index - Communications and Multimedia Security Access content directly

Full Text Documents

Chargement de la page


Chargement de la page

Table of Contents
Communications and Multimedia Security
Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (Eds.)
Front Matter

Part I: Research Papers


Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit – Cross-Feature Type Comparisons
Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl
Achieving Anonymity against Major Face Recognition Algorithms
Benedikt Driessen, Markus Dürmuth
Client-Side Biometric Verification Based on Trusted Computing
Jan Vossaert, Jorn Lapon, Bart Decker, Vincent Naessens

Applied Cryptography

Dedicated Hardware for Attribute-Based Credential Verification
Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven Strycker
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
Y. Rao, Ratna Dutta

Part II: Work in Progress

Sustainable Value Creation, Business Models and Strategies

Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack
Andreas Hasselberg, Rene Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel

Digital Watermarking, Steganography and Forensics

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
Huajian Liu, Yiyao Li, Martin Steinebach
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors
Boris Assanovich, William Puech, and Iuliia Tkachenko
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine
Hieu Nguyen, Stefan Katzenbeisser
Pit Stop for an Audio Steganography Algorithm
Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller
Robust Hash Algorithms for Text
Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf
Hardware Based Security Enhanced Direct Memory Access
Marcel Eckert, Igor Podebrad, Bernd Klauer

Social Network Privacy, Security and Authentication

Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
Takayuki Yamada, Seiichi Gohshi, Isao Echizen
E-Learning of IT Security Threats: A Game Prototype for Children
Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation
Gábor Gulyás, Sándor Imre
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models
Xiaofeng Xia

Part III: Extended Abstracts

Authentication with Time Features for Keystroke Dynamics on Touchscreens
Matthias Trojahn, Florian Arndt, Frank Ortmeier
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans
Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications
Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer
SocACL: An ASP-Based Access Control Language for Online Social Networks
Edward Caprin, Yan Zhang
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton
Konstantinos Raftopoulos, Klimis Ntalianis, Paraskevi Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu

Part IV: Keynotes

Face Recognition from Degraded Images – Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries
Sabah Jassim
Trustworthy Software Development
Sachar Paulus, Nazila Mohammadi, Thorsten Weyer



Designed by Inria-IES Team :    Hosted by HAL :