TY - BOOK AU - Decker,Bart de ED - IFIP TC6/TC11 International Conference on Communications and Multimedia Security TI - Communications and multimedia security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings T2 - Lecture Notes in Computer Science, SN - 9783642407796 AV - QA76.9.A25 I35 2013 U1 - 005.8 23 PY - 2013/// CY - Heidelberg PB - Springer KW - Computer security KW - Congresses KW - Telecommunication systems KW - Security measures KW - Multimedia systems KW - Computer networks KW - Computer Security KW - Computer Communication Networks KW - Multimedia KW - Sécurité informatique KW - Congrès KW - Systèmes de télécommunications KW - Sécurité KW - Mesures KW - Multimédia KW - Réseaux d'ordinateurs KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index; Includes author index; Research Papers; Biometrics; Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit -- Cross-Feature Type Comparisons; Jutta Hämmerle-Uhl, Michael Pober and Andreas Uhl --; Achieving Anonymity against Major Face Recognition Algorithms; Benedikt Driessen and Markus Dürmuth --; Client-Side Biometric Verification Based on Trusted Computing; Jan Vossaert [and others] --; Applied Cryptography; Dedicated Hardware for Attribute-Based Credential Verification; Geoffrey Ottoy [and others] --; Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption; Y. Sreenivasa Rao and Ratna Dutta --; Work in Progress; Biometrics; Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack; Andreas Hasselberg [and others] --; Digital Watermarking, Steganography and Forensics; Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion; Huajian Liu, Yiyao Li and Martin Steinebach --; Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors; Boris Assanovich, William Puech and Iuliia Tkachenko --; Detecting Resized Double JPEG Compressed Images -- Using Support Vector Machine; Hieu Cuong Nguyen and Stefan Katzenbeisser --; Pit Stop for an Audio Steganography Algorithm; Andreas Westfeld [and others] --; Robust Hash Algorithms for Text; Martin Steinebach [and others] --; Hardware Based Security Enhanced Direct Memory Access; Marcel Eckert, Igor Podebrad and Bernd Klauer --; Social Network Privacy, Security and Authentication; Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity; Takayuki Yamada, Seiichi Gohshi and Isao Echizen --; E-Learning of IT Security Threats: A Game Prototype for Children; Jana Fruth [and others] --; Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation; Gábor György Gulyás and Sándor Imre --; An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models; Xiaofeng Xia --; Extended Abstracts; Authentication with Time Features for Keystroke Dynamics on Touchscreens; Matthias Trojahn, Florian Arndt and Frank Ortmeier --; Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans; Mario Hildebrandt [and others] --; Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications; Mario Hildebrandt [and others] --; SocACL: An ASP-Based Access Control Language for Online Social Networks; Edward Caprin and Yan Zhang --; Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton; Konstantinos Raftopoulos [and others] --; Keynotes; Face Recognition from Degraded Images -- Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries; Sabah A. Jassim --; Trustworthy Software Development; Sachar Paulus, Nazila Gol Mohammadi and Thorsten Weyer N2 - This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication UR - https://link.springer.com/10.1007/978-3-642-40779-6 ER -