networking and security - willkommen — verbundzentrale … · 2011-03-14 · improving...

15
2010 International Conference on Multimedia Information Networking and Security (MINES 2010) Nanjing, China 4-6 November 2010 Editors: Xi Chen Stefanos Gritzalis Shiguo Lian IEEE IEEE Catalog Number: CFP1096H-PRT ISBN: 978-1-4244-8626-7

Upload: dobao

Post on 26-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

2010 International Conference on

Multimedia Information

Networking and Security

(MINES 2010)

Nanjing, China

4-6 November 2010

Editors:

Xi Chen Stefanos Gritzalis

Shiguo Lian

IEEE IEEE Catalog Number: CFP1096H-PRT

ISBN: 978-1-4244-8626-7

2010 International Conference

on Multimedia Information

Networking and Security

MINES 2010

Table of Contents

Greetings from the General Chairs. xix

Greetings from the Technical Programming Committee

Chairs xxi

Organizing Committee xxiii

Reviewers xxix

Track I: Multimedia Computing and Intelligence

Optical Image and SAR Image Matching Based on Scattered Edge Feature 1

Hui Cheng

TBM: A High-Effective Monitoring Algorithm to the Quality of IPTV

Transmission 5

Zhigang Sun, Ziwen Zhang, Dong Wang, and Hua ZhangThe Color Components' Exchanging on Different Color Spaces for Image

Segmentation of Hematocyte 10

Hang Dai and Xi Li

Application Research of Voice Control in Reading Assistive Device for Visually

Impaired Persons 14

Zeng Fanfeng

Trajectory Based Sign Language Video Retrieval Using Revised String Edit

Distance 17

Shilin Zhang and Bo ZhangA New Rate Adaptive Control Algorithm for JPEG2000 23

Qi-hu Li, Yan-yan Zhang, Guo-qiang Ren, Qin-zhang Wu, and Wen-jun Han

Coordinated Multi-sensors Coverage Based on Parallelism Selection Genetic

Algorithm 28

Bin Wu and Hailin Feng

Iterative Algorithm of Fixed Points for Nonexpansive Mappings by Metric

Projections 32

Yuanheng Wang andZongsheng Sheng

V

Fast Texture Segmentation Based on Semi-local Region Descriptor and Active

Contour Driven by the Bhattacharyya Distance 35

Shanqing Zhang, Weibin Xin, and Guixu Zhang

A Multiple Description Coding Approach for Overlay Multipath Video

Streaming Based on QoE Evaluations 39

Majd Ghareeb and Cesar Viho

2PASCD: An Efficient 2-Pass Abrupt Scene Change Detection Algorithm 44

Aditya Vashistha, Rajarathnam Nallusamy, and Sanjoy Paul

A Style Transfer Algorithm of Caricature 49

Wenjuan Chen, Guoyu Sun, Haiyan Li, Qingjie Sun, and Minyong Shi

HKC: A Dictionary Training Algorithm for Sparse Representation 54

Jian Xu and Zhiguo Chang

Blind Source Separation of Audios Based on Bayesian Method 58

Jiayu An, Hut Wang, Bing Zhu, Juanjuan Cai, and Qin Zhang

A New Efficient Method of Computing MDCT in MP3 Audio Coding 63

Guixing Wu and En-hui Yang

Application of Improved Snake Model in Segmentation of Korean Pine Cone

Image 68

Su Jian-min and Wang Xiao-li

RD-Based Adaptive UEP for H.264 Video Transmission in Wireless Networks 72

Zenghua Zhao and Shubing Long

A Scalable Clustering Algorithm Based on Affinity Propagation and Normalized

Cut 77

Lei Huang, Jiabin Wang, and Xing He

An Edge-Adaptive Interpolation Algorithm for Super-Resolution Reconstruction 81

Xiao-feng Wang and He-lei Ling

Event Element Identify of Internet Context 85

Fu Chen

Hierarchical Access Control for Scalable Video Coding 89

Gui Zhang and Chun Yuan

Track II: Information Networking and Communication

Simulation and Analysis of Optimized OLSR 97

Li Zhiyuan and Hu Jinhong

Modeling the Critical Transmitting Range for Connectivity in Wireless Sensor

Networks 101

Yanhuai Qu, Jianan Fang, and Shuai ZhangA Dynamic Multi-relay Cooperation Node Selection Algorithm 106

Qin Qin, Zeng Zhimin, Zhang Tiankui, and Zhang Congqing

vi

Error-Bounded Data Compression Using Data, Temporal and Spatial

Correlations in Wireless Sensor Networks 111

Meng-Han Li, Chih-Chung Lin, Chi-Cheng Chuang, and Ray-I Chang

The Forwarding Indices of Enhanced Hypercube Networks 116

Changqing Liu and Hongmei Liu

Performance Evaluation of SigComp in MANETs 119

Yanling Wu, Yuncheng Liu, and Ming Li

Fragment Maintenance in Distributed Storage Systems 123

Xiaoyuan Yang and Shuaishuai Zhu

Research and Realization of IPv4 Virtual Service Based on the ForCES

Framework 127

Hua Wang, Bin Zhuge, and Weiming Wang

USMI: An Ultra-Node Selection Mechanism with Incentive in P2P Network 131

Huo Ying and Chen Zhigang

Equilibrium Network with Core-Periphery Architecture of Local Information

Flow 141

Xinjie Zhao, Hongwei Gao, Wenwen Li, Nana Sun, Una Sun, and Dandan Dong

Research and Implementation on QoS Routing Algorithm to Meet Multimedia

Applications 145

Huqi'ng Wang and Zhixin Sun

Packet Forwarding Based on Cooperative Game and Auction Theoryin Wireless Ad Hoc Network 149

Bo-qing Yang and Hao Sun

Modeling and Simulation of Link-16 System in Network Simulator 2 154

Zhao-xiong He andXing Liu

Improving Data Transmission Reliability with Network Coding in Wireless

Sensor Network 159

Jing Hao, Hailin Feng, and Guangxue Wu

Internet Traffic Identification Using Community Detecting Algorithm 164

Jun Cai and Shun-Zheng Yu

HTTP Proxy Server Based on Real-Time Link 169

Guang-feiDu, Zhi-hong Zhang, andXiao-ying Wu

A Novel Fixed Contention Window Backoff Algorithm for IEEE 802.11 WLAN 174

Chun Shi, Xianhua Dai, Qi Zhou, and Jianyao Nie

Vector-Based Low-Delay Forwarding Protocol for Underwater Wireless Sensor

Networks 178

Chang Su, Xiaoming Liu, and Fengju Shang

A Future Network Architecture for Resource Sharing and Service Diversity 182

Rui Li, Jianya Chen, Yunjie Liu, and Tao Huang

vii

Analyzing and Improving the Simulation Algorithm of IEEE 802.11DCF Error

Frame Model in QualNet Simulator 187

Lei Lei, Qing Zhu, Jinhua Zhou, and Weiling Cai

Management Innovation of Promoting the Development of Private Enterprise

in Hebei Province is Technology Roadmap 192

HongMei Zhang

How Can Peers Assist Each Other in Large-Scale P2P-VoD Systems 198

Yubao Zhang, Hui Wang, Pei Li, Zhihong Jiang, and Chao Gao

Mobile Awareness Based Hybrid MAC Protocol for Tactical Data Link

Networks 203

Jiqiang Tang and Youguang ZhangThe Placement Scheme for Static Nodes in a Circular WSN Area Based on

the Analysis of Density and Energy 208

Jiechao WangThe Empirical Analysis on the Information Technology Risk Control Evaluation

System in the Commercial Bank Based on URSIT Frame 213

Mingxing Li and Tongjian Zhang

Track III: Service Science and Intelligence

Analysis of Externality Based on Internet 217

Lin Zhongyan

Design and Implement of the Electric and Electronic Virtual Experiment

System 221

Shoucheng Ding, Wenhui Li, Jianhai Li, and Wanqiang Lu

A Novel Model Supporting Customization Sharing in SaaS Applications 225

Lanju Kong, Qingzhong Li, and Xuxu Zheng

Web-Service-Based Design for Rural Industry by the Local e-Government 230

Hongyan Wang, Quanyin Zhu, Jianchun Shen, and Suqun Cao

Web Services Security Policy 236

Yongsheng Zhang, Cuicui Sun, Yang Jing, and Wang Ying

A Modeling Approach on Self-Adaptive Composite Services 240

Liang Ge and Bin Zhang

IMS Management & Monitoring with eTOM Framework and Composite Web

Service 245

B. Raouyane, M. Errais, M. Bellafkih, and Mohamed Ramdani

The Adaptive Method for Closely Communicating Community Detection Based

on Ant Colony Clustering 250

Yan Liu, Lian Liu, and Junyong Luo

Automatic Term Extraction in Cryptology Based on Extension of Central String 255

Chen Shichao and Yu Bin

Optimizing Queries with Expensive Video Predicates Based on Estimation

of Attribute Cardinality 259

Lisheng Yu, Jianmei Zhang, and Shan Wang

viii

Customer Adoption of Internet Banking: An Integration of TAM with Trust,

Perceived Risk, and Quality 264

Hong-Lei Song

The Worm Propagation Model with Pulse Quarantine Strategy 269

Yu Yao, Hao Guo, Fu-xiang Gao, and Ge Yu

An Improved DTC Algorithm for Reducing Torque Ripples of PMSM Based

on Cloud Model and SVM 274

Li Ningzhou, Wei Xiaojuan, and Feng Xiaoyun

Research on Operational Strategies of B-to-C Websites Based on Experiential

Marketing 278

Tong Li and Liping Chen

Geospatial Information Security Web Service Based on Agent 283

Jing Sun, Jin Liu, Zhengquan Xu, and Zhe Wu

Improved Authentication Scheme Using Facial Recognition Scheme Based

on RFID Tag 287

Dae-Hee Seo, Jang-Mi Baek, Mi-Yeon Yoon, Jung-Wook Choi, Dong-Sub Cho,

and Yunjeong Jo

A Dynamic Data Storage Architecture for SaaS 292

Wu Shengqi, Zhang Shidong, and Kong Lanju

Apply ARX Program to Improve the Precision of the Digital Control System

of Antiaircraft Guns 297

Wang Hao-yu, Gu Xue-wen, Li Yun, Tan Zhong, and Zhu Jian-ye

Empirical Research of Mobile Reading Consumers' Behavior Intention 301

Ma Ling and Ding Lin

Improved SOM Algorithm-HDSOM Applied in Text Clustering 306

Ai-xiang Sun

Research on Software Cascading Failures 310

Wenhui Lan, Kuanjiu Zhou, Jinjin Feng, and Zongzheng Chi

Factors Affecting Privacy Disclosure on Social Network Sites: An Integrated

Model 315

Xuefeng Li and Xi Chen

Web Service Based Enterprise Mobile Information System 320

Jingjing Tao and Xi Chen

An Initial Review of Cloud Computing Services Research Development 324

Wei Zhao

Research on Vehicle Routing Problem of Cold Chain Logistics 329

Wang Ying and Chen Xi

Track IV: Multimedia Information Security

Obligation Constraints in Access Control 335

Zongda Wu, Jianfeng Lu, and Chenglang Lu

Detecting Composite JPEG Images in Transform Domain 340

Ergong Zheng, Xijian Ping, and Tao Zhang

ix

Social Networks Based Fingerprint Code: SNBFC and Its Pirates Tracing

Algorithm to Majority Attack 345

Conghuan Ye, Hefei Ling, Fuhao Zou, and Zhengding Lu

Type Redefinition Plagiarism Detection of Token-Based Comparison 351

Lifang Han, Baojiang Cui, Ru Zhang, Zhongxian Li, Jianxin Wang, and Yongle Hao

Novel Hybrid Blind Digital Image Watermarking in Cepstrum and DCT Domain 356

Piotr Lenarczyk and Zbigniew Piotrowski

A Case Study of Software Security Test Based on Defects Threat Tree

Modeling 362

Song Huang, ZhanWei Hui, Liang Wang, andXiaoMing Liu

A RSC Invariant Watermarking Scheme Utilizing Image Normalization

for Synchronization 366

Wu Jianzhen and Li Hongqin

Visual Tracking Model Based on Feature-Imagination and Its Application 370

Xiaoxiao Xu, Zhiling Wang, and Zonghai Chen

A Xen-Based Secure Virtual Disk Access-Control Method 375

Fagui Liu, Hao Zhang, and Haiyan Zhou

Blind Tampering Identification by Incorporating EFR and Calibration 379

Kaiwei Cai, Xiaolong Li, Bin Yang, and Xiaoqing Lu

N-Day Average Volume Based Time-Series Analysis for Passenger Flow

of Metro 384

Hai-yan Zhu

An Improved BPCS Steganography Based on Dynamic Threshold 388

Peipei Shi and Zhaohui Li

Drift Correction Modulation Scheme for Digital Audio Watermarking 392

Zbigniew Piotrowski

Track V: Communication and Network Security

Risk Evaluation of Network Security Based on NLPCA-RBF Neural Network 398

Jingxue Ran and Bo Xiao

An ID-Based Proxy Multi-signcryption Scheme from Pairings 403

Weiping Zuo

Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers .- 406

Chang N. Zhang, Q/'an Yu, and Xiao Wei Liu

Certificateless Ring Signature Scheme from Anonymous Subsets 413

Huaqun Wang

A New Authentication Protocol for Roaming in Wireless Mesh Networks Based

on Three-Party Key Agreement 418

Peng Xiao, Jingsha He, and Yingfang Fu

A Provably Secure Parallel Certificatelesss Ring Signcryption Scheme 423

Lijun Zhu, Futai Zhang, and Songqin Miao

X

Fully Secure Anonymous Identity-Based Encryption under Simple

Assumptions 428

Yanli Ren, Shuozhong Wang, Xinpeng Zhang, and Zhenxing Qian

Research on Context and Trust-Based Grid Service Authorization Model 433

Houren Xiong and Bin ZhangAn Approach to Analyze Covert Channel Based on Finite State Machine 438

Xiong Liu, Jian-guo Hao, and Yi-qi Dai

Formal Analysis and Improvement of Two-Factor Authenticated Key Exchange

Protocol 443

Ying Liu, Fushan Wei, and Chuangui Ma

Research and Analysis about Attack and Guard for QQ 448

Hongru Wei, Pei Xiaoqiang, Li Yaoyao, and Huang JingheResearch on Detector Generating Algorithm Based on Artificial Immune 452

Zhen Liu, Su Xu, and Jun Li

Public Key Cryptosystems from the Multiplicative Learning with Errors 456

Gu Chunsheng

Vertex-Fault-Tolerant Cycles Embedding on Enhanced Hypercube 460

Liu Yingying, Liu Hongmei, and Zhang Yanjuan

A New Hierarchical Key AuthData Management Scheme for Trusted Platform 463

Weiping Peng, Yajian Zhou, Cong Wang, Yixian Yang, and Yuan Ping

Research on XML-Based Key Management Service for Identity-Based

Cryptography 468

Tieming Chen, Jie Jiang, Bo Chen, and Wei Li

Data Exchange between Multilevel Security Management System Based Ice 473

Luo Yang and Zheng Chang-xing

A Secure Proxy Blind Signature Scheme Based on DLP 477

Binayak Kar, Pritam Prava Sahoo, and Ashok Kumar Das

Proactive Vulnerability Finding via Information Flow Tracking 481

Zhi Liu, Xiaosong Zhang, andXiongda Li

Variable Length Character N-Gram Approach for Online Writeprint

Identification 486

Jianwen Sun, Zongkai Yang, Pei Wang, and Sanya Liu

Research on Decision of Cyber Security Investment Based on EvolutionaryGame Model 491

Rong Pan and Changxin Xu

Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy

Transmission 496

Guiyi Wei, Xueli Wang, and Yuxin Mao

Extensive Design for Attack's Recognition and Resistance of Survivable

Network 501

Xu Hui, Zhu Yanqiong, and Zhou Jianmei

RBAC Permission Consistency Static Analysis Framework 506

Tao Wang, Wei-hua Li, and Zun Liu

xi

Security Analysis of Projected C*- Scheme 511

Feng Yuan, Yupu Hu, and Yan Wang

A Secure Confidential Document Model and Its Application 516

Shi-yuan Zheng and Jun Liu

Certificateless Two Party Key Agreement Protocol 520

Liu Wenhao, Xu Chunxiang, and Xu Jian

Certificate-Based Perfect Concurrent Signatures 526

Zhenjie Huang and Jianneng Chen

LT Codes with a New Degree Distribution 531

Liang Li and Jiaxiang Zhao

Concept Alignment in Attribute Based Access Control 536

Tianyang Zhou, Qingxian Wang, and Changzheng Xu

Password Protected Credentials 541

Yanjiang Yang and Feng Bao

RBAC Constraints Specification and Enforcement in Extended XACML 546

Nurmamat Helil and Kaysar Rahman

Fault Diagnosis Analysis in Large-Scale Computing Environments 551

Yan Xue and Xuefang Zhu

The Probability of Trojan Attacks on Multi-level Security Strategy Based

Network 555

Tao Yin, Lansheng Han, Chun Wan, Xiao Qu, and Yuan Li

Simulation and Analysis of LDoS Attacks 560

Jing Zhang, Bo Liu, Huaping Hu, and Lin Chen

Co-dimension 1 Bifurcations of the Delayed Internet TCP-RED Model 565

Pei Lijun, Zhang Li, and Wang Ruimin

A Security Assessment Model for E-Commerce Based on Entropy Weight

Coefficient Method 570

Bai Tao and Du GuanghuiDetection of Packet Length Based Network Steganography 574

Anand S. Nair, Arijit Sur, and Sukumar Nandi

A Novel Method of Outliers within Data Streams Based on Clustering EvolvingModel for Detecting Intrusion Attacks of Unknown Type 579

Gang Xiong and Minxia Zhang

A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy

and Security 584

Jian Shen, Dongmin Choi, Sangman Moh, and llyong Chung

Application and Research on Active Protection for Campus Network Based

on Multi-cores UTM 589

HuaQun Liu and LiangBin Zheng

Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme 593

Songqin Miao, Futai Zhang, and Lei Zhang

Defeating TCG TOCTOU Attacks in Trusted HVM 598

Xiaolin Chang, Han Zhen, JiQiang Liu, Bin Xing, and Jogesh K. Muppala

xii

Fourth-Order Finite Difference Approach for Numerical Solution of Burgers

Equation 603

Mamatimin Umar, Nurmamat Helil, and Kaysar Rahman

Special Session 1: Applications and Security in Cultural HeritageEnvironments

Segmentation and Tagging of Oracle Inscriptions Based on Lucene

and Dictionary 608

Jin-yu Kai, Na Li, and Yong-ge Liu

Constructing Classification Model with MapReduce 611

Xiangxiang Chen, Kaigui Wu, and Changze Wu

A Secure Data Management Model for Cultural Organizations 616

Vasiliki Liagkou and Paul Spirakis

ICT for Human Development in South Pacific 621

Eduard Babulak

Special Session 2: Security, Privacy and Copyright in Multimedia Social

Network

Combination Algorithm of Active and Passive Security Protection for ImageBased on Arnold Transform 625

Li Jiang and Zhengquan Xu

Analysis on Wavelet Coefficient for Image Watermarking 630

Lei Hu and Fang Wan

Text's Source Trustworthiness Detection Based on Cognitive Hash 635

Donghui Hu, Juan Zhang, Xuegang Hu, Lian Wang, Wenjie Miao,

and Zhengfeng Hou

The Design of Combined Random Number Generator 640

Xiaohui Guan and Yaguan Qian

Authentication Protocols to Support Fast Handoff for 802.11s Mesh Networks 644

Yang Wei-dong, Liu Ji-zhao, Wang Ke, and Sun Li-Ming

Special Session 3: Watermarking and Steganography in Multimedia

Image Self-Embedding with Large-Area Restoration Capability 649

Zhenxing Qian and Tong Qiao

Histogram-Based Perceptual Image Hashing in the DWT Domain 653

Shijun Xiang

Bhattacharyya Distance for Blind Image Steganalysis 658

Ke Ke, Tao Zhao, and Ou Li

A New Encryption Method Using Turbo Code 662

Qian Mao, Chuan Qin, and Decun Dong

A Novel Semi-fragile Authentication Watermarking Scheme of Color JPEG

Image in Compressed Domain 666

Qunting Yang, Tiegang Gao, and Fan Li

xiii

Robust Software Watermarking Scheme Based on Obfuscated Interpretation 671

Ying Zeng, Fenlin Liu, Xiangyang Luo, and Chunfang Yang

Reversible Data Hiding of Subsampled Model for Edge-Information Prediction 676

Guorui Feng and Lingyan Fan

Steganalysis of Analysis-by-Synthesis Compressed Speech 681

Qi Ding and Xijian Ping

A Further Study on a PVD-Based Steganography 686

Liping Ji, Xiaolong Li, Bin Yang, and Zhihong Liu

Cryptographic Secrecy Analysis of Matrix Embedding 691

Jiufen Liu, Jiayong Chen, Weiming Zhang, and Tao Han

Special Session 4: Large-Scale Multimedia Search and MiningAssociation Rule Mining with Establishment of Frequent Item Set Vectors 696

Hai-yan Zhou and Qi Hut

A Relevance Feedback System for CBIR with Long-Term Learning 700

Lu Hui, Huang Xiang-Lin, Yang Li-Fang, and Liu Min

A Fast Biological Data Mining Algorithm Based on Embedded Frequent

Subtree 705

Zhong-xue Yang

The CMVAI-File: An Efficient Approximation-Based High-Dimensional Index

Structure 710

Lihong Ye and Yuan Hua

Special Session 5: Mobile Internet and Service Innovation

Research on E-commerce Capability Evaluation Model Based on DEA 714

Yingjin Lu, Xianglan Jiang, and Jiao Lu

Analyzes IPTV Security Threats under the Triple Play 720

Liu Tibin

Virtual Resource Organization and Virtual Network Embedding across MultipleDomains 725

So Lv, Zhenkai Wang, Tao Huang, Jianya Chen, and Yunjie Liu

Municipal Solid Waste Recycle Management Information Platform Based

on Internet of Things Technology 729

Chen Tao and Li Xiang

A General Review of Mobile E-Government in China 733

Chen Su and Ma Jing

Application Model of Mobile E-Government in Wuhan Urban Circle 738

Chen Su and Zhou Pei

The Impact of KIBS on Divisions of Manufacturing Corporations: The Cases

of Japan 742

She Shuo and Akio Nagahira

xiv

Comparative Study on E-Govemment from the Perspective of Local

Government between China and the U.S 746

Zeng Yuhang

Special Session 6: Trusted Software in Information Networking

A Comprehensive Monitor Model for Self-Healing Systems 751

Dong Xikun, Wang Huiqiang, and Lv Hongwu

An Approach of Inconsistency Verification of Use Case in XML and the Model

of Verification Tool 757

Ning Jin and Jing YangResearch of Agile Software Development Based on Formal Methods 762

Anfan Zuo, Jing Yang, and Xiaowen Chen

Administrative Domain: Security Enhancement for Virtual TPM 767

Xin Jin, Li-na Wang, Rong-wei Yu, Peng Kou, and Cheng-lin Shen

The Impacts of Some Distrustable Factors on Software Quality 772

Jizhou Zhan, Xianzhong Zhou, and Jiabao Zhao

Special Session 7: Wireless Network Security

On the Security of Some Self-Healing Key Distribution Schemes 777

Huaqun WangThe Application of Trust Model in WLAN 781

Guo-Zi Sun, Jie Wei, Dan-Wei Chen, and Wei-Ming Geng

A Secure Clustering Scheme Protocol for MANET 785

Li Wang and Fei Gao

Continuum-State Communication Network Reliability Model 790

Yu Jiang, Aiqun Hu, and Yubo Song

Mobile Office Security Technology for WLAN 795

Yu Jiang, Guoqin Li, and Aiqun Hu

Study on Application of TNC Technology in Mobile Office 799

Guoqin Li, Yu Jiang, and Aiqun Hu

Implicit Security Authentication Scheme in Wireless Sensor Networks 804

Haiguang Chen, XinHua Chen, and Junyu Niu

A Promising Pairwise Key Establishment Scheme for Wireless Sensor

Networks in Hostile Environments 809

Wenqi Yu

A GSM/UMTS Selective Jamming System 813

Song Yubo, Zhou Kan, Yao Bingxin, and Chen Xi

A Partial Zero-Forcing Precoding Method for Downlink Multi-user MIMO

Channel 816

Bingxin Yao and Yubo Song

XV

Workshop 1: Second International Workshop on Network SteganographyIWNS2010

Encryption Scheme Based on Invertible Watermarking

Jinwei Wang, Yufeng Shi, and Shiguo Lian

Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless

Sensor Networks

David Martins and Herve Guyennet

Stream Control Transmission Protocol Steganography

Wojciech Frajzzek, Wojciech Mazurczyk, and Krzysztof Szczypiorski

Hiding Data in OFDM Symbols of IEEE 802.11 Networks

Krzysztof Szczypiorski and Wojciech Mazurczyk

A Steganography Method for AAC Audio Based on Escape Sequences

Yujie Wang, Li Guo, Yifang Wei, and Cuiping Wang

Retransmission Steganography Applied

Wojciech Mazurczyk, Milosz Smolarczyk, and Krzysztof Szczypiorski

Workshop 2: Service-Oriented Architecture and Services Computing -

SOASC2010

Identity-Based Authentication in Cloud Storage Sharing

Lishan Kang and Xuejie Zhang

Amalgamation of Ontologies via a Statistical Approach

Peng Liu, Gonghua Xu, Chuang Xu, Xiaoxuan Wang, and Xiaoying Wang

Similarity Matching Algorithm of Multiple Granularities Time-Series Data

Wenning Hao, Enlai Zhao, Hongjun Zhang, Gang Chen, and Shuining Zhao

Application of Bloom Filter in Grid Information Service

Xueming Li, Lijuan Peng, and Chunlin Zhang

Workshop 3: Secure Multimedia Communication and Services - SECMCS

2010

Multimedia Content Tracing Scheme Based on Tardos' Fingerprint Codes

Hongyuan Li, Guangjie Liu, Junwen Wang, Yuewei Dai, and Zhiquan Wang

Some Results on the Degenerate Criterion of Cryptographic Functions

over Finite Fields

Jihong Teng, Xiaoying Huang, and Weiming Zhang

Efficient Matrix Embedding Based on Random Linear Codes

Jiayong Chen, Yuefei Zhu, Yong Shen, and Weiming Zhang

Image Encryption Algorithm Based on DNA Sequences for the Big Image

Shihua Zhou, Qiang Zhang, andXiaopeng Wei

Image Copy-Move Forgery Detection Based on SURF

Xu Bo, Wang Junwen, Liu Guangjie, and Dai Yuewei

A Covert Channel Detection Algorithm Based on TCP Markov Model

Jiangtao Zhai, Guangjie Liu, and Yuewei Dai

xvi

Color Filter Array Synthesis in Digital Image via Dictionary Re-demosaicing 898

Sun Guangling, Shen Zhoubiao, and Chen YuejunSecure Image Delivery Scheme Using Poisson Editing 902

Chuan Qin, Jia-Hong Li, Wei-Bin Lee, andXinpeng Zhang

Image Forgery Forensics Based on Manual Blurred Edge Detection 907

Junwen Wang, Guangjie Liu, Bo Xu, Hongyuan Li, Yuewei Dai, and Zhiquan Wang

A Content Providing System with Privacy Protection 912

Shuhui Hou and Tetsutaro Uehara

An Efficient Signcryption Schemes Based on Bilinear Maps 918

Jianhong Zhang andXiuna Su

Image Splicing Detection Using Color Edge Inconsistency 923

Zhen Fang, Shuozhong Wang, andXinpeng Zhang

How Unstable Can Be a Heterogeneous Multimedia Network

under Adversarial Attacks That Change Dynamically Link Slowdowns? 927

Dimitrios Koukopoulos

Workshop 4: Multimedia Contents Analysis and Applications - MCAA 2010

Vector and Scalar Edge Extraction from Multi-spectral High Spatial Resolution

Remotely Sensed Imagery (MHSRRSI) in Weighted Color Space 932

Liu Jianhua and Mao Zhengyuan

Struts+Spring+Hibernate Integrated Framework and Its Use in Log Accounting

and Analyzing System 936

Xiafei Hao and Hongxi Tang

Design and Research of Network Video Teaching System 940

Li Qingsheng, Yang Yuxing, and Wang Jipeng

Study of Fire Recognition System Based on Dmpster-Shafer Evidence Theory 945

Jianjun Liao, Xiaotai Niu, Qiuping Guo, and Xiaoning Li

Researches on the Applications of Mass Short Messages in Hospital

Information System 949

Xiao-fan Zhao and Shun-yi Hu

A Novel Steganalysis Scheme of Digital Video 952

Su Yu, Hui-Xiang Xu, Zhi-Hong Yang, and Zhi-Chao Li

Research on the Development of Knowledge Node-based Multimedia

Courseware 957

Tian Xiping and Wang Yali

Research and Design on the Data Model Based on Archaeology GIS 961

Zhao Hong-dan and Wu Qin-xia

The Application of the Technique of 2D Fragments Stitching Based on Outline

Feature in Rejoining Oracle Bones 964

Yong-Ge Liu, Tian-Lin Wang, and Ji-Peng Wang

Function Design of Multimedia Monitoring System Based on Wireless Network 969

Li Min and Zhao Xiaofan

xvii

Research of Hybrid Positioning Based Vehicle interactive Navigation System 974

Mingke Fang, Lei Li, and Wei Huang

Author Index 979

xviii