Full Text Documents

Search


Table of Contents
Communications and Multimedia Security
Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (Eds.)
Front Matter

Part I: Research Papers


Biometrics


Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit – Cross-Feature Type Comparisons
Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl
3-17
Achieving Anonymity against Major Face Recognition Algorithms
Benedikt Driessen, Markus Dürmuth
18-33
Client-Side Biometric Verification Based on Trusted Computing
Jan Vossaert, Jorn Lapon, Bart Decker, Vincent Naessens
34-49

Applied Cryptography


Dedicated Hardware for Attribute-Based Credential Verification
Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven Strycker
50-65
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
Y. Rao, Ratna Dutta
66-81

Part II: Work in Progress


Sustainable Value Creation, Business Models and Strategies


Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack
Andreas Hasselberg, Rene Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel
85-94

Digital Watermarking, Steganography and Forensics


Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
Huajian Liu, Yiyao Li, Martin Steinebach
95-104
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors
Boris Assanovich, William Puech, and Iuliia Tkachenko
105-112
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
Hieu Nguyen, Stefan Katzenbeisser
113-122
Pit Stop for an Audio Steganography Algorithm
Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller
123-134
Robust Hash Algorithms for Text
Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf
135-144
Hardware Based Security Enhanced Direct Memory Access
Marcel Eckert, Igor Podebrad, Bernd Klauer
145-151

Social Network Privacy, Security and Authentication


Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
Takayuki Yamada, Seiichi Gohshi, Isao Echizen
152-161
E-Learning of IT Security Threats: A Game Prototype for Children
Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann
162-172
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation
Gábor Gulyás, Sándor Imre
173-184
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models
Xiaofeng Xia
185-194

Part III: Extended Abstracts


Authentication with Time Features for Keystroke Dynamics on Touchscreens
Matthias Trojahn, Florian Arndt, Frank Ortmeier
197-199
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans
Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann
200-203
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications
Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer
204-206
SocACL: An ASP-Based Access Control Language for Online Social Networks
Edward Caprin, Yan Zhang
207-210
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton
Konstantinos Raftopoulos, Klimis Ntalianis, Paraskevi Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu
211-214

Part IV: Keynotes


Face Recognition from Degraded Images – Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries
Sabah Jassim
217-232
Trustworthy Software Development
Sachar Paulus, Nazila Mohammadi, Thorsten Weyer
233-247

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/