By Topic

Biometrics and Security Technologies (ISBAST), 2013 International Symposium on

Date 2-5 July 2013

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1001 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (366 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2013, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (368 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s):xix - xxi
    Request permission for commercial reuse | PDF file iconPDF (283 KB)
    Freely Available from IEEE
  • A Blog Clustering Approach Based on Queried Keywords

    Publication Year: 2013, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    In recent years, blogs were used between friends and family members. Nowadays, more and more bloggers are willing to share information with others. Therefore, it is desirable that related blogs can be connected. Clustering is often used for establishing connections between blogs. Full-text keywords retrieval process (FKRP) is generally used to obtain the keywords of posts, and the keywords were th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic ROI Segmentation in B-Mode Ultrasound Image for Liver Fibrosis Classification

    Publication Year: 2013, Page(s):10 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    Chronic hepatitis is one of the most important health threats worldwide. Although ultrasound is commonly used to diagnosis of various liver diseases, the accuracy of visual diagnosis is very low, and it also strongly depends on the experience of radiologist. The identification and classification of ultrasound images have become very desirable due to the rapid development of computer technology. Ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Network Analyzer Based on the Automatic Control of LabVIEW in Radio and Television Test

    Publication Year: 2013, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    A control system of network analyzer based on LabVIEW is introduced in the paper. The system connects PC and network analyzer through USB/GPIB bus, and then realizes the control operation of control instruction using SCPI control instructions, finally, completes the measurement of reflection loss, insertion loss and band flatness. The automatic test system has the advantages of high reliability an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anticipating Dormant Functionality in Malware: A Semantics Based Approach

    Publication Year: 2013, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    One of the challenges in malware analysis has been finding out the dormant functionality of the malware. Requirement of manual analysis along with code obfuscation and encryption rules out static analysis as it may not be effective and scalable in the face of continuously rising number of malware produced daily. Dynamic analysis on the other hand relies on the exhibited behavior of the malware, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Hiding Using Flexible Multi-bit MER

    Publication Year: 2013, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    Multi-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak robustness. Moreover, it is unfortunate because no literature discusses the formulations and the properties of multi-bit MEE up to this day. Therefore, this work propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Unsupervised Learning in Publish Subscribe System Design

    Publication Year: 2013, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1199 KB) | HTML iconHTML

    Skewed ness in popularity among subscriptions and events is an inherent property in publish/subscribe systems. In this paper, we propose to exploit the popularity skew by utilizing unsupervised machine learning techniques in the design of publish/subscribe systems. The design comprises three main ideas. First, similar subscriptions are clustered together using unsupervised machine learning methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Build an Automated Fingerprint Identification System

    Publication Year: 2013, Page(s):40 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    Fingerprint based identification is becoming increasingly useful and cost effective now a days to tackle growing trend of identity theft, repeat offenses, authentication frauds, medical malpractices, and unlawful access & permissions. This paper provides a historical background on the evolution of fingerprint technology and detailed the salient feature such system should possess to meet the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plug-n-Play AFIS Development for Criminal and Civil Applications

    Publication Year: 2013, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB) | HTML iconHTML

    Automated Fingerprint Identification System (AFIS) is a de-facto standard for processing of identity claims in criminal and civilian settings around the world. There are dozens of commercial organizations and vendors offering their end-to-end solutions and software development kits (SDKs) world wide, yet the development and deployment of such a system is always an uphill task due to interdisciplin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Image Watermarking Scheme Using Non-dominated Sorting Genetic Algorithm II

    Publication Year: 2013, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    In recent years, singular value decomposition has become a popular tool for image watermarking. In this paper, we propose a new blind watermarking scheme by quantizing the singular values of wavelet component. To optimize the system performance, we treat the image watermarking as a multi-objective optimization problem based on non-dominated sorting genetic algorithm II. Based on this new perspecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Backward Error Concealment for H.264/AVC Videos on Error-Prone Networks

    Publication Year: 2013, Page(s):62 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    Transmitting compressed video data is quite common over wireless and wired networks. In error-prone networks, however, packet loss can lead to incorrect decoding. With the new generation standard, H.264/AVC, such issues are prevalent and drastically degrade the quality of decoded video. To solve these problems, error concealment is applied in the decoder. However, traditional error concealment doe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Health Design of EEG Signal Classification for Epilepsy Diagnosis

    Publication Year: 2013, Page(s):67 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (930 KB) | HTML iconHTML

    Epilepsy, which is caused by abnormal discharges in the brain, is one of the most common neurological disorders. To diagnose efficiently epilepsy, it is valuable to classify electroencephalogram signal. In this paper, we proposed a new e-health design of Electroencephalogram (EEG) signal classification for epilepsy diagnosis. The design is based on support vector machine to classify electroencepha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Correlation Analysis between Breast Density and Cancer Risk Factor in Breast MRI Images

    Publication Year: 2013, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Breast cancer is one of the most common malignancy in women. Recently, the development in medical imaging technology increases the diagnosis effectiveness in predicting breast tumor in the early stage. The trend in breast cancer diagnose is to predict what kind of breast cancer could be happened instead of detecting the disease. In this paper, a breast magnetic resonance imaging is applied to comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Geocasting Forwarding Scheme for Mobile Nodes in VANETs

    Publication Year: 2013, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    In this paper, we propose a geocasting forwarding scheme for mobile nodes in vehicle ad hoc networks. Geocasting is used for sending messages to nodes in a specified area. In this paper, we invest the concept of Fermat point region, a region that the sum of distances of the vertices of the triangle to this region is minimum, to forward packets. The Fermat point regions (FPRs) are used as routing r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Implementation of Block Cipher in JCA

    Publication Year: 2013, Page(s):82 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    The structure of block ciphers can be separate to three part: algorithm, operation mode and Padding mode. Therefore the Cipher service provider interface of JCA can be improved for programmer. In this paper, we design the interface which can be used to efficiently construct the service of block cipher in JCA. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of the Travelling Time- and Energy-Efficient Android GPS Navigation App with the VANET-Based A* Route Planning Algorithm

    Publication Year: 2013, Page(s):85 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2848 KB) | HTML iconHTML

    This paper has three major contributions. First, a vehicular ad-hoc network (VANET)-based A* (VBA*) route planning algorithm is proposed to calculate the route with the shortest travelling time or the least oil consumption, depending on two real-time traffic information sources. The first one is the recorded traffic information of the road segment that the vehicle has passed through. This traffic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Multimedia Technology in Case-Based Medical E-Learning

    Publication Year: 2013, Page(s):93 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    The study proposes a new interactive-video e-learning system, and the experiment targets are medical interns. The medical interns are necessary to learn through a variety of clinical cases. The system provides the function of case-based multimedia teaching materials. The medical records are depending on different cases, and instructors can online upload and edit them. The record includes text, ima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Anonymous Car Rental System Based on NFC

    Publication Year: 2013, Page(s):97 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    In this paper, we propose an anonymous car rental protocol based on NFC technology. Our main contributions include: (1) Anonymity. Users provide their personal information to a trusted third party (TTP) only. The car hire providers cannot get users' real identity. (2) Unlink ability. Car rental companies are unable to establish any link between users' rental records and users' identity simply by a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.