The proceedings contain 40 papers. The topics discussed include: video scrambling for privacy protection in video surveillance: recent results and validation framework;ensuring security of H.264 videos by using waterm...
ISBN:
(纸本)9780819486370
The proceedings contain 40 papers. The topics discussed include: video scrambling for privacy protection in video surveillance: recent results and validation framework;ensuring security of H.264 videos by using watermarking;novel technology for enhanced security and trust in communication networks;system for non-disruptive high-capacity indexed data embedding and recovery using multimedia signal covers;establishing trust in decentralized smart sensor networks;the effects of uncommon time constraints to stopping criteria for managing human-machine interactive decision-making;an adaptive LMS technique for wavelet polynomial threshold denoising;accuracy, security, and processing time comparisons of biometric fingerprint recognition system using digital and optical enhancements;remote object authentication against counterfeiting using elliptic curves;and multi-template image matching using alpha-rooted biquaternion phase correlation with application to logo recognition.
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as image capture, Location applications, and Biometric authentication such as Fingerprint veri...
详细信息
ISBN:
(纸本)9780819481726
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I. e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
The aim of this article is to give a practical overview of certain commercial software for investigation of the new iPhone 4. It is demonstrated how important data stored in the iPhone are investigated. Different case...
详细信息
ISBN:
(纸本)9780819486370
The aim of this article is to give a practical overview of certain commercial software for investigation of the new iPhone 4. It is demonstrated how important data stored in the iPhone are investigated. Different cases of investigations are presented that are well-suited for forensics lab work.
The aim of this article is to show forensic investigation methods for mobile phones to students in a university forensic lab environment. Students have to learn the usefulness of forensic procedures to ensure evidence...
详细信息
ISBN:
(纸本)9780819486370
The aim of this article is to show forensic investigation methods for mobile phones to students in a university forensic lab environment. Students have to learn the usefulness of forensic procedures to ensure evidence collection, evidence preservation, forensic analysis, and reporting. Open source tools as well as commercial forensic tools for forensic investigation of modern mobile (smart) phones are used. It is demonstrated how important data stored in the mobile device are investigated. Different scenarios of investigations are presented that are well-suited for forensics lab work in university.
Over the past several years there has been an apparent shift in research focus in the area of digital steganography and steganalysis - a shift from primarily image based methods to a new focus on broader multimedia te...
详细信息
ISBN:
(纸本)9780819486370
Over the past several years there has been an apparent shift in research focus in the area of digital steganography and steganalysis - a shift from primarily image based methods to a new focus on broader multimedia techniques. More specifically the area of digital audio steganography is of prime interest. We introduce a new high capacity, covert channel data embedding and recovery system for digital audio carrier files using a key based encoding and decoding method. It will be shown that the added information file is interleaved within the carrier file and is fully indexed allowing for segmented extraction and recovery of data at chosen start and stop points in the sampled stream. The original audio quality is not affected by the addition of this covert data. The embedded information can also be secured by a binary key string or cryptographic algorithm and resists statistical analytic detection attempts. We will also describe how this new method can be used for data compression and expansion applications in the transfer and storage of digital multimedia to increase the overall data capacity and security.
Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Beside...
详细信息
ISBN:
(纸本)9780819486370
Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Besides cost, issues related to accuracy, security, and processing time in practical biometric recognition systems represent the most critical factors that makes these systems widely acceptable. Accurate and secure biometric systems often require sophisticated enhancement and encoding techniques that burdens the overall processing time of the system. In this paper we present a comparison between common digital and optical enhancement\encoding techniques with respect to their accuracy, security and processing time, when applied to biometric fingerprint systems.
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: a...
详细信息
ISBN:
(纸本)9780819495464
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
Watermarking is known to be a very difficult task. Robustness, Distortion, Payload, security, Complexity are many constraints to deal with. When applied to a video stream, the difficulty seems to be growing in compari...
详细信息
ISBN:
(纸本)9780819486370
Watermarking is known to be a very difficult task. Robustness, Distortion, Payload, security, Complexity are many constraints to deal with. When applied to a video stream, the difficulty seems to be growing in comparison to image watermarking. Many classical non malicious manipulations of a compressed stream may suppress the embedded information. For example, a simple re-compression of a DVD movie (MPEG2 compression) to a DivX movie will defeat most of the current state-of-the-art watermarking systems. In this talk, we will expose the different techniques in order to watermark a video compressed stream. Before, we will present the H.264/AVC standard which is one of the most powerful video-compression algorithms. The discussion about video watermarking will be illustrated with H.264 streams. The specific example of traitor tracing will be presented. Deadlocks will be discussed, and then the possible extensions and the future applications will conclude the presentation.
mobile devices are usually computationally restricted in carrying out complicated processing algorithms on its multimedia document. While cloud computing provides resources for customers, a major concern is the custom...
详细信息
ISBN:
(纸本)9781510626522
mobile devices are usually computationally restricted in carrying out complicated processing algorithms on its multimedia document. While cloud computing provides resources for customers, a major concern is the customer data's privacy and security. The information-theoretic secure (ITS) approach has some advantages over the homomorphic encryption approach. ITS is faster and requires much shorter encryption. In this paper, we proposed a framework based on the ITS paradigm using the linear secret sharing scheme for image and audio processing tasks on mobile devices. Our experiments were carried out on the Amazon EC2 commercial cloud platform with better performance than existing ones.
This paper introduces a new redundant number system, the adjunctive numerical relation (ANR) codes, which offer improvements over other well known systems such as the Fibonacci, Lucas, and the Prime number systems whe...
详细信息
ISBN:
(纸本)9780819495464
This paper introduces a new redundant number system, the adjunctive numerical relation (ANR) codes, which offer improvements over other well known systems such as the Fibonacci, Lucas, and the Prime number systems when used in multimedia data hiding applications. It will be shown that this new redundant number system has potential applications in digital communications, signal, and imageprocessing. the paper will also offer two illustrative applications for this new redundant coding system. First an enhanced bit-plane decomposition of image formatted files with data embedding (steganography and watermarking). Secondly, an example of an expanded bit-line decomposition of audio formatted files with data embedding and index-based retrieval capability will be described. The computer simulations will detail the statistical stability required for effective data encoding techniques and demonstrate the improvements in the embedding capacity in multimedia carriers.
暂无评论