首页 > 最新文献

2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

英文 中文
A review of recent advances on multimedia watermarking security and design implications for digital Quran computing 综述了多媒体水印安全及其对数字古兰经计算的设计意义
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013139
O. Tayan, Y. Alginahi
The explosion in the online propagation of digital multimedia suggests that such data is vulnerable to threats, data-manipulation and attack. This problem is further exacerbated when dealing with highly sensitive digital multimedia content such as the Holy Quran, in which the modification/corruption of a single character, diacritic or symbol would regard the entire content as invalid. Hence, the protection of sensitive data and Quran multimedia data in particular is essential to ensure that only the original non-tampered data is propagated with no distortion. Protection schemes include verifying integrity, proof-of-authenticity, tamper-detection and copyright protection. A technique in the literature used to provide the necessary security for such digital content is known as digital watermarking. This paper reviews the state-of-the-art in digital text, image and audio watermarking applicable to sensitive digital content and discusses how those approaches can achieve the required protection, measured against relevant performance metrics and set according to their respective environments and digital formats being used. The main goal of this paper is to provide an effective study by which to develop new techniques and approaches for the protection of sensitive multimedia content.
数字多媒体在线传播的爆炸式增长表明,这些数据很容易受到威胁、数据操纵和攻击。当处理高度敏感的数码多媒体内容,例如《古兰经》时,这个问题会进一步恶化。在这些内容中,只要修改/损坏一个字符、变音符号或符号,就会使整个内容无效。因此,保护敏感数据,特别是古兰经多媒体数据至关重要,以确保只传播原始的未篡改数据而不失真。保护方案包括完整性验证、真实性证明、篡改检测和版权保护。文献中用于为此类数字内容提供必要安全性的技术称为数字水印。本文回顾了适用于敏感数字内容的数字文本、图像和音频水印的最新技术,并讨论了这些方法如何实现所需的保护,根据相关的性能指标进行测量,并根据各自的环境和正在使用的数字格式进行设置。本文的主要目的是为开发敏感多媒体内容保护的新技术和新方法提供有效的研究。
{"title":"A review of recent advances on multimedia watermarking security and design implications for digital Quran computing","authors":"O. Tayan, Y. Alginahi","doi":"10.1109/ISBAST.2014.7013139","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013139","url":null,"abstract":"The explosion in the online propagation of digital multimedia suggests that such data is vulnerable to threats, data-manipulation and attack. This problem is further exacerbated when dealing with highly sensitive digital multimedia content such as the Holy Quran, in which the modification/corruption of a single character, diacritic or symbol would regard the entire content as invalid. Hence, the protection of sensitive data and Quran multimedia data in particular is essential to ensure that only the original non-tampered data is propagated with no distortion. Protection schemes include verifying integrity, proof-of-authenticity, tamper-detection and copyright protection. A technique in the literature used to provide the necessary security for such digital content is known as digital watermarking. This paper reviews the state-of-the-art in digital text, image and audio watermarking applicable to sensitive digital content and discusses how those approaches can achieve the required protection, measured against relevant performance metrics and set according to their respective environments and digital formats being used. The main goal of this paper is to provide an effective study by which to develop new techniques and approaches for the protection of sensitive multimedia content.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A unified approach for unconstrained off-angle iris recognition 一种无约束非角度虹膜识别的统一方法
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013091
Sim Hiew Moi, H. Asmuni, Rohayanti Hassan, R. Othman
Improving the performance of non-idealistic iris recognition has recently become one of the main focus in iris biometric research. In real-world iris image acquisitions, it is common and unavoidable to capture off-angle iris images. Such off-angle iris images are categorized as non-idealistic because they substantially degrade the performance of iris recognition. In this paper, we present a unified framework designed to improve off-angle iris recognition performance. We propose combination of least square ellipse fitting (LSEF) technique and the geometric calibration (GC) technique for the iris segmentation. For off-angle images, the improper location of iris and pupil interferes with the ability to effectively segment the inner boundary and outer boundary of the iris image. With the proposed techniques, inner and outer boundaries are fitted iteratively. For feature extraction, we propose a NeuWave Network (inspired by the Haar wavelet decomposition and neural network). The iris features are represented using the wavelet coefficients. Each different angle of the iris have its own significant coefficient and these coefficient, with a set of weights, then forms the iris template. The approach is evaluated based on recognition accuracy measured by the false rejection, false acceptance rate, and decidability index. We evaluate the algorithms with WVU-IBIDC datasets.
提高非理想虹膜识别性能已成为近年来虹膜生物识别研究的主要热点之一。在实际的虹膜图像采集中,捕获非角度虹膜图像是常见的,也是不可避免的。这种偏离角度的虹膜图像被归类为非理想的,因为它们大大降低了虹膜识别的性能。在本文中,我们提出了一个统一的框架,旨在提高非角度虹膜识别性能。提出了最小二乘椭圆拟合(LSEF)和几何校正(GC)相结合的虹膜分割方法。对于非角度图像,虹膜和瞳孔的位置不合适会影响虹膜图像内边界和外边界的有效分割。利用所提出的技术,迭代拟合内外边界。对于特征提取,我们提出了NeuWave网络(受Haar小波分解和神经网络的启发)。用小波系数表示虹膜特征。每个不同角度的虹膜都有自己的显著系数,这些系数加上一组权重,就形成了虹膜模板。通过错误拒绝率、错误接受率和可判决性指标来衡量该方法的识别精度。我们用WVU-IBIDC数据集对算法进行了评估。
{"title":"A unified approach for unconstrained off-angle iris recognition","authors":"Sim Hiew Moi, H. Asmuni, Rohayanti Hassan, R. Othman","doi":"10.1109/ISBAST.2014.7013091","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013091","url":null,"abstract":"Improving the performance of non-idealistic iris recognition has recently become one of the main focus in iris biometric research. In real-world iris image acquisitions, it is common and unavoidable to capture off-angle iris images. Such off-angle iris images are categorized as non-idealistic because they substantially degrade the performance of iris recognition. In this paper, we present a unified framework designed to improve off-angle iris recognition performance. We propose combination of least square ellipse fitting (LSEF) technique and the geometric calibration (GC) technique for the iris segmentation. For off-angle images, the improper location of iris and pupil interferes with the ability to effectively segment the inner boundary and outer boundary of the iris image. With the proposed techniques, inner and outer boundaries are fitted iteratively. For feature extraction, we propose a NeuWave Network (inspired by the Haar wavelet decomposition and neural network). The iris features are represented using the wavelet coefficients. Each different angle of the iris have its own significant coefficient and these coefficient, with a set of weights, then forms the iris template. The approach is evaluated based on recognition accuracy measured by the false rejection, false acceptance rate, and decidability index. We evaluate the algorithms with WVU-IBIDC datasets.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
JPEG mage encryption with Elliptic Curve Cryptography JPEG图像加密与椭圆曲线加密
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013111
Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari
Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.
目前,图像多用途应用的课题在安全建立、身份验证、水印等领域蓬勃发展。同时,多学科领域的兴起也吸引了更多的关注。在现有的加密算法中,椭圆曲线加密算法具有带宽利用率低、计算时间短、密钥大小小等特点,适合用于图像加密。本文详细提出了在图像压缩过程中和压缩前利用ECC对图像进行加密,并给出了应用ECC对图像加/解密、加密性能和压缩性能的结果和分析。
{"title":"JPEG mage encryption with Elliptic Curve Cryptography","authors":"Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013111","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013111","url":null,"abstract":"Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Geometrical and eigenvector features for ear recognition 耳朵识别的几何特征和特征向量特征
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013094
F. Kurniawan, M. Rahim, M. Khalil
Unconstrained ear biometric means an ear image that has variance in view and pose. This situation is challenging in ear recognition because one ear has various presentation. In this study, two features are considered to handle unconstrained ear image. The features called geometrical feature and eigenvector features. In eigenvector feature, the ear is extracted from six regions then the eigenvector is computed from each of those regions. Each region has capability to represent particular part of the ear image. Another feature is called geometrical feature that reflecting the shape of ear image. The widely used classifier is utilized and it trained with both features. Proposed method outcome is measured to evaluate the recognition rates among single features and fused features. The experiment is carried out on benchmark database collected by University of Science and Technology Beijing (USTB). It shows the proposed method can achieved promising result.
无约束耳生物识别技术是指具有不同视角和姿态的耳图像。这种情况对耳朵识别具有挑战性,因为一只耳朵有不同的表现。在本研究中,考虑了两个特征来处理无约束耳图像。这些特征称为几何特征和特征向量特征。在特征向量特征中,从六个区域提取耳朵,然后从每个区域计算特征向量。每个区域都有能力代表耳朵图像的特定部分。另一种特征被称为几何特征,它反映了耳朵图像的形状。利用了目前广泛使用的分类器,并对其进行了两个特征的训练。通过测量所提方法的结果来评估单一特征和融合特征之间的识别率。实验在北京科技大学收集的基准数据库上进行。结果表明,该方法能取得较好的效果。
{"title":"Geometrical and eigenvector features for ear recognition","authors":"F. Kurniawan, M. Rahim, M. Khalil","doi":"10.1109/ISBAST.2014.7013094","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013094","url":null,"abstract":"Unconstrained ear biometric means an ear image that has variance in view and pose. This situation is challenging in ear recognition because one ear has various presentation. In this study, two features are considered to handle unconstrained ear image. The features called geometrical feature and eigenvector features. In eigenvector feature, the ear is extracted from six regions then the eigenvector is computed from each of those regions. Each region has capability to represent particular part of the ear image. Another feature is called geometrical feature that reflecting the shape of ear image. The widely used classifier is utilized and it trained with both features. Proposed method outcome is measured to evaluate the recognition rates among single features and fused features. The experiment is carried out on benchmark database collected by University of Science and Technology Beijing (USTB). It shows the proposed method can achieved promising result.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Offline handwriting segmentation for writer identification 脱机手写分割写作者识别
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013086
E. Cermeño, Silvana Mallor, J. A. Sigüenza
In this paper we present a new technique for off-line text-independent handwriting analysis based on segmentation. Segmentation is a common step used in different research works in order to generate connected components that will be processed to extract features (geometry, concavity etc.). Our work focuses in the segmentation process and the information that can be directly extracted from the way a writer joins or separates ink connected components without need of analyzing the components themselves. The proposed multi-segmentation method shows good results tested on its own with real documents from police corps database and suggest an improved way to apply segmentation to other connected component based systems.
本文提出了一种基于分割的脱机文本无关手写体分析方法。分割是不同研究工作中常用的步骤,目的是生成连接的组件,这些组件将被处理以提取特征(几何形状、凹凸度等)。我们的工作重点是分割过程,以及可以直接从作者连接或分离墨水连接组件的方式中提取的信息,而无需分析组件本身。本文提出的多段分割方法在警察数据库的实际文档中取得了良好的效果,并为其他基于连接组件的系统的分割提供了一种改进的方法。
{"title":"Offline handwriting segmentation for writer identification","authors":"E. Cermeño, Silvana Mallor, J. A. Sigüenza","doi":"10.1109/ISBAST.2014.7013086","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013086","url":null,"abstract":"In this paper we present a new technique for off-line text-independent handwriting analysis based on segmentation. Segmentation is a common step used in different research works in order to generate connected components that will be processed to extract features (geometry, concavity etc.). Our work focuses in the segmentation process and the information that can be directly extracted from the way a writer joins or separates ink connected components without need of analyzing the components themselves. The proposed multi-segmentation method shows good results tested on its own with real documents from police corps database and suggest an improved way to apply segmentation to other connected component based systems.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131975231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rushing attack against routing protocols in Mobile Ad-Hoc Networks 针对移动Ad-Hoc网络路由协议的匆忙攻击
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013125
S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari
Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routing protocols in MANETs. Although there are many researches over Rushing attacks, the security research community suffers from a famine of evidence to present the exact position of this kind of attacks in MANETs clearly. Therefore, we paid particular attention to this issue to clarify the position of Rushing attacks against routing protocols and the functionality of this category of attacks. We hope that our document be useful for other researchers in understanding mentioned issue in face with this class of attacks.
由于无线信道的特性,移动自组织网络(manet)容易受到许多威胁和攻击。除此之外,网络节点的移动性使得路由协议的安全性成为Ad-Hoc网络中最有趣的研究领域之一。此外,快速攻击已成为针对路由协议的常见攻击之一。尽管对快速攻击的研究很多,但安全研究界缺乏足够的证据来清楚地展示这种攻击在manet中的确切位置。因此,我们特别关注这个问题,以澄清针对路由协议的匆忙攻击的地位和这类攻击的功能。我们希望我们的文件对其他研究人员在面对这类攻击时理解上述问题有用。
{"title":"Rushing attack against routing protocols in Mobile Ad-Hoc Networks","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013125","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013125","url":null,"abstract":"Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routing protocols in MANETs. Although there are many researches over Rushing attacks, the security research community suffers from a famine of evidence to present the exact position of this kind of attacks in MANETs clearly. Therefore, we paid particular attention to this issue to clarify the position of Rushing attacks against routing protocols and the functionality of this category of attacks. We hope that our document be useful for other researchers in understanding mentioned issue in face with this class of attacks.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"644 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Effective mining on large databases for intrusion detection 针对入侵检测的大型数据库有效挖掘
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013122
Reza Adinehnia, N. Udzir, L. S. Affendey, I. Ishak, Z. Hanapi
Data mining is a common automated way of generating normal patterns for intrusion detection systems. In this work a large dataset is customized to be suitable for both sequence mining and association rule learning. These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system.Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. The main contribution of this work is the evaluation of the association rule learning that can be used for further studies in the field of database intrusion detection systems.
数据挖掘是一种为入侵检测系统生成正常模式的常用自动化方法。在这项工作中,一个大型数据集被定制为适合序列挖掘和关联规则学习。然后对这两种不同的挖掘方法进行测试和比较,找出哪一种方法可以为入侵检测系统产生更准确的有效模式。结果表明,在本文提出的数据集上使用先验算法可以获得更高的检测率。本文的主要贡献是对关联规则学习的评价,为数据库入侵检测系统的进一步研究提供了依据。
{"title":"Effective mining on large databases for intrusion detection","authors":"Reza Adinehnia, N. Udzir, L. S. Affendey, I. Ishak, Z. Hanapi","doi":"10.1109/ISBAST.2014.7013122","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013122","url":null,"abstract":"Data mining is a common automated way of generating normal patterns for intrusion detection systems. In this work a large dataset is customized to be suitable for both sequence mining and association rule learning. These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system.Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. The main contribution of this work is the evaluation of the association rule learning that can be used for further studies in the field of database intrusion detection systems.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers 基于签名的集成数据挖掘分类器异常入侵检测
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013127
W. Yassin, N. Udzir, Azizol Abdullah, Mohd Taufik Abdullah, H. Zulzalil, Z. Muda
As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to find those intrusive activities as fast as possible with precision. Unfortunately, besides minimizing false alarms; the performance issues related to heavy computational process has become drawbacks to be resolved in this kind of detection systems. In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. Integratingdata mining classifiers such as Naive Bayes and Random Forest can beutilized to decrease false alarms as well as generate signatures based on detection resultsfor future prediction and reducing processing time. Results from a number of experiments using DARPA 1999 and ISCX 2012 benchmark dataset have validated that SADS own better detection capabilities with lower processing duration as contrast to conventional anomaly-based detection method.
随着互联网和网络技术作为传播媒介的影响力在全球范围内的发展和扩大,网络攻击也随之增多。异常检测系统(ads)通过对网络中来自不同位置的数据包行为等信息进行检测,以快速准确地发现入侵行为。不幸的是,除了尽量减少误报;计算量大的性能问题已经成为这类检测系统亟待解决的问题。在这项工作中,提出了一种新的基于签名的异常检测方案(SADS),该方案可以更准确、更迅速地检查数据包头的行为模式。集成数据挖掘分类器,如朴素贝叶斯和随机森林,可以用来减少假警报,以及基于检测结果生成签名,用于未来预测和减少处理时间。基于DARPA 1999和ISCX 2012基准数据集的大量实验结果表明,与传统的基于异常的检测方法相比,SADS具有更好的检测能力和更短的处理时间。
{"title":"Signature-Based Anomaly intrusion detection using Integrated data mining classifiers","authors":"W. Yassin, N. Udzir, Azizol Abdullah, Mohd Taufik Abdullah, H. Zulzalil, Z. Muda","doi":"10.1109/ISBAST.2014.7013127","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013127","url":null,"abstract":"As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to find those intrusive activities as fast as possible with precision. Unfortunately, besides minimizing false alarms; the performance issues related to heavy computational process has become drawbacks to be resolved in this kind of detection systems. In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. Integratingdata mining classifiers such as Naive Bayes and Random Forest can beutilized to decrease false alarms as well as generate signatures based on detection resultsfor future prediction and reducing processing time. Results from a number of experiments using DARPA 1999 and ISCX 2012 benchmark dataset have validated that SADS own better detection capabilities with lower processing duration as contrast to conventional anomaly-based detection method.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Matching reduction of 2DPalmHash Code 2DPalmHash码的匹配约简
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013107
L. Leng, Ming Li, A. Teoh
2DPalmHash Code (2DPHC), which is constructed based on Gabor filter, is a cancelable palmprint coding scheme for secure palmprint verification. In this scheme, multiple-translated matchings between two 2DPHCs are performed to remedy the vertical and horizontal dislocation problems of Gabor feature matrix. According to the analysis, vertical translation matching fixes the vertical dislocation, but the horizontal translation matching does not work out horizontal dislocation. Therefore, the computation of multiple-translated matching of 2DPHC can be reduced by discarding the horizontal translation matching. The matching reduction not only reduces the computational complexity of matching, but also improves the verification performance and enhances the changeability capacity of 2DPHC as a cancelable scheme.
2d掌纹码(2DPHC)是一种基于Gabor滤波器构造的可取消掌纹编码方案,用于安全掌纹验证。在该方案中,两个2DPHCs之间进行多次平移匹配,以解决Gabor特征矩阵的垂直和水平错位问题。根据分析,垂直平移匹配解决了垂直错位,而水平平移匹配不解决水平错位。因此,通过丢弃水平平移匹配,可以减少2DPHC的多平移匹配计算。匹配缩减不仅降低了匹配的计算复杂度,而且提高了验证性能,增强了2DPHC作为可取消方案的可变性能力。
{"title":"Matching reduction of 2DPalmHash Code","authors":"L. Leng, Ming Li, A. Teoh","doi":"10.1109/ISBAST.2014.7013107","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013107","url":null,"abstract":"2DPalmHash Code (2DPHC), which is constructed based on Gabor filter, is a cancelable palmprint coding scheme for secure palmprint verification. In this scheme, multiple-translated matchings between two 2DPHCs are performed to remedy the vertical and horizontal dislocation problems of Gabor feature matrix. According to the analysis, vertical translation matching fixes the vertical dislocation, but the horizontal translation matching does not work out horizontal dislocation. Therefore, the computation of multiple-translated matching of 2DPHC can be reduced by discarding the horizontal translation matching. The matching reduction not only reduces the computational complexity of matching, but also improves the verification performance and enhances the changeability capacity of 2DPHC as a cancelable scheme.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using a biometric system to check-in and check-out luggage at airports 使用生物识别系统在机场办理登机手续和托运行李
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013095
R. Hans
The airline industry is losing millions of dollars each year due to lost or stolen passenger luggage. The current system used for both checking-in and checking-out passengers' luggage has not proven to be effective in curbing luggage loss. On the other hand numerous businesses, including airlines, have turned into biometrics for effective access control and user authentication. It is on the basis of this undisputed success of biometric systems that this research study proposes the extended use of a fingerprint biometric system for passenger luggage check-in and check-out at the airports. The use of biometrics at various international airports in other business areas has yielded positive results. Therefore, the usage of a biometric system for luggage check-in and check-out would be one way of nipping luggage theft in the bud. There are various returns on investing in the proposed biometric system for passenger luggage control at the airports. These returns include, curbing luggage theft resulting in savings of millions of dollars on luggage loss, and improving passenger satisfaction as well as passenger service. The usage of the proposed biometric system at the airports which have not started using biometrics has some limitations. These limitations include the perceived private invasion and user acceptance limitations.
由于旅客行李丢失或被盗,航空业每年损失数百万美元。目前用于旅客行李托运和托运的系统在减少行李丢失方面没有被证明是有效的。另一方面,包括航空公司在内的许多企业已经转向生物识别技术,以实现有效的访问控制和用户认证。正是基于生物识别系统的这种无可争议的成功,本研究建议将指纹生物识别系统扩展用于机场的旅客行李登记和退房。生物识别技术在多个国际机场和其他业务领域的应用取得了积极成果。因此,在行李登记和退房时使用生物识别系统将是将行李盗窃扼杀在萌芽状态的一种方法。投资拟议中的用于机场旅客行李控制的生物识别系统有各种各样的回报。这些回报包括,遏制行李盗窃,从而节省数百万美元的行李损失,提高乘客满意度和乘客服务。在尚未开始使用生物识别技术的机场使用拟议的生物识别系统有一些限制。这些限制包括感知到的隐私入侵和用户接受限制。
{"title":"Using a biometric system to check-in and check-out luggage at airports","authors":"R. Hans","doi":"10.1109/ISBAST.2014.7013095","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013095","url":null,"abstract":"The airline industry is losing millions of dollars each year due to lost or stolen passenger luggage. The current system used for both checking-in and checking-out passengers' luggage has not proven to be effective in curbing luggage loss. On the other hand numerous businesses, including airlines, have turned into biometrics for effective access control and user authentication. It is on the basis of this undisputed success of biometric systems that this research study proposes the extended use of a fingerprint biometric system for passenger luggage check-in and check-out at the airports. The use of biometrics at various international airports in other business areas has yielded positive results. Therefore, the usage of a biometric system for luggage check-in and check-out would be one way of nipping luggage theft in the bud. There are various returns on investing in the proposed biometric system for passenger luggage control at the airports. These returns include, curbing luggage theft resulting in savings of millions of dollars on luggage loss, and improving passenger satisfaction as well as passenger service. The usage of the proposed biometric system at the airports which have not started using biometrics has some limitations. These limitations include the perceived private invasion and user acceptance limitations.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1