首页 > 最新文献

2012 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Sequence detection of overlapping latent fingerprints using a short-term aging feature 基于短时老化特征的重叠潜指纹序列检测
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412630
M. Schott, R. Merkel, J. Dittmann
This paper presents a novel approach for sequence detection of overlapping latent fingerprints for crime scene forensics. The approach involves a contactless and nondestructive acquisition of untreated fingerprints by using a Chromatic White Light (CWL) sensor. Based on 40 time series with 1160 samples, our approach shows how an aging feature called Binary Pixel for measuring the short-term decay of fingerprint samples can be used in combination with overlapping fingerprint separation methods for sequence detection. This allows differentiating which latent fingerprint was placed first and which later and thus provides contextual information for criminal investigations. Our experiments show promising results with a detection accuracy of at least 70%, regardless of the initial age of both the older and newer fingerprint.
提出了一种用于犯罪现场取证的重叠潜指纹序列检测新方法。该方法涉及使用彩色白光(CWL)传感器对未经处理的指纹进行非接触和无损采集。基于1160个样本的40个时间序列,我们的方法展示了如何将一种称为二进制像素的老化特征用于测量指纹样本的短期衰减,并结合重叠指纹分离方法进行序列检测。这可以区分哪个潜伏指纹是先放置的,哪个是后放置的,从而为刑事调查提供背景信息。我们的实验显示了有希望的结果,无论旧指纹和新指纹的初始年龄如何,检测准确率至少为70%。
{"title":"Sequence detection of overlapping latent fingerprints using a short-term aging feature","authors":"M. Schott, R. Merkel, J. Dittmann","doi":"10.1109/WIFS.2012.6412630","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412630","url":null,"abstract":"This paper presents a novel approach for sequence detection of overlapping latent fingerprints for crime scene forensics. The approach involves a contactless and nondestructive acquisition of untreated fingerprints by using a Chromatic White Light (CWL) sensor. Based on 40 time series with 1160 samples, our approach shows how an aging feature called Binary Pixel for measuring the short-term decay of fingerprint samples can be used in combination with overlapping fingerprint separation methods for sequence detection. This allows differentiating which latent fingerprint was placed first and which later and thus provides contextual information for criminal investigations. Our experiments show promising results with a detection accuracy of at least 70%, regardless of the initial age of both the older and newer fingerprint.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133311846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Non-regenerative two-hop wiretap channels using interference neutralization 使用干扰中和的非再生双跳窃听信道
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412659
Sabrina Gerbracht, Eduard Axel Jorswieck, G. Zheng, B. Ottersten
In this paper, we analyze the achievable secrecy rates in the two-hop wiretap channel with four nodes, where the transmitter and the receiver have multiple antennas while the relay and the eavesdropper have only a single antenna each. The relay is operating in amplify-and-forward mode and all the channels between the nodes are known perfectly by the transmitter. We discuss different transmission and protection schemes like artificial noise (AN). Furthermore, we introduce interference neutralization (IN) as a new protection scheme. We compare the different schemes regarding the high-SNR slope and the high-SNR power offset and illustrate the performance by simulation results. It is shown analytically as well as by numerical simulations that the high SNR performance of the proposed IN scheme is better than the one of AN.
本文分析了四节点两跳窃听信道中,发送端和接收端有多个天线,而中继端和窃听端各只有一个天线的可实现保密率。中继以放大转发模式工作,发射机完全知道节点之间的所有信道。我们讨论了不同的传输和保护方案,如人工噪声(AN)。此外,我们还引入了干扰中和(IN)作为一种新的保护方案。我们比较了不同方案在高信噪比斜率和高信噪比功率偏移方面的性能,并通过仿真结果说明了这些方案的性能。分析和数值模拟结果表明,本文提出的IN方案具有比AN方案更好的高信噪比性能。
{"title":"Non-regenerative two-hop wiretap channels using interference neutralization","authors":"Sabrina Gerbracht, Eduard Axel Jorswieck, G. Zheng, B. Ottersten","doi":"10.1109/WIFS.2012.6412659","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412659","url":null,"abstract":"In this paper, we analyze the achievable secrecy rates in the two-hop wiretap channel with four nodes, where the transmitter and the receiver have multiple antennas while the relay and the eavesdropper have only a single antenna each. The relay is operating in amplify-and-forward mode and all the channels between the nodes are known perfectly by the transmitter. We discuss different transmission and protection schemes like artificial noise (AN). Furthermore, we introduce interference neutralization (IN) as a new protection scheme. We compare the different schemes regarding the high-SNR slope and the high-SNR power offset and illustrate the performance by simulation results. It is shown analytically as well as by numerical simulations that the high SNR performance of the proposed IN scheme is better than the one of AN.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Facial landmark configuration for improved detection 面部地标配置,改进检测
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412618
C. Huang, B. Efraty, U. Kurkure, E. Papadakis, S. Shah, I. Kakadiaris
In this paper, we present two methods to improve the performance of landmark detection algorithms that are designed to detect individual landmarks. We focus on the landmark configuration module that takes the output of the individual landmark detectors and searches for a configuration of optimal landmark locations based on appropriate shape constraints. We design two configuration search approaches: (i) a multivariate conditional Gaussian-based model, and (ii) a MRF-based formulation with higher-order potentials. We evaluated the performance of our proposed methods using several state-of-the-art detectors, and consistently obtained improved performance.
在本文中,我们提出了两种方法来提高用于检测单个地标的地标检测算法的性能。我们专注于地标配置模块,该模块接受单个地标探测器的输出,并根据适当的形状约束搜索最佳地标位置的配置。我们设计了两种配置搜索方法:(i)基于多变量条件高斯模型,(ii)基于高阶势的mrf公式。我们使用几个最先进的检测器评估了我们提出的方法的性能,并不断获得改进的性能。
{"title":"Facial landmark configuration for improved detection","authors":"C. Huang, B. Efraty, U. Kurkure, E. Papadakis, S. Shah, I. Kakadiaris","doi":"10.1109/WIFS.2012.6412618","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412618","url":null,"abstract":"In this paper, we present two methods to improve the performance of landmark detection algorithms that are designed to detect individual landmarks. We focus on the landmark configuration module that takes the output of the individual landmark detectors and searches for a configuration of optimal landmark locations based on appropriate shape constraints. We design two configuration search approaches: (i) a multivariate conditional Gaussian-based model, and (ii) a MRF-based formulation with higher-order potentials. We evaluated the performance of our proposed methods using several state-of-the-art detectors, and consistently obtained improved performance.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"699 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Telephone handset identification by feature selection and sparse representations 基于特征选择和稀疏表示的电话听筒识别
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412628
Yannis Panagakis, Constantine Kotropoulos
Speech signals convey information not only for the speakers' identity and the spoken language, but also for the acquisition devices used during their recording. Therefore, it is reasonable to perform acquisition device identification by analyzing the recorded speech signal. To this end, the random spectral features (RSFs) and the labeled spectral features (LSFs) are proposed as intrinsic fingerprints suitable for device identification. The RSFs and the LSFs are extracted by applying unsupervised and supervised feature selection to the mean spectrogram of each speech signal, respectively. State-of-the-art identification accuracy of 97.58% has been obtained by employing LSFs on a set of 8 telephone handsets, from Lincoln-Labs Handset Database (LLHDB).
语音信号传递的信息不仅包括说话人的身份和语言,还包括录音过程中使用的采集设备。因此,通过分析所记录的语音信号来进行采集设备的识别是合理的。为此,提出了随机光谱特征(rfs)和标记光谱特征(lfs)作为适用于设备识别的本征指纹。分别对每个语音信号的平均谱图进行无监督和有监督特征选择,提取rsf和lsf。在林肯实验室手机数据库(LLHDB)的8部手机上使用lfs,获得了97.58%的最先进的识别准确率。
{"title":"Telephone handset identification by feature selection and sparse representations","authors":"Yannis Panagakis, Constantine Kotropoulos","doi":"10.1109/WIFS.2012.6412628","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412628","url":null,"abstract":"Speech signals convey information not only for the speakers' identity and the spoken language, but also for the acquisition devices used during their recording. Therefore, it is reasonable to perform acquisition device identification by analyzing the recorded speech signal. To this end, the random spectral features (RSFs) and the labeled spectral features (LSFs) are proposed as intrinsic fingerprints suitable for device identification. The RSFs and the LSFs are extracted by applying unsupervised and supervised feature selection to the mean spectrogram of each speech signal, respectively. State-of-the-art identification accuracy of 97.58% has been obtained by employing LSFs on a set of 8 telephone handsets, from Lincoln-Labs Handset Database (LLHDB).","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130516595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Two-stage appearance-based re-identification of humans in low-resolution videos 低分辨率视频中基于外观的两阶段人类再识别
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412619
J. Metzler
The objective of human re-identification is to recognize a specific individual on different locations and to determine whether an individual has already appeared. This is especially in multi-camera networks with non-overlapping fields of view of interest. However, this is still an unsolved computer vision task due to several challenges, e.g. significant changes of appearance of humans as well as different illumination, camera parameters etc. In addition, for instance, in surveillance scenarios only low-resolution videos are usually available, so that biometric approaches may not be applied. This paper presents a whole-body appearance-based human re-identification approach for low-resolution videos. The method is divided in two stages: first, an appearance model is computed from several images of an individual and pairwise compared to each other. The model is based on means of covariance descriptors determined by spectral clustering techniques. In the second stage, the result is refined by learning the appearance manifolds of the best matches. The proposed approach is tested on a multi-camera data set of a typical surveillance scenario and compared to a color histogram based method.
人体再识别的目的是识别不同位置的特定个体,并确定该个体是否已经出现。这在无重叠感兴趣视场的多摄像机网络中尤其如此。然而,这仍然是一个未解决的计算机视觉任务,由于几个挑战,如人类的外观的显著变化,以及不同的照明,相机参数等。此外,例如,在监控场景中,通常只有低分辨率的视频可用,因此生物识别方法可能无法应用。本文提出了一种基于全身外观的低分辨率视频人体再识别方法。该方法分为两个阶段:首先,从个体的几张图像中计算出一个外观模型,并对彼此进行两两比较。该模型基于谱聚类技术确定的协方差描述子的均值。在第二阶段,通过学习最佳匹配的外观流形来改进结果。在典型监控场景的多摄像机数据集上对该方法进行了测试,并与基于颜色直方图的方法进行了比较。
{"title":"Two-stage appearance-based re-identification of humans in low-resolution videos","authors":"J. Metzler","doi":"10.1109/WIFS.2012.6412619","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412619","url":null,"abstract":"The objective of human re-identification is to recognize a specific individual on different locations and to determine whether an individual has already appeared. This is especially in multi-camera networks with non-overlapping fields of view of interest. However, this is still an unsolved computer vision task due to several challenges, e.g. significant changes of appearance of humans as well as different illumination, camera parameters etc. In addition, for instance, in surveillance scenarios only low-resolution videos are usually available, so that biometric approaches may not be applied. This paper presents a whole-body appearance-based human re-identification approach for low-resolution videos. The method is divided in two stages: first, an appearance model is computed from several images of an individual and pairwise compared to each other. The model is based on means of covariance descriptors determined by spectral clustering techniques. In the second stage, the result is refined by learning the appearance manifolds of the best matches. The proposed approach is tested on a multi-camera data set of a typical surveillance scenario and compared to a color histogram based method.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124851778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reverse engineering of double JPEG compression in the presence of image resizing 逆向工程的双重JPEG压缩在存在的图像大小调整
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412637
T. Bianchi, A. Piva
In this paper, we propose a forensic technique for the reverse engineering of double JPEG compression in the presence of image resizing between the two compressions. Our approach is based on the fact that previously JPEG compressed images tend to have a near lattice distribution property (NLDP), and that this property is usually maintained after a simple image processing step and subsequent recompression. The proposed approach represents an improvement with respect to existing techniques analyzing double JPEG compression. Moreover, compared to forensic techniques aiming at the detection of resampling in JPEG images, the proposed approach moves a step further, since it also provides an estimation of both the resize factor and the quality factor of the previous JPEG compression. Such additional information can be used to reconstruct the history of an image and perform more detailed forensic analyses.
在本文中,我们提出了一种用于双重JPEG压缩的逆向工程的取证技术,在两种压缩之间存在图像大小调整。我们的方法是基于这样一个事实,即以前的JPEG压缩图像往往具有近点阵分布属性(NLDP),并且该属性通常在简单的图像处理步骤和随后的再压缩之后保持不变。该方法相对于现有的双JPEG压缩分析技术是一种改进。此外,与旨在检测JPEG图像重采样的取证技术相比,该方法更进一步,因为它还提供了对先前JPEG压缩的调整因子和质量因子的估计。这些附加信息可用于重建图像的历史,并执行更详细的法医分析。
{"title":"Reverse engineering of double JPEG compression in the presence of image resizing","authors":"T. Bianchi, A. Piva","doi":"10.1109/WIFS.2012.6412637","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412637","url":null,"abstract":"In this paper, we propose a forensic technique for the reverse engineering of double JPEG compression in the presence of image resizing between the two compressions. Our approach is based on the fact that previously JPEG compressed images tend to have a near lattice distribution property (NLDP), and that this property is usually maintained after a simple image processing step and subsequent recompression. The proposed approach represents an improvement with respect to existing techniques analyzing double JPEG compression. Moreover, compared to forensic techniques aiming at the detection of resampling in JPEG images, the proposed approach moves a step further, since it also provides an estimation of both the resize factor and the quality factor of the previous JPEG compression. Such additional information can be used to reconstruct the history of an image and perform more detailed forensic analyses.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Identify computer generated characters by analysing facial expressions variation 通过分析面部表情变化来识别计算机生成的角色
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412658
Duc-Tien Dang-Nguyen, G. Boato, F. D. Natale
Significant improvements have been recently achieved in both quality and realism of computer generated characters, which are nowadays often very difficult to be distinguished from real ones. However, generating highly realistic facial expressions is still a challenging issue, since synthetic expressions usually follow a repetitive pattern, while in natural faces the same expression is usually produced in similar but not equal ways. In this paper, we propose a method to distinguish between computer generated and natural faces based on facial expressions analysis. In particular, small variations of the facial shape models corresponding to the same expression are used as evidence of synthetic characters.
最近,计算机生成的角色在质量和真实感方面都取得了重大进步,这些角色现在通常很难与真实角色区分开来。然而,生成高度逼真的面部表情仍然是一个具有挑战性的问题,因为合成表情通常遵循重复的模式,而在自然面部中,相同的表情通常以相似但不相等的方式产生。在本文中,我们提出了一种基于面部表情分析的计算机生成人脸和自然人脸的区分方法。特别是,面部形状模型的小变化对应于相同的表情被用作合成特征的证据。
{"title":"Identify computer generated characters by analysing facial expressions variation","authors":"Duc-Tien Dang-Nguyen, G. Boato, F. D. Natale","doi":"10.1109/WIFS.2012.6412658","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412658","url":null,"abstract":"Significant improvements have been recently achieved in both quality and realism of computer generated characters, which are nowadays often very difficult to be distinguished from real ones. However, generating highly realistic facial expressions is still a challenging issue, since synthetic expressions usually follow a repetitive pattern, while in natural faces the same expression is usually produced in similar but not equal ways. In this paper, we propose a method to distinguish between computer generated and natural faces based on facial expressions analysis. In particular, small variations of the facial shape models corresponding to the same expression are used as evidence of synthetic characters.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices 通过利用人和成像设备之间的光谱灵敏度差异来防止未经授权的复制显示信息
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412640
Takayuki Yamada, S. Gohshi, I. Echizen
A method is described for preventing unauthorized copying of information shown on a display. It utilizes the difference in spectral sensitivity between humans and imaging devices. A near-infrared light source, which has no effect on human vision, is installed in front of an existing display to corrupt the content of photographs taken of the display. Testing using a prototype implementation demonstrated that this method effectively prevents the unauthorized copying of displayed information. In addition to preventing the disclosure of confidential and personal information through the unauthorized photographing of displays, the proposed method has broad application to the unauthorized photographing of works of art, factory equipment, and other objects subject to photographic restrictions.
描述了一种用于防止未经授权复制显示在显示器上的信息的方法。它利用了人类和成像设备在光谱灵敏度上的差异。在现有的显示器前安装对人类视觉没有影响的近红外光源,以破坏显示器拍摄的照片的内容。使用原型实现的测试表明,该方法有效地防止了对显示信息的未经授权的复制。除了防止通过未经授权拍摄展示品而泄露机密和个人信息外,该方法还广泛适用于未经授权拍摄艺术品、工厂设备和其他受摄影限制的物体。
{"title":"Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices","authors":"Takayuki Yamada, S. Gohshi, I. Echizen","doi":"10.1109/WIFS.2012.6412640","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412640","url":null,"abstract":"A method is described for preventing unauthorized copying of information shown on a display. It utilizes the difference in spectral sensitivity between humans and imaging devices. A near-infrared light source, which has no effect on human vision, is installed in front of an existing display to corrupt the content of photographs taken of the display. Testing using a prototype implementation demonstrated that this method effectively prevents the unauthorized copying of displayed information. In addition to preventing the disclosure of confidential and personal information through the unauthorized photographing of displays, the proposed method has broad application to the unauthorized photographing of works of art, factory equipment, and other objects subject to photographic restrictions.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting anomalous network hosts by means of PCA 基于PCA的异常网络主机检测
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412633
T. Pevný, M. Rehák, Martin Grill
This paper focuses on the identification of anomalous hosts within a computer network with the motivation to detect attacks and/or other unwanted and suspicious traffic. The proposed detection method does not use content of packets, which enables the method to be used on encrypted networks. Moreover, the method has very low computational complexity allowing fast detection and response important for limitation of potential damages. The proposed method uses entropies of IP addresses and ports to build two complementary models of host's traffic based on principal component analysis. These two models are coupled with two orthogonal anomaly definitions, which gives four different detectors. The methods are evaluated and compared to prior art on one week long capture of traffic on university network. The experiments reveals that no single detector can detect all types of anomalies, which is expected and stresses the importance of ensemble approach towards intrusion detection.
本文主要研究计算机网络中异常主机的识别,目的是检测攻击和/或其他不需要的和可疑的流量。提出的检测方法不使用数据包的内容,这使得该方法能够在加密网络上使用。此外,该方法具有非常低的计算复杂度,允许快速检测和响应,这对限制潜在损害至关重要。该方法利用IP地址和端口的熵,基于主成分分析建立主机流量的两个互补模型。这两种模型与两种正交的异常定义相结合,得到了四种不同的检测器。对这些方法进行了评估,并与现有技术进行了为期一周的大学网络流量捕获进行了比较。实验表明,没有一个单一的检测器可以检测到所有类型的异常,这是预期的,并强调了集成方法在入侵检测中的重要性。
{"title":"Detecting anomalous network hosts by means of PCA","authors":"T. Pevný, M. Rehák, Martin Grill","doi":"10.1109/WIFS.2012.6412633","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412633","url":null,"abstract":"This paper focuses on the identification of anomalous hosts within a computer network with the motivation to detect attacks and/or other unwanted and suspicious traffic. The proposed detection method does not use content of packets, which enables the method to be used on encrypted networks. Moreover, the method has very low computational complexity allowing fast detection and response important for limitation of potential damages. The proposed method uses entropies of IP addresses and ports to build two complementary models of host's traffic based on principal component analysis. These two models are coupled with two orthogonal anomaly definitions, which gives four different detectors. The methods are evaluated and compared to prior art on one week long capture of traffic on university network. The experiments reveals that no single detector can detect all types of anomalies, which is expected and stresses the importance of ensemble approach towards intrusion detection.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An efficient JPEG steganographic scheme using uniform embedding 采用均匀嵌入的高效JPEG隐写方案
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412644
Linjie Guo, J. Ni, Y. Shi
Steganography is the science and art of covert communication. Its objective is to hide the most secret messages into a cover object with the least possible statistical detectability. In practice, this is generally realized by a framework of minimal distortion embedding. This paper presents an efficient JPEG steganographic scheme based on syndrome trellis coding (STC) and a uniform embedding strategy, which, instead of random modification, tries to modify nonzero quantized DCT coefficients of different magnitude with equal probability, leading to possible minimal artifacts for statistics of DCT coefficients as a whole. The distortion metric corresponding to the uniform embedding is based on the magnitude of the DCT coefficients and both their intra- and inter-block neighborhood coefficients and known as uniform embedding distortion metric (UED). With the proposed scheme, the STC provides multiple codewords for a given message, while the UED determines the best one with minimal distortion. In this way, the average statistics change in each bin is significantly reduced, which corresponds to less detectability of steganalysis. Compared with prior arts, experimental results demonstrate the superior performance of the proposed scheme in terms of secure embedding capacity against steganalysis.
隐写术是秘密通信的科学和艺术。它的目标是将最机密的信息隐藏到一个具有最小统计可探测性的掩体中。在实践中,这通常是通过最小失真嵌入框架来实现的。本文提出了一种基于证格编码(STC)和均匀嵌入策略的高效JPEG隐写方案,该方案不是随机修改,而是尝试以等概率修改不同量级的非零量化DCT系数,从而使DCT系数的统计伪影从整体上最小化。与均匀嵌入相对应的失真度量基于DCT系数及其块内和块间邻域系数的大小,称为均匀嵌入失真度量(UED)。在该方案中,STC为给定的消息提供多个码字,而UED则以最小的失真确定最佳码字。这样,每个bin中的平均统计量变化显著减少,这对应于较低的隐写分析可检测性。与现有技术相比,实验结果表明该方案在抗隐写分析的安全嵌入能力方面具有优越的性能。
{"title":"An efficient JPEG steganographic scheme using uniform embedding","authors":"Linjie Guo, J. Ni, Y. Shi","doi":"10.1109/WIFS.2012.6412644","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412644","url":null,"abstract":"Steganography is the science and art of covert communication. Its objective is to hide the most secret messages into a cover object with the least possible statistical detectability. In practice, this is generally realized by a framework of minimal distortion embedding. This paper presents an efficient JPEG steganographic scheme based on syndrome trellis coding (STC) and a uniform embedding strategy, which, instead of random modification, tries to modify nonzero quantized DCT coefficients of different magnitude with equal probability, leading to possible minimal artifacts for statistics of DCT coefficients as a whole. The distortion metric corresponding to the uniform embedding is based on the magnitude of the DCT coefficients and both their intra- and inter-block neighborhood coefficients and known as uniform embedding distortion metric (UED). With the proposed scheme, the STC provides multiple codewords for a given message, while the UED determines the best one with minimal distortion. In this way, the average statistics change in each bin is significantly reduced, which corresponds to less detectability of steganalysis. Compared with prior arts, experimental results demonstrate the superior performance of the proposed scheme in terms of secure embedding capacity against steganalysis.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130620864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
期刊
2012 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1