The research on wireless system is to improve the reliability and performance of wireless radio links. The effects of (multi-path) radio propagation, modulation, and coding and signal processing techniques on the spectrum efficiency and performance of wireless radio networks are studied, in particular Orthogonal Frequency Division Multiplexing (OFDM) and related transmission methods. But the multimedia information is not secured in the wireless environment compared to that of wired environment. In this paper, we have carried out a new method of cryptographic algorithm over a future generation (4G and above) wireless system called the OFDM (FFT (Fast Fourier Transform) / IFFT (Inverse FFT)) technique using Walsh Hadamard spreading codes. We have done the simulation in MATLAB programming and the BER (Bit Error Rate) vs. SNR (Signal-to-Noise Ratio) performance is studied for multimedia signals (such as text, audio and image) in an AWGN wireless channel. We have also developed an algorithm for generating the Walsh codes and the RSA secret keys. We found the results of our simulation are very much satisfactory for practical implementation in wireless systems.
{"title":"RSA/Shift Secured IFFT/FFT Based OFDM Wireless System","authors":"D. Rajaveerappa, A. Almarimi","doi":"10.1109/IAS.2009.356","DOIUrl":"https://doi.org/10.1109/IAS.2009.356","url":null,"abstract":"The research on wireless system is to improve the reliability and performance of wireless radio links. The effects of (multi-path) radio propagation, modulation, and coding and signal processing techniques on the spectrum efficiency and performance of wireless radio networks are studied, in particular Orthogonal Frequency Division Multiplexing (OFDM) and related transmission methods. But the multimedia information is not secured in the wireless environment compared to that of wired environment. In this paper, we have carried out a new method of cryptographic algorithm over a future generation (4G and above) wireless system called the OFDM (FFT (Fast Fourier Transform) / IFFT (Inverse FFT)) technique using Walsh Hadamard spreading codes. We have done the simulation in MATLAB programming and the BER (Bit Error Rate) vs. SNR (Signal-to-Noise Ratio) performance is studied for multimedia signals (such as text, audio and image) in an AWGN wireless channel. We have also developed an algorithm for generating the Walsh codes and the RSA secret keys. We found the results of our simulation are very much satisfactory for practical implementation in wireless systems.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and supply chain application in the future. RFID is intimate linking real and virtual also creates considerable security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and/or privacy were proposed. In this paper, we surveys the literature of hash-based access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag.
{"title":"Secure Access Control Scheme of RFID System Application","authors":"Yu-Chih Huang","doi":"10.1109/IAS.2009.223","DOIUrl":"https://doi.org/10.1109/IAS.2009.223","url":null,"abstract":"Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and supply chain application in the future. RFID is intimate linking real and virtual also creates considerable security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and/or privacy were proposed. In this paper, we surveys the literature of hash-based access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Valuable images are usually acquired with higher resolution and deeper color depth. Hence, in this paper, we proposed a scheme based on cropping and downsampling to prevent the embedded fingerprints from average attack. We first generate an resized original image for each user with cropping and downsampling. This resized original image belonging to a particular user is then embedded with the fingerprint related to this user. With this method, a coalition of users can still apply average attack on their own fingerprinted images, but the more number of images used, the lower the perceptual quality of the result image will become. The effectiveness of the proposed method is well illustrated by experimental results.
{"title":"Collusion-Resilient Fingerprinting Using Cropping and Subsampling","authors":"Yueh-Hong Chen, Hsiang-Cheh Huang","doi":"10.1109/IAS.2009.343","DOIUrl":"https://doi.org/10.1109/IAS.2009.343","url":null,"abstract":"Valuable images are usually acquired with higher resolution and deeper color depth. Hence, in this paper, we proposed a scheme based on cropping and downsampling to prevent the embedded fingerprints from average attack. We first generate an resized original image for each user with cropping and downsampling. This resized original image belonging to a particular user is then embedded with the fingerprint related to this user. With this method, a coalition of users can still apply average attack on their own fingerprinted images, but the more number of images used, the lower the perceptual quality of the result image will become. The effectiveness of the proposed method is well illustrated by experimental results.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing browser-side anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given.
{"title":"Browser-Side Countermeasures for Deceptive Phishing Attack","authors":"Huajun Huang, Shaohong Zhong, Junshan Tan","doi":"10.1109/IAS.2009.12","DOIUrl":"https://doi.org/10.1109/IAS.2009.12","url":null,"abstract":"Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing browser-side anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133263412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Ashiqur Rahaman, H. Plate, Y. Roudier, A. Schaad
Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector,healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging task. This paper describes a publish/subscribe middleware infrastructure to achieve a content-based dissemination of XML documents. Our approach relies on the dissemination of XML documents based on their semantics, as described by concepts that form an interoperable description of documents. This infrastructure leverages our earlier scheme [1] for protecting the integrity and confidentiality of XML content during dissemination.
{"title":"Towards Secure Content Based Dissemination of XML Documents","authors":"Mohammad Ashiqur Rahaman, H. Plate, Y. Roudier, A. Schaad","doi":"10.1109/IAS.2009.138","DOIUrl":"https://doi.org/10.1109/IAS.2009.138","url":null,"abstract":"Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector,healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging task. This paper describes a publish/subscribe middleware infrastructure to achieve a content-based dissemination of XML documents. Our approach relies on the dissemination of XML documents based on their semantics, as described by concepts that form an interoperable description of documents. This infrastructure leverages our earlier scheme [1] for protecting the integrity and confidentiality of XML content during dissemination.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xingmei Zhao
Considering the unsteadiness and unpredictability of a practical task running environment due to the unsteadiness of network communication and the estimation deviation, it is necessary to introduce fuzzy concept and theory to the scheduling and performance control of the soft real-time application systems oriented communication and network fields. In this paper, a new adaptive soft real-time task scheduling model with the fuzzy-PID feedback controller was presented. In this model, we used the fuzzy scheduling algorithm in which the scheduling turn of a ready task is decided by the fuzzy inference result of its criticality and deadline distance. Meanwhile,in the adaptive control part, we used the fuzzy-PID controller that combines the fuzzy feedback controller and PID controller instead of traditonal PID controller. The simulation test shows that our presented model can enable a soft real-time systems which has the mulit-level service characteristic reach the steady state faster and has less miss ratio to more important tasks.
{"title":"An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems","authors":"Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xingmei Zhao","doi":"10.1109/IAS.2009.269","DOIUrl":"https://doi.org/10.1109/IAS.2009.269","url":null,"abstract":"Considering the unsteadiness and unpredictability of a practical task running environment due to the unsteadiness of network communication and the estimation deviation, it is necessary to introduce fuzzy concept and theory to the scheduling and performance control of the soft real-time application systems oriented communication and network fields. In this paper, a new adaptive soft real-time task scheduling model with the fuzzy-PID feedback controller was presented. In this model, we used the fuzzy scheduling algorithm in which the scheduling turn of a ready task is decided by the fuzzy inference result of its criticality and deadline distance. Meanwhile,in the adaptive control part, we used the fuzzy-PID controller that combines the fuzzy feedback controller and PID controller instead of traditonal PID controller. The simulation test shows that our presented model can enable a soft real-time systems which has the mulit-level service characteristic reach the steady state faster and has less miss ratio to more important tasks.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper address issues that arise in copyright protection systems of digital images, which employ blind watermark verification structures in the curvelet domain. First, we observe that statistical distribution with heavy algebraic tails, such as the alpha-stable family, are in many cases more accurate modeling tools for the curvelet coefficients than families with exponential tails such as generalized Gaussian. Motivated by our modeling results, we then design a new processor for blind watermark detection using the Cauchy member of the alpha-stable family. We analyze the performance of the new detector in terms of the associated probabilities of detection and false alarm and we compare it to the performance of the generalized Gaussian detector and the traditional correlation-based detector by performance experiments. The experiments prove that Cauchy detector is superior to the others.
{"title":"Curvelet Domain Watermark Detection Using Alpha-Stable Models","authors":"Chengzhi Deng, Huasheng Zhu, Shengqian Wang","doi":"10.1109/IAS.2009.21","DOIUrl":"https://doi.org/10.1109/IAS.2009.21","url":null,"abstract":"This paper address issues that arise in copyright protection systems of digital images, which employ blind watermark verification structures in the curvelet domain. First, we observe that statistical distribution with heavy algebraic tails, such as the alpha-stable family, are in many cases more accurate modeling tools for the curvelet coefficients than families with exponential tails such as generalized Gaussian. Motivated by our modeling results, we then design a new processor for blind watermark detection using the Cauchy member of the alpha-stable family. We analyze the performance of the new detector in terms of the associated probabilities of detection and false alarm and we compare it to the performance of the generalized Gaussian detector and the traditional correlation-based detector by performance experiments. The experiments prove that Cauchy detector is superior to the others.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work presents a new approach, symmetric mask-based scheme (SMBS), for moving object detection and tracking based on the symmetric mask-based discrete wavelet transform (SMDWT). This work presents a fast algorithm, called 2-D SMDWT, to improve the critical issue of the 2-D lifting-based Discrete Wavelet Transform (LDWT), and then obtains the benefit of low latency, reduced complexity, and low transpose memory for object detection. The successful moving object detection in a real surrounding environment is a difficult task due to noise issues such as fake motion or Gaussian noise. The SMBS approach can effectively reduce noises with low computing cost in both indoor and outdoor environments. The experimental results indicate that the proposed method can provide precise moving object detection and tracking.
{"title":"Moving Object Tracking Using Symmetric Mask-Based Scheme","authors":"Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu","doi":"10.1109/IAS.2009.150","DOIUrl":"https://doi.org/10.1109/IAS.2009.150","url":null,"abstract":"This work presents a new approach, symmetric mask-based scheme (SMBS), for moving object detection and tracking based on the symmetric mask-based discrete wavelet transform (SMDWT). This work presents a fast algorithm, called 2-D SMDWT, to improve the critical issue of the 2-D lifting-based Discrete Wavelet Transform (LDWT), and then obtains the benefit of low latency, reduced complexity, and low transpose memory for object detection. The successful moving object detection in a real surrounding environment is a difficult task due to noise issues such as fake motion or Gaussian noise. The SMBS approach can effectively reduce noises with low computing cost in both indoor and outdoor environments. The experimental results indicate that the proposed method can provide precise moving object detection and tracking.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative Matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the Non-negative Matrix Factorization approach could be also an ideal candidate to detect internal threats.
{"title":"Detecting Insider Attacks Using Non-negative Matrix Factorization","authors":"J. Platoš, V. Snás̃el, P. Krömer, A. Abraham","doi":"10.1109/IAS.2009.262","DOIUrl":"https://doi.org/10.1109/IAS.2009.262","url":null,"abstract":"It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative Matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the Non-negative Matrix Factorization approach could be also an ideal candidate to detect internal threats.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134424815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the infrared imaging guidance system, small targets of infrared image is disturbed by the background and noise, which results in low SNR and brings difficulty to target detection. Therefore, firstly we use mathematical morphology filtering based Top-Hat transform to suppress the background of the digital infrared image. After that, we get the union resulted from WTT and BTT. And then, using adaptive threshold segmentation algorithm, we obtain the image which contains the small target. The experimental results prove that, when the SNR reaches 2, this approach presented by this paper is an effective method for small infrared moving target detection.
{"title":"Small Moving Infrared Target Detection Algorithm under Low SNR Background","authors":"Kai Wang, Yan Liu, Xiaowei Sun","doi":"10.1109/IAS.2009.239","DOIUrl":"https://doi.org/10.1109/IAS.2009.239","url":null,"abstract":"In the infrared imaging guidance system, small targets of infrared image is disturbed by the background and noise, which results in low SNR and brings difficulty to target detection. Therefore, firstly we use mathematical morphology filtering based Top-Hat transform to suppress the background of the digital infrared image. After that, we get the union resulted from WTT and BTT. And then, using adaptive threshold segmentation algorithm, we obtain the image which contains the small target. The experimental results prove that, when the SNR reaches 2, this approach presented by this paper is an effective method for small infrared moving target detection.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133079864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}