首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
RSA/Shift Secured IFFT/FFT Based OFDM Wireless System 基于RSA/Shift安全IFFT/FFT的OFDM无线系统
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.356
D. Rajaveerappa, A. Almarimi
The research on wireless system is to improve the reliability and performance of wireless radio links. The effects of (multi-path) radio propagation, modulation, and coding and signal processing techniques on the spectrum efficiency and performance of wireless radio networks are studied, in particular Orthogonal Frequency Division Multiplexing (OFDM) and related transmission methods. But the multimedia information is not secured in the wireless environment compared to that of wired environment. In this paper, we have carried out a new method of cryptographic algorithm over a future generation (4G and above) wireless system called the OFDM (FFT (Fast Fourier Transform) / IFFT (Inverse FFT)) technique using Walsh Hadamard spreading codes. We have done the simulation in MATLAB programming and the BER (Bit Error Rate) vs. SNR (Signal-to-Noise Ratio) performance is studied for multimedia signals (such as text, audio and image) in an AWGN wireless channel. We have also developed an algorithm for generating the Walsh codes and the RSA secret keys. We found the results of our simulation are very much satisfactory for practical implementation in wireless systems.
无线系统的研究是为了提高无线链路的可靠性和性能。研究了(多路径)无线电传播、调制、编码和信号处理技术对无线无线电网络频谱效率和性能的影响,特别是正交频分复用(OFDM)和相关的传输方法。但是与有线环境相比,无线环境下的多媒体信息的安全性不高。在本文中,我们使用Walsh Hadamard扩频码在下一代(4G及以上)无线系统上进行了一种新的加密算法方法,称为OFDM (FFT(快速傅里叶变换)/ IFFT(逆FFT))技术。我们用MATLAB编程进行了仿真,研究了AWGN无线信道中多媒体信号(如文本、音频和图像)的误码率与信噪比的性能。我们还开发了一种用于生成Walsh代码和RSA密钥的算法。我们发现我们的仿真结果非常令人满意的实际应用在无线系统中。
{"title":"RSA/Shift Secured IFFT/FFT Based OFDM Wireless System","authors":"D. Rajaveerappa, A. Almarimi","doi":"10.1109/IAS.2009.356","DOIUrl":"https://doi.org/10.1109/IAS.2009.356","url":null,"abstract":"The research on wireless system is to improve the reliability and performance of wireless radio links. The effects of (multi-path) radio propagation, modulation, and coding and signal processing techniques on the spectrum efficiency and performance of wireless radio networks are studied, in particular Orthogonal Frequency Division Multiplexing (OFDM) and related transmission methods. But the multimedia information is not secured in the wireless environment compared to that of wired environment. In this paper, we have carried out a new method of cryptographic algorithm over a future generation (4G and above) wireless system called the OFDM (FFT (Fast Fourier Transform) / IFFT (Inverse FFT)) technique using Walsh Hadamard spreading codes. We have done the simulation in MATLAB programming and the BER (Bit Error Rate) vs. SNR (Signal-to-Noise Ratio) performance is studied for multimedia signals (such as text, audio and image) in an AWGN wireless channel. We have also developed an algorithm for generating the Walsh codes and the RSA secret keys. We found the results of our simulation are very much satisfactory for practical implementation in wireless systems.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure Access Control Scheme of RFID System Application RFID系统应用的安全访问控制方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.223
Yu-Chih Huang
Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and supply chain application in the future. RFID is intimate linking real and virtual also creates considerable security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and/or privacy were proposed. In this paper, we surveys the literature of hash-based access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag.
射频识别(RFID)是一种非接触式技术,它被认为是取代条形码的方法,因为条形码是在视线范围内读取数据,限制了未来在物流和供应链层面应用的实用性。RFID是真实与虚拟的紧密联系,在RFID的采用中也产生了相当大的安全和隐私风险。到目前为止,人们对RFID的安全性和/或隐私性进行了许多研究。在对基于哈希的访问控制方案进行研究的基础上,提出了一种提高无源RFID标签安全性和保密性的有效方案。
{"title":"Secure Access Control Scheme of RFID System Application","authors":"Yu-Chih Huang","doi":"10.1109/IAS.2009.223","DOIUrl":"https://doi.org/10.1109/IAS.2009.223","url":null,"abstract":"Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and supply chain application in the future. RFID is intimate linking real and virtual also creates considerable security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and/or privacy were proposed. In this paper, we surveys the literature of hash-based access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Collusion-Resilient Fingerprinting Using Cropping and Subsampling 基于裁剪和子采样的共谋弹性指纹识别
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.343
Yueh-Hong Chen, Hsiang-Cheh Huang
Valuable images are usually acquired with higher resolution and deeper color depth. Hence, in this paper, we proposed a scheme based on cropping and downsampling to prevent the embedded fingerprints from average attack. We first generate an resized original image for each user with cropping and downsampling. This resized original image belonging to a particular user is then embedded with the fingerprint related to this user. With this method, a coalition of users can still apply average attack on their own fingerprinted images, but the more number of images used, the lower the perceptual quality of the result image will become. The effectiveness of the proposed method is well illustrated by experimental results.
有价值的图像通常具有更高的分辨率和更深的颜色深度。因此,本文提出了一种基于裁剪和降采样的方案来防止嵌入指纹受到平均攻击。我们首先通过裁剪和降采样为每个用户生成一个调整大小的原始图像。然后将属于特定用户的调整大小的原始图像嵌入与该用户相关的指纹。使用这种方法,一个用户联盟仍然可以对自己的指纹图像进行平均攻击,但是使用的图像数量越多,结果图像的感知质量就越低。实验结果很好地说明了该方法的有效性。
{"title":"Collusion-Resilient Fingerprinting Using Cropping and Subsampling","authors":"Yueh-Hong Chen, Hsiang-Cheh Huang","doi":"10.1109/IAS.2009.343","DOIUrl":"https://doi.org/10.1109/IAS.2009.343","url":null,"abstract":"Valuable images are usually acquired with higher resolution and deeper color depth. Hence, in this paper, we proposed a scheme based on cropping and downsampling to prevent the embedded fingerprints from average attack. We first generate an resized original image for each user with cropping and downsampling. This resized original image belonging to a particular user is then embedded with the fingerprint related to this user. With this method, a coalition of users can still apply average attack on their own fingerprinted images, but the more number of images used, the lower the perceptual quality of the result image will become. The effectiveness of the proposed method is well illustrated by experimental results.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Browser-Side Countermeasures for Deceptive Phishing Attack 欺骗性网络钓鱼攻击的浏览器端对策
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.12
Huajun Huang, Shaohong Zhong, Junshan Tan
Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing browser-side anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given.
网络钓鱼是网络身份盗窃的一种形式。网络钓鱼者利用社会工程学窃取受害者的个人身份数据和金融账户凭证。社会工程骗局利用伪造的电子邮件将毫无防备的受害者引诱到假冒网站,这些网站旨在诱骗收件人泄露信用卡号、账户用户名、密码和社会保险号等财务数据。这被称为欺骗性网络钓鱼攻击。本文全面概述了欺骗性网络钓鱼攻击及其对抗技术,即反网络钓鱼。首先,讨论了钓鱼者使用的技术以及欺骗性网络钓鱼攻击的定义、分类和未来的工作。接着介绍了现有的浏览器端反网络钓鱼技术和研究阶段的技术,并对各种对策的优缺点进行了深入的分析。
{"title":"Browser-Side Countermeasures for Deceptive Phishing Attack","authors":"Huajun Huang, Shaohong Zhong, Junshan Tan","doi":"10.1109/IAS.2009.12","DOIUrl":"https://doi.org/10.1109/IAS.2009.12","url":null,"abstract":"Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing browser-side anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133263412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Towards Secure Content Based Dissemination of XML Documents 基于内容的XML文档安全传播研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.138
Mohammad Ashiqur Rahaman, H. Plate, Y. Roudier, A. Schaad
Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector,healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging task. This paper describes a publish/subscribe middleware infrastructure to achieve a content-based dissemination of XML documents. Our approach relies on the dissemination of XML documents based on their semantics, as described by concepts that form an interoperable description of documents. This infrastructure leverages our earlier scheme [1] for protecting the integrity and confidentiality of XML content during dissemination.
在公共部门、医疗保健或工程等领域,协作处理复杂的XML数据结构是一项非常重要的任务。具体来说,以一种有选择和安全的方式提供可伸缩的XML内容传播服务是一项具有挑战性的任务。本文描述了一个发布/订阅中间件基础结构,以实现基于内容的XML文档传播。我们的方法依赖于基于语义的XML文档的传播,语义是由形成可互操作文档描述的概念所描述的。这个基础设施利用我们之前的方案[1]来保护XML内容在传播过程中的完整性和机密性。
{"title":"Towards Secure Content Based Dissemination of XML Documents","authors":"Mohammad Ashiqur Rahaman, H. Plate, Y. Roudier, A. Schaad","doi":"10.1109/IAS.2009.138","DOIUrl":"https://doi.org/10.1109/IAS.2009.138","url":null,"abstract":"Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector,healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging task. This paper describes a publish/subscribe middleware infrastructure to achieve a content-based dissemination of XML documents. Our approach relies on the dissemination of XML documents based on their semantics, as described by concepts that form an interoperable description of documents. This infrastructure leverages our earlier scheme [1] for protecting the integrity and confidentiality of XML content during dissemination.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems 一种适用于软实时系统的自适应模糊调度和模糊pid性能控制模型
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.269
Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xingmei Zhao
Considering the unsteadiness and unpredictability of a practical task running environment due to the unsteadiness of network communication and the estimation deviation, it is necessary to introduce fuzzy concept and theory to the scheduling and performance control of the soft real-time application systems oriented communication and network fields. In this paper, a new adaptive soft real-time task scheduling model with the fuzzy-PID feedback controller was presented. In this model, we used the fuzzy scheduling algorithm in which the scheduling turn of a ready task is decided by the fuzzy inference result of its criticality and deadline distance. Meanwhile,in the adaptive control part, we used the fuzzy-PID controller that combines the fuzzy feedback controller and PID controller instead of traditonal PID controller. The simulation test shows that our presented model can enable a soft real-time systems which has the mulit-level service characteristic reach the steady state faster and has less miss ratio to more important tasks.
考虑到实际任务运行环境由于网络通信的不稳定性和估计偏差造成的不稳定性和不可预测性,有必要将模糊概念和理论引入面向通信和网络领域的软实时应用系统的调度和性能控制中。提出了一种基于模糊pid反馈控制器的自适应软实时任务调度模型。在该模型中,我们使用模糊调度算法,其中就绪任务的调度回合由其临界性和截止时间距离的模糊推理结果决定。同时,在自适应控制部分,我们使用模糊反馈控制器和PID控制器相结合的模糊PID控制器来代替传统的PID控制器。仿真试验表明,该模型能使具有多级服务特性的软实时系统更快地达到稳态,对更重要的任务具有更低的失误率。
{"title":"An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems","authors":"Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xingmei Zhao","doi":"10.1109/IAS.2009.269","DOIUrl":"https://doi.org/10.1109/IAS.2009.269","url":null,"abstract":"Considering the unsteadiness and unpredictability of a practical task running environment due to the unsteadiness of network communication and the estimation deviation, it is necessary to introduce fuzzy concept and theory to the scheduling and performance control of the soft real-time application systems oriented communication and network fields. In this paper, a new adaptive soft real-time task scheduling model with the fuzzy-PID feedback controller was presented. In this model, we used the fuzzy scheduling algorithm in which the scheduling turn of a ready task is decided by the fuzzy inference result of its criticality and deadline distance. Meanwhile,in the adaptive control part, we used the fuzzy-PID controller that combines the fuzzy feedback controller and PID controller instead of traditonal PID controller. The simulation test shows that our presented model can enable a soft real-time systems which has the mulit-level service characteristic reach the steady state faster and has less miss ratio to more important tasks.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Curvelet Domain Watermark Detection Using Alpha-Stable Models 基于稳定模型的曲线域水印检测
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.21
Chengzhi Deng, Huasheng Zhu, Shengqian Wang
This paper address issues that arise in copyright protection systems of digital images, which employ blind watermark verification structures in the curvelet domain. First, we observe that statistical distribution with heavy algebraic tails, such as the alpha-stable family, are in many cases more accurate modeling tools for the curvelet coefficients than families with exponential tails such as generalized Gaussian. Motivated by our modeling results, we then design a new processor for blind watermark detection using the Cauchy member of the alpha-stable family. We analyze the performance of the new detector in terms of the associated probabilities of detection and false alarm and we compare it to the performance of the generalized Gaussian detector and the traditional correlation-based detector by performance experiments. The experiments prove that Cauchy detector is superior to the others.
本文研究了数字图像版权保护系统中采用曲线域盲水印验证结构的问题。首先,我们观察到具有重代数尾的统计分布,如α稳定族,在许多情况下比具有指数尾的族(如广义高斯)更准确地建模曲线系数。根据我们的建模结果,我们设计了一种新的处理器,用于使用α稳定家族的柯西成员进行盲水印检测。我们从检测和虚警的相关概率的角度分析了新检测器的性能,并通过性能实验将其与广义高斯检测器和传统的基于相关的检测器的性能进行了比较。实验证明,柯西探测器优于其他探测器。
{"title":"Curvelet Domain Watermark Detection Using Alpha-Stable Models","authors":"Chengzhi Deng, Huasheng Zhu, Shengqian Wang","doi":"10.1109/IAS.2009.21","DOIUrl":"https://doi.org/10.1109/IAS.2009.21","url":null,"abstract":"This paper address issues that arise in copyright protection systems of digital images, which employ blind watermark verification structures in the curvelet domain. First, we observe that statistical distribution with heavy algebraic tails, such as the alpha-stable family, are in many cases more accurate modeling tools for the curvelet coefficients than families with exponential tails such as generalized Gaussian. Motivated by our modeling results, we then design a new processor for blind watermark detection using the Cauchy member of the alpha-stable family. We analyze the performance of the new detector in terms of the associated probabilities of detection and false alarm and we compare it to the performance of the generalized Gaussian detector and the traditional correlation-based detector by performance experiments. The experiments prove that Cauchy detector is superior to the others.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Moving Object Tracking Using Symmetric Mask-Based Scheme 基于对称掩码的运动目标跟踪
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.150
Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu
This work presents a new approach, symmetric mask-based scheme (SMBS), for moving object detection and tracking based on the symmetric mask-based discrete wavelet transform (SMDWT). This work presents a fast algorithm, called 2-D SMDWT, to improve the critical issue of the 2-D lifting-based Discrete Wavelet Transform (LDWT), and then obtains the benefit of low latency, reduced complexity, and low transpose memory for object detection. The successful moving object detection in a real surrounding environment is a difficult task due to noise issues such as fake motion or Gaussian noise. The SMBS approach can effectively reduce noises with low computing cost in both indoor and outdoor environments. The experimental results indicate that the proposed method can provide precise moving object detection and tracking.
本文提出了一种基于对称掩模的离散小波变换(SMDWT)的运动目标检测和跟踪的新方法——基于对称掩模的方案(SMBS)。本文提出了一种称为二维SMDWT的快速算法,以改善基于二维提升的离散小波变换(LDWT)的关键问题,从而获得低延迟、降低复杂性和低转置内存的目标检测优势。由于假运动或高斯噪声等噪声问题,在真实环境中成功检测运动目标是一项艰巨的任务。无论在室内还是室外环境下,SMBS方法都能以较低的计算成本有效地降低噪声。实验结果表明,该方法可以提供精确的运动目标检测和跟踪。
{"title":"Moving Object Tracking Using Symmetric Mask-Based Scheme","authors":"Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu","doi":"10.1109/IAS.2009.150","DOIUrl":"https://doi.org/10.1109/IAS.2009.150","url":null,"abstract":"This work presents a new approach, symmetric mask-based scheme (SMBS), for moving object detection and tracking based on the symmetric mask-based discrete wavelet transform (SMDWT). This work presents a fast algorithm, called 2-D SMDWT, to improve the critical issue of the 2-D lifting-based Discrete Wavelet Transform (LDWT), and then obtains the benefit of low latency, reduced complexity, and low transpose memory for object detection. The successful moving object detection in a real surrounding environment is a difficult task due to noise issues such as fake motion or Gaussian noise. The SMBS approach can effectively reduce noises with low computing cost in both indoor and outdoor environments. The experimental results indicate that the proposed method can provide precise moving object detection and tracking.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Insider Attacks Using Non-negative Matrix Factorization 利用非负矩阵分解检测内部攻击
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.262
J. Platoš, V. Snás̃el, P. Krömer, A. Abraham
It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative Matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the Non-negative Matrix Factorization approach could be also an ideal candidate to detect internal threats.
事实上,绝大多数的注意力都集中在防止外部威胁上,这被认为是更危险的。然而,一些行业调查显示,他们内部报告了攻击事件。内部攻击是一种不寻常的威胁类型,也是非常严重和常见的。与外部入侵者不同,在内部攻击的情况下,入侵者是被授权访问网络的人。提出了一种检测内部攻击的非负矩阵分解方法。与其他已建立的模式识别技术的比较表明,非负矩阵分解方法也是检测内部威胁的理想候选方法。
{"title":"Detecting Insider Attacks Using Non-negative Matrix Factorization","authors":"J. Platoš, V. Snás̃el, P. Krömer, A. Abraham","doi":"10.1109/IAS.2009.262","DOIUrl":"https://doi.org/10.1109/IAS.2009.262","url":null,"abstract":"It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative Matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the Non-negative Matrix Factorization approach could be also an ideal candidate to detect internal threats.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134424815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Small Moving Infrared Target Detection Algorithm under Low SNR Background 低信噪比背景下红外运动小目标检测算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.239
Kai Wang, Yan Liu, Xiaowei Sun
In the infrared imaging guidance system, small targets of infrared image is disturbed by the background and noise, which results in low SNR and brings difficulty to target detection. Therefore, firstly we use mathematical morphology filtering based Top-Hat transform to suppress the background of the digital infrared image. After that, we get the union resulted from WTT and BTT. And then, using adaptive threshold segmentation algorithm, we obtain the image which contains the small target. The experimental results prove that, when the SNR reaches 2, this approach presented by this paper is an effective method for small infrared moving target detection.
在红外成像制导系统中,红外图像中的小目标受到背景和噪声的干扰,导致信噪比低,给目标检测带来困难。为此,首先采用基于数学形态学滤波的Top-Hat变换对数字红外图像的背景进行抑制。之后,我们得到了WTT和BTT的合并结果。然后,采用自适应阈值分割算法,得到包含小目标的图像。实验结果证明,当信噪比达到2时,本文提出的方法是一种有效的红外小运动目标检测方法。
{"title":"Small Moving Infrared Target Detection Algorithm under Low SNR Background","authors":"Kai Wang, Yan Liu, Xiaowei Sun","doi":"10.1109/IAS.2009.239","DOIUrl":"https://doi.org/10.1109/IAS.2009.239","url":null,"abstract":"In the infrared imaging guidance system, small targets of infrared image is disturbed by the background and noise, which results in low SNR and brings difficulty to target detection. Therefore, firstly we use mathematical morphology filtering based Top-Hat transform to suppress the background of the digital infrared image. After that, we get the union resulted from WTT and BTT. And then, using adaptive threshold segmentation algorithm, we obtain the image which contains the small target. The experimental results prove that, when the SNR reaches 2, this approach presented by this paper is an effective method for small infrared moving target detection.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133079864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1