A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obtain high robustness and transparency with respect to the existing algorithms. In our scheme, the embedding factor is controlled locally according to the result of Generic Algorithm (GA) cycle. The simulation results show that the proposed algorithm yields a watermark which is invisible to human eyes and robust to a wide variety of common attacks.
{"title":"A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic Algorithm","authors":"Peng Luo, Ping Wei, Yiqun Liu","doi":"10.1109/INCoS.2013.128","DOIUrl":"https://doi.org/10.1109/INCoS.2013.128","url":null,"abstract":"A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obtain high robustness and transparency with respect to the existing algorithms. In our scheme, the embedding factor is controlled locally according to the result of Generic Algorithm (GA) cycle. The simulation results show that the proposed algorithm yields a watermark which is invisible to human eyes and robust to a wide variety of common attacks.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces the recent trend of networking technologies in Japan. Especially after the East Japan Mega quake, the importance of saving natural resources has been more seriously recognized than ever. Therefore, the author focuses the explanation on the electric power and radio frequency, which are the part of natural resources and are key players to construct national infrastructures. Many smart grid projects in Japan are supported by the government. Their research and development activities created a number of new technologies. Green ICT is another activity to save energy. Less consumption of electric power in communication devices need to be realized as well as in CPU and storage devices. Finally the author picks TV white space up, which leads to reorganization of VHF/UHF band plan in Japan. Cognitive radio technologies can be applied to share frequencies in the white space in the future.
{"title":"Networking Technology Trend in Japan, Toward Earth-Friendly Infrastructure","authors":"A. Arutaki","doi":"10.1109/INCoS.2013.158","DOIUrl":"https://doi.org/10.1109/INCoS.2013.158","url":null,"abstract":"This paper introduces the recent trend of networking technologies in Japan. Especially after the East Japan Mega quake, the importance of saving natural resources has been more seriously recognized than ever. Therefore, the author focuses the explanation on the electric power and radio frequency, which are the part of natural resources and are key players to construct national infrastructures. Many smart grid projects in Japan are supported by the government. Their research and development activities created a number of new technologies. Green ICT is another activity to save energy. Less consumption of electric power in communication devices need to be realized as well as in CPU and storage devices. Finally the author picks TV white space up, which leads to reorganization of VHF/UHF band plan in Japan. Cognitive radio technologies can be applied to share frequencies in the white space in the future.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Virtual Segment (VS) is an architecture design for delay tolerant network to efficiently perform the store-carry-and-forward routing along traffic flows of vehicles on roadway networks. VS network consists of three types of node: Corresponding Node (CN), Relay Node (RN), and Base Node (BN). CN is a stationary node as the roles of a sender and a receiver of messages, RN is a movable node as a vehicle to relay the messages, and BN is a stationary gateway to the core backbone network connecting all the BNs as a reliable high-speed communication network. The VS network is considered to be effective for message forwarding in disaster situations since RNs are flexible to transfer messages between CNs and BNs. However, effects of breakdown of BNs by disaster have not been well studied even though the failure of message transfer between BNs seriously degrade the performance of the arrival rate of forwarding messages. In this paper, we investigate some disaster scenarios using our traffic simulator of vehicles and also our mathematical model of the VS network to simulate the effects of the disruption of BNs on the performance. We consider some methods to determine the restoration order of broken BNs and numerically compare the performance of the arrival rate. As a result, we found that the performance of the arrival rate is quickly recovered by the preferential restoration of frequently used BNs.
{"title":"Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment Network","authors":"H. Tsuji, A. Fujihara, H. Miwa","doi":"10.1109/INCoS.2013.85","DOIUrl":"https://doi.org/10.1109/INCoS.2013.85","url":null,"abstract":"Virtual Segment (VS) is an architecture design for delay tolerant network to efficiently perform the store-carry-and-forward routing along traffic flows of vehicles on roadway networks. VS network consists of three types of node: Corresponding Node (CN), Relay Node (RN), and Base Node (BN). CN is a stationary node as the roles of a sender and a receiver of messages, RN is a movable node as a vehicle to relay the messages, and BN is a stationary gateway to the core backbone network connecting all the BNs as a reliable high-speed communication network. The VS network is considered to be effective for message forwarding in disaster situations since RNs are flexible to transfer messages between CNs and BNs. However, effects of breakdown of BNs by disaster have not been well studied even though the failure of message transfer between BNs seriously degrade the performance of the arrival rate of forwarding messages. In this paper, we investigate some disaster scenarios using our traffic simulator of vehicles and also our mathematical model of the VS network to simulate the effects of the disruption of BNs on the performance. We consider some methods to determine the restoration order of broken BNs and numerically compare the performance of the arrival rate. As a result, we found that the performance of the arrival rate is quickly recovered by the preferential restoration of frequently used BNs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framework which provides strong security and privacy guarantees for distributed computations on sensitive data. The framework is a novel integration of access control via attribute-based encryption, and privacy-preserving aggregate computation via homomorphic encryption. Data providers control the security policy for their sensitive data. Users without security expertise can perform computations on the data, but the framework confines these computations, preventing information leakage beyond the data provider's policy. Our prototype implementation demonstrates the flexibility of the framework on several case studies. It was proved more efficient than fully homomorphic encryption.
{"title":"Design of a Security Framework on MapReduce","authors":"Zhen Guo, Xudong Zhu, Lijun Guo, S. Kang","doi":"10.1109/INCoS.2013.29","DOIUrl":"https://doi.org/10.1109/INCoS.2013.29","url":null,"abstract":"To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framework which provides strong security and privacy guarantees for distributed computations on sensitive data. The framework is a novel integration of access control via attribute-based encryption, and privacy-preserving aggregate computation via homomorphic encryption. Data providers control the security policy for their sensitive data. Users without security expertise can perform computations on the data, but the framework confines these computations, preventing information leakage beyond the data provider's policy. Our prototype implementation demonstrates the flexibility of the framework on several case studies. It was proved more efficient than fully homomorphic encryption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-receiver signcrption is useful in many applications such as secure email systems. In this paper, we propose a new efficient construction of multi-receiver signcryption from identity-based public key cryptosystem to traditional public key cryptosystem. The new scheme enables a user in IDPKC successfully broadcast messages, not only in authentic way but also in privately way, to users in TPKC. Furthermore, the security proof shows the proposed scheme is secure under the hardness of Generalized Bilinear Diffie-Hellman Problem in the random oracle.
{"title":"IDPKC-to-TPKC Construction of Multi-receiver Signcryption","authors":"Xiaotong Fu, Xiaowei Li, Wen Liu","doi":"10.1109/INCoS.2013.62","DOIUrl":"https://doi.org/10.1109/INCoS.2013.62","url":null,"abstract":"Multi-receiver signcrption is useful in many applications such as secure email systems. In this paper, we propose a new efficient construction of multi-receiver signcryption from identity-based public key cryptosystem to traditional public key cryptosystem. The new scheme enables a user in IDPKC successfully broadcast messages, not only in authentic way but also in privately way, to users in TPKC. Furthermore, the security proof shows the proposed scheme is secure under the hardness of Generalized Bilinear Diffie-Hellman Problem in the random oracle.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116699818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with anonymous communications system being widely researched, anonymity measurement becomes more and more significant. However, there is still no desired mathematical model for this. In this paper, some necessary features for anonymity measurement model are analyzed and a dynamic model based on information entropy is proposed. Then some analyses, as well as the practicality of our model illustrated with some examples are given. Finally, comparisons with other models are made to show advantages of our model.
{"title":"Information Entropy Model for Anonymity Measurement","authors":"Jun Ye, Yong Ding, Xin-Guo Li","doi":"10.1109/INCoS.2013.58","DOIUrl":"https://doi.org/10.1109/INCoS.2013.58","url":null,"abstract":"Along with anonymous communications system being widely researched, anonymity measurement becomes more and more significant. However, there is still no desired mathematical model for this. In this paper, some necessary features for anonymity measurement model are analyzed and a dynamic model based on information entropy is proposed. Then some analyses, as well as the practicality of our model illustrated with some examples are given. Finally, comparisons with other models are made to show advantages of our model.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125609456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications or processes. We develop and implement techniques for inferring agent plans, specifically inferring agent goals. We propose two ways to infer goals for plans without and with a goal library respectively. Besides, a preferred goal is considered when a goal library is provided, using the notions of consistency, maximal entailment and minimality. The complexity of the plan recognition framework is analyzed and the experimental results show that the average runtime for generating Belief-Desire-Intention (BDI) plans relying on the number of expansion nodes, choice branching factor and parallel branching factor in workflow nets (WF-nets), and that the plan recognition framework is feasible and computable.
{"title":"BDI Goal Recognition for Agent Program Learning","authors":"Hongyun Xu, Youqun Shi, Qiying Cao","doi":"10.1109/INCoS.2013.72","DOIUrl":"https://doi.org/10.1109/INCoS.2013.72","url":null,"abstract":"Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications or processes. We develop and implement techniques for inferring agent plans, specifically inferring agent goals. We propose two ways to infer goals for plans without and with a goal library respectively. Besides, a preferred goal is considered when a goal library is provided, using the notions of consistency, maximal entailment and minimality. The complexity of the plan recognition framework is analyzed and the experimental results show that the average runtime for generating Belief-Desire-Intention (BDI) plans relying on the number of expansion nodes, choice branching factor and parallel branching factor in workflow nets (WF-nets), and that the plan recognition framework is feasible and computable.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a novel encoding procedure to realize codes that resemble SR-LDPC codes (rate less codes for erasure correction). For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The two code words are then XOR-ed at the relay. The destination can recover the information from the two sources.
{"title":"Distributed SR-LDPC Codes over Multiple-Access Relay Channel","authors":"Rong Sun, Jingwei Liu","doi":"10.1109/INCoS.2013.117","DOIUrl":"https://doi.org/10.1109/INCoS.2013.117","url":null,"abstract":"This paper proposes a novel encoding procedure to realize codes that resemble SR-LDPC codes (rate less codes for erasure correction). For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The two code words are then XOR-ed at the relay. The destination can recover the information from the two sources.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many natural networks including social networks are scale-free, i.e. the distribution of node degrees in the network is heavy-tailed and follows the power law. In this work we analyze the scale-free properties of selected subnets of a complex co-authorship network induced by significant nodes (authors) and the evolution of these properties in time. The subnets induced by significant authors are sampled at different times and the power law parameters are estimated analytically. The study provides an empirical overview of the scale-freeness and evolution of power law parameters in a dynamic co-authorship network.
{"title":"Evolution of Scale-Freeness in a Co-authorship Network","authors":"P. Krömer, M. Kudelka, Z. Horak, V. Snás̃el","doi":"10.1109/INCoS.2013.127","DOIUrl":"https://doi.org/10.1109/INCoS.2013.127","url":null,"abstract":"Many natural networks including social networks are scale-free, i.e. the distribution of node degrees in the network is heavy-tailed and follows the power law. In this work we analyze the scale-free properties of selected subnets of a complex co-authorship network induced by significant nodes (authors) and the evolution of these properties in time. The subnets induced by significant authors are sampled at different times and the power law parameters are estimated analytically. The study provides an empirical overview of the scale-freeness and evolution of power law parameters in a dynamic co-authorship network.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users to compute the public authentication tags of file blocks. To tackle the challenge, we propose a new cloud storage architecture with two independent cloud servers, that is, the cloud storage server and the cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. The introduction of cloud audit server eliminates the involvement of user in the auditing and in the pre-processing phases.
{"title":"An Efficient Proof of Retrievability with Public Auditing in Cloud Computing","authors":"Jin Li, Xiao Tan, Xiaofeng Chen, D. Wong","doi":"10.1109/INCoS.2013.185","DOIUrl":"https://doi.org/10.1109/INCoS.2013.185","url":null,"abstract":"Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users to compute the public authentication tags of file blocks. To tackle the challenge, we propose a new cloud storage architecture with two independent cloud servers, that is, the cloud storage server and the cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. The introduction of cloud audit server eliminates the involvement of user in the auditing and in the pre-processing phases.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}