- Watermarking and Steganography
- Signal Processing and Cryptography
- Multimedia Forensics
- Communications and Network Security
- Biometrics
- Applications
- Read more about Security in the Internet of Things: Information Theoretic Insights
- Log in to post comments
The emerging Internet of Things (IoT) has several salient characteristics that differentiate it from existing wireless networking architectures. These include the deployment of very large numbers of (possibly) low-complexity terminals; the need for low-latency, short-packet communications (e.g., to support automation); light or no infrastructure; and primary applications of data gathering, inference and control.
- Categories:
- Read more about REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS
- Log in to post comments
This paper proposes a new vacating room after encryption reversible data hiding scheme. Hidden data is embedded into the encrypted host image by bit-flipping a preselected bitplane of a randomly formed pixel group. The major novelty of the paper is the use of multiple predictors in an adaptive procedure for detecting between original and modified pixels. Four predictors are used on a context of four neighbors, namely the average of the four pixels, a weighted average based on local gradients, the median and the midpoint. Experimental results are provided.
- Categories:
- Read more about Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
- Log in to post comments
Performance estimation is crucial to the assessment of novel algorithms and systems. In detection error trade-off (DET) diagrams, discrimination performance is solely assessed targeting one application, where cross-application performance considers risks resulting from decisions, depending on application constraints. For the purpose of interchangeability of research results across different application constraints, we propose to augment DET curves by depicting systems regarding their support of security and convenience levels.
poster.pdf
- Categories:
- Read more about Keynote: Physical Security is from Mars, Cybersecurity is from Venus
- Log in to post comments
Corporations are dealing with the traditions of managing security in silos, leading to an increased number of attacks on things like critical infrastructure. Corporate (Physical) Security deals with facilities and building access, whereas IT Security is dealing with cybersecurity as well as system and network access. It’s as if they are living on different planets!
- Categories:
- Read more about Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics
- Log in to post comments
In this paper, we present Discriminant Correlation Analysis (DCA), a feature level fusion technique that incorporates the class associations in correlation analysis of the feature sets. DCA performs an effective feature fusion by maximizing the pair-wise correlations across the two feature sets, and at the same time, eliminating the between-class correlations and restricting the correlations to be within classes.
- Categories:
- Categories:
- Read more about Full-duplex vs. Half-duplex Secret-key Generation
- Log in to post comments
- Categories:
- Categories:
- Read more about Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics
- Log in to post comments
- Categories: