IFIP TC6 Open Digital Library

14. Communications and Multimedia Security 2013: Magdeburg, Germany

Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings

Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer

Springer, Lecture Notes in Computer Science 8099, ISBN: 978-3-642-40778-9



Contents

Research Papers

Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons.

Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl

 3-17

Achieving Anonymity against Major Face Recognition Algorithms.

Benedikt Driessen, Markus Dürmuth

 18-33

Client-Side Biometric Verification Based on Trusted Computing.

Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens

 34-49

Dedicated Hardware for Attribute-Based Credential Verification.

Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker

 50-65

Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption.

Y. Sreenivasa Rao, Ratna Dutta

 66-81

Work in Progress

Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack.

Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel

 85-94

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.

Huajian Liu, Yiyao Li, Martin Steinebach

 95-104

Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors.

Boris Assanovich, William Puech, Iuliia Tkachenko

 105-112

Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine.

Hieu Cuong Nguyen, Stefan Katzenbeisser

 113-122

Pit Stop for an Audio Steganography Algorithm.

Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller

 123-134

Robust Hash Algorithms for Text.

Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf

 135-144

Hardware Based Security Enhanced Direct Memory Access.

Marcel Eckert, Igor Podebrad, Bernd Klauer

 145-151

Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity.

Takayuki Yamada, Seiichi Gohshi, Isao Echizen

 152-161

E-Learning of IT Security Threats: A Game Prototype for Children.

Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann

 162-172

Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation.

Gábor György Gulyás, Sándor Imre

 173-184

An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models.

Xiaofeng Xia

 185-194

Extended Abstracts

Authentication with Time Features for Keystroke Dynamics on Touchscreens.

Matthias Trojahn, Florian Arndt, Frank Ortmeier

 197-199

Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans.

Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann

 200-203

Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications.

Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer

 204-206

SocACL: An ASP-Based Access Control Language for Online Social Networks.

Edward Caprin, Yan Zhang

 207-210

Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton.

Konstantinos Raftopoulos, Klimis S. Ntalianis, Paraskevi K. Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu

 211-214

Keynotes

Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries.

Sabah A. Jassim

 217-232

Trustworthy Software Development.

Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer

 233-247