index - Communications and Multimedia Security Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Communications and Multimedia Security
Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (Eds.)
Front Matter

Part I: Research Papers


Biometrics


Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit – Cross-Feature Type Comparisons
Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl
3-17
Achieving Anonymity against Major Face Recognition Algorithms
Benedikt Driessen, Markus Dürmuth
18-33
Client-Side Biometric Verification Based on Trusted Computing
Jan Vossaert, Jorn Lapon, Bart Decker, Vincent Naessens
34-49

Applied Cryptography


Dedicated Hardware for Attribute-Based Credential Verification
Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven Strycker
50-65
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
Y. Rao, Ratna Dutta
66-81

Part II: Work in Progress


Sustainable Value Creation, Business Models and Strategies


Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack
Andreas Hasselberg, Rene Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel
85-94

Digital Watermarking, Steganography and Forensics


Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
Huajian Liu, Yiyao Li, Martin Steinebach
95-104
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors
Boris Assanovich, William Puech, and Iuliia Tkachenko
105-112
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
Hieu Nguyen, Stefan Katzenbeisser
113-122
Pit Stop for an Audio Steganography Algorithm
Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller
123-134
Robust Hash Algorithms for Text
Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf
135-144
Hardware Based Security Enhanced Direct Memory Access
Marcel Eckert, Igor Podebrad, Bernd Klauer
145-151

Social Network Privacy, Security and Authentication


Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
Takayuki Yamada, Seiichi Gohshi, Isao Echizen
152-161
E-Learning of IT Security Threats: A Game Prototype for Children
Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann
162-172
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation
Gábor Gulyás, Sándor Imre
173-184
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models
Xiaofeng Xia
185-194

Part III: Extended Abstracts


Authentication with Time Features for Keystroke Dynamics on Touchscreens
Matthias Trojahn, Florian Arndt, Frank Ortmeier
197-199
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans
Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann
200-203
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications
Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer
204-206
SocACL: An ASP-Based Access Control Language for Online Social Networks
Edward Caprin, Yan Zhang
207-210
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton
Konstantinos Raftopoulos, Klimis Ntalianis, Paraskevi Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu
211-214

Part IV: Keynotes


Face Recognition from Degraded Images – Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries
Sabah Jassim
217-232
Trustworthy Software Development
Sachar Paulus, Nazila Mohammadi, Thorsten Weyer
233-247

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/