Information Security Applications
11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
Article
Digital medical images assist specialists in improving their diagnostic efficiency and in treating diseases. For example, the chest Computed Tomography (CT) images help in diagnosing the lung disease. The ches...
Article
Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. ...
Chapter and Conference Paper
Generally, there is a tradeoff between quality and computational workload required to obtain that quality. In this paper, we focus on practical issues in implementing a pig activity monitoring system. We first...
Chapter and Conference Paper
Digital medical images assist specialists in improving their diagnostic efficiency and in treating diseases. For example, the chest Computed Tomography (CT) images help in diagnosing the lung disease. The ches...
Chapter and Conference Paper
It is anticipated that high-performance handheld multi-core devices will be used as WSN processing nodes in the near future. Reducing execution time by deploying parallel applications on multi-core platforms c...
Chapter and Conference Paper
Recently, many multimedia applications can be parallelized by using multicore platforms such as CPU and GPU. In this paper, we propose a parallel processing approach for a multimedia application by using both ...
Article
Recently, with the increase of terror and crime the utilization of security surveillance systems including CCTV increases. However, the issues of privacy invasion occurred by exposing the data recorded through...
Chapter and Conference Paper
Recently, many applications can be parallelized by using multicore platforms. In this paper, we propose a load balancing technique in parallelizing an application whose first module has data independency and i...
Book and Conference Proceedings
11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
Chapter and Conference Paper
SECMPEG selectively encrypts data to protect MPEG video streams with minimum overhead. However, this scheme is known to provide only confidentiality but not integrity for data. In this paper, we apply AES-CCM ...
Article
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes impor...
Chapter and Conference Paper
Biometrics-based user authentication has several advantages over the traditional password-based systems for standalone authentication applications. However, security of biometric data is particularly important...
Chapter and Conference Paper
In ubiquitous environment, terminal-initiated traffics(e.g., sensor data streams) will become more popularized than human-initiated traffics(e.g., web browsing, file transfer, and media streaming). The characteri...
Chapter and Conference Paper
Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...
Chapter and Conference Paper
To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...
Chapter and Conference Paper
As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. Esp...
Chapter and Conference Paper
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication ar...
Chapter and Conference Paper
Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by h...
Chapter and Conference Paper
Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...
Chapter and Conference Paper
Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. ...