The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel geometric distortion resilient image copy detection scheme based on scale invariant feature transform (SIFT) detector. By using the SIFT detector, the proposed copy detection scheme first construct a series of robust, homogenous, and larger size circular patches. And then, the cirque track division strategy and ordinal measure concept are introduced to generate a cirque-based...
Fuzzy fingerprint vault is a developed cryptographic construct to secure critical data with the fingerprint data. The geometric hashing technique is proposed to realize an important feature, pre-alignment, but it yields great vulnerabilities to the system. In this paper, we discuss the details of the implementation of the fuzzy fingerprint vault based on geometric hashing, and then illustrate the...
The classification of unstructured P2P multicast video streaming is the premise for playing online linkage and real-time evidence in the process of network monitoring management. A new classification method is demonstrated, and some real-time protocol behavior features are figured in this paper, which is found out through distinguishing packet type and transmission direction. With these accessible...
A new multiple faces detection method based on facial features is proposed, which gets the face candidates with the help of skin color and makes use of wavelet express of images and the principal component analysis (PCA) to obtain the eigenvectors distinguishing faces and non-faces, and modifies Bayesian classifier to detect multiple faces of input images. ??, the parameter of the modified rules,...
We propose a novel image watermarking scheme capable of providing unequal protection levels to different regions in the image. In the scheme, we firstly divide the image into high protection region, low protection region and non-protection region, and then use unequal error protection (UEP) code to encode the bits generated by high and low protection regions simultaneously and form the watermark bits...
Digital images are facing trustworthy crisis with the emergence of various digital image process tools and steganography tools. Current digital image forensic methods can not evaluate the digital image's trustworthiness. Base on Dempster-Shafer (D-S) evidence theory, this paper proposed a new model which can effectively evaluate digital image trustworthiness. Instead of using Dempster's original rule...
This article discusses the users' privacy issues when they learn in Libray2.0. The authors classify learners' privacy issues in Library2.0 into four categories: users' personal information, users' seeking behavior privacy, threat from the third party and affiliated links, and leak of users' private documents. In order to protect users' privacy, various privacy-enhancing measures should be adopted...
With the development of social network sites, security protection of private information online has been a serious and important research topic. Research status quo on privacy of social network sites has been investigated and reviewed in this paper. Two main ways of obtaining private information on social network sites were summarized as based on privacy disclosure and attack technique. In each category,...
In social network, more and more video websites were appeared around the world, and everyone can upload or download the media freely. Therefore, it brings some content security problems, such as piracy, sensitive contents' disclosure and so on. This paper proposes a system to detect the media which is prepare to be uploaded. First we should initialize a Media Feature Database (MFD) which contains...
In this paper, we proposed a new digital forensic process model, named COEM (case-oriented evidence mining model), along with its approaches, top-down. The model consists of sets of tasks described at two levels of abstraction: case (from requirement to finding) and data (from general to specific). The COEM facilitates analysis in a viewpoint of case instead of data, and gives investigators a more...
Privacy policy plays an important role in the collection and usage of privacy data. Compared with the access control policy, the privacy policy shows three characteristics: (1) the set of privacy policies can offer more semantics; (2) The privacy policy is created by the data owner, whereas the access control policy is created by the database manager; (3) they work in different ways, accurate matching...
Cognitive radio networks have emerged as a new trend in wireless technology due to their perfect solution to the spectrum scarcity. The critical aspect of the spectrum allocation in distributed cognitive radio networks is how efficiently the spectrum is managed and how the secondary user's (SU) link is maintained once the primary user (PU) arrives or when the channel degrades due to interference....
The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control...
The growing importance of Trust in the realm of open network environment introduces further research on it, due to the special significance of trust to whole system. We view trust as a relation among entities that participate in an action meeting the trustor's own standards for an intended purpose. In this paper, we propose a trust algebra aiming to solving generic trust propagation and trust inference...
Data integrity of software can't ensure the trustiness of software behavior, a model named software's dynamic trustiness model based on behavior integrity (SDTMBBI) is proposed in this paper, which regards the behavior integrity and data integrity of the software entity as the core of software dynamic trustiness authentication. This model can be used to keep the trustiness of software behavior and...
Trust negotiation is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Sometimes negotiators do not have very strict security requirements or the efficiency is the most crucial need. In such cases, it is preferable to adopt schemes that speed up the negotiations, even if they...
Trusted computing is a promising technology for enhancing the security of platform by the TPM. The TPM is a tamper-resistant microcontroller designed to provide robust security capabilities for the trusted platform. It typically is affixed to the motherboard with LPC bus. However, It is so limitary that TPM can't be directly used in currently common PC, TPM isn't flexible and portable to be used in...
In the specification of trusted platform module (TPM), object-independent authorization protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are many TPM manufacturers having made their own TPM. However, some of the TPM manufacturers don't implement the TPM completely according to the specification of TPM. In this paper, BAN...
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz framework for systematic automated testing of a TCG trusted software stack implementation. This framework is based on blackbox fuzz testing methods, integrated with target profiling,...
Trusted computing group developed two solutions to realize remote attestation between platforms, but both of them have drawbacks. Privacy CA defined by trusted computing group needs to be highly available and may collude with verifier to trace user's transactions. direct anonymous attestation proposed in trusted platform module specification v1.2 is not efficient because it adopts many exponential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.