IFIP TC6 Open Digital Library

14. Communications and Multimedia Security 2013: Magdeburg, Germany

Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings

Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer

Springer, Lecture Notes in Computer Science 8099, ISBN: 978-3-642-40778-9


Research Papers

Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons.

Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl


Achieving Anonymity against Major Face Recognition Algorithms.

Benedikt Driessen, Markus Dürmuth


Client-Side Biometric Verification Based on Trusted Computing.

Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens


Dedicated Hardware for Attribute-Based Credential Verification.

Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker


Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption.

Y. Sreenivasa Rao, Ratna Dutta


Work in Progress

Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack.

Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel


Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.

Huajian Liu, Yiyao Li, Martin Steinebach


Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors.

Boris Assanovich, William Puech, Iuliia Tkachenko


Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine.

Hieu Cuong Nguyen, Stefan Katzenbeisser


Pit Stop for an Audio Steganography Algorithm.

Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller


Robust Hash Algorithms for Text.

Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf


Hardware Based Security Enhanced Direct Memory Access.

Marcel Eckert, Igor Podebrad, Bernd Klauer


Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity.

Takayuki Yamada, Seiichi Gohshi, Isao Echizen


E-Learning of IT Security Threats: A Game Prototype for Children.

Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann


Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation.

Gábor György Gulyás, Sándor Imre


An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models.

Xiaofeng Xia


Extended Abstracts

Authentication with Time Features for Keystroke Dynamics on Touchscreens.

Matthias Trojahn, Florian Arndt, Frank Ortmeier


Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans.

Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann


Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications.

Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer


SocACL: An ASP-Based Access Control Language for Online Social Networks.

Edward Caprin, Yan Zhang


Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton.

Konstantinos Raftopoulos, Klimis S. Ntalianis, Paraskevi K. Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu



Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries.

Sabah A. Jassim


Trustworthy Software Development.

Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer