifi- cation system can be built, with high detection rates for a given false-alarm probability.
研究了僵尸网络命令控制(C&C)通道的识别和检测问题。僵尸网络是由攻击者(Botmaster)使用C&C基础设施远程控制的受损机器(Bots)组成的逻辑网络,以执行恶意活动。因此,关键目标是在造成任何实际伤害之前识别和阻止C&C。我们提出了一种异常检测算法,并将其应用于开放和加密流的定时数据,这些数据可以在不深入检查的情况下收集。该算法利用Lempel - Ziv通用压缩算法对正常流量(在学习过程中)进行最优概率分配,然后估计新序列(在运行过程中)的可能性并进行相应的分类。此外,该算法是通用的,可以应用于任何事件序列,不一定与交通相关。我们在真实的网络轨迹上评估了检测算法,展示了如何构建一个通用的、低复杂度的C&C识别系统,在给定的假警报概率下具有高检测率。
{"title":"Botnet identification via universal anomaly detection","authors":"Shachar Siboni, A. Cohen","doi":"10.1109/WIFS.2014.7084311","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084311","url":null,"abstract":"The problem of identifying and detecting Botnets Command and Control (C&C) channels is considered. A Botnet is a logical network of compromised machines (Bots) which are remotely controlled by an attacker (Botmaster) using a C&C infrastructure in order to perform malicious activities. Accordingly, a key objective is to identify and block the C&C before any real harm is caused. We propose an anomaly detection algorithm and apply it to timing data, which can be collected without deep inspection, from open as well as encrypted flows. The suggested algorithm utilizes the Lempel Ziv universal compression algorithm in order to optimally give a probability assignment for normal traffic (during learning), then estimate the likelihood of new sequences (during operation) and classify them accordingly. Furthermore, the algorithm is generic and can be applied to any sequence of events, not necessarily traffic-related. We evaluate the detection algorithm on real-world network traces, showing how a universal, low complexity C&C identifi- cation system can be built, with high detection rates for a given false-alarm probability.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Video forensics based on expression dynamics 基于表情动态的视频取证
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084321
Duc-Tien Dang-Nguyen, V. Conotter, G. Boato, F. D. Natale
Digital graphics tools are nowadays capable of rendering highly photorealistic imagery, which easily puzzle our perception of reality. This poses serious ethical and legal issues, which in turn create the need for further technologies able to ensure the trustworthiness of digital media as a true representation of reality, especially when depicting humans. In this work, we propose a novel forensic technique to tackle the problem of distinguishing computer generated (CG) from real humans in videos. It exploits the temporal information inherent of a video sequence by analyzing the spatio-temporal appearance of facial expressions in both CG and real humans. Even if rendering facial expression has reached outstanding performances, CG face appearance over time still presents some underlying mechanical properties that greatly differ from the natural muscle movements of real humans. We build an efficient classifier on a set of features describing facial dynamics and spatio-temporal changes during smiling to distinguish CG from human faces. Experimental results demonstrate the effectiveness of the proposed approach.
如今,数字图形工具能够呈现高度逼真的图像,这些图像很容易迷惑我们对现实的感知。这带来了严重的道德和法律问题,这反过来又产生了对进一步技术的需求,这些技术能够确保数字媒体作为现实的真实代表的可信度,特别是在描绘人类时。在这项工作中,我们提出了一种新的法医技术来解决在视频中区分计算机生成(CG)和真人的问题。它通过分析CG和真人面部表情的时空外观,利用视频序列固有的时间信息。即使面部表情的渲染已经达到了出色的表现,随着时间的推移,CG面部外观仍然呈现出一些与真人自然肌肉运动大不相同的潜在力学特性。我们在一组描述微笑时面部动态和时空变化的特征上建立了一个有效的分类器,以区分CG和人脸。实验结果证明了该方法的有效性。
{"title":"Video forensics based on expression dynamics","authors":"Duc-Tien Dang-Nguyen, V. Conotter, G. Boato, F. D. Natale","doi":"10.1109/WIFS.2014.7084321","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084321","url":null,"abstract":"Digital graphics tools are nowadays capable of rendering highly photorealistic imagery, which easily puzzle our perception of reality. This poses serious ethical and legal issues, which in turn create the need for further technologies able to ensure the trustworthiness of digital media as a true representation of reality, especially when depicting humans. In this work, we propose a novel forensic technique to tackle the problem of distinguishing computer generated (CG) from real humans in videos. It exploits the temporal information inherent of a video sequence by analyzing the spatio-temporal appearance of facial expressions in both CG and real humans. Even if rendering facial expression has reached outstanding performances, CG face appearance over time still presents some underlying mechanical properties that greatly differ from the natural muscle movements of real humans. We build an efficient classifier on a set of features describing facial dynamics and spatio-temporal changes during smiling to distinguish CG from human faces. Experimental results demonstrate the effectiveness of the proposed approach.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive matching for copy-move Forgery detection 自适应匹配复制移动伪造检测
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084314
Mohsen Zandi, Ahmad Mahmoudi Aznaveh, Azadeh Mansouri
The objective of copy-move forgery detection methods are to find copied regions within the same image. There are two main approaches to detect copy-move forgery: keypoint-based and block-based methods. Although the former is superior in terms of computational complexity, these methods neglect the smooth regions since they confine their search to salient points. On the other hand, while block-based methods consider smooth areas, they introduce a huge number of false matches. In this paper, it is proposed to employ an adaptive threshold in the matching phase in order to overcome this problem. The experimental results demonstrate that the proposed method can greatly reduce the number of false matches which results in improving both performance and computational cost.
复制-移动伪造检测方法的目标是在同一图像中找到被复制的区域。检测复制-移动伪造有两种主要方法:基于关键点的方法和基于块的方法。虽然前者在计算复杂度方面更胜一筹,但由于它们将搜索限制在显著点上,因此忽略了光滑区域。另一方面,虽然基于块的方法考虑平滑区域,但它们引入了大量的错误匹配。本文提出在匹配阶段采用自适应阈值来克服这一问题。实验结果表明,该方法可以大大减少错误匹配的数量,从而提高了性能和计算成本。
{"title":"Adaptive matching for copy-move Forgery detection","authors":"Mohsen Zandi, Ahmad Mahmoudi Aznaveh, Azadeh Mansouri","doi":"10.1109/WIFS.2014.7084314","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084314","url":null,"abstract":"The objective of copy-move forgery detection methods are to find copied regions within the same image. There are two main approaches to detect copy-move forgery: keypoint-based and block-based methods. Although the former is superior in terms of computational complexity, these methods neglect the smooth regions since they confine their search to salient points. On the other hand, while block-based methods consider smooth areas, they introduce a huge number of false matches. In this paper, it is proposed to employ an adaptive threshold in the matching phase in order to overcome this problem. The experimental results demonstrate that the proposed method can greatly reduce the number of false matches which results in improving both performance and computational cost.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Asymptotic MIMO artificial-noise secrecy rates with eigenmode partitioning 具有特征模划分的渐近MIMO人工噪声保密率
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084307
A. D. Harper, R. Baxley
In a multiple-input multiple-output (MIMO) wiretap channel system, it has been shown that artificial noise can be transmitted in the null space of the main channel to guarantee the secrecy at the intended receiver. Previous formulas for MIMO asymptotic capacity assume that all channel eigenmodes will be utilized. However, optimizing over possible antenna configurations requires partitioning the available eigenmodes. With only some eigenmodes used for signal transmission, finding an exact closed-form asymptotic solution is, in general, intractable. We present a large-scale MIMO approximation with eigenmode partitioning, accurate for realistic numbers of antennas, and with greatly reduced computational complexity.
在多输入多输出(MIMO)窃听信道系统中,可以在主信道的零空间中传输人工噪声以保证接收端的保密性。先前的MIMO渐近容量公式假设将利用所有信道特征模。然而,优化可能的天线配置需要划分可用的特征模式。通常情况下,当信号传输仅使用某些特征模态时,很难找到精确的闭型渐近解。我们提出了一个具有特征模式划分的大规模MIMO近似,对实际天线数量准确,并且大大降低了计算复杂度。
{"title":"Asymptotic MIMO artificial-noise secrecy rates with eigenmode partitioning","authors":"A. D. Harper, R. Baxley","doi":"10.1109/WIFS.2014.7084307","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084307","url":null,"abstract":"In a multiple-input multiple-output (MIMO) wiretap channel system, it has been shown that artificial noise can be transmitted in the null space of the main channel to guarantee the secrecy at the intended receiver. Previous formulas for MIMO asymptotic capacity assume that all channel eigenmodes will be utilized. However, optimizing over possible antenna configurations requires partitioning the available eigenmodes. With only some eigenmodes used for signal transmission, finding an exact closed-form asymptotic solution is, in general, intractable. We present a large-scale MIMO approximation with eigenmode partitioning, accurate for realistic numbers of antennas, and with greatly reduced computational complexity.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of radial-based 3D watermarking systems 基于径向的三维水印系统安全性分析
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084299
Xavier Rolland-Névière, G. Doërr, P. Alliez
To be relevant in copyright protection scenarios, watermarking systems need to provide appropriate levels of security. This paper investigates the security of a popular 3D watermarking method that alters the histogram of distances between the vertices of a surface mesh and its center of mass using a quadratic programming formulation.We study two conventional security mechanisms, namely (i) obfuscating the support of the content used for watermarking and (ii) relying on random projections to obfuscate the watermarking subspace. The different attacks surveyed throughout the paper clearly highlight the limitations of this family of 3D watermarking systems with respect to security.
为了与版权保护方案相关,水印系统需要提供适当级别的安全性。本文研究了一种流行的三维水印方法的安全性,该方法使用二次规划公式改变表面网格顶点与质心之间的距离直方图。我们研究了两种传统的安全机制,即(i)混淆用于水印的内容的支持和(ii)依赖于随机投影来混淆水印子空间。本文调查的不同攻击清楚地突出了该系列3D水印系统在安全性方面的局限性。
{"title":"Security analysis of radial-based 3D watermarking systems","authors":"Xavier Rolland-Névière, G. Doërr, P. Alliez","doi":"10.1109/WIFS.2014.7084299","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084299","url":null,"abstract":"To be relevant in copyright protection scenarios, watermarking systems need to provide appropriate levels of security. This paper investigates the security of a popular 3D watermarking method that alters the histogram of distances between the vertices of a surface mesh and its center of mass using a quadratic programming formulation.We study two conventional security mechanisms, namely (i) obfuscating the support of the content used for watermarking and (ii) relying on random projections to obfuscate the watermarking subspace. The different attacks surveyed throughout the paper clearly highlight the limitations of this family of 3D watermarking systems with respect to security.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130851952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bootstrap-based proxy reencryption for private multi-user computing 用于私有多用户计算的基于引导的代理重加密
Pub Date : 2014-12-01 DOI: 10.1109/WIFS.2014.7084312
J. Troncoso-Pastoriza, Serena Caputo
The increasingly popular paradigm of Cloud computing brings about many benefits both for clients and providers, but it also introduces privacy risks associated to outsourcing data and processes to an untrustworthy environment. In particular, the multi-user computing scenario is especially difficult to tackle from a privacy-preserving point of view, seeking to protect data from different users while allowing for flexible Cloud applications. This work leverages Gentry's cryptographic bootstrapping operation as a means to endow fully homomorphic cryptosystem with proxy reencryption functionalities, targeted at the private multi-user and multi-key computing scenario. We provide an example implementation based on Gentry-Halevi cryptosystem, and a secure protocol that employs this primitive for solving the private multi-user computing scenario with non-colluding parties.
日益流行的云计算范式为客户和提供商带来了许多好处,但它也引入了与将数据和流程外包到不可信的环境相关的隐私风险。特别是,从保护隐私的角度来看,多用户计算场景尤其难以解决,因为它既要保护不同用户的数据,又要允许灵活的云应用程序。这项工作利用Gentry的加密引导操作作为一种手段,赋予完全同态密码系统代理再加密功能,针对私有多用户和多密钥计算场景。我们提供了一个基于Gentry-Halevi密码系统的示例实现,以及一个使用该原语解决非串通各方的私有多用户计算场景的安全协议。
{"title":"Bootstrap-based proxy reencryption for private multi-user computing","authors":"J. Troncoso-Pastoriza, Serena Caputo","doi":"10.1109/WIFS.2014.7084312","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084312","url":null,"abstract":"The increasingly popular paradigm of Cloud computing brings about many benefits both for clients and providers, but it also introduces privacy risks associated to outsourcing data and processes to an untrustworthy environment. In particular, the multi-user computing scenario is especially difficult to tackle from a privacy-preserving point of view, seeking to protect data from different users while allowing for flexible Cloud applications. This work leverages Gentry's cryptographic bootstrapping operation as a means to endow fully homomorphic cryptosystem with proxy reencryption functionalities, targeted at the private multi-user and multi-key computing scenario. We provide an example implementation based on Gentry-Halevi cryptosystem, and a secure protocol that employs this primitive for solving the private multi-user computing scenario with non-colluding parties.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can leakage models be more efficient? non-linear models in side channel attacks 泄漏模型是否更有效?侧信道攻击中的非线性模型
Pub Date : 2014-05-12 DOI: 10.1109/WIFS.2014.7084330
Q. Tian, Máire O’Neill, Neil Hanley
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.
在过去十年中,学术文献中发表了许多侧信道攻击,详细介绍了如何通过对密码系统进行各种攻击(例如微分或相关功率分析)来有效地提取密钥。在这些攻击中最有效和最广泛使用的泄漏模型是汉明权重和距离模型,它给出了许多现实世界系统的简单而有效的功耗近似。这些泄漏模型反映了比特交换的数量,假设它与功耗成正比。然而,电路中的实际功耗变化不太可能是直接的那种形式。因此,我们通过转换函数映射现有的泄漏模型,提出了一种非线性泄漏模型,该模型更准确地描述了功耗的变化,从而大大提高了攻击效率。这样做的优点是利用了非线性功率模型,同时保留了汉明权重或距离模型的简单性。在此基础上提出了一种改进的攻击体系结构,以便在实际应用中有效地生成正确的密钥。最后,对攻击结果进行了实证比较。
{"title":"Can leakage models be more efficient? non-linear models in side channel attacks","authors":"Q. Tian, Máire O’Neill, Neil Hanley","doi":"10.1109/WIFS.2014.7084330","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084330","url":null,"abstract":"In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video anomaly detection based on wake motion descriptors and perspective grids 基于尾流运动描述符和透视网格的视频异常检测
Pub Date : 1900-01-01 DOI: 10.1109/WIFS.2014.7084329
Roberto Leyva, Victor Sanchez, Chang-Tsun Li
This paper proposes a video anomaly detection method based on wake motion descriptors. The method analyses the motion characteristics of the video data, on a video volume-by-video volume basis, by computing the wake left behind by moving objects in the scene. It then probabilistically identifies those never previously seen motion patterns in order to detect anomalies. The method also considers the perspective of the scene to compensate for the relative change in an object's size introduced by the camera's view angle. To this end, a perspective grid is proposed to define the size of video volumes for anomaly detection. Evaluation results against several state-of- the-art methods show that the proposed method attains high detection accuracies and competitive computational time.
提出了一种基于尾流运动描述子的视频异常检测方法。该方法通过计算场景中运动物体留下的尾迹,在逐视频量的基础上分析视频数据的运动特征。然后,它会概率地识别那些以前从未见过的运动模式,以检测异常情况。该方法还考虑了场景的视角,以补偿由相机视角引入的物体尺寸的相对变化。为此,提出了一个透视网格来定义异常检测视频卷的大小。对几种最新方法的评估结果表明,该方法具有较高的检测精度和较短的计算时间。
{"title":"Video anomaly detection based on wake motion descriptors and perspective grids","authors":"Roberto Leyva, Victor Sanchez, Chang-Tsun Li","doi":"10.1109/WIFS.2014.7084329","DOIUrl":"https://doi.org/10.1109/WIFS.2014.7084329","url":null,"abstract":"This paper proposes a video anomaly detection method based on wake motion descriptors. The method analyses the motion characteristics of the video data, on a video volume-by-video volume basis, by computing the wake left behind by moving objects in the scene. It then probabilistically identifies those never previously seen motion patterns in order to detect anomalies. The method also considers the perspective of the scene to compensate for the relative change in an object's size introduced by the camera's view angle. To this end, a perspective grid is proposed to define the size of video volumes for anomaly detection. Evaluation results against several state-of- the-art methods show that the proposed method attains high detection accuracies and competitive computational time.","PeriodicalId":220523,"journal":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126391618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1