IFIP TC6 Open Digital Library

13. Communications and Multimedia Security 2012: Canterbury, UK

Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings

Bart De Decker, David W. Chadwick

Springer, Lecture Notes in Computer Science 7394, ISBN: 978-3-642-32804-6



Contents

Research Papers

Robust Resampling Detection in Digital Images.

Hieu Cuong Nguyen, Stefan Katzenbeisser

 3-15

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries.

Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann

 16-25

Security Analysis of Image-Based PUFs for Anti-counterfeiting.

Saloomeh Shariati, François Koeune, François-Xavier Standaert

 26-38

Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference.

Mouhamadou L. Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya

 39-54

Data-Minimizing Authentication Goes Mobile.

Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer

 55-71

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.

Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu

 72-86

Work in Progress

Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans.

Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann

 89-98

A Method for Reducing the Risk of Errors in Digital Forensic Investigations.

Graeme Horsman, Christopher Laing, Paul Vickers

 99-106

Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance.

Tobias Scheidat, Karl Kümmel, Claus Vielhauer

 107-116

A New Approach to Commutative Watermarking-Encryption.

Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang

 117-130

Systematic Engineering of Control Protocols for Covert Channels.

Steffen Wendzel, Jörg Keller

 131-144

Efficiency of Secure Network Coding Schemes.

Elke Franz, Stefan Pfennig, André Fischer

 145-159

A New Approach for Private Searches on Public-Key Encrypted Data.

Amar Siad

 160-173

Multi-level Authentication Based Single Sign-On for IMS Services.

Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman

 174-187

Extended Abstracts

Are 128 Bits Long Keys Possible in Watermarking?

Patrick Bas, Teddy Furon

 191

Predicate-Tree Based Pretty Good Privacy of Data.

William Perrizo, Arjun G. Roy

 192-194

OOXML File Analysis of the July 22nd Terrorist Manual.

Hanno Langweg

 195-197

Privacy-Preserving Scheduling Mechanism for eHealth Systems.

Milica Milutinovic, Vincent Naessens, Bart De Decker

 198-200

Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors.

Jürgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex

 201-203

A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls.

André Zúquete, Pedro Correia, Miguel Rocha

 204-206

From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor.

Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer

 207-210

Practical Revocable Anonymous Credentials.

Jan Hajny, Lukas Malina

 211-213

Keynotes

Privacy Management in Global Organisations.

Siani Pearson

 217-237

From Panopticon to Fresnel, Dispelling a False Sense of Security.

Jon Crowcroft, Ian Brown

 238-242