首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Best of two worlds: Secure cloud federations meet eIDAS 两全其美:安全的云联盟符合eIDAS
Thomas Zefferer, Dominik Ziegler, Andreas Reiter
The federation of information technology (IT) systems is a common approach to bundle capabilities and get the best results for all participants. Cloud computing and electronic identity (eID) are only two out of many domains, for which federated solutions have been a topic of scientific and corporate interest during the past years. Recently, the H2020 project SUNFISH has introduced a new cloud-federation approach called ‘Federation as a Service’ (FaaS). FaaS enables secure cloud federations, where data owners remain in full control of their data and workflows. In this paper, we identify shortcomings of the FaaS approach in terms of secure and reliable user authentication. In this sense, data security and protection mechanisms are only as good as the applied authentication measures. We solve this issue by proposing the integration of an existing pan-European federation of national eID systems into FaaS. This increases security guarantees of FaaS by using a trustworthy and liable eID solution that has a strong legal basis in the form of the EU eIDAS Regulation. A first successful implementation and deployment of the proposed solution demonstrates its feasibility and shows the great potential of combining federation solutions from the cloud domain and the eID domain.
信息技术(IT)系统的联合是捆绑功能并为所有参与者获得最佳结果的常用方法。云计算和电子身份(eID)只是许多领域中的两个,在过去的几年里,联邦解决方案一直是科学和企业感兴趣的主题。最近,H2020项目SUNFISH引入了一种新的云联盟方法,称为“联盟即服务”(FaaS)。FaaS支持安全的云联合,数据所有者仍然可以完全控制他们的数据和工作流。在本文中,我们指出了FaaS方法在安全和可靠的用户身份验证方面的缺点。从这个意义上说,数据安全和保护机制的好坏取决于所应用的身份验证措施。我们通过提议将现有的泛欧洲国家eID系统联盟集成到FaaS中来解决这个问题。这通过使用具有欧盟eIDAS法规形式的强大法律基础的可靠且可靠的eID解决方案,增加了FaaS的安全性保证。该解决方案的首次成功实现和部署证明了其可行性,并显示了将来自云域和eID域的联邦解决方案结合在一起的巨大潜力。
{"title":"Best of two worlds: Secure cloud federations meet eIDAS","authors":"Thomas Zefferer, Dominik Ziegler, Andreas Reiter","doi":"10.23919/ICITST.2017.8356430","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356430","url":null,"abstract":"The federation of information technology (IT) systems is a common approach to bundle capabilities and get the best results for all participants. Cloud computing and electronic identity (eID) are only two out of many domains, for which federated solutions have been a topic of scientific and corporate interest during the past years. Recently, the H2020 project SUNFISH has introduced a new cloud-federation approach called ‘Federation as a Service’ (FaaS). FaaS enables secure cloud federations, where data owners remain in full control of their data and workflows. In this paper, we identify shortcomings of the FaaS approach in terms of secure and reliable user authentication. In this sense, data security and protection mechanisms are only as good as the applied authentication measures. We solve this issue by proposing the integration of an existing pan-European federation of national eID systems into FaaS. This increases security guarantees of FaaS by using a trustworthy and liable eID solution that has a strong legal basis in the form of the EU eIDAS Regulation. A first successful implementation and deployment of the proposed solution demonstrates its feasibility and shows the great potential of combining federation solutions from the cloud domain and the eID domain.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models 基于LSTM递归神经网络和ARIMA模型的数据中心机器CPU工作负荷预测
Deepak Janardhanan, E. Barrett
The advent of Data Science has led to data being evermore useful for an increasing number of organizations who want to extract knowledge from it for financial and research purposes. This has triggered data to be mined at an even faster pace causing the rise of Data Centers that host over thousands of machines together with thousands of jobs running in each of those machines. The growing complexities associated with managing such a huge infrastructure has caused the scheduling management systems to be inefficient at resource allocation across these machines. Hence, resource usage forecasting of machines in data centers is a growing area for research. This study focuses on the Time Series forecasting of CPU usage of machines in data centers using Long Short-Term Memory (LSTM) Network and evaluating it against the widely used and traditional autoregressive integrated moving average (ARIMA) models for forecasting. The final LSTM model had a forecasting error in the range of 17–23% compared to ARIMA model's 3742%. The results clearly show that LSTM models performed more consistently due to their ability to learn non-linear data much better than ARIMA models.
数据科学的出现使得数据变得越来越有用,越来越多的组织希望从数据中提取知识用于财务和研究目的。这引发了以更快的速度挖掘数据,导致数据中心的兴起,这些数据中心托管了数千台机器,每台机器上都运行着数千个作业。与管理如此庞大的基础设施相关的日益增长的复杂性导致调度管理系统在这些机器之间的资源分配方面效率低下。因此,数据中心中机器的资源使用预测是一个日益增长的研究领域。本文主要研究了利用LSTM网络对数据中心机器CPU使用情况进行时间序列预测,并将其与广泛使用的传统自回归综合移动平均(ARIMA)预测模型进行比较。最终LSTM模型的预测误差为17-23%,而ARIMA模型的预测误差为3742%。结果清楚地表明,由于LSTM模型学习非线性数据的能力比ARIMA模型好得多,因此LSTM模型的表现更加一致。
{"title":"CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models","authors":"Deepak Janardhanan, E. Barrett","doi":"10.23919/ICITST.2017.8356346","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356346","url":null,"abstract":"The advent of Data Science has led to data being evermore useful for an increasing number of organizations who want to extract knowledge from it for financial and research purposes. This has triggered data to be mined at an even faster pace causing the rise of Data Centers that host over thousands of machines together with thousands of jobs running in each of those machines. The growing complexities associated with managing such a huge infrastructure has caused the scheduling management systems to be inefficient at resource allocation across these machines. Hence, resource usage forecasting of machines in data centers is a growing area for research. This study focuses on the Time Series forecasting of CPU usage of machines in data centers using Long Short-Term Memory (LSTM) Network and evaluating it against the widely used and traditional autoregressive integrated moving average (ARIMA) models for forecasting. The final LSTM model had a forecasting error in the range of 17–23% compared to ARIMA model's 3742%. The results clearly show that LSTM models performed more consistently due to their ability to learn non-linear data much better than ARIMA models.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Monitoring darknet activities by using network telescope 利用网络望远镜监测暗网活动
Shaikha AlShehyari, C. Yeun, E. Damiani
Today, many hosts are connected to the Internet worldwide. Those hosts are intentionally or even accidentally targeted in a daily basis by malicious activities. Thus, it is essential to monitor Internet traffic in order to acquire the knowledge of the threats that is targeting computers and network systems. Security experts initiated numerous approaches for monitoring traffic that includes malicious activities, and network telescope was one of them. Network telescopes are valuable in the term of monitoring and gathering data associated with Internet attack activities. Analysis of traffic captured by network telescopes has been shown as an effective measure in characterizing evil traffic caused by worm propagation and distributed denial of service attacks. This paper will discuss monitoring traffic coming from Darknet using network telescope. Additionally, we will identify the security issues and threats introduced if no monitored device is placed within a network infrastructure. The objective of this paper is to introduce the effect of such a technology on entities, provide successful solution, and encourage future research in this area of interest.
今天,世界各地的许多主机都连接到互联网。这些主机每天都会被恶意活动有意甚至无意地攻击。因此,为了获得针对计算机和网络系统的威胁的知识,监控互联网流量是必不可少的。安全专家提出了许多方法来监控包含恶意活动的流量,网络望远镜就是其中之一。网络望远镜在监控和收集与网络攻击活动有关的数据方面是有价值的。利用网络望远镜对捕获到的流量进行分析是表征蠕虫传播和分布式拒绝服务攻击引起的恶意流量的有效手段。本文将讨论利用网络望远镜对来自暗网的流量进行监控。此外,我们将确定如果在网络基础设施中没有放置受监视的设备所引入的安全问题和威胁。本文的目的是介绍这种技术对实体的影响,提供成功的解决方案,并鼓励未来在这一感兴趣的领域进行研究。
{"title":"Monitoring darknet activities by using network telescope","authors":"Shaikha AlShehyari, C. Yeun, E. Damiani","doi":"10.23919/ICITST.2017.8356360","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356360","url":null,"abstract":"Today, many hosts are connected to the Internet worldwide. Those hosts are intentionally or even accidentally targeted in a daily basis by malicious activities. Thus, it is essential to monitor Internet traffic in order to acquire the knowledge of the threats that is targeting computers and network systems. Security experts initiated numerous approaches for monitoring traffic that includes malicious activities, and network telescope was one of them. Network telescopes are valuable in the term of monitoring and gathering data associated with Internet attack activities. Analysis of traffic captured by network telescopes has been shown as an effective measure in characterizing evil traffic caused by worm propagation and distributed denial of service attacks. This paper will discuss monitoring traffic coming from Darknet using network telescope. Additionally, we will identify the security issues and threats introduced if no monitored device is placed within a network infrastructure. The objective of this paper is to introduce the effect of such a technology on entities, provide successful solution, and encourage future research in this area of interest.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight signcryption scheme based on discrete Chebyshev maps 基于离散切比雪夫映射的轻量级签名加密方案
Ta Thi Kim Hue, T. Hoang, An Braeken
Signcryption schemes are cryptographic mechanisms providing both encryption and signing in a very efficient way. This paper presents a lightweight signcryption scheme based on Chebyshev chaotic maps over finite fields. For that, complex dynamic properties of the Chebyshev map are investigated and shown to be adequate for the construction of a signcryption scheme. The proposed signcryption scheme is proven to be secure for both outsider and insider attacks. Moreover, its computational cost is low, and the lower hardware complexity in compared with others based on elliptic curves.
签名加密方案是以一种非常有效的方式提供加密和签名的加密机制。提出了一种基于有限域上切比雪夫混沌映射的轻量级签名加密方案。为此,研究了切比雪夫映射的复杂动态性质,并证明其足以用于构造一个签名加密方案。所提出的签名加密方案对外部攻击和内部攻击都是安全的。与其他基于椭圆曲线的算法相比,该算法计算成本低,硬件复杂度低。
{"title":"Lightweight signcryption scheme based on discrete Chebyshev maps","authors":"Ta Thi Kim Hue, T. Hoang, An Braeken","doi":"10.23919/ICITST.2017.8356343","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356343","url":null,"abstract":"Signcryption schemes are cryptographic mechanisms providing both encryption and signing in a very efficient way. This paper presents a lightweight signcryption scheme based on Chebyshev chaotic maps over finite fields. For that, complex dynamic properties of the Chebyshev map are investigated and shown to be adequate for the construction of a signcryption scheme. The proposed signcryption scheme is proven to be secure for both outsider and insider attacks. Moreover, its computational cost is low, and the lower hardware complexity in compared with others based on elliptic curves.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129304677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing cyber security awareness with mobile games 利用手机游戏提升网络安全意识
F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki
The ever-increasing threats on cybersecurity has consequently increased the need for enhanced awareness about cybersecurity and its various threats among public. This paper presents the design aspects of the two mobile gaming applications including Malware Guardian game, and Password Protector game. Further, different mobile games concept developed during the course of the study is also presented. The malware Guardian was aimed at educating the users about different security threats, security issues, the risks associated with it and the tools to be used for preventing these attacks. The Password Protector is aimed at educating the users about the need for creating strong and complex passwords, remembering and changing them frequently. Both the games are in the final phase of design, and will be developed once the design specifications are outlined. The major design aspects of the two gaming applications are presented in this paper, which are carefully crafted after a peer review of functions and technologies to be associated with.
随着网络安全威胁的不断增加,公众对网络安全及其各种威胁的认识也日益提高。本文介绍了恶意软件守护游戏和密码保护游戏这两款手机游戏的设计。此外,本文还介绍了在研究过程中产生的不同手机游戏概念。恶意软件Guardian旨在教育用户了解不同的安全威胁、安全问题、与之相关的风险以及用于防止这些攻击的工具。密码保护的目的是教育用户需要创建强大而复杂的密码,记住和经常更改它们。这两款游戏都处于设计的最后阶段,并将在设计规范概述后进行开发。本文介绍了这两款游戏应用程序的主要设计方面,它们是在对相关功能和技术进行同行审查后精心设计的。
{"title":"Enhancing cyber security awareness with mobile games","authors":"F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki","doi":"10.23919/ICITST.2017.8356361","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356361","url":null,"abstract":"The ever-increasing threats on cybersecurity has consequently increased the need for enhanced awareness about cybersecurity and its various threats among public. This paper presents the design aspects of the two mobile gaming applications including Malware Guardian game, and Password Protector game. Further, different mobile games concept developed during the course of the study is also presented. The malware Guardian was aimed at educating the users about different security threats, security issues, the risks associated with it and the tools to be used for preventing these attacks. The Password Protector is aimed at educating the users about the need for creating strong and complex passwords, remembering and changing them frequently. Both the games are in the final phase of design, and will be developed once the design specifications are outlined. The major design aspects of the two gaming applications are presented in this paper, which are carefully crafted after a peer review of functions and technologies to be associated with.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance vs. security: Implementing an immutable database in MySQL 性能vs.安全性:在MySQL中实现不可变数据库
Thomas Nash, Aspen Olmsted
Maintaining transactional history is crucial to unraveling the changes any unauthorized user makes to a system, and this logging database is often a prime target for attackers. One common approach to maintaining this security is through an immutable database. There are many ways to implement such a database which maintains appropriate security requirements, each ranging in the complexity and effort required to configure. What remains constant amongst all the methods is that the database is available only to a restricted, defined set of users and that records may only be inserted and not updated or deleted to maintain a proper history. We demonstrate two of these methods in the MySQL database system and compare performance and capabilities amongst them.
维护事务历史记录对于揭示任何未经授权的用户对系统所做的更改至关重要,并且此日志数据库通常是攻击者的主要目标。维护这种安全性的一种常用方法是通过不可变数据库。有许多方法可以实现这样一个维护适当安全性需求的数据库,每种方法的复杂性和配置所需的工作量各不相同。在所有方法中保持不变的是,数据库仅对一组受限制的、已定义的用户可用,并且只能插入记录,不能更新或删除记录以维护适当的历史记录。我们在MySQL数据库系统中演示了其中的两种方法,并比较了它们之间的性能和功能。
{"title":"Performance vs. security: Implementing an immutable database in MySQL","authors":"Thomas Nash, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356402","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356402","url":null,"abstract":"Maintaining transactional history is crucial to unraveling the changes any unauthorized user makes to a system, and this logging database is often a prime target for attackers. One common approach to maintaining this security is through an immutable database. There are many ways to implement such a database which maintains appropriate security requirements, each ranging in the complexity and effort required to configure. What remains constant amongst all the methods is that the database is available only to a restricted, defined set of users and that records may only be inserted and not updated or deleted to maintain a proper history. We demonstrate two of these methods in the MySQL database system and compare performance and capabilities amongst them.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile business performance metrics: Framework and case study 移动业务性能指标:框架和案例研究
Ahyoung Kim, Junwoo Lee
The increases in mobile-phone users changed paradigms in mobile business and extended business area and its applications. Therefore, various attempts have been made to succeed in mobile business. In this study, performance indicators for measuring business performance are proposed, also using proposed performance indicators framework for analyzing usage-focused mobile business is suggested. Based on the characteristics of mobile business, performance indicators are classified to Customer Retention and Product Engagement. The customer's usage data automatically collected from mobile application is analyzed by 2 performance indicators. In this paper, we will suggest the mobile business analysis framework for performance indicators, and introduce the result of analysis through case-study. The suggestion and mobile business analysis framework from this study support decision making in mobile business area such as mobile marketing and mobile commerce.
移动电话用户的增加改变了移动业务的模式,扩展了业务领域及其应用。因此,为了在移动业务中取得成功,人们进行了各种尝试。在本研究中,提出了衡量企业绩效的绩效指标,并建议使用所提出的绩效指标框架来分析以使用为中心的移动业务。根据移动业务的特点,绩效指标分为客户留存率和产品参与度。从移动应用程序自动收集的客户使用数据通过2个性能指标进行分析。本文将提出移动业务绩效指标分析框架,并通过案例分析介绍分析结果。本研究提出的建议和移动商务分析框架为移动营销和移动商务等移动商务领域的决策提供了支持。
{"title":"Mobile business performance metrics: Framework and case study","authors":"Ahyoung Kim, Junwoo Lee","doi":"10.23919/ICITST.2017.8356372","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356372","url":null,"abstract":"The increases in mobile-phone users changed paradigms in mobile business and extended business area and its applications. Therefore, various attempts have been made to succeed in mobile business. In this study, performance indicators for measuring business performance are proposed, also using proposed performance indicators framework for analyzing usage-focused mobile business is suggested. Based on the characteristics of mobile business, performance indicators are classified to Customer Retention and Product Engagement. The customer's usage data automatically collected from mobile application is analyzed by 2 performance indicators. In this paper, we will suggest the mobile business analysis framework for performance indicators, and introduce the result of analysis through case-study. The suggestion and mobile business analysis framework from this study support decision making in mobile business area such as mobile marketing and mobile commerce.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection 一种基于DCT心理视觉阈值的鲁棒版权保护盲水印技术
F. Ernawan, M. Kabir, Z. Mustaffa
This work presents a blind watermarking technique based on a psychovisual threshold for a robust copyright protection. Psychovisual threshold can provide a trade-off between imperceptibility and robustness of the watermark. This paper proposes a new watermarking scheme where watermarks are embedded on some selected coefficients of DCT frequencies considering psychovisual threshold. The embedding regions are determined using a modified entropy to indicate less distortion areas. Furthermore, the watermark image is scrambled before embedding to provide additional security. The proposed scheme is tested under different types of signal-processing and geometric attack. The experimental results show that our scheme produces higher imperceptibility and robustness of the watermark than the existing schemes.
提出了一种基于心理视觉阈值的盲水印技术,实现了对版权的鲁棒保护。心理视觉阈值可以在水印的不可感知性和鲁棒性之间进行权衡。本文提出了一种新的基于视觉心理阈值的DCT频率嵌入水印方案。嵌入区域是用一种改进的熵来确定的,以表明畸变较小的区域。此外,水印图像在嵌入前进行了置乱处理,以提供额外的安全性。该方案在不同类型的信号处理和几何攻击下进行了测试。实验结果表明,该方案比现有方案具有更高的水印隐蔽性和鲁棒性。
{"title":"A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection","authors":"F. Ernawan, M. Kabir, Z. Mustaffa","doi":"10.23919/ICITST.2017.8356354","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356354","url":null,"abstract":"This work presents a blind watermarking technique based on a psychovisual threshold for a robust copyright protection. Psychovisual threshold can provide a trade-off between imperceptibility and robustness of the watermark. This paper proposes a new watermarking scheme where watermarks are embedded on some selected coefficients of DCT frequencies considering psychovisual threshold. The embedding regions are determined using a modified entropy to indicate less distortion areas. Furthermore, the watermark image is scrambled before embedding to provide additional security. The proposed scheme is tested under different types of signal-processing and geometric attack. The experimental results show that our scheme produces higher imperceptibility and robustness of the watermark than the existing schemes.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On blockchain-based authorization architecture for beyond-5G mobile services 基于区块链的超5g移动服务授权架构研究
S. Kiyomoto, A. Basu, Mohammad Shahriar Rahman, S. Ruj
This paper proposes a new conceptual architecture for authorization of mobile services based on blockchain technologies, and presents a design of procedures for heterogeneous mobile communication services. Furthermore, an extension of the procedures is considered in order to enhance privacy protection for users. The new architecture realizes the separation of mobile communication infrastructure and billing functions and multiple use of several mobile communication services under a single contract with a billing operator.
提出了一种基于区块链技术的移动服务授权新概念架构,并给出了异构移动通信服务的流程设计。此外,为了加强对用户隐私的保护,考虑了程序的扩展。新的体系结构实现了移动通信基础设施和计费功能的分离,以及在与计费运营商签订的单一合同下多种移动通信服务的多重使用。
{"title":"On blockchain-based authorization architecture for beyond-5G mobile services","authors":"S. Kiyomoto, A. Basu, Mohammad Shahriar Rahman, S. Ruj","doi":"10.23919/ICITST.2017.8356363","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356363","url":null,"abstract":"This paper proposes a new conceptual architecture for authorization of mobile services based on blockchain technologies, and presents a design of procedures for heterogeneous mobile communication services. Furthermore, an extension of the procedures is considered in order to enhance privacy protection for users. The new architecture realizes the separation of mobile communication infrastructure and billing functions and multiple use of several mobile communication services under a single contract with a billing operator.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Evaluate action primitives for human activity recognition using unsupervised learning approach 使用无监督学习方法评估人类活动识别的动作原语
Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted
Smartphones and wearable devices are in the frontlines when it comes to the field of Human Activity Recognition (HAR). There have been numerous attempts to use motion sensors in smartphones and wearables to recognize human activity. Most of these studies apply supervised learning techniques, which requires them to use labeled datasets. In this work, we take a sample of these labels, or action primitives (sit, stand, run, walk, jump, lie down), and evaluate them against the resulting labels of several clustering algorithms. We built two datasets (labeled and unlabeled) using accelerometer, gyroscope, and pedometer readings from two fixed-position devices, a smartphone in the side pocket, and a smartwatch strapped onto the left-hand wrist. Ultimately, we want to determine whether these action primitives commonly used in HAR are optimal, and suggest a better set of primitives if not.
在人类活动识别(HAR)领域,智能手机和可穿戴设备处于最前沿。人们曾多次尝试在智能手机和可穿戴设备中使用运动传感器来识别人类活动。这些研究大多应用监督学习技术,这需要他们使用标记数据集。在这项工作中,我们取了这些标签或动作原语(坐、站、跑、走、跳、躺)的一个样本,并根据几种聚类算法的结果标签对它们进行评估。我们建立了两个数据集(标记和未标记),使用加速度计,陀螺仪和计步器读数从两个固定位置的设备,智能手机放在侧口袋,智能手表绑在左手手腕。最终,我们希望确定HAR中常用的这些动作原语是否是最佳的,如果不是,则建议一组更好的原语。
{"title":"Evaluate action primitives for human activity recognition using unsupervised learning approach","authors":"Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356374","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356374","url":null,"abstract":"Smartphones and wearable devices are in the frontlines when it comes to the field of Human Activity Recognition (HAR). There have been numerous attempts to use motion sensors in smartphones and wearables to recognize human activity. Most of these studies apply supervised learning techniques, which requires them to use labeled datasets. In this work, we take a sample of these labels, or action primitives (sit, stand, run, walk, jump, lie down), and evaluate them against the resulting labels of several clustering algorithms. We built two datasets (labeled and unlabeled) using accelerometer, gyroscope, and pedometer readings from two fixed-position devices, a smartphone in the side pocket, and a smartwatch strapped onto the left-hand wrist. Ultimately, we want to determine whether these action primitives commonly used in HAR are optimal, and suggest a better set of primitives if not.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1