Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297597
C. Kung, H.H. Hsiao, W. Cheng, Y. Yan
With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.
{"title":"Visual robust oblivious watermarking technique","authors":"C. Kung, H.H. Hsiao, W. Cheng, Y. Yan","doi":"10.1109/CCST.2003.1297597","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297597","url":null,"abstract":"With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125767490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297587
H. Meng, Hsei-chang Lee, Yu-Liang Chen
Although the analysis of GSR using SEM/EDX has been thoroughly studied, no literature on the SEM/EDX analysis of primer mixtures of center-fired cartridges has been reported. Thus, not only GSR but also primer mixtures generated from both reference cartridges and confiscated illegal cartridges were analyzed in this work. The aim of this work is to obtain elemental composition data of primer mixtures of handgun cartridges frequently encountered in Taiwan and to provide procedures for identifying cartridge used in criminal activities through elemental analysis of GSR and primer mixtures of suspected cartridge. Twenty-five kinds of cartridges with noncorrosive primers or lead-free primers were disassembled or test-fired to collect primer mixtures or GSR, respectively. Bullet and propellants of unfired ammunition were removed, the cartridge case was deprimed, and primer mixtures were then recovered. Gunshot residue samples were collected from shooter's hand, spent cartridge case, and target surface after test firing. Both primer mixture and GSR samples were then subjected to SEM/EDX analysis. The results revealed that all of the noncorrosive primer mixtures and GSR generated from cartridges with these primers contained unique elemental composition of lead (Pb), barium (Ba), and antimony (Sb). Only Ba and Sb were detected in two kinds of lead-free primer mixtures and GSR generated from cartridges with these primers, where none of Pb, Ba, and Sb were detected in samples from the other four kinds of lead-free cartridges. Characteristic elements of Pb, Ba, and Sb were detected in all primer and GSR samples collected from illegal cartridges and were not detected in samples from police duty cartridges. These results indicated that lead-free cartridges have not yet been used by criminals in Taiwan. The significant elemental difference between GSRs from different sources is especially useful in identifying possible shooter while the fired bullet is missing.
{"title":"The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysis","authors":"H. Meng, Hsei-chang Lee, Yu-Liang Chen","doi":"10.1109/CCST.2003.1297587","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297587","url":null,"abstract":"Although the analysis of GSR using SEM/EDX has been thoroughly studied, no literature on the SEM/EDX analysis of primer mixtures of center-fired cartridges has been reported. Thus, not only GSR but also primer mixtures generated from both reference cartridges and confiscated illegal cartridges were analyzed in this work. The aim of this work is to obtain elemental composition data of primer mixtures of handgun cartridges frequently encountered in Taiwan and to provide procedures for identifying cartridge used in criminal activities through elemental analysis of GSR and primer mixtures of suspected cartridge. Twenty-five kinds of cartridges with noncorrosive primers or lead-free primers were disassembled or test-fired to collect primer mixtures or GSR, respectively. Bullet and propellants of unfired ammunition were removed, the cartridge case was deprimed, and primer mixtures were then recovered. Gunshot residue samples were collected from shooter's hand, spent cartridge case, and target surface after test firing. Both primer mixture and GSR samples were then subjected to SEM/EDX analysis. The results revealed that all of the noncorrosive primer mixtures and GSR generated from cartridges with these primers contained unique elemental composition of lead (Pb), barium (Ba), and antimony (Sb). Only Ba and Sb were detected in two kinds of lead-free primer mixtures and GSR generated from cartridges with these primers, where none of Pb, Ba, and Sb were detected in samples from the other four kinds of lead-free cartridges. Characteristic elements of Pb, Ba, and Sb were detected in all primer and GSR samples collected from illegal cartridges and were not detected in samples from police duty cartridges. These results indicated that lead-free cartridges have not yet been used by criminals in Taiwan. The significant elemental difference between GSRs from different sources is especially useful in identifying possible shooter while the fired bullet is missing.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297604
B.-T. Wang, H. Schulzrinne
Packet dropping attack (PDA) is a network attack that utilizes compromised network elements to degrade network performance or quality by intentionally dropping a certain amount of IP packets. The major distinction of the PDA from traditional denial-of service (DoS) attack is that some victims do not even discern that they are under attack. Offensive router detection (ORD) is a mechanism capable of detecting offensive routers that are performing the PDA. The ORD mechanism is based on the principle of conservation of flow in the network, and employs a new proposed ICMP message, Caddie message, which records packet forwarding information in the Caddie messages. Therefore, after analyzing the information, we can identify routers that are abnormally dropping packets. We show the advantages of the ORD mechanism over other existing network monitoring mechanisms and discusses storage and bandwidth overhead issues. We also demonstrate the advantages and the effectiveness of the approach by simulating the functionality of the ORD mechanism to detect four different packet-dropping patterns.
丢包攻击(Packet drop attack, PDA)是一种利用受损的网元,故意丢弃一定数量的IP报文,从而降低网络性能或质量的网络攻击。PDA与传统的拒绝服务(DoS)攻击的主要区别在于,一些受害者甚至没有意识到他们正在受到攻击。攻击性路由器检测(ORD)是一种能够检测正在执行PDA的攻击性路由器的机制。ORD机制基于网络中流量守恒的原则,采用了一种新提出的ICMP报文——Caddie报文,在Caddie报文中记录报文的转发信息。因此,通过分析这些信息,我们可以识别出异常丢包的路由器。我们展示了ORD机制相对于其他现有网络监控机制的优势,并讨论了存储和带宽开销问题。我们还通过模拟ORD机制的功能来检测四种不同的数据包丢弃模式,从而证明了该方法的优点和有效性。
{"title":"Detecting offensive routers: a straightforward approach","authors":"B.-T. Wang, H. Schulzrinne","doi":"10.1109/CCST.2003.1297604","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297604","url":null,"abstract":"Packet dropping attack (PDA) is a network attack that utilizes compromised network elements to degrade network performance or quality by intentionally dropping a certain amount of IP packets. The major distinction of the PDA from traditional denial-of service (DoS) attack is that some victims do not even discern that they are under attack. Offensive router detection (ORD) is a mechanism capable of detecting offensive routers that are performing the PDA. The ORD mechanism is based on the principle of conservation of flow in the network, and employs a new proposed ICMP message, Caddie message, which records packet forwarding information in the Caddie messages. Therefore, after analyzing the information, we can identify routers that are abnormally dropping packets. We show the advantages of the ORD mechanism over other existing network monitoring mechanisms and discusses storage and bandwidth overhead issues. We also demonstrate the advantages and the effectiveness of the approach by simulating the functionality of the ORD mechanism to detect four different packet-dropping patterns.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297567
Hsing-Bai Chen, Sue-Chen Hsueh
We present an efficient scheme for mobile devices to conduct transactions demanding high security. The use of cryptographic mechanisms is minimized by applying block-ciphers and one-way hash primitives, which can be operated with low-end processors and very little working space. Undeniable billing can be achieved by applying one-way hash chains. Owing to one-way hash functions, the integrity of the masked transactions and the billing information can be verified, even when the masked information is transmitted in public. Complicated cryptographic mechanisms, also the regulations among roaming countries, thus can be eliminated so that a light-weight billing can be achieved.
{"title":"Light-weight authentication and billing in mobile communications","authors":"Hsing-Bai Chen, Sue-Chen Hsueh","doi":"10.1109/CCST.2003.1297567","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297567","url":null,"abstract":"We present an efficient scheme for mobile devices to conduct transactions demanding high security. The use of cryptographic mechanisms is minimized by applying block-ciphers and one-way hash primitives, which can be operated with low-end processors and very little working space. Undeniable billing can be achieved by applying one-way hash chains. Owing to one-way hash functions, the integrity of the masked transactions and the billing information can be verified, even when the masked information is transmitted in public. Complicated cryptographic mechanisms, also the regulations among roaming countries, thus can be eliminated so that a light-weight billing can be achieved.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297548
Eun-Kyung Ryu, Kee-Won Kim, K. Yoo
We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network, allowing low-entropy passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromise. Besides, it is secure against an adversary who captured a host's password file. Since user passwords are stored in a verifier form, the adversary cannot use it directly to compromise security. The proposed scheme here shows that it is more efficient in computational time and communication overhead over the existing schemes.
{"title":"A simple key agreement protocol","authors":"Eun-Kyung Ryu, Kee-Won Kim, K. Yoo","doi":"10.1109/CCST.2003.1297548","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297548","url":null,"abstract":"We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network, allowing low-entropy passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromise. Besides, it is secure against an adversary who captured a host's password file. Since user passwords are stored in a verifier form, the adversary cannot use it directly to compromise security. The proposed scheme here shows that it is more efficient in computational time and communication overhead over the existing schemes.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131062982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297618
J.-R.J. Shieh
Content-based audio feature extraction is key to obtaining important message from audio information. Research in the past several years has focused on the use of speech recognition techniques that are not directly applicable to compressed audio bit stream. However, subband coding based MPEG-1 audio layer III (MP3) is now useful for any system with limited channel capacity for its high quality to bit rate ratio. It has been widely adopted in audio-on-demand, music link via ISDN and digital satellite broadcasting. Message collection is easier if audio content can be extract directly on subband domain. Several useful algorithms are proposed here to manifest this idea.
{"title":"Audio content based feature extraction on subband domain","authors":"J.-R.J. Shieh","doi":"10.1109/CCST.2003.1297618","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297618","url":null,"abstract":"Content-based audio feature extraction is key to obtaining important message from audio information. Research in the past several years has focused on the use of speech recognition techniques that are not directly applicable to compressed audio bit stream. However, subband coding based MPEG-1 audio layer III (MP3) is now useful for any system with limited channel capacity for its high quality to bit rate ratio. It has been widely adopted in audio-on-demand, music link via ISDN and digital satellite broadcasting. Message collection is easier if audio content can be extract directly on subband domain. Several useful algorithms are proposed here to manifest this idea.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297616
H.-M. Wang
The terrorist attack is one type of emergency caused by humans. This emergency is rare, but can cause catastrophic effects. In the aftermath of 9-11, it is proprietary security personnel's responsibility to help every employee get back to "business as normal" while at the same time, being prepared for possible terrorist attacks. An up-to-date contingency plan is expected to help security managers to fulfill this role. Security managers should reassess or develop the contingency plan by using the Federal Emergency Management Agency's (FEMA) guidebook. They are encouraged to adopt the Homeland Security Advisory System, or alternatively to develop a simple color-coded system, to response the threats of terrorist attack in stages. They are suggested to consider three factors-top executive's commitment, adequate trainings, and coordination with public agencies-in the planning.
{"title":"Contingency planning: emergency preparedness for terrorist attacks","authors":"H.-M. Wang","doi":"10.1109/CCST.2003.1297616","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297616","url":null,"abstract":"The terrorist attack is one type of emergency caused by humans. This emergency is rare, but can cause catastrophic effects. In the aftermath of 9-11, it is proprietary security personnel's responsibility to help every employee get back to \"business as normal\" while at the same time, being prepared for possible terrorist attacks. An up-to-date contingency plan is expected to help security managers to fulfill this role. Security managers should reassess or develop the contingency plan by using the Federal Emergency Management Agency's (FEMA) guidebook. They are encouraged to adopt the Homeland Security Advisory System, or alternatively to develop a simple color-coded system, to response the threats of terrorist attack in stages. They are suggested to consider three factors-top executive's commitment, adequate trainings, and coordination with public agencies-in the planning.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114229205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.
{"title":"Assigning cryptographic keys to access control in a multi-attribute hierarchy","authors":"Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang","doi":"10.1109/CCST.2003.1297582","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297582","url":null,"abstract":"We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297591
I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin
There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.
{"title":"A study of information and communication security forensic technology capability in Taiwan","authors":"I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin","doi":"10.1109/CCST.2003.1297591","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297591","url":null,"abstract":"There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297575
M. Faúndez-Zanuy
This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.
{"title":"Face recognition in a transformed domain","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2003.1297575","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297575","url":null,"abstract":"This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}