首页 > 最新文献

Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.最新文献

英文 中文
Design and implementation of a distributed router 分布式路由器的设计与实现
O. Hagsand, M. Hidell, Peter Sjödin
The requirements on IP routers are increasing for every new generation of designs. The driving forces are growing traffic volumes and demands for new services. We argue that a decentralized modular system design would improve the scalability, flexibility, and reliability of future routers. We have designed and implemented such a distributed router, based on physical separation between different functional modules for control and forwarding plane operations. This paper presents the design and implementation, focusing on the internal communication protocols and implementation aspects of the control plane
每一代新设计对IP路由器的要求都在增加。驱动力是不断增长的交通量和对新服务的需求。我们认为,分散的模块化系统设计将提高未来路由器的可扩展性、灵活性和可靠性。我们设计并实现了这样一个分布式路由器,基于不同功能模块之间的物理分离,实现控制平面和转发平面的操作。本文介绍了控制平面的设计与实现,重点介绍了控制平面的内部通信协议和实现方面
{"title":"Design and implementation of a distributed router","authors":"O. Hagsand, M. Hidell, Peter Sjödin","doi":"10.1109/ISSPIT.2005.1577100","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577100","url":null,"abstract":"The requirements on IP routers are increasing for every new generation of designs. The driving forces are growing traffic volumes and demands for new services. We argue that a decentralized modular system design would improve the scalability, flexibility, and reliability of future routers. We have designed and implemented such a distributed router, based on physical separation between different functional modules for control and forwarding plane operations. This paper presents the design and implementation, focusing on the internal communication protocols and implementation aspects of the control plane","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Novel scheme for compact orthogonal modified-Prony representation of signals 信号紧正交修正proony表示的新格式
M. Fahmy, Y. Hasan
In this paper, an algorithm is developed to construct a set of M orthogonal basis along which signals, whether noisy or noise-free, can be decomposed. Combining a modified Prony signal approximation and Gram-Schmidt orthogonalization schemes (to obtain the orthogonal bases), the proposed method represents the processed signal as the sum of M damped exponentials. It is shown that the employed bases are closely related to the roots of an Mth order forward linear prediction polynomial, satisfying the system. In addition, an optimization procedure is described to optimally adjust these bases to accurately represent the signal under consideration. The proposed procedure finds applications in signal compression and signal de-noising, where it is only necessary to specify the orthogonal basis, as well as the decomposition weights rather than sending the complete signal batch. Illustrative examples are given
本文提出了一种构造M个正交基集的算法,无论信号是有噪声的还是无噪声的,都可以沿着该正交基集进行分解。该方法结合改进的proony信号近似和Gram-Schmidt正交格式(以获得正交基),将处理后的信号表示为M个阻尼指数的和。结果表明,所采用的基与一个m阶前向线性预测多项式的根密切相关,满足了系统的要求。此外,还描述了一个优化过程,以最佳地调整这些基,以准确地表示所考虑的信号。该方法适用于信号压缩和信号去噪,只需要指定正交基和分解权值,而不需要发送完整的信号批次。给出了实例说明
{"title":"Novel scheme for compact orthogonal modified-Prony representation of signals","authors":"M. Fahmy, Y. Hasan","doi":"10.1109/ISSPIT.2005.1577181","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577181","url":null,"abstract":"In this paper, an algorithm is developed to construct a set of M orthogonal basis along which signals, whether noisy or noise-free, can be decomposed. Combining a modified Prony signal approximation and Gram-Schmidt orthogonalization schemes (to obtain the orthogonal bases), the proposed method represents the processed signal as the sum of M damped exponentials. It is shown that the employed bases are closely related to the roots of an Mth order forward linear prediction polynomial, satisfying the system. In addition, an optimization procedure is described to optimally adjust these bases to accurately represent the signal under consideration. The proposed procedure finds applications in signal compression and signal de-noising, where it is only necessary to specify the orthogonal basis, as well as the decomposition weights rather than sending the complete signal batch. Illustrative examples are given","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127862806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On space-time block coding in downlink of multiuser CDMA systems 多用户CDMA系统下行链路空时分组编码研究
S. Mohammad Razavizadeh, V. Tabataba Vakili, P. Azmi, M. Fardis
In this paper, we introduce a new transmission scheme for downlink of multiple antenna code division multiple access (CDMA) systems. In the proposed scheme, the Alamouti's space-time block coding (STBC) method is extended to multiuser systems. Moreover, to mitigate multiple access interference in the conventional receivers, the linear transmit preceding technique is used in the transmitter. We show that using STBC codes in conjunction with transmit preceding in CDMA systems can significantly increase the capacity of these systems. In this method, the mobile terminals are simple and they do not need any information about other users' spreading sequences. Our computer simulations show that the proposed method has the same performance as the methods based on the combination of receive diversity and multiuser detection in the uplink of CDMA systems
本文介绍了一种用于多天线码分多址(CDMA)系统下行链路的新传输方案。该方案将Alamouti空时分组编码(STBC)方法扩展到多用户系统。此外,为了减轻传统接收机中的多址干扰,在发射机中采用了线性发射前置技术。研究表明,在CDMA系统中使用STBC码与传输前导相结合可以显著提高系统的容量。在这种方法中,移动终端操作简单,不需要其他用户的传播序列信息。计算机仿真结果表明,该方法与CDMA系统上行链路中基于接收分集和多用户检测相结合的方法具有相同的性能
{"title":"On space-time block coding in downlink of multiuser CDMA systems","authors":"S. Mohammad Razavizadeh, V. Tabataba Vakili, P. Azmi, M. Fardis","doi":"10.1109/ISSPIT.2005.1577079","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577079","url":null,"abstract":"In this paper, we introduce a new transmission scheme for downlink of multiple antenna code division multiple access (CDMA) systems. In the proposed scheme, the Alamouti's space-time block coding (STBC) method is extended to multiuser systems. Moreover, to mitigate multiple access interference in the conventional receivers, the linear transmit preceding technique is used in the transmitter. We show that using STBC codes in conjunction with transmit preceding in CDMA systems can significantly increase the capacity of these systems. In this method, the mobile terminals are simple and they do not need any information about other users' spreading sequences. Our computer simulations show that the proposed method has the same performance as the methods based on the combination of receive diversity and multiuser detection in the uplink of CDMA systems","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114585485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient parameter selection criterion for image denoising 一种有效的图像去噪参数选择准则
H. Pirsiavash, S. Kasaei, F. Marvasti
The performance of most image denoising systems depends on some parameters which should be set carefully based on noise distribution and its variance. As in some applications noise characteristics are unknown, in this research, a criterion which its minimization leads to the best parameter set up is introduced. The proposed criterion is evaluated for the wavelet shrinkage image denoising algorithm using the cross validation procedure. The criterion is tested for some different values of thresholds, and the output leading to the minimum criterion value is selected as the final denoised output. The resulting outputs of our method and the previous threshold selection scheme for the wavelet shrinkage, i.e. the median absolute difference (MAD), are compared. The objective and subjective test results show the improved efficiency of the proposed denoising algorithm
大多数图像去噪系统的性能取决于一些参数,这些参数应根据噪声分布及其方差仔细设置。由于在某些应用中噪声特性是未知的,在本研究中,引入了一个使噪声最小的准则,从而得到最佳参数。采用交叉验证方法对小波收缩图像去噪算法进行了评价。对不同的阈值对准则进行测试,并选择导致准则值最小的输出作为最终去噪输出。我们的方法和之前的小波收缩阈值选择方案,即中位数绝对差(MAD)的输出结果进行了比较。客观和主观测试结果表明,该去噪算法提高了去噪效率
{"title":"An efficient parameter selection criterion for image denoising","authors":"H. Pirsiavash, S. Kasaei, F. Marvasti","doi":"10.1109/ISSPIT.2005.1577214","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577214","url":null,"abstract":"The performance of most image denoising systems depends on some parameters which should be set carefully based on noise distribution and its variance. As in some applications noise characteristics are unknown, in this research, a criterion which its minimization leads to the best parameter set up is introduced. The proposed criterion is evaluated for the wavelet shrinkage image denoising algorithm using the cross validation procedure. The criterion is tested for some different values of thresholds, and the output leading to the minimum criterion value is selected as the final denoised output. The resulting outputs of our method and the previous threshold selection scheme for the wavelet shrinkage, i.e. the median absolute difference (MAD), are compared. The objective and subjective test results show the improved efficiency of the proposed denoising algorithm","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Using visual augmentations to test control interactions in visual dataflow languages 使用可视化增强来测试可视化数据流语言中的控件交互
M. Karam
In this work, we have extended the abstract graph model which we have previously introduced (Karam, M. et al., Sept. 2001), and incorporated the extended model into a visual dataflow testing system that allows testers to import, test, and reflect, with the use of colors, the testedness/coverage of a visual dataflow program's controls. The testing environment in our system is complemented with an augmentation technique that uses visual artifacts and a coloring scheme. Results from our case studies indicates the usefulness of this technique and its practicality in terms of catching, as well as locating faults in real Prograph (shafer Dan, Oct. 1994) programs
在这项工作中,我们扩展了我们之前介绍过的抽象图形模型(Karam, M. et al., 2001年9月),并将扩展模型合并到一个可视化数据流测试系统中,该系统允许测试人员通过使用颜色来导入、测试和反映可视化数据流程序控制的可测试性/覆盖率。我们系统中的测试环境是通过使用视觉工件和着色方案的增强技术进行补充的。我们的案例研究结果表明,该技术在捕捉和定位实际程序中的故障方面是有用的,并且具有实用性(shafer Dan, 1994年10月)
{"title":"Using visual augmentations to test control interactions in visual dataflow languages","authors":"M. Karam","doi":"10.1109/ISSPIT.2005.1577172","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577172","url":null,"abstract":"In this work, we have extended the abstract graph model which we have previously introduced (Karam, M. et al., Sept. 2001), and incorporated the extended model into a visual dataflow testing system that allows testers to import, test, and reflect, with the use of colors, the testedness/coverage of a visual dataflow program's controls. The testing environment in our system is complemented with an augmentation technique that uses visual artifacts and a coloring scheme. Results from our case studies indicates the usefulness of this technique and its practicality in terms of catching, as well as locating faults in real Prograph (shafer Dan, Oct. 1994) programs","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new entropy-based algorithm for face localization 一种新的基于熵的人脸定位算法
S. Alirezaee, K. Faez, H. Rashidy Kanan, H. Aghaeinia
Detecting and localizing a face in a single image is the most important part of almost all face recognition systems. Face localization aims to determine the image position of a face for verification purpose of documents such as passport, driving license, ID cards, etc. In this paper an entropy-based method is proposed for detecting the high information region of the image, which may include eyes, mouth, nose, etc. The derived regions in this stage of recognition are sent to feature extraction and classification phase. The method has been tested on the ORL database. The results show the effectiveness and robustness of the proposed method for face detection and localization in presence of white additive Gaussian noise up to 25 dBw. We have achieved localization rate 99.75% for detection of faces in the ORL data set that we had which means 1 miss over 400 ORL faces
在单个图像中检测和定位人脸是几乎所有人脸识别系统中最重要的部分。人脸定位的目的是确定人脸的图像位置,用于护照、驾照、身份证等证件的验证。本文提出了一种基于熵的图像高信息区域检测方法,这些高信息区域包括眼睛、嘴巴、鼻子等。在这一阶段的识别得到的区域被送到特征提取和分类阶段。该方法已在ORL数据库上进行了测试。实验结果表明,该方法在最大为25 dBw的高斯白加性噪声下具有良好的人脸检测和定位效果。在现有的ORL数据集中,我们的人脸检测的定位率达到了99.75%,这意味着1张以上的ORL人脸缺失
{"title":"A new entropy-based algorithm for face localization","authors":"S. Alirezaee, K. Faez, H. Rashidy Kanan, H. Aghaeinia","doi":"10.1109/ISSPIT.2005.1577114","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577114","url":null,"abstract":"Detecting and localizing a face in a single image is the most important part of almost all face recognition systems. Face localization aims to determine the image position of a face for verification purpose of documents such as passport, driving license, ID cards, etc. In this paper an entropy-based method is proposed for detecting the high information region of the image, which may include eyes, mouth, nose, etc. The derived regions in this stage of recognition are sent to feature extraction and classification phase. The method has been tested on the ORL database. The results show the effectiveness and robustness of the proposed method for face detection and localization in presence of white additive Gaussian noise up to 25 dBw. We have achieved localization rate 99.75% for detection of faces in the ORL data set that we had which means 1 miss over 400 ORL faces","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124691942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kernel Design of bilinear TFD for multiple LFM signals with unbalanced amplitudes 多幅不平衡LFM信号双线性TFD的核设计
Pu Wang, Jianyu Yang, Jintao Xiong
This paper presents a novel method for kernel design of a bilinear time frequency distribution (TFD) for multiple linear frequency modulated (LFM) signals with unbalanced amplitudes. The kernel is constructed from the product ambiguity function (AF), which suppresses cross terms and noise in the ambiguity domain. An algorithm is developed to determine the angles and distances of the radically distributed contents of the auto terms in the ambiguity domain. To reduce the residual signals and error propagation effect, an iterative approach is implemented. Simulation results validate the method and demonstrate cross terms and noise suppression and high resolution in the time frequency domain
针对幅值不平衡的多重线性调频信号,提出了一种双线性时频分布(TFD)的核设计方法。核函数由乘积模糊函数(AF)构造,该函数抑制了模糊域内的交叉项和噪声。提出了一种确定模糊域内自动项的根本分布内容的角度和距离的算法。为了减少残留信号和误差传播的影响,采用了迭代方法。仿真结果验证了该方法的有效性,证明了交叉项和噪声抑制以及时频域的高分辨率
{"title":"Kernel Design of bilinear TFD for multiple LFM signals with unbalanced amplitudes","authors":"Pu Wang, Jianyu Yang, Jintao Xiong","doi":"10.1109/ISSPIT.2005.1577152","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577152","url":null,"abstract":"This paper presents a novel method for kernel design of a bilinear time frequency distribution (TFD) for multiple linear frequency modulated (LFM) signals with unbalanced amplitudes. The kernel is constructed from the product ambiguity function (AF), which suppresses cross terms and noise in the ambiguity domain. An algorithm is developed to determine the angles and distances of the radically distributed contents of the auto terms in the ambiguity domain. To reduce the residual signals and error propagation effect, an iterative approach is implemented. Simulation results validate the method and demonstrate cross terms and noise suppression and high resolution in the time frequency domain","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Considering the security challenges in consumer-oriented eCommerce 考虑到面向消费者的电子商务中的安全挑战
S. Furnell
Although proven security technologies are available to protect eCommerce transactions, consumers can still face significant challenges if they have low threat awareness or limited technology literacy. This paper considers such challenges, linked to the consumer's understanding and the usability of the security features placed before them. The need to ensure threat awareness is well illustrated by the problem of phishing - a threat that can specifically target eCommerce users, and which explicitly uses their lack of knowledge as a basis for exploitation. Having established a need for protection, the discussion proceeds to consider the barriers posed by security technologies themselves, identifying a range of issues that may specifically be encountered by end-users. Providing a solution to the problems is far from straightforward, but the paper proposes a number of directions in which useful contributions can be made
尽管经过验证的安全技术可用于保护电子商务交易,但如果消费者的威胁意识较低或技术素养有限,他们仍然可能面临重大挑战。本文考虑了这些挑战,与消费者的理解和摆在他们面前的安全功能的可用性有关。网络钓鱼问题很好地说明了确保威胁意识的必要性——这种威胁可以专门针对电子商务用户,并明确地利用他们缺乏知识作为利用的基础。在确定了保护需求之后,讨论继续考虑安全技术本身造成的障碍,确定最终用户可能具体遇到的一系列问题。为这些问题提供解决方案远非直截了当,但本文提出了一些可以做出有益贡献的方向
{"title":"Considering the security challenges in consumer-oriented eCommerce","authors":"S. Furnell","doi":"10.1109/ISSPIT.2005.1577154","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577154","url":null,"abstract":"Although proven security technologies are available to protect eCommerce transactions, consumers can still face significant challenges if they have low threat awareness or limited technology literacy. This paper considers such challenges, linked to the consumer's understanding and the usability of the security features placed before them. The need to ensure threat awareness is well illustrated by the problem of phishing - a threat that can specifically target eCommerce users, and which explicitly uses their lack of knowledge as a basis for exploitation. Having established a need for protection, the discussion proceeds to consider the barriers posed by security technologies themselves, identifying a range of issues that may specifically be encountered by end-users. Providing a solution to the problems is far from straightforward, but the paper proposes a number of directions in which useful contributions can be made","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126845362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multitarget ground tracking with road maps and particle filters 多目标地面跟踪与道路地图和粒子过滤器
G. Kravaritis, B. Mulgrew
This paper studies the problem of tracking multiple targets on the ground when information about the road map is available. It introduces an algorithmic structure which employs a particle filter for estimation and tracking in conjunction with a gating function and a data association scheme for measurement-to-track assignment. The proposed technique is based on the variable structure multiple model particle filter and the joint probabilistic data association algorithm
本文研究了当路线图信息可用时的地面多目标跟踪问题。介绍了一种算法结构,该算法采用粒子滤波器进行估计和跟踪,并结合门控函数和数据关联方案进行测量-跟踪分配。该方法基于变结构多模型粒子滤波和联合概率数据关联算法
{"title":"Multitarget ground tracking with road maps and particle filters","authors":"G. Kravaritis, B. Mulgrew","doi":"10.1109/ISSPIT.2005.1577104","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577104","url":null,"abstract":"This paper studies the problem of tracking multiple targets on the ground when information about the road map is available. It introduces an algorithmic structure which employs a particle filter for estimation and tracking in conjunction with a gating function and a data association scheme for measurement-to-track assignment. The proposed technique is based on the variable structure multiple model particle filter and the joint probabilistic data association algorithm","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121603886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Extending an OMA-based DRM framework with non-repudiation services 使用不可否认服务扩展基于oma的DRM框架
J. A. Onieva, J. Lopez, Jianying Zhou, R. Román
Digital rights management (DRM) is an umbrella term for any of several arrangements, which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be specified by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows free access to the content by the consumers, but only those carrying the proper right object (RO) will be able to process such content. As a security service considered in different layers of the security framework defined by ITU X.805, almost all applications need to consider non-repudiation in the very beginning of their design. Unfortunately this has not been done so far in DRM specifications due to practical issues and the type of content distributed. We analyze this service for the a DRM framework and provide a solution which allows the right objects acquisition to be undeniable
数字版权管理(DRM)是多种安排的总称,它允许电子形式内容的供应商以供应商可以指定的各种方式控制材料并限制其使用。这些安排是通过安全技术提供的,主要是加密,并以分离的方式分发内容和权利。这允许消费者免费访问内容,但只有那些携带适当的正确对象(RO)的用户才能处理这些内容。作为在ITU X.805定义的安全框架的不同层中考虑的安全服务,几乎所有应用程序在设计之初都需要考虑不可否认性。不幸的是,由于实际问题和分发的内容类型,到目前为止在DRM规范中还没有做到这一点。我们在一个DRM框架中分析了这个服务,并提供了一个解决方案,该解决方案允许正确的对象获取是不可否认的
{"title":"Extending an OMA-based DRM framework with non-repudiation services","authors":"J. A. Onieva, J. Lopez, Jianying Zhou, R. Román","doi":"10.1109/ISSPIT.2005.1577143","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577143","url":null,"abstract":"Digital rights management (DRM) is an umbrella term for any of several arrangements, which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be specified by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows free access to the content by the consumers, but only those carrying the proper right object (RO) will be able to process such content. As a security service considered in different layers of the security framework defined by ITU X.805, almost all applications need to consider non-repudiation in the very beginning of their design. Unfortunately this has not been done so far in DRM specifications due to practical issues and the type of content distributed. We analyze this service for the a DRM framework and provide a solution which allows the right objects acquisition to be undeniable","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1