首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Performance evaluation and improvement of speaker recognition over GSM environment GSM环境下说话人识别的性能评价与改进
Tan-Hsu Tan, Shih-Wei Chang, C. Yang
Performance evaluation and improvement of speaker recognition over real GSM environment are investigated. A text-independent speaker recognition system based on Gaussian mixture model (GMM) is implemented for performance evaluation. To match the real-world conditions, an NTUT-LAB416 speech corpus is collected over GSM telecommunication network from in-car environment of various driving speeds. An approach employing multistyle training model is proposed to alleviate the adverse effects due to environmental mismatch. Also, a post-processing scheme using auto-regression and moving-average (ARMA) filter is suggested to overcome the varying noise conditions. Experimental results indicate that the proposed approaches can effectively improve the performance of speaker recognition over GSM environment.
研究了真实GSM环境下说话人识别的性能评价和改进。实现了一种基于高斯混合模型(GMM)的独立于文本的说话人识别系统。为了与现实环境相匹配,通过GSM电信网络从不同行驶速度的车内环境中收集NTUT-LAB416语音语料库。提出了一种采用多风格训练模型的方法来缓解环境不匹配带来的不利影响。同时,提出了一种采用自回归和移动平均(ARMA)滤波的后处理方案,以克服变化的噪声条件。实验结果表明,该方法能有效提高GSM环境下的说话人识别性能。
{"title":"Performance evaluation and improvement of speaker recognition over GSM environment","authors":"Tan-Hsu Tan, Shih-Wei Chang, C. Yang","doi":"10.1109/CCST.2003.1297600","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297600","url":null,"abstract":"Performance evaluation and improvement of speaker recognition over real GSM environment are investigated. A text-independent speaker recognition system based on Gaussian mixture model (GMM) is implemented for performance evaluation. To match the real-world conditions, an NTUT-LAB416 speech corpus is collected over GSM telecommunication network from in-car environment of various driving speeds. An approach employing multistyle training model is proposed to alleviate the adverse effects due to environmental mismatch. Also, a post-processing scheme using auto-regression and moving-average (ARMA) filter is suggested to overcome the varying noise conditions. Experimental results indicate that the proposed approaches can effectively improve the performance of speaker recognition over GSM environment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face recognition in a transformed domain 变换域中的人脸识别
M. Faúndez-Zanuy
This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.
本文提出使用离散余弦变换(DCT)代替特征脸方法(Karhunen-Loeve变换)进行基于正面人脸图像的生物特征识别。实验结果表明,该方法具有较好的识别精度和较低的计算负担。本文包括不同分类器的结果和它们的组合。
{"title":"Face recognition in a transformed domain","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2003.1297575","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297575","url":null,"abstract":"This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An encryption scheme for large Chinese texts 一种大型中文文本加密方案
Bao-Chyuan Guan, Ray-I Chang, Yung Chung Wei, Chia-Ling Hu, Yu-Lin Chiu
We improve the encryption of oriental language texts in a high-secure official document system such as military or government. As an example, an encryption scheme based on DBS is introduced for large Chinese text files. The ideogram-based Chinese texts are different from the alphabet-based English texts in many important features. First, an English text is a sequence of one-byte characters. A Chinese text is also a sequence of characters, but usually two-bytes of characters. Second, the number of distinct characters appeared in a Chinese text is much higher than that appeared in an English text. Third, the frequency distribution of the Chinese characters is very skewed. In DES, the assumption of random and uniform distribution of characters is unrealistic, especially, for Chinese texts. DES with substitution and transposition based ciphers has been subjected to attacks such as linear cryptanalysis and differential cryptanalysis. Due to the skewness of characters' distribution, Chinese texts encrypted by DES would be vulnerable for these attacks. This paper bases on DES to design a new scheme for encrypting large Chinese texts. We first divide each two-bytes character in a Chinese text into the high-byte group and the low-byte group. They include the high-byte and the low-byte of each character, respectively. According to the distributions of the high-byte and the low-byte of Chinese characters, we recode each byte in these two groups. Finally, we encrypt the recoded bytes in these two groups by using a modified DES algorithm individually. By decrypting and combining these two groups of encrypted data, the original Chinese text can be revealed.
我们改进了军事或政府等高度安全的官方文件系统中东方语言文本的加密。作为实例,介绍了一种基于DBS的大型中文文本文件加密方案。以表意文字为基础的汉语文本与以字母为基础的英语文本有许多重要的特点。首先,英文文本是一个单字节字符序列。中文文本也是一个字符序列,但通常是两个字节的字符。其次,中文文本中出现的不同字符的数量远远高于英文文本。第三,汉字的频率分布非常不平衡。在DES中,字符随机均匀分布的假设是不现实的,特别是对于中文文本。具有替换和换位密码的DES一直受到线性密码分析和差分密码分析等攻击。由于字符分布的不均匀性,经过DES加密的中文文本容易受到这些攻击。本文基于DES设计了一种新的大型中文文本加密方案。我们首先将中文文本中的每个两字节字符分为高字节组和低字节组。它们分别包括每个字符的高字节和低字节。根据汉字高字节和低字节的分布,对这两组中每一个字节进行重新编码。最后,我们分别使用改进的DES算法对这两组中的编码字节进行加密。通过对这两组加密数据进行解密和组合,就可以显示出原始中文文本。
{"title":"An encryption scheme for large Chinese texts","authors":"Bao-Chyuan Guan, Ray-I Chang, Yung Chung Wei, Chia-Ling Hu, Yu-Lin Chiu","doi":"10.1109/CCST.2003.1297620","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297620","url":null,"abstract":"We improve the encryption of oriental language texts in a high-secure official document system such as military or government. As an example, an encryption scheme based on DBS is introduced for large Chinese text files. The ideogram-based Chinese texts are different from the alphabet-based English texts in many important features. First, an English text is a sequence of one-byte characters. A Chinese text is also a sequence of characters, but usually two-bytes of characters. Second, the number of distinct characters appeared in a Chinese text is much higher than that appeared in an English text. Third, the frequency distribution of the Chinese characters is very skewed. In DES, the assumption of random and uniform distribution of characters is unrealistic, especially, for Chinese texts. DES with substitution and transposition based ciphers has been subjected to attacks such as linear cryptanalysis and differential cryptanalysis. Due to the skewness of characters' distribution, Chinese texts encrypted by DES would be vulnerable for these attacks. This paper bases on DES to design a new scheme for encrypting large Chinese texts. We first divide each two-bytes character in a Chinese text into the high-byte group and the low-byte group. They include the high-byte and the low-byte of each character, respectively. According to the distributions of the high-byte and the low-byte of Chinese characters, we recode each byte in these two groups. Finally, we encrypt the recoded bytes in these two groups by using a modified DES algorithm individually. By decrypting and combining these two groups of encrypted data, the original Chinese text can be revealed.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Assigning cryptographic keys to access control in a multi-attribute hierarchy 在多属性层次结构中为访问控制分配加密密钥
Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang
We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.
我们考虑了多属性层次结构中的访问控制,并提出了一种为该层次结构分配密钥的新方法。通过授权进行访问控制对于军事或政府中的高安全性系统非常重要,因为未经授权的用户不允许访问机密数据。考虑了高安全性军事工作流程的实际应用系统。工作流中的每个特定工作活动都必须关联多个属性。应用系统基于Petri网模型,我们将系统中的访问控制问题定义为一个多属性层次环境。Petri网由有向二部图表示,其中的节点要么是位置(表示条件),要么是过渡(表示活动)。位于某个位置的令牌表示其条件为真。当转换的所有位置都有令牌时,就启用了转换。我们的问题目标是为这个多属性层次结构分配合适的加密密钥。基于对安全需求的描述,我们的算法可以自动验证并生成密钥。
{"title":"Assigning cryptographic keys to access control in a multi-attribute hierarchy","authors":"Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang","doi":"10.1109/CCST.2003.1297582","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297582","url":null,"abstract":"We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of information and communication security forensic technology capability in Taiwan 台湾地区信息通信安全取证技术能力研究
I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin
There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.
随着互联网的快速发展,网络安全问题时有发生。通过硬盘、系统日志、防火墙、IDS日志、进程以及Internet连接等各种设备收集证据和取证要点,在事件发生期间和事件发生后维护互联网安全系统是非常重要的。如果能在这类事件发生之前确立并妥善保存证据,对法医程序将更为有利。大多数政府机构缺乏足够的安全系统技术知识,他们仍然认为这项工作的技术部分属于警察。事实上,我们不能保证一个完美的阶段,但至少我们可以找出问题是什么,追踪攻击来自哪里,这就是计算机取证的任务。从事相关安全系统技术研究开发的学校、机构正在开展本职工作;因此,计算机取证的能力已经分散。因此,为了提高信息通信安全取证技能和能力,我们真正需要的是一个完整的计划,以整合信息通信安全取证技能和能力。
{"title":"A study of information and communication security forensic technology capability in Taiwan","authors":"I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin","doi":"10.1109/CCST.2003.1297591","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297591","url":null,"abstract":"There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A panoramic stabilized periscope with common optical path 一种具有共光路的全景稳定潜望镜
Ping Chen
"Panoramic stabilization" and "common optical path" as designed are two significant issues regarding the technology of periscope detection. The idea of "panoramic stabilization" is to construct a pseudo level coordinate while in 360/spl deg/ searching. Sighting vector to the target expressed by spherical coordinate should be based on this panoramic stabilized level. The design of "common optical path" entirely employs a set of reflection mirrors with folded optical path for various light wave bands to shorten the size of the periscope. Devices associated with these features are developed and wrapped up in terms of an analysis of conceptual configuration.
“全景稳定”和“共光路”的设计是潜望镜探测技术中的两个重要问题。“全景稳定”的思想是在360度/spl度/搜索时构造一个伪水平坐标。用球坐标表示的对目标的瞄准矢量应基于该全景稳定水平。“共光路”的设计完全采用了一组针对各种光波波段的折叠光路反射镜,以缩短潜望镜的尺寸。与这些特征相关的设备是根据概念配置的分析开发和包装的。
{"title":"A panoramic stabilized periscope with common optical path","authors":"Ping Chen","doi":"10.1109/CCST.2003.1297557","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297557","url":null,"abstract":"\"Panoramic stabilization\" and \"common optical path\" as designed are two significant issues regarding the technology of periscope detection. The idea of \"panoramic stabilization\" is to construct a pseudo level coordinate while in 360/spl deg/ searching. Sighting vector to the target expressed by spherical coordinate should be based on this panoramic stabilized level. The design of \"common optical path\" entirely employs a set of reflection mirrors with folded optical path for various light wave bands to shorten the size of the periscope. Devices associated with these features are developed and wrapped up in terms of an analysis of conceptual configuration.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel round function architecture for AES encryption/decryption utilizing look-up table 一种利用查找表实现AES加解密的圆形函数结构
Jhing-Fa Wang, Sun-Wei Chang, Po-Chuan Lin
We present an intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm. Our design utilizes the T-box algorithm to implement the Rijndael round function. By analyzing the pipelining dataflow, a new architecture, which combines the multiplexing and the iteration architecture, is also proposed. The designs are implemented using the integrated systems engineering (ISE) 5.1i software on a single Virtex-E XCV812E field programmable gate array (FPGA) device. As a result, the AES IP core operates at 61MHz with the key scheduler resulting in a throughput of l.9Gbps for the AES encryption and decryption with the block size of 128 bits and the flexible key size. A comparison is provided between our design and similar existing implementations.
我们提出了整个高级加密标准(AES)算法的知识产权(IP)核心。我们的设计利用T-box算法实现Rijndael round函数。通过对流水线数据流的分析,提出了一种将复用和迭代相结合的新架构。该设计使用集成系统工程(ISE) 5.1i软件在单个Virtex-E XCV812E现场可编程门阵列(FPGA)设备上实现。因此,AES IP核使用密钥调度器在61MHz下工作,从而使AES加密和解密的吞吐量为1.9 gbps,块大小为128位,密钥大小灵活。将我们的设计与类似的现有实现进行比较。
{"title":"A novel round function architecture for AES encryption/decryption utilizing look-up table","authors":"Jhing-Fa Wang, Sun-Wei Chang, Po-Chuan Lin","doi":"10.1109/CCST.2003.1297549","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297549","url":null,"abstract":"We present an intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm. Our design utilizes the T-box algorithm to implement the Rijndael round function. By analyzing the pipelining dataflow, a new architecture, which combines the multiplexing and the iteration architecture, is also proposed. The designs are implemented using the integrated systems engineering (ISE) 5.1i software on a single Virtex-E XCV812E field programmable gate array (FPGA) device. As a result, the AES IP core operates at 61MHz with the key scheduler resulting in a throughput of l.9Gbps for the AES encryption and decryption with the block size of 128 bits and the flexible key size. A comparison is provided between our design and similar existing implementations.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secure 77GHz Vivaldi antenna for millimeter wave communication 安全77GHz维瓦尔第天线用于毫米波通信
L. Chong, P. Ng, J. Fu
The antenna was fed by a unilateral fin line and then transmitted to its taper slotline radiator. The design and fabrication of the substrate containing the fin line transmission section and tapered slot radiating section were carried out The waveguides were also designed to house the fin line section of the substrate. Simulations were carried out using XFDTD software to determine the radiating characteristic of the antenna. A set of S-parameter and polarization curves of designed 77GHz were shown.
天线由单侧鳍线馈电,然后传输到其锥形槽线散热器。设计和制作了包含鳍线传输段和锥形槽辐射段的衬底,并设计了容纳鳍线部分的波导。利用XFDTD软件进行仿真,确定天线的辐射特性。给出了一组设计的77GHz s参数曲线和极化曲线。
{"title":"Secure 77GHz Vivaldi antenna for millimeter wave communication","authors":"L. Chong, P. Ng, J. Fu","doi":"10.1109/CCST.2003.1297543","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297543","url":null,"abstract":"The antenna was fed by a unilateral fin line and then transmitted to its taper slotline radiator. The design and fabrication of the substrate containing the fin line transmission section and tapered slot radiating section were carried out The waveguides were also designed to house the fin line section of the substrate. Simulations were carried out using XFDTD software to determine the radiating characteristic of the antenna. A set of S-parameter and polarization curves of designed 77GHz were shown.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of a computer-aided system for risk assessment on information systems 资讯系统风险评估之电脑辅助系统设计
Gen-Yih Liao, Chen Song
The Internet creates an efficient environment for businesses to conduct transactions, while also creating a channel for outsiders to access organizational assets. To determine the reasonable amount of security investment, security officers would conduct risk assessment to evaluate the risk values in existing systems. In traditional risk assessment processes, however, heavy dependence on human experts leads to difficulties in automating risk assessment. We propose a transaction based computer aided system to facilitate risk assessment on information systems. The proposed system evaluates assets with business transactions, which facilitates the procedures of asset evaluation. The likelihood model used by the system can assist the risk analysts in conducting what-if analyses to determine risk values. Therefore, the proposed system contributes in enhancing the level of automation regarding risk assessment.
互联网为企业进行交易创造了一个有效的环境,同时也为外部人员访问组织资产创造了一个渠道。为确定合理的保安投资金额,保安人员会进行风险评估,评估现有系统的风险值。然而,在传统的风险评估过程中,对人类专家的严重依赖导致了风险评估自动化的困难。我们建议一个以交易为基础的电脑辅助系统,以方便资讯系统的风险评估。建议的系统以商业交易评估资产,方便了资产评估的程序。系统使用的似然模型可以帮助风险分析人员进行假设分析,以确定风险值。因此,建议的系统有助于提高风险评估的自动化水平。
{"title":"Design of a computer-aided system for risk assessment on information systems","authors":"Gen-Yih Liao, Chen Song","doi":"10.1109/CCST.2003.1297553","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297553","url":null,"abstract":"The Internet creates an efficient environment for businesses to conduct transactions, while also creating a channel for outsiders to access organizational assets. To determine the reasonable amount of security investment, security officers would conduct risk assessment to evaluate the risk values in existing systems. In traditional risk assessment processes, however, heavy dependence on human experts leads to difficulties in automating risk assessment. We propose a transaction based computer aided system to facilitate risk assessment on information systems. The proposed system evaluates assets with business transactions, which facilitates the procedures of asset evaluation. The likelihood model used by the system can assist the risk analysts in conducting what-if analyses to determine risk values. Therefore, the proposed system contributes in enhancing the level of automation regarding risk assessment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A wavelet-based public key image authentication watermarking 基于小波的公钥图像认证水印
Chien-Chang Chen, Kang Fan, Shengquan Wang
We introduce a new wavelet-based image authentication approach that the proposed approach can detect attacks on an authenticated image and indicate the modification area. The proposed authentication procedure first applies the image into a 3-level wavelet transform and the fingerprint of each subimage's block is then encrypted by a cryptosystem to replace the LSB of the block. The block's fingerprint is obtained by calculating the hash value of the block, its neighboring blocks, and its coarse approximation in low-pass subimage. The verification step only requires the user's public key to check whether the new calculated fingerprint is consistent with the decryption result of the LSB. Experimental results show that the proposed approach detects attacks including spatial or wavelet coefficients replacement efficiently, whereas the modification area is clearly indicated.
我们提出了一种新的基于小波的图像认证方法,该方法可以检测出对认证图像的攻击并指出修改区域。该方法首先对图像进行3级小波变换,然后对每个子图像块的指纹进行加密,以替换块的LSB。通过计算该块及其相邻块的哈希值及其在低通子图像中的粗近似值来获得该块的指纹。验证步骤只需要用户的公钥检查新计算的指纹是否与LSB的解密结果一致。实验结果表明,该方法能有效检测空间或小波系数替换攻击,且修改区域清晰。
{"title":"A wavelet-based public key image authentication watermarking","authors":"Chien-Chang Chen, Kang Fan, Shengquan Wang","doi":"10.1109/CCST.2003.1297579","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297579","url":null,"abstract":"We introduce a new wavelet-based image authentication approach that the proposed approach can detect attacks on an authenticated image and indicate the modification area. The proposed authentication procedure first applies the image into a 3-level wavelet transform and the fingerprint of each subimage's block is then encrypted by a cryptosystem to replace the LSB of the block. The block's fingerprint is obtained by calculating the hash value of the block, its neighboring blocks, and its coarse approximation in low-pass subimage. The verification step only requires the user's public key to check whether the new calculated fingerprint is consistent with the decryption result of the LSB. Experimental results show that the proposed approach detects attacks including spatial or wavelet coefficients replacement efficiently, whereas the modification area is clearly indicated.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117002721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1