By Topic

2008 2nd International Conference on Anti-counterfeiting, Security and Identification

20-23 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 118
  • Committees

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • A welcome from the chairman

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • DWT and DCT combined robust watermarking algorithm based on Vector Quantization with labeled codewords

    Publication Year: 2008, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    In this paper, a novel robust audio watermarking algorithm is presented. It takes full advantage of the multi-resolution and the energy compression properties of the discrete wavelet transform (DWT) and discrete cosine transform (DCT) respectively, and embeds a pseudorandom permuted binary image in the original audio signal by vector quantization (VQ). The original audio is first transformed using... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti-fake label and security identification system based on multiple luminescent quantum dots

    Publication Year: 2008, Page(s):45 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (809 KB) | HTML iconHTML

    Recent advancements in nanomaterials have produced a new class of fluorescent labels based on the semiconductor quantum dots. The emission wavelength of quantum dots can be continuously tuned by changing the particle size or component, and a single light source can be used for simultaneous excitation of all dots with different band gaps. High-quality dots are also highly stable against photobleach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of discriminant analysis methods applied to diffractive optically variable image

    Publication Year: 2008, Page(s):26 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    As a kind of powerful anti-counterfeiting device, diffractive optically variable image (DOVI) has been developed and widely used in information security field. However, the identification of DOVI today by bare eyes is not reliable. In this paper we investigate the recognition of DOVI with machine learning method, and five kinds of algorithms, namely quadratic discriminate analysis (QDA), linear di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti-counterfeiting using phosphor PUF

    Publication Year: 2008, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1091 KB) | HTML iconHTML

    Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel discrete wavelet transform based digital watermarking scheme

    Publication Year: 2008, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB) | HTML iconHTML

    In this paper, a simple watermarking scheme for digital image authentication is proposed. The insertion of a binary watermark is accomplished by adding to the lower frequency subband of discrete wavelet transform (DWT) decomposition of host image with a random binary image obtained by random permutations. The proposed scheme is secure, fast, and is immune of the well-known quantization attack. Esp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • kd-tree based fingerprint identification system

    Publication Year: 2008, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    This paper presents an efficient fingerprint indexing algorithm that retrieves the top best matches from a huge database. It considers minutia features based on 9-dimensional index space comprised of transformation invariant information and a stable triangulation algorithm i.e 1-order Delaunay triangulation, both of which are insensitive to fingerprint distortion. It uses indexing technique based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of OLAP to the analysis of the curriculum chosen by students

    Publication Year: 2008, Page(s):97 - 100
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    With development of the scale of higher education, more and more data about curriculum chosen by students has been produced. This paper analyzes the application of data warehouse, on-line analytical processing and data mining on the analysis of curriculum chosen by students, accomplishes the design of data warehouse about universities curriculum chosen by students, extracts and transforms curricul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern matching of time series and its application to trend prediction

    Publication Year: 2008, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Trend prediction of time series is an important research. Pattern matching provides a useful way for trend prediction. We mainly focus on the subsequence matching of time series in the paper. Firstly, we present the simulated series as the imputed pattern for the pattern matching; especially build a simulated ascending triangle series. Secondly, we propose an evaluation method with the actual tren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive fragile watermark for image authentication with tampering localization

    Publication Year: 2008, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    A fragile content-based image authentication scheme with location based on integer wavelet transform is presented. In this scheme, the digest of each block is coded by a chaotic sequence to form its watermark, which is embedded in another block which selected by an ergodic matrix of a hyperchaotic sequence. The encryption further strengthens the security. That all security parameters are user depe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A path-oriented test data generation approach for automatic software testing

    Publication Year: 2008, Page(s):63 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The clonal selection (CS) algorithm is an optimization algorithm based upon the clonal selection principle in the biological immune system. This paper presents a novel approach that uses CS algorithm for path-oriented test data generation. The approach takes a selected path as a target and executes sequences of operators iteratively for test case to generate. An affinity function which is made up ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of a new software testing model

    Publication Year: 2008, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    The structural testing and functional testing are analyzed. The new software testing model is proposed that is the definition-use testing methods. The new software testing model defines coverage criterion between full path and full edge. Providing a system method to check software default, and improves the software testing efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SecureSMSPay: Secure SMS Mobile Payment model

    Publication Year: 2008, Page(s):11 - 17
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of signal of roll eccentricity based on wavelet thresholding de-noising

    Publication Year: 2008, Page(s):48 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    With the ever-increasing demand for the quality of steel plate and strip products, roll eccentricity has become an important factor affecting the product quality. In this paper, the roll eccentricity signal is modeled based on modern signal processing theory. As the data gained from the sensor contain interference, the wavelet threshold de-noising method is developed. By using wavelet analysis, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical publicly verifiable secret sharing scheme based on bilinear pairing

    Publication Year: 2008, Page(s):71 - 75
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    A practical publicly verifiable secret sharing (PVSS) is constructed based on the bilinear pairing on elliptic curves, which has all advantages of B. Schoenmakerspsila PVSS and its secret is not the form of discrete logarithm, thus this PVSS is extremely practical. Moreover, in the schemepsilas distribution of shares phase, only using bilinearity of bilinear pairing, anybody can verify whether the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-reference based semi-fragile image watermarking scheme for authentication

    Publication Year: 2008, Page(s):93 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    In this paper, a novel image watermarking scheme is proposed. With the combination of JPEG compression scheme, the watermark is embedded in to the host image by consideration of the relationship between the quantized pixels and the original pixels. Since the proposed scheme has a nice combination of JPEG compression, the proposed scheme has good robustness against JPEG compressions. The experiment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cable tension prediction of Hongfeng Lake cable-stayed bridge using BP neural network

    Publication Year: 2008, Page(s):18 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1106 KB) | HTML iconHTML

    Due to the funds problem, it is impossible to have acceleration sensors installed on bridgepsilas every cable. In order to get each cablepsilas tension, a three-layer BP neural network model is presented and the neural network with a number of measured data is trained. Using this neural network model, the cable tension can be predicted without any acceleration sensor installed. Then, the neural ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The infrared dynamic image identification based on the MOS resistance arrays

    Publication Year: 2008, Page(s):79 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1152 KB) | HTML iconHTML

    The thermoelectric characterization of MOS-based resistance arrays has been studied, including the resistance array unit and the structure of resistance arrays. The MOS resistance arrays infrared image nonuniformity was explored. A novel method based on thermal image realtime compensation has been developed, which was used to temperature infrared detector units. Arrays with 64times64 units and pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research and application of security requirements analysis methodology of information systems

    Publication Year: 2008, Page(s):30 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2813 KB) | HTML iconHTML

    Generally, the security requirements analysis is a key process of security requirements engineering which includes the elicitation, analysis, verification and management of security requirements. Based on the existing security requirements analysis theories and approaches, this paper introduces two proposals to analysis the security requirements of information systems. The first proposal based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A watermarking energy estimating model in wavelet domain

    Publication Year: 2008, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    A watermarking energy estimating model in wavelet domain is proposed in this paper. The model novelly expresses the special relationship between the watermarking energy and the PSNR(or SNR) of the watermarked image in wavelet domain, and the PSNR(or SNR) can be computed by the watermarking energy rather than by the watermarked image, so that the quality of the watermarked image can be directly con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication based on Euclidean geometry properties

    Publication Year: 2008, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    A user authentication scheme based upon the properties of Euclidean geometry properties is proposed. The center authority (CA) constructs the shared information by using both its secret and the userpsilas password in the user registration phase. Then the request message is computed by using both the userpsilas password and the registered information based on properties of Euclidean geometry and on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern recognition based on the measurements of low-frequency electromagnetic radiation

    Publication Year: 2008, Page(s):76 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    A method to measure the low-frequency electromagnetic radiation based on virtual instrument is presented in this paper. According to the virtual instrument technology, the paper employs LabView virtual instrument programming language, modulating programming method and related instruments to devise an automatic measuring system to the radiation. We use the system to measure the radiation, analyze t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auto-focusing system for microscope based on computational verb controllers

    Publication Year: 2008, Page(s):84 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    In this paper, an auto-focusing system of microscope for integrated circuits (IC) analysis is presented. In this system, the Laplacian algorithm is used as the evaluation function, which provides a reference to the degree of defocus. The auto-focusing controlling algorithm based on computational verb theory consists of two controllers designed: the moving-speed controller and the moving-direction ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.