Conferences related to Authenticity

Back to Top

2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2008 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.


2012 International Conference on Computer Science and Service System (CSSS)

open issues in all aspects of computer science and service system.


2012 2nd International Conference on Remote Sensing, Environment and Transportation Engineering (RSETE)

RSETE 2012 aims to provide a high-level international forum for researchers and engineers to present and discuss recent advances, new techniques and applications in the field of environment such as remote sensing, transportation, as well as environment engineering, etc.


2012 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc


2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

The lnternational Conference CICN 2012 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary to brainstorm for fruitful results and applications.


More Conferences

Periodicals related to Authenticity

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Control Systems Technology, IEEE Transactions on

Serves as a compendium for papers on the technological advances in control engineering and as an archival publication which will bridge the gap between theory and practice. Papers will highlight the latest knowledge, exploratory developments, and practical applications in all aspects of the technology needed to implement control systems from analysis and design through simulation and hardware.


More Periodicals


Xplore Articles related to Authenticity

Back to Top

An empirical approach for digital currency forensics

Wei Q. Yan; Jarrett Chambers 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

The banknote manufacturing industry is shrouded in secrecy, fundamental mechanics of security components are closely guarded trade secrets. Currency forensics is the application of systematic methods to determine authenticity of questioned currency. However, forensic analysis is a difficult task requiring specially trained examiners, the most important challenge is automating the analysis process reducing human error and time. In this study, ...


Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication

Cik Ku Haroswati Che Ku Yahaya; Harnani Hassan; Mohd Izwan Bin Md Kahmi 2012 International Conference on System Engineering and Technology (ICSET), 2012

In Malaysia, Halal Certificate can only be issued by Jakim. For the time being, there is no specific method to verify authentication of Halal Certificate displayed at food or service premises. Watermarking technique however, offered a solution for authenticity of the data and copyright protection. In this paper, an investigation on perceptual and robustness of least significant bit (LSB) digital ...


Long Term Trusted Archive Services

Aleksej Jerman Blazic Digital Society, 2007. ICDS '07. First International Conference on the, 2007

With the transition to paperless environment the e- business and e-government processes demand to prove the existence of data at a specific point of time and to demonstrate the integrity of the data since that time during long term periods is becoming of utmost importance. Through the course of time the true value of electronic content may simply evaporate due ...


Hash functions for information authentication

B. Preneel; R. Govaerts; J. Vandewalle CompEuro 1992 Proceedings Computer Systems and Software Engineering, 1992

The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is ...


Persistent Interoperable Security for JXTA Advertisements

Joan Arnedo-Moreno; Jordi Herrera-Joancomartí 2008 International Conference on Complex, Intelligent and Software Intensive Systems, 2008

In order to access resources within a peer-to-peer network, JXTA completely relies in the usage of advertisements published by the resource owner. This may easily lead to DoS or spoofing attacks from malicious peers by forging advertisements with false identifiers unless advertisement authenticity is provided. Furthermore, in a fully distributed environment, in order to truly isolate a malicious node, collaboration ...


More Xplore Articles

Educational Resources on Authenticity

Back to Top

eLearning

An empirical approach for digital currency forensics

Wei Q. Yan; Jarrett Chambers 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

The banknote manufacturing industry is shrouded in secrecy, fundamental mechanics of security components are closely guarded trade secrets. Currency forensics is the application of systematic methods to determine authenticity of questioned currency. However, forensic analysis is a difficult task requiring specially trained examiners, the most important challenge is automating the analysis process reducing human error and time. In this study, ...


Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication

Cik Ku Haroswati Che Ku Yahaya; Harnani Hassan; Mohd Izwan Bin Md Kahmi 2012 International Conference on System Engineering and Technology (ICSET), 2012

In Malaysia, Halal Certificate can only be issued by Jakim. For the time being, there is no specific method to verify authentication of Halal Certificate displayed at food or service premises. Watermarking technique however, offered a solution for authenticity of the data and copyright protection. In this paper, an investigation on perceptual and robustness of least significant bit (LSB) digital ...


Long Term Trusted Archive Services

Aleksej Jerman Blazic Digital Society, 2007. ICDS '07. First International Conference on the, 2007

With the transition to paperless environment the e- business and e-government processes demand to prove the existence of data at a specific point of time and to demonstrate the integrity of the data since that time during long term periods is becoming of utmost importance. Through the course of time the true value of electronic content may simply evaporate due ...


Hash functions for information authentication

B. Preneel; R. Govaerts; J. Vandewalle CompEuro 1992 Proceedings Computer Systems and Software Engineering, 1992

The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is ...


Persistent Interoperable Security for JXTA Advertisements

Joan Arnedo-Moreno; Jordi Herrera-Joancomartí 2008 International Conference on Complex, Intelligent and Software Intensive Systems, 2008

In order to access resources within a peer-to-peer network, JXTA completely relies in the usage of advertisements published by the resource owner. This may easily lead to DoS or spoofing attacks from malicious peers by forging advertisements with false identifiers unless advertisement authenticity is provided. Furthermore, in a fully distributed environment, in order to truly isolate a malicious node, collaboration ...


More eLearning Resources

IEEE-USA E-Books

  • Image and Video Processing History Recovery

    This chapter describes the most useful traces used for image and video processing history recovery, and the main forensic techniques that are based on them. The important traces are those relying on specific properties of the encoding process. However, coding artifacts are rarely the only trace of processing. Editing operations, like resizing and colour enhancement, are commonly applied to both images and video. First, the chapter introduces the existing approaches used in the forensic literature to reveal the presence of coding and editing artifacts. Then, it explains how to employ such tools to recover several parameters characterizing the processing history. The chapter presents two case studies, showing possible applications of processing history recovery to tamper detection. It shows how the illustrated forensic techniques can be applied in realistic settings to partly recover the processing history, and how this information can provide useful hints about the authenticity of the analysed media.

  • Native Stagings: Pirate Acts and the Complex of Authenticity

    This chapter contains sections titled: Staging the Native, Exclusive Indigeneity, Export Redemption, Authenticity's Complex, On Innovation and Adulteration, Augmenting Experience, Authentic Mutations

  • The CD-ROM That Would Not Be

    On July 3, 2015, the Internet awoke to a weird story. Someone had recovered a long-lost prototype of the "Super NES CD-ROM." Pictures were posted, news sites reported all kinds of things, and authenticity was discussed, questioned, proved, and disproved, all at the same time.

  • A Survey of Information AuthenticationThis work was performed at Sandia National Laboratories and supported by the u.s. Department of Energy under contract no. DEAC0476DP00789.

    In both commercial and private transactions, authentication of information (messages) is of vital concern to all of the participants. For example, the party accepting a check usually insists on corroborating identification of the issuer - authentication of the originator, or as we shall say throughout this chapter, the transmitter - and the party issuing the check not only fils in the face amount in numerals, but also writes out the amount in script, and may even go so far as to emboss that part of the check to make it more difficult for anyone to subsequently alter the face amount appearing on an instrument bearing his valid signature, that is, a primitive means of providing for the later authentication of the communication or message. Although this example illustrates the two main concerns of the participants in the authentication of information, namely, the verification that the communication was originated by the purported transmitter and that it hasn't subsequently been substituted for or altered, it fails to illustrate perhaps the most important feature in the current use of authentication. The information conveyed on the check is inextricably linked to a physical instrument, the check itself, for which there exist legally accepted protocols to establish the authenticity of the signature and the integrity of what the issuer wrote in the event of a later dispute as to whether the check is valid or the signature genuine, independent of the information content (date, amount, etc.) recorded there. The contemporary concern in authentication, though, is with situations in which the exchange involves only information, that is, in which there is no physical instrument that can later be used to corroborate the authenticity of either the transmitter's identity or of the communication.

  • Network Security and Attack Defense

    This chapter contains sections titled: Introduction Confidentiality Integrity Authenticity Nonrepudiation Freshness Availability Intrusion Detection Key Management Summary Acknowledgments References

  • Forensic Authentication of Digital Audio and Video Files

    Requests of a forensic laboratory to conduct authenticity examinations of digital audio and video files are usually based on one or more of the following reasons: legal, investigative or administrative. This chapter discusses the types of common recording devices, digital file formats and evidence requirements. Next, it talks about the physical laboratory facility, and requisite software and equipment. The chapter explains the protocols for conducting scientific authenticity examinations of digital audio and video files, including critical listening and visual reviews, data analysis and temporal/frequency analyses. The protocol used when conducting forensic authenticity examinations of digital audio and video files is based on a number of different analysis steps, as applicable, which are generally categorized as follows: hashing and cloning; playback and conversion optimization; digital data analysis; audio analyses; video analyses; and preparation of work notes. The chapter also talks about the importance of expert testimony, and provides some case examples.

  • How to Insure That Data Acquired to Verify Treaty Compliance Are TrustworthyThis chapter first appeared in the Proceedings of the IEEE, vol. 76, no. 5, May 1988.

    In a series of papers [6-8] this author has documented the evolution at the Sandia National Laboratories of a solution to the problem of how to make it possible for two mutually distrusting (and presumed deceitful) parties, the host and the monitor, to both trust a data acquisition system whose function it is to inform the monitor, and perhaps third parties, whether the host has or has not violated the terms of a treaty. The even more important question of what data will adequately show compliance (or noncompliance) and of how this data can be gathered in a way that adequately insures against deception will not be discussed here. We start by assuming that such a data acquisition system exists, and that the opportunities for deception that are the subject of this chapter lie only in the manipulation of the data itself, that is, forgery, modification, retransmission, etc. The national interests of the various participants, host, monitor and third parties, at first appear to be mutually exclusive and irreconcilable, however we will arrive at the conclusion that it is possible to simultaneously satisfy the interests of all parties. The technical device on which this resolution depends is the concatenation of two or more private authentication channels to create a system in which each participant need only trust that part of the whole that he contributed. In the resulting scheme, no part of the data need be kept secret from any participant at any time; no party, nor collusion of fewer than all of the parties can utter an undetectable forgery; no unilateral action on the part of any party can lessen the confidence of the others as to the authenticity of the data and finally third parties, that is, arbiters, can be logically persuaded of the authenticity of data. Thus, finally after nearly two decades of development a complete technical solution is in hand for the problem of trustworthy verification of treaty compliance.

  • No title

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • Authenticity Beats Eloquence

    Most experts stress the need for practice before making a presentation, but this chapter provides an anecdote illustrating the possible dangers of overpreparing and studied eloquence and losing on authenticity. Rehearsing before making a presentation probably does the most good for the most people. A quick flip through the slides just before the talk is fine, but frantic last-minute cramming will just get the presenter even more keyed up without really helping. This chapter suggests that if a person is not quite ready to face the audience, the bathroom mirror is always handy. After talking to the mirror, the person should relax. The chapter also suggests the following points for making the presentation: speaking up, standing tall, avoiding rhetoric, engaging audience, and staying in charge. The three rules of public speaking are being forthright; being brief; and being seated.



Standards related to Authenticity

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...



Jobs related to Authenticity

Back to Top

No jobs are currently tagged "Authenticity"