首页 > 最新文献

2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

英文 中文
Malware behavior image for malware variant identification 恶意软件行为图像,用于恶意软件变体识别
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013128
Syed Zainudeen Mohd Shaid, M. A. Maarof
Several methods have been devised by researchers to facilitate malware analysis and one of them is through malware visualization. Malware visualization is a field that focuses on representing malware features in a form of visual cues that could be used to convey more information about a particular malware. There has been works in malware visualization but unfortunately, there seems to be a lack of focus in visualizing malware behavior. In this paper, we highlight our findings in visualizing malware behavior and its potential benefit for malware classification. Our research shows that malware behavior visualization can be used as a way to identify malware variants with high accuracy.
研究人员设计了几种方法来促进恶意软件的分析,其中一种方法是通过恶意软件可视化。恶意软件可视化是一个专注于以视觉线索的形式表示恶意软件特征的领域,可以用来传达关于特定恶意软件的更多信息。在恶意软件可视化方面已经有了一些工作,但不幸的是,似乎缺乏对恶意软件行为可视化的关注。在本文中,我们重点介绍了我们在恶意软件行为可视化方面的发现及其对恶意软件分类的潜在好处。我们的研究表明,恶意软件行为可视化可以作为一种识别恶意软件变体的方法,具有很高的准确性。
{"title":"Malware behavior image for malware variant identification","authors":"Syed Zainudeen Mohd Shaid, M. A. Maarof","doi":"10.1109/ISBAST.2014.7013128","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013128","url":null,"abstract":"Several methods have been devised by researchers to facilitate malware analysis and one of them is through malware visualization. Malware visualization is a field that focuses on representing malware features in a form of visual cues that could be used to convey more information about a particular malware. There has been works in malware visualization but unfortunately, there seems to be a lack of focus in visualizing malware behavior. In this paper, we highlight our findings in visualizing malware behavior and its potential benefit for malware classification. Our research shows that malware behavior visualization can be used as a way to identify malware variants with high accuracy.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
A mechanism for privacy preserving in healthcare organizations 医疗保健组织中的隐私保护机制
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013123
Muhammad Syafiq Samsi, S. Razak
As use of the internet has become wide spread, many good effects are seen but the adverse functions are also found. One of these adverse functions is the unnecessary personal information exposure. This issue may be a significant problem because there is the potential for so many people to see the information if the information is disclosed by mistake by its collector such as internet service provider. Information can also be disclosed by the person who holds a superior role in the system, namely, the system administrator. Internet users have paid special attention to this issue caused by the fact that many of the operations and transactions that they carry out through the internet can be easily recorded and collected. Thus, identity disintegration has become a desirable feature to be implemented in a database management system. In this paper, we propose an identity disintegration mechanism that is intended for use in the healthcare field.
随着互联网的广泛使用,人们看到了许多好的影响,但也发现了不利的功能。这些不良功能之一是不必要的个人信息暴露。这个问题可能是一个严重的问题,因为如果信息的收集者(如互联网服务提供商)错误地泄露了这些信息,那么就有可能让很多人看到这些信息。信息也可以由在系统中拥有高级角色的人,即系统管理员披露。互联网用户特别关注这个问题,因为他们通过互联网进行的许多操作和交易都很容易被记录和收集。因此,身份分解已成为数据库管理系统中需要实现的特性。在本文中,我们提出了一种身份解体机制,旨在用于医疗保健领域。
{"title":"A mechanism for privacy preserving in healthcare organizations","authors":"Muhammad Syafiq Samsi, S. Razak","doi":"10.1109/ISBAST.2014.7013123","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013123","url":null,"abstract":"As use of the internet has become wide spread, many good effects are seen but the adverse functions are also found. One of these adverse functions is the unnecessary personal information exposure. This issue may be a significant problem because there is the potential for so many people to see the information if the information is disclosed by mistake by its collector such as internet service provider. Information can also be disclosed by the person who holds a superior role in the system, namely, the system administrator. Internet users have paid special attention to this issue caused by the fact that many of the operations and transactions that they carry out through the internet can be easily recorded and collected. Thus, identity disintegration has become a desirable feature to be implemented in a database management system. In this paper, we propose an identity disintegration mechanism that is intended for use in the healthcare field.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"194 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115985400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved skin detection based on dynamic threshold using multi-colour space 基于多色空间动态阈值的改进皮肤检测
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013089
M. Z. Osman, M. A. Maarof, M. F. Rohani
Skin colour detection is widely used in applications such as adult image filtering, steganography, content-based image retrieval (CBIR), face tracking, face recognition, and facial surgery. Recently, researchers are more interested in developing high level skin detection strategy for still images based on online sample learning approach which requires no offline training dataset. Previous dynamic skin color detection works has shown high true positive result than the static skin detection in term of skin-like colour and ethnicity factors. However, dynamic skin colour detection also produced high false positives result which lowers the accuracy of skin detection. This is due to the current approach of elliptical mask model that is not flexible for face rotation and is based on single colour space. Therefore, we propose dynamic skin colour detection based on multi-colour space. The result shows the effectiveness of the proposed method by reducing the false positive rate from 19.6069% to 6.9887% and increased the precision rate from 81.27% to 91.49%.
肤色检测广泛应用于成人图像过滤、隐写术、基于内容的图像检索(CBIR)、人脸跟踪、人脸识别和面部手术等领域。近年来,研究人员对基于在线样本学习方法的高级静态图像皮肤检测策略更感兴趣,该方法不需要离线训练数据集。在类肤色和种族因素方面,以往的动态肤色检测工作显示出比静态肤色检测更高的真阳性结果。然而,动态肤色检测也会产生较高的假阳性结果,降低了皮肤检测的准确性。这是由于目前椭圆掩模模型的方法不能灵活地进行人脸旋转,并且是基于单一颜色空间。因此,我们提出了基于多色空间的动态肤色检测方法。结果表明,该方法的有效性,将假阳性率从19.6069%降低到6.9887%,准确率从81.27%提高到91.49%。
{"title":"Improved skin detection based on dynamic threshold using multi-colour space","authors":"M. Z. Osman, M. A. Maarof, M. F. Rohani","doi":"10.1109/ISBAST.2014.7013089","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013089","url":null,"abstract":"Skin colour detection is widely used in applications such as adult image filtering, steganography, content-based image retrieval (CBIR), face tracking, face recognition, and facial surgery. Recently, researchers are more interested in developing high level skin detection strategy for still images based on online sample learning approach which requires no offline training dataset. Previous dynamic skin color detection works has shown high true positive result than the static skin detection in term of skin-like colour and ethnicity factors. However, dynamic skin colour detection also produced high false positives result which lowers the accuracy of skin detection. This is due to the current approach of elliptical mask model that is not flexible for face rotation and is based on single colour space. Therefore, we propose dynamic skin colour detection based on multi-colour space. The result shows the effectiveness of the proposed method by reducing the false positive rate from 19.6069% to 6.9887% and increased the precision rate from 81.27% to 91.49%.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A lightweight blockcipher based on chaotic maps 基于混沌映射的轻量级加密算法
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013112
Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo
Biometric data is non-renewable and irrevocable, so it is necessary to encrypt in the process of collection, storage and transmission to preserve its security. In this paper, a lightweight block cipher applied in the resource-limited environment is proposed by combining generalized Feistel network with chaotic maps. The cipher employs linear mixing transformations within encryption operation and adopts round keys from chaotic systems. Theoretical analysis and experimental results indicate that the cipher provides fast diffusion speed and high security.
生物特征数据具有不可更新、不可撤销的特点,因此在采集、存储和传输过程中需要对其进行加密,以保证其安全性。本文将广义Feistel网络与混沌映射相结合,提出了一种适用于资源有限环境下的轻量级分组密码。该密码在加密操作中采用线性混合变换,并采用混沌系统中的圆密钥。理论分析和实验结果表明,该密码具有扩散速度快、安全性高等优点。
{"title":"A lightweight blockcipher based on chaotic maps","authors":"Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo","doi":"10.1109/ISBAST.2014.7013112","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013112","url":null,"abstract":"Biometric data is non-renewable and irrevocable, so it is necessary to encrypt in the process of collection, storage and transmission to preserve its security. In this paper, a lightweight block cipher applied in the resource-limited environment is proposed by combining generalized Feistel network with chaotic maps. The cipher employs linear mixing transformations within encryption operation and adopts round keys from chaotic systems. Theoretical analysis and experimental results indicate that the cipher provides fast diffusion speed and high security.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms 使用协作安全机制预测高级持续性威胁(APT)对策
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013108
Natasha Arjumand Shoaib Mirza, Haider Abbas, F. A. Khan, J. Al-Muhtadi
Information and communication security has gained significant importance due to its wide spread use, increased sophistication and complexity in its deployment. On the other hand, more sophisticated and stealthy techniques are being practiced by the intruder's group to penetrate and exploit the technology and attack detection. One such treacherous threat to all critical assets of an organization is Advanced Persistent Threat (APT). Since APT attack vector is not previously known, consequently this can harm the organization's assets before the patch for this security flaw is released/available. This paper presents a preliminary research effort to counter the APT or zero day attacks at an early stage by detecting malwares. Open Source version of Security Information and Event Management (SIEM) is used to detect denial of service attack launched through remote desktop service. The framework presented in this paper also shows the efficiency of the technique and it can be enhanced with more sophisticated mechanisms for APT attack detection.
信息和通信安全由于其广泛的使用,其部署的复杂性和复杂性日益增加而变得非常重要。另一方面,入侵者组织正在使用更复杂和隐蔽的技术来渗透和利用技术和攻击检测。高级持续威胁(APT)是对组织所有关键资产的一种危险威胁。由于以前不知道APT攻击向量,因此在此安全漏洞的补丁发布/可用之前,这可能会损害组织的资产。本文介绍了通过检测恶意软件在早期阶段对抗APT或零日攻击的初步研究工作。SIEM (Security Information and Event Management)是开源版本,用于检测通过远程桌面服务发起的拒绝服务攻击。本文提出的框架也显示了该技术的效率,并且可以通过更复杂的APT攻击检测机制来增强它。
{"title":"Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms","authors":"Natasha Arjumand Shoaib Mirza, Haider Abbas, F. A. Khan, J. Al-Muhtadi","doi":"10.1109/ISBAST.2014.7013108","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013108","url":null,"abstract":"Information and communication security has gained significant importance due to its wide spread use, increased sophistication and complexity in its deployment. On the other hand, more sophisticated and stealthy techniques are being practiced by the intruder's group to penetrate and exploit the technology and attack detection. One such treacherous threat to all critical assets of an organization is Advanced Persistent Threat (APT). Since APT attack vector is not previously known, consequently this can harm the organization's assets before the patch for this security flaw is released/available. This paper presents a preliminary research effort to counter the APT or zero day attacks at an early stage by detecting malwares. Open Source version of Security Information and Event Management (SIEM) is used to detect denial of service attack launched through remote desktop service. The framework presented in this paper also shows the efficiency of the technique and it can be enhanced with more sophisticated mechanisms for APT attack detection.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132969452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection 综述了人脸检测的研究进展,包括神经网络和基于Haar特征的级联分类器在人脸检测中的应用
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013097
Ali Sharifara, M. Rahim, Yasaman Anisi
Face detection is an interesting area in research application of computer vision and pattern recognition, especially during the past several years. It is also plays a vital role in surveillance systems which is the first steps in face recognition systems. The high degree of variation in the appearance of human faces causes the face detection as a complex problem in computer vision. The face detection systems aimed to decrease false positive rate and increase the accuracy of detecting face especially in complex background images. The main aim of this paper is to present an up-to-date review of face detection methods including feature-based, appearance-based, knowledge-based and template matching. Also, the study presents the effect of applying Haar-like features along with neural networks. We also conclude this paper with some discussions on how the work can be taken further.
人脸检测是近年来计算机视觉和模式识别领域研究应用的一个热点。它在监控系统中也起着至关重要的作用,这是人脸识别系统的第一步。人脸的高度变化使得人脸检测成为计算机视觉中的一个复杂问题。人脸检测系统旨在降低误报率,提高在复杂背景图像中人脸检测的准确率。本文主要介绍了基于特征、基于外观、基于知识和模板匹配的人脸检测方法的最新进展。同时,研究了类哈尔特征与神经网络结合应用的效果。最后,我们还讨论了如何进一步开展这项工作。
{"title":"A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection","authors":"Ali Sharifara, M. Rahim, Yasaman Anisi","doi":"10.1109/ISBAST.2014.7013097","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013097","url":null,"abstract":"Face detection is an interesting area in research application of computer vision and pattern recognition, especially during the past several years. It is also plays a vital role in surveillance systems which is the first steps in face recognition systems. The high degree of variation in the appearance of human faces causes the face detection as a complex problem in computer vision. The face detection systems aimed to decrease false positive rate and increase the accuracy of detecting face especially in complex background images. The main aim of this paper is to present an up-to-date review of face detection methods including feature-based, appearance-based, knowledge-based and template matching. Also, the study presents the effect of applying Haar-like features along with neural networks. We also conclude this paper with some discussions on how the work can be taken further.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
A fourier transform quality measure for iris images 虹膜图像的傅里叶变换质量度量
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013093
Sisanda Makinana, J. V. D. Merwe, T. Malumedzha
Iris recognition systems have attracted much attention for their uniqueness, stability and reliability. However, performance of this system depends on quality of acquired iris sample. This is because in order to obtain reliable features good quality images are to be used. Thus, it is important to accurately assess image quality before applying feature extraction algorithm in order to avoid insufficient results. This study aims to quantitatively analyse the effect of iris image quality in order to ensure that good quality images are selected for feature extraction, in order to improve iris recognition system. In addition, this research proposes a measure of iris image quality using a Fourier Transform. The experimental results demonstrate that the proposed algorithm shows better performance in quality classification as it yields a 97% accuracy rate than the existing algorithms.
虹膜识别系统以其独特性、稳定性和可靠性而备受关注。然而,该系统的性能取决于虹膜样本的质量。这是因为为了获得可靠的特征,需要使用高质量的图像。因此,在应用特征提取算法之前,准确地评估图像质量,以避免结果不充分是非常重要的。本研究旨在定量分析虹膜图像质量的影响,以确保选择高质量的图像进行特征提取,从而改进虹膜识别系统。此外,本研究提出了使用傅里叶变换测量虹膜图像质量的方法。实验结果表明,该算法在质量分类方面具有更好的性能,准确率达到97%。
{"title":"A fourier transform quality measure for iris images","authors":"Sisanda Makinana, J. V. D. Merwe, T. Malumedzha","doi":"10.1109/ISBAST.2014.7013093","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013093","url":null,"abstract":"Iris recognition systems have attracted much attention for their uniqueness, stability and reliability. However, performance of this system depends on quality of acquired iris sample. This is because in order to obtain reliable features good quality images are to be used. Thus, it is important to accurately assess image quality before applying feature extraction algorithm in order to avoid insufficient results. This study aims to quantitatively analyse the effect of iris image quality in order to ensure that good quality images are selected for feature extraction, in order to improve iris recognition system. In addition, this research proposes a measure of iris image quality using a Fourier Transform. The experimental results demonstrate that the proposed algorithm shows better performance in quality classification as it yields a 97% accuracy rate than the existing algorithms.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards metamodel-based approach for Information Security Awareness Management 基于元模型的信息安全意识管理方法研究
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013141
A. Jama, M. M. Siraj, R. Kadir
Information technology and information system have been used widely in many fields such as in business, education, marketing, transportation and medical. Security aspect plays a vital role and thus turns into a challenging issue. The security should be readily installed and resistance to various numbers of potential attacks likes Spyware, Phishing / Spam and Malwares (Virus, Worm and Trojans). It is important to have specific countermeasures that could minimize the harm to enterprises. Thus, increasing the awareness to optimal level is the main target of enterprise management. Unfortunately, the main reason that fails many existing enterprise' Information Security Awareness Management (ISAM) models is the complexity and inflexibility. Complexity means the model's structure is less practical (for instance, the implementation needs to be deployed manually). Inflexibility means it cannot support multiple kinds of businesses and did not consider security aspects. In this paper, we surveyed and discussed several existing ISAM models considering the security issues in current enterprise. We proposed a metamodel-based approach for ISAM that can offer efficiency and security that brings out clearly significant benefits by highlighting the organization overall level of awareness whether it is strong enough or weak. This will help many users in this domain to easily understand the important concepts required for their own information security awareness management.
信息技术和信息系统已广泛应用于商业、教育、营销、交通、医疗等诸多领域。安全方面起着至关重要的作用,因此成为一个具有挑战性的问题。安全措施应易于安装,并能抵御各种潜在的攻击,如间谍软件、网络钓鱼/垃圾邮件和恶意软件(病毒、蠕虫和特洛伊木马)。重要的是要有具体的对策,尽量减少对企业的伤害。因此,提高企业的最优意识是企业管理的主要目标。不幸的是,许多现有企业信息安全意识管理(ISAM)模型失败的主要原因是其复杂性和不灵活性。复杂性意味着模型的结构不太实用(例如,需要手动部署实现)。缺乏灵活性意味着它不能支持多种业务,并且没有考虑安全方面的问题。本文针对当前企业存在的安全问题,对现有的几种ISAM模型进行了综述和讨论。我们为ISAM提出了一种基于元模型的方法,该方法可以提供效率和安全性,通过突出组织的整体意识水平(是否足够强或足够弱)来带来明显的显著好处。这将帮助该领域的许多用户轻松理解他们自己的信息安全意识管理所需的重要概念。
{"title":"Towards metamodel-based approach for Information Security Awareness Management","authors":"A. Jama, M. M. Siraj, R. Kadir","doi":"10.1109/ISBAST.2014.7013141","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013141","url":null,"abstract":"Information technology and information system have been used widely in many fields such as in business, education, marketing, transportation and medical. Security aspect plays a vital role and thus turns into a challenging issue. The security should be readily installed and resistance to various numbers of potential attacks likes Spyware, Phishing / Spam and Malwares (Virus, Worm and Trojans). It is important to have specific countermeasures that could minimize the harm to enterprises. Thus, increasing the awareness to optimal level is the main target of enterprise management. Unfortunately, the main reason that fails many existing enterprise' Information Security Awareness Management (ISAM) models is the complexity and inflexibility. Complexity means the model's structure is less practical (for instance, the implementation needs to be deployed manually). Inflexibility means it cannot support multiple kinds of businesses and did not consider security aspects. In this paper, we surveyed and discussed several existing ISAM models considering the security issues in current enterprise. We proposed a metamodel-based approach for ISAM that can offer efficiency and security that brings out clearly significant benefits by highlighting the organization overall level of awareness whether it is strong enough or weak. This will help many users in this domain to easily understand the important concepts required for their own information security awareness management.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Evaluation of Remote Video Surveillance System on Private Cloud 基于私有云的远程视频监控系统设计与评价
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013131
Biao Song, Yuan Tian, Bingyin Zhou
Cloud based video surveillance systems have been proposed and implemented recently. With the advances in cloud technologies, opportunity for getting on-demand remote video surveillance service can be pursued. In this paper, we propose a novel remote display solution that allows remote surveillance users to watch real-time surveillance video, to use surveillance software and to share screen updates among users on remote desktop. Multiple encoders and parallel encoding method are adopted in remote display to meet quality of service requirement under varying situations. Our proposed system deals with dynamic workload better than traditional remote display methods since surveillance task and encoding task are separately managed. Two queuing models are designed to handle resource provisioning problem for different encoders.
基于云的视频监控系统已经被提出并实施。随着云技术的进步,可以追求按需远程视频监控服务的机会。在本文中,我们提出了一种新颖的远程显示解决方案,允许远程监控用户观看实时监控视频,使用监控软件并在远程桌面的用户之间共享屏幕更新。远程显示采用多编码器并行编码方式,以满足不同情况下的服务质量要求。由于监控任务和编码任务是分开管理的,因此该系统比传统的远程显示方法更能处理动态工作负载。设计了两种排队模型来处理不同编码器的资源配置问题。
{"title":"Design and Evaluation of Remote Video Surveillance System on Private Cloud","authors":"Biao Song, Yuan Tian, Bingyin Zhou","doi":"10.1109/ISBAST.2014.7013131","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013131","url":null,"abstract":"Cloud based video surveillance systems have been proposed and implemented recently. With the advances in cloud technologies, opportunity for getting on-demand remote video surveillance service can be pursued. In this paper, we propose a novel remote display solution that allows remote surveillance users to watch real-time surveillance video, to use surveillance software and to share screen updates among users on remote desktop. Multiple encoders and parallel encoding method are adopted in remote display to meet quality of service requirement under varying situations. Our proposed system deals with dynamic workload better than traditional remote display methods since surveillance task and encoding task are separately managed. Two queuing models are designed to handle resource provisioning problem for different encoders.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Two-dimensional direct discriminant locality preserving projection analysis for face recognition 二维直接判别保局域投影分析用于人脸识别
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013087
Hengjian Li, J. Dong, Jinping Li
To make use of information contained in the null space of withinclass during the implementation of discriminant locality preserving projection(DLPP), a very efficient feature extraction algorithm called two-dimensional direct discriminant LPP (2D-DDLPP) algorithm is proposed for face recognition in this paper. By modifying the simultaneous diagonalization procedure, the null space of the interclass matrix can be discarded for it carries no discriminative information and the null space of intraclass matrix is preserved for it contains very important information for classification. Also, the 2D-DDLPP algorithm does not need to transform 2D image matrix into a vector prior to feature extraction so that it can be implemented more efficient and accurate than the 1D traditional in extracting the facial features. Therefore, the performance of 2D-DDLPP has been greatly improved. Extensive experiments are performed to test and evaluate the new algorithm using the UMIST and the AR face databases. The experimental results indicate that our proposed 2D DDLPP method is not only computationally more efficiently but also more accurate than the 2DLPP method in extracting the facial features for face recognition.
为了在判别局部保持投影(DLPP)实现过程中利用类内零空间中包含的信息,本文提出了一种非常高效的人脸识别特征提取算法二维直接判别LPP (2D-DDLPP)算法。通过修改同时对角化过程,可以丢弃类间矩阵的零空间,因为它不携带判别信息;保留类内矩阵的零空间,因为它包含对分类非常重要的信息。此外,2D- ddlpp算法在特征提取之前不需要将二维图像矩阵转换为矢量,因此在提取面部特征方面比传统的一维算法更高效、更准确。因此,2D-DDLPP的性能得到了很大的提高。使用UMIST和AR人脸数据库进行了广泛的实验来测试和评估新算法。实验结果表明,本文提出的二维DDLPP方法不仅计算效率更高,而且在提取人脸特征用于人脸识别方面也比2DLPP方法更准确。
{"title":"Two-dimensional direct discriminant locality preserving projection analysis for face recognition","authors":"Hengjian Li, J. Dong, Jinping Li","doi":"10.1109/ISBAST.2014.7013087","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013087","url":null,"abstract":"To make use of information contained in the null space of withinclass during the implementation of discriminant locality preserving projection(DLPP), a very efficient feature extraction algorithm called two-dimensional direct discriminant LPP (2D-DDLPP) algorithm is proposed for face recognition in this paper. By modifying the simultaneous diagonalization procedure, the null space of the interclass matrix can be discarded for it carries no discriminative information and the null space of intraclass matrix is preserved for it contains very important information for classification. Also, the 2D-DDLPP algorithm does not need to transform 2D image matrix into a vector prior to feature extraction so that it can be implemented more efficient and accurate than the 1D traditional in extracting the facial features. Therefore, the performance of 2D-DDLPP has been greatly improved. Extensive experiments are performed to test and evaluate the new algorithm using the UMIST and the AR face databases. The experimental results indicate that our proposed 2D DDLPP method is not only computationally more efficiently but also more accurate than the 2DLPP method in extracting the facial features for face recognition.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126350130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1