SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:1556 6013 OR L773:1556 6021 "

Sökning: L773:1556 6013 OR L773:1556 6021

  • Resultat 1-10 av 38
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Alam, Quratulain, et al. (författare)
  • Formal Verification of the xDAuth Protocol
  • 2016
  • Ingår i: IEEE Transactions on Information Forensics and Security. - 1556-6013 .- 1556-6021. ; 11:9, s. 1956-1969
  • Tidskriftsartikel (refereegranskat)abstract
    • Service Oriented Architecture (SOA) offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using High Level Petri Nets (HLPN) to understand protocol information flow in a distributed environment. We analyze the rules of information flow using Z language while Z3 SMT solver is used for verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g. secure secret key authentication, Chinese wall security policy and secrecy specific properties, e.g. confidentiality, integrity, authenticity.
  •  
2.
  • Alonso-Fernandez, Fernando, 1978-, et al. (författare)
  • A Comparative Study of Fingerprint Image-Quality Estimation Methods
  • 2007
  • Ingår i: IEEE Transactions on Information Forensics and Security. - New York : IEEE Press. - 1556-6013 .- 1556-6021. ; 2:4, s. 734-743
  • Tidskriftsartikel (refereegranskat)abstract
    • One of the open issues in fingerprint verification is the lack of robustness against image-quality degradation. Poor-quality images result in spurious and missing features, thus degrading the performance of the overall system. Therefore, it is important for a fingerprint recognition system to estimate the quality and validity of the captured fingerprint images. In this work, we review existing approaches for fingerprint image-quality estimation, including the rationale behind the published measures and visual examples showing their behavior under different quality conditions. We have also tested a selection of fingerprint image-quality estimation algorithms. For the experiments, we employ the BioSec multimodal baseline corpus, which includes 19 200 fingerprint images from 200 individuals acquired in two sessions with three different sensors. The behavior of the selected quality measures is compared, showing high correlation between them in most cases. The effect of low-quality samples in the verification performance is also studied for a widely available minutiae-based fingerprint matching system.
  •  
3.
  • Bhanu, Bir, et al. (författare)
  • Guest Editorial : Special Issue on Human Detection and Recognition
  • 2007
  • Ingår i: IEEE Transactions on Information Forensics and Security. - New York : IEEE Press. - 1556-6013 .- 1556-6021. ; 2:3 part 2, s. 489-490
  • Tidskriftsartikel (refereegranskat)abstract
    • The 12 regular papers and three correspondences in this special issue focus on human detection and recognition. The papers represent gait, face (3-D, 2-D, video), iris, palmprint, cardiac sounds, and vulnerability of biometrics and protection against the spoof attacks.
  •  
4.
  • Borhani, Mohammad, 1993-, et al. (författare)
  • KDC Placement Problem in Secure VPLS Networks
  • 2023
  • Ingår i: IEEE Transactions on Information Forensics and Security. - : IEEE. - 1556-6013 .- 1556-6021. ; 18, s. 1951-1962
  • Tidskriftsartikel (refereegranskat)abstract
    • Virtual Private LAN Service (VPLS) is a VPN technology that connects remote client sites with provider networks in a transparent manner. Session key-based HIPLS (S-HIPLS) is a VPLS architecture based on the Host Identity Protocol (HIP) that provides a secure VPLS architecture using a Key Distribution Center (KDC) to implement security mechanisms such as authentication, encryption etc. It exhibits limited scalability though. Using multiple distributed KDCs would offer numerous advantages including reduced workload per KDC, distributed key storage, and improved scalability, while simultaneously eliminating the single point of failure of S-HIPLS. It would also come with the need for optimally placing KDCs in the provider network. In this work, we formulate the KDC placement (KDCP) problem for a secure VPLS network as an Integer Linear Programming (ILP) problem. The latter is NP-hard, thereby suggesting a high computational cost for obtaining exact solutions especially for large deployments. Therefore, we motivate the use of a primal-dual algorithm to efficiently produce near-optimal solutions. Extensive evaluations on large-scale network topologies, such as the random Internet graph, demonstrate our method’s time-efficiency as well as its improved scalability and usefulness compared to both HIPLS and S-HIPLS.
  •  
5.
  • Cao, Phuong, et al. (författare)
  • Optimal Transmit Strategies for Gaussian MISO Wiretap Channels
  • 2018
  • Ingår i: IEEE Transactions on Information Forensics and Security. - 1556-6013 .- 1556-6021.
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)abstract
    • This paper studies the optimal tradeoff between secrecy and non-secrecy rates of the MISO wiretap channels for different power constraint settings:sum power constraint only, per-antenna power constraints only and joint sum and per-antenna power constraints. The problem is motivated by the fact thatchannel capacity and secrecy capacity are generally achieved by different transmit strategies. First, a necessary and sufficient condition to ensure a positive secrecy capacity is shown. The optimal tradeoff between secrecy rate and transmission rate is characterized by a weighted rate sum maximization problem. Since this problem is not necessarily convex, equivalent problem formulations are introduced to derive the optimal transmit strategies. Under sum power constraint only, a closed-form solution is provided. Under per-antenna power constraints, necessary conditions to find the optimal power allocation are provided. Sufficient conditions are provided for the special case of two transmit antennas. For the special case of parallel channels, the optimal transmit strategies can deduced from an equivalent point-to-point channel problem. Lastly, the theoretical results are illustrated by numerical simulations.
  •  
6.
  • Cao, Phuong, et al. (författare)
  • Optimal Transmit Strategies for Gaussian MISO Wiretap Channels
  • 2020
  • Ingår i: IEEE Transactions on Information Forensics and Security. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1556-6013 .- 1556-6021. ; 15, s. 829-838
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper studies the optimal tradeoff between secrecy and non-secrecy rates of the MISO wiretap channels for different power constraint settings: sum power constraint only, per-antenna power constraints only, and joint sum and per-antenna power constraints. The problem is motivated by the fact that channel capacity and secrecy capacity are generally achieved by different transmit strategies. First, a necessary and sufficient condition to ensure a positive secrecy capacity is shown. The optimal tradeoff between secrecy rate and transmission rate is characterized by a weighted rate sum maximization problem. Since this problem is not necessarily convex, equivalent problem formulations are introduced to derive the optimal transmit strategies. Under sum power constraint only, a closed-form solution is provided. Under per-antenna power constraints, necessary conditions to find the optimal power allocation are derived. Sufficient conditions are provided for the special case of two transmit antennas. For the special case of aligned channels, the optimal transmit strategies can deduced from an equivalent point-to-point channel problem. Last, the theoretical results are illustrated by numerical simulations.
  •  
7.
  • Chen, Guang, et al. (författare)
  • NeuroAED : Towards Efficient Abnormal Event Detection in Visual Surveillance With Neuromorphic Vision Sensor
  • 2021
  • Ingår i: IEEE Transactions on Information Forensics and Security. - : Institute of Electrical and Electronics Engineers (IEEE). - 1556-6013 .- 1556-6021. ; 16, s. 923-936
  • Tidskriftsartikel (refereegranskat)abstract
    • Abnormal event detection is an important task in research and industrial applications, which has received considerable attention in recent years. Existing methods usually rely on standard frame-based cameras to record the data and process them with computer vision technologies. In contrast, this paper presents a novel neuromorphic vision based abnormal event detection system. Compared to the frame-based camera, neuromorphic vision sensors, such as Dynamic Vision Sensor (DVS), do not acquire full images at a fixed frame rate but rather have independent pixels that output intensity changes (called events) asynchronously at the time they occur. Thus, it avoids the design of the encryption scheme. Since events are triggered by moving edges on the scene, DVS is a natural motion detector for the abnormal objects and automatically filters out any temporally-redundant information. Based on this unique output, we first propose a highly efficient method based on the event density to select activated event cuboids and locate the foreground. We design a novel event-based multiscale spatio-temporal descriptor to extract features from the activated event cuboids for the abnormal event detection. Additionally, we build the NeuroAED dataset, the first public dataset dedicated to abnormal event detection with neuromorphic vision sensor. The NeuroAED dataset consists of four sub-datasets: Walking, Campus, Square, and Stair dataset. Experiments are conducted based on these datasets and demonstrate the high efficiency and accuracy of our method.
  •  
8.
  • Choraria, Moulik, et al. (författare)
  • Design of false data injection attack on distributed process estimation
  • 2022
  • Ingår i: IEEE Transactions on Information Forensics and Security. - 1556-6021 .- 1556-6013. ; 17, s. 670-683
  • Tidskriftsartikel (refereegranskat)abstract
    • Herein, design of false data injection attack on a distributed cyber-physical system is considered. A stochastic process with linear dynamics and Gaussian noise is measured by multiple agent nodes, each equipped with multiple sensors. The agent nodes form a multi-hop network among themselves. Each agent node computes an estimate of the process by using its sensor observation and messages obtained from neighboring nodes, via Kalman-consensus filtering. An external attacker, capable of arbitrarily manipulating the sensor observations of some or all agent nodes, injects errors into those sensor observations. The goal of the attacker is to steer the estimates at the agent nodes as close as possible to a pre-specified value, while respecting a constraint on the attack detection probability. To this end, a constrained optimization problem is formulated to find the optimal parameter values of a certain class of linear attacks. The parameters of linear attack are learnt on-line via a combination of stochastic approximation based update of a Lagrange multiplier, and an optimization technique involving either the Karush-Kuhn-Tucker (KKT) conditions or online stochastic gradient descent. The problem turns out to be convex for some special cases. Desired convergence of the proposed algorithms are proved by exploiting the convexity and properties of stochastic approximation algorithms. Finally, numerical results demonstrate the efficacy of the attack.
  •  
9.
  • Do, Tan Tai, et al. (författare)
  • Jamming-Resistant Receivers for the Massive MIMO Uplink
  • 2018
  • Ingår i: IEEE Transactions on Information Forensics and Security. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1556-6013 .- 1556-6021. ; 13:1, s. 210-223
  • Tidskriftsartikel (refereegranskat)abstract
    • We design a jamming-resistant receiver scheme to enhance the robustness of a massive MIMO uplink system against jamming. We assume that a jammer attacks the system both in the pilot and data transmission phases. The key feature of the proposed scheme is that, in the pilot phase, the base station estimates not only the legitimate channel, but also the jamming channel by exploiting a purposely unused pilot sequence. The jamming channel estimate is used to construct linear receiver filters that reject the impact of the jamming signal. The performance of the proposed scheme is analytically evaluated using the asymptotic properties of massive MIMO. The best regularized zero-forcing receiver and the optimal power allocations for the legitimate system and the jammer are also studied. Numerical results are provided to verify our analysis and show that the proposed scheme greatly improves the achievable rates, as compared with conventional receivers. Interestingly, the proposed scheme works particularly well under strong jamming attacks, since the improved estimate of the jamming channel outweighs the extra jamming power.
  •  
10.
  • Fronthaler, Hartwig, et al. (författare)
  • Fingerprint Image-Quality Estimation and its Application to Multialgorithm Verification
  • 2008
  • Ingår i: IEEE Transactions on Information Forensics and Security. - New York, N.Y. : IEEE Signal Processing Society. - 1556-6013 .- 1556-6021. ; 3:2, s. 331-338
  • Tidskriftsartikel (refereegranskat)abstract
    • Signal-quality awareness has been found to increase recognition rates and to support decisions in multisensor environments significantly. Nevertheless, automatic quality assessment is still an open issue. Here, we study the orientation tensor of fingerprint images to quantify signal impairments, such as noise, lack of structure, blur, with the help of symmetry descriptors. A strongly reduced reference is especially favorable in biometrics, but less information is not sufficient for the approach. This is also supported by numerous experiments involving a simpler quality estimator, a trained method (NFIQ), as well as the human perception of fingerprint quality on several public databases. Furthermore, quality measurements are extensively reused to adapt fusion parameters in a monomodal multialgorithm fingerprint recognition environment. In this study, several trained and nontrained score-level fusion schemes are investigated. A Bayes-based strategy for incorporating experts' past performances and current quality conditions, a novel cascaded scheme for computational efficiency, besides simple fusion rules, is presented. The quantitative results favor quality awareness under all aspects, boosting recognition rates and fusing differently skilled experts efficiently as well as effectively (by training).
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 38
Typ av publikation
tidskriftsartikel (38)
Typ av innehåll
refereegranskat (37)
övrigt vetenskapligt/konstnärligt (1)
Författare/redaktör
Bigun, Josef (4)
Fierrez, Julian (3)
Fronthaler, Hartwig (3)
Kollreider, Klaus (3)
Alonso-Fernandez, Fe ... (2)
Björnson, Emil, Prof ... (2)
visa fler...
Vasilakos, Athanasio ... (2)
Ottersten, Björn, 19 ... (2)
Salimi, Somayeh (2)
Vasilakos, Athanasio ... (2)
Ortega-Garcia, Javie ... (2)
Alonso-Fernandez, Fe ... (2)
Razavizadeh, S. Moha ... (1)
Akhunzada, Adnan (1)
Aref, Mohammad Reza (1)
Chatzinotas, Symeon (1)
Han, Z. (1)
Gao, Z. (1)
Kalantari, A (1)
Larsson, Erik G (1)
Johansson, Karl H., ... (1)
Bhanu, Bir (1)
Pappas, Nikolaos, 19 ... (1)
Ström, Erik, 1965 (1)
Sandberg, Henrik (1)
Liyanage, Madhusanka (1)
Gurtov, Andrei (1)
Gurtov, Andrei, 1979 ... (1)
Venkategowda, Naveen (1)
Hanzo, Lajos (1)
Do, Tan Tai (1)
Malekian, Reza, 1983 ... (1)
Alam, Quratulain (1)
Tabbasum, Saher (1)
Malik, Saif U.R. (1)
Alam, Masoom (1)
Ali, Tamleek (1)
Khan, Samee U. (1)
Buyya, Rajkumar (1)
Karlsson, Marcus (1)
Gu, Irene Yu-Hua, 19 ... (1)
Mohapatra, Parthajit (1)
Fierrez, J. (1)
Ortega-Garcia, J. (1)
Gonzalez-Rodriguez, ... (1)
Gonzalez-Sosa, Ester (1)
Gonzalez-Rodriguez, ... (1)
Vera-Rodriguez, Rube ... (1)
Kumar, Vijay (1)
Skoglund, Mikael (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (19)
Linköpings universitet (7)
Högskolan i Halmstad (6)
Luleå tekniska universitet (4)
Chalmers tekniska högskola (2)
Örebro universitet (1)
visa fler...
Malmö universitet (1)
visa färre...
Språk
Engelska (38)
Forskningsämne (UKÄ/SCB)
Teknik (24)
Naturvetenskap (18)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy