Amazon cover image
Image from Amazon.com

Communications and multimedia security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 8099. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Heidelberg : Springer, 2013Description: 1 online resource (xiv, 249 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642407796
  • 364240779X
  • 3642407781
  • 9783642407789
Other title:
  • CMS 2013
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 I35 2013
NLM classification:
  • QA 76.9.A25
Other classification:
  • 54.62
Online resources:
Contents:
Research Papers. Biometrics. Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit -- Cross-Feature Type Comparisons / Jutta Hämmerle-Uhl, Michael Pober and Andreas Uhl -- Achieving Anonymity against Major Face Recognition Algorithms / Benedikt Driessen and Markus Dürmuth -- Client-Side Biometric Verification Based on Trusted Computing / Jan Vossaert [and others] -- Applied Cryptography. Dedicated Hardware for Attribute-Based Credential Verification / Geoffrey Ottoy [and others] -- Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption / Y. Sreenivasa Rao and Ratna Dutta -- Work in Progress. Biometrics. Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack / Andreas Hasselberg [and others] -- Digital Watermarking, Steganography and Forensics. Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion / Huajian Liu, Yiyao Li and Martin Steinebach -- Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors / Boris Assanovich, William Puech and Iuliia Tkachenko -- Detecting Resized Double JPEG Compressed Images -- Using Support Vector Machine / Hieu Cuong Nguyen and Stefan Katzenbeisser -- Pit Stop for an Audio Steganography Algorithm / Andreas Westfeld [and others] -- Robust Hash Algorithms for Text / Martin Steinebach [and others] -- Hardware Based Security Enhanced Direct Memory Access / Marcel Eckert, Igor Podebrad and Bernd Klauer -- Social Network Privacy, Security and Authentication. Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity / Takayuki Yamada, Seiichi Gohshi and Isao Echizen -- E-Learning of IT Security Threats: A Game Prototype for Children / Jana Fruth [and others] -- Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation / Gábor György Gulyás and Sándor Imre -- An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models / Xiaofeng Xia -- Extended Abstracts. Authentication with Time Features for Keystroke Dynamics on Touchscreens / Matthias Trojahn, Florian Arndt and Frank Ortmeier -- Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans / Mario Hildebrandt [and others] -- Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications / Mario Hildebrandt [and others] -- SocACL: An ASP-Based Access Control Language for Online Social Networks / Edward Caprin and Yan Zhang -- Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton / Konstantinos Raftopoulos [and others] -- Keynotes. Face Recognition from Degraded Images -- Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries / Sabah A. Jassim -- Trustworthy Software Development / Sachar Paulus, Nazila Gol Mohammadi and Thorsten Weyer.
Summary: This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Research Papers. Biometrics. Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit -- Cross-Feature Type Comparisons / Jutta Hämmerle-Uhl, Michael Pober and Andreas Uhl -- Achieving Anonymity against Major Face Recognition Algorithms / Benedikt Driessen and Markus Dürmuth -- Client-Side Biometric Verification Based on Trusted Computing / Jan Vossaert [and others] -- Applied Cryptography. Dedicated Hardware for Attribute-Based Credential Verification / Geoffrey Ottoy [and others] -- Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption / Y. Sreenivasa Rao and Ratna Dutta -- Work in Progress. Biometrics. Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack / Andreas Hasselberg [and others] -- Digital Watermarking, Steganography and Forensics. Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion / Huajian Liu, Yiyao Li and Martin Steinebach -- Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors / Boris Assanovich, William Puech and Iuliia Tkachenko -- Detecting Resized Double JPEG Compressed Images -- Using Support Vector Machine / Hieu Cuong Nguyen and Stefan Katzenbeisser -- Pit Stop for an Audio Steganography Algorithm / Andreas Westfeld [and others] -- Robust Hash Algorithms for Text / Martin Steinebach [and others] -- Hardware Based Security Enhanced Direct Memory Access / Marcel Eckert, Igor Podebrad and Bernd Klauer -- Social Network Privacy, Security and Authentication. Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity / Takayuki Yamada, Seiichi Gohshi and Isao Echizen -- E-Learning of IT Security Threats: A Game Prototype for Children / Jana Fruth [and others] -- Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation / Gábor György Gulyás and Sándor Imre -- An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models / Xiaofeng Xia -- Extended Abstracts. Authentication with Time Features for Keystroke Dynamics on Touchscreens / Matthias Trojahn, Florian Arndt and Frank Ortmeier -- Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans / Mario Hildebrandt [and others] -- Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications / Mario Hildebrandt [and others] -- SocACL: An ASP-Based Access Control Language for Online Social Networks / Edward Caprin and Yan Zhang -- Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton / Konstantinos Raftopoulos [and others] -- Keynotes. Face Recognition from Degraded Images -- Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries / Sabah A. Jassim -- Trustworthy Software Development / Sachar Paulus, Nazila Gol Mohammadi and Thorsten Weyer.

International conference proceedings.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed September 24, 2013).

This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.

Includes author index.

Powered by Koha