Ebook: Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings
- Tags: Systems and Data Security, Biometrics, e-Commerce/e-business, Computer Communication Networks, Data Encryption, Management of Computing and Information Systems
- Series: Lecture Notes in Computer Science 7394
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
Content:
Front Matter....Pages -
Front Matter....Pages 1-1
Robust Resampling Detection in Digital Images....Pages 3-15
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries....Pages 16-25
Security Analysis of Image-Based PUFs for Anti-counterfeiting....Pages 26-38
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference....Pages 39-54
Data-Minimizing Authentication Goes Mobile....Pages 55-71
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption....Pages 72-86
Front Matter....Pages 87-87
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans....Pages 89-98
A Method for Reducing the Risk of Errors in Digital Forensic Investigations....Pages 99-106
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance....Pages 107-116
A New Approach to Commutative Watermarking-Encryption....Pages 117-130
Systematic Engineering of Control Protocols for Covert Channels....Pages 131-144
Efficiency of Secure Network Coding Schemes....Pages 145-159
A New Approach for Private Searches on Public-Key Encrypted Data....Pages 160-173
Multi-level Authentication Based Single Sign-On for IMS Services....Pages 174-187
Front Matter....Pages 189-189
Are 128 Bits Long Keys Possible in Watermarking?....Pages 191-191
Predicate-Tree Based Pretty Good Privacy of Data....Pages 192-194
OOXML File Analysis of the July 22nd Terrorist Manual....Pages 195-197
Privacy-Preserving Scheduling Mechanism for eHealth Systems....Pages 198-200
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors....Pages 201-203
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls....Pages 204-206
Front Matter....Pages 189-189
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor....Pages 207-210
Practical Revocable Anonymous Credentials....Pages 211-213
Front Matter....Pages 215-215
Privacy Management in Global Organisations....Pages 217-237
From Panopticon to Fresnel, Dispelling a False Sense of Security....Pages 238-242
Back Matter....Pages -
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
Content:
Front Matter....Pages -
Front Matter....Pages 1-1
Robust Resampling Detection in Digital Images....Pages 3-15
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries....Pages 16-25
Security Analysis of Image-Based PUFs for Anti-counterfeiting....Pages 26-38
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference....Pages 39-54
Data-Minimizing Authentication Goes Mobile....Pages 55-71
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption....Pages 72-86
Front Matter....Pages 87-87
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans....Pages 89-98
A Method for Reducing the Risk of Errors in Digital Forensic Investigations....Pages 99-106
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance....Pages 107-116
A New Approach to Commutative Watermarking-Encryption....Pages 117-130
Systematic Engineering of Control Protocols for Covert Channels....Pages 131-144
Efficiency of Secure Network Coding Schemes....Pages 145-159
A New Approach for Private Searches on Public-Key Encrypted Data....Pages 160-173
Multi-level Authentication Based Single Sign-On for IMS Services....Pages 174-187
Front Matter....Pages 189-189
Are 128 Bits Long Keys Possible in Watermarking?....Pages 191-191
Predicate-Tree Based Pretty Good Privacy of Data....Pages 192-194
OOXML File Analysis of the July 22nd Terrorist Manual....Pages 195-197
Privacy-Preserving Scheduling Mechanism for eHealth Systems....Pages 198-200
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors....Pages 201-203
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls....Pages 204-206
Front Matter....Pages 189-189
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor....Pages 207-210
Practical Revocable Anonymous Credentials....Pages 211-213
Front Matter....Pages 215-215
Privacy Management in Global Organisations....Pages 217-237
From Panopticon to Fresnel, Dispelling a False Sense of Security....Pages 238-242
Back Matter....Pages -
....
Download the book Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)