Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Liveness detection is a rapidly expanding research area, an area that has become more relevant, due to the increased complexity and sophistication of spoofing attacks. Despite much research within liveness detection, a lack exists regarding the categorisation of liveness detection techniques. Therefore the development of a taxonomy that identifies the characteristics of liveness detection, and creates...
Intentional jamming and spoofing are growing concerns for communication and positioning systems based on Global Navigation Satellite System (GNSS). In the maritime sector, intentional interfering signals might induce poor performance of the GNSS receivers, that, in severe cases, are unable to provide reliable measurements. On board of vessels, the failure of the GNSS receiver propagates to multiple...
Data encryption is the primary method to protect embedded devices in the hostile environment. The security of the traditional data encryption algorithms relies on keeping the keys secret and they always require a lot of arithmetic and logical computations, which may be not suitable for area critical or power critical embedded devices. At TrustCom 2013, Hou et al. Proposed to use a physical unclonable...
There is a need for robust and effective trust management. Different security problems result in different requirements to the design of trust management, and the existing attacks in trust management for security are yet to be solved. In this paper, we first propose a framework to classify desired properties of trust management for each type of security problems. We then investigate typical representative...
We previously proposed the artificial fiber (AF) patterns in order to be able to hide information in printed documents. AF pattern uses the features of the medium (e.g., paper). It has features of rotational invariance, low visibility of the hidden information. But it still suffered extraction threshold instability when using a camera to extract the information. This problem has now been overcome...
A Method based on a mathematical model has been developed for simulating the basic characteristics of artificial fiber patterns using only a PC. Artificial fiber patterns enable information to be hidden in the background of printed matter with almost no visible noise. Measurement of the intensity ratio for artificial fiber patterns created using the method demonstrated that the properties of the paper...
Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by malicious automated programs (e.g., web bots) is becoming a serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism...
Active measurement studies show that the Peer-to-Peer (P2P) file sharing protocol Bit Torrent is highly under attack. Moreover, malicious peers can easily exploit the original seeding algorithm and therefore reduce the efficiency of this protocol. In this paper, we propose a novel seeding algorithm that requests peers to vote for their best sharing peers. Our results show that this incentive mechanism...
This paper proposes a formulation for a stochastic security constrained unit commitment, dispatch and reserve scheduling, considering N-1 security and non-spinning reserves. We employ a randomized optimization technique that is based on scenario generation of the uncertain variables, in this case the wind power, and offers probabilistic certificates regarding the robustness properties of the resulting...
Embedded systems (ESs) have been a prominent solution for enhancing system performance and reliability in recent years. ESs that are required to ensure functional correctness under timing constraints are referred to as real-time embedded systems (RTESs). With the emerging trend of utilizing RTESs in safety and reliability critical areas, security of RTESs, especially confidentiality of the communication,...
Many studies have shown that Multiple Classifier Systems (MCSs) are more robust than single classifiers to evasion attacks for linear classifiers. However, to the best of our knowledge, the robustness of MCSs for non-linear classifiers has not been inves-tigated. This paper attempts to discuss two issues experimentally including a MCS is still more robust than a single classifier for non-linear classifiers,...
An eye detection method for eyeglass wearers in iris recognition is proposed. The eye detection method consists of two steps; eye candidate detection and eye validation. In eye candidate detection, eye candidates are searched by employing a mask with 2×3 sub-blocks on a near infrared eye image to compute the intensity difference between the iris region and the surrounding regions. In eye validation,...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control...
With the development of wind power, how to use wind power fully has become an important research. In this paper, wind power accommodation robust model with security constraints considering demand response is built to accommodate wind power as much as possible. The robust model is a two-level optimal model: the upper level is to minimize the curtailed wind power and the lower level is to re-schedule...
Programming languages have long incorporated type safety, increasing their level of abstraction and thus aiding programmers. Type safety eliminates whole classes of security-sensitive bugs, replacing the tedious and error-prone search for such bugs in each application with verifying the correctness of the type system. Despite their benefits, these protections often end at the process boundary, that...
Security oriented codes are considered as one of the most efficient countermeasures against fault injection attacks. Their efficiency is usually measured in terms of their error masking probability. This criterion is applicable in cases where it is possible to distinguish between random errors and malicious attacks. In practice, if the induced errors are not fixed for several clock cycles, it is difficult...
The growing prevalence of Smartphones and Tablets has introduced new challenges and a heterogeneous hardware and software ecosystem. One of the interesting aspects of this phenomenon is how to control the user owned devices' access to organization/retail resources. This research focuses on enhancing a proposed indoor geo-fencing and access control framework aiming for retail environments as a case...
This paper presents an improved technique for hiding data in audio. The proposed method modifies the amplitude of the cover audio file to embed the secret message. To increase the security of the proposed scheme, we use a key to adjust the hiding technique. The suggested scheme does not need the original signal for extracting the hidden bits. Experimental results show that the proposed method is inaudible...
A process is a collection of steps, carried out using data, by either human or automated agents, to achieve a specific goal. The agents in our process are insiders, they have access to different data and annotations on data moving in between the process steps. At various points in a process, they can carry out attacks on privacy and security of the process through their interactions with different...
This paper deals with the image security along with compression. Here we have proposed an algorithm using chaos on EZW compression technique to provide security along with image compression. We had chosen chaos for image security due to its robustness to initial condition and mixing property. Our process of providing image security starts with compressing the image using EZW. The output sequence of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.