Conferences related to Authenticity

Back to Top

2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2008 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.


2012 6th International Conference on Application of Information and Communication Technologies (AICT)

The AICT 2012 International Conference is a forum to bring together business people, researchers, scientists, software architects, and industry professionals to discuss innovative ideas and diverse topics on next generation of ICT application.

  • 2011 5th International Conference on Application of Information and Communication Technologies (AICT)

    the 5th International Conference on Application of Information and Communication Technologies AICT2011 invites high-quality recent research results in the areas of Information and Communication ICT in Emergency services and disaster recovery, ICT in Education and businesses, ICT in Research, ICT in security, ICT in Health care services and bio-informatics, Home and Health networking, ICT in governments, Electronic commerce, Mobility and Mobile Payments, Broadband access, satellite services, rural communicat

  • 2010 4th International Conference on Application of Information and Communication Technologies (AICT)

    Areas of Information and Communication ICT in Emergency services and disaster recovery, ICT in Education and businesses, ICT in Research, ICT in security, ICT in Health care services and bio-informatics and nano-technology, Home and Health networking, ICT in governments, Electronic commerce, Mobility and Mobile Payments, Broadband access, satellite services, rural communications, Mobile and Wireless Communications, optical communications and networking, architectures, protocols, planning and design, ICT in


2008 9th International Conference for Young Computer Scientists (ICYCS)

Following the tradition and success of previous ICYCS conferences, ICYCS 2008 will provide an international forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications on all aspects of Computer Science and Technology and its related disciplines. It will feature keynote speeches, technical presentations, panel discussions and symposiums/workshops .


2008 Indian Conference On Computer Vision, Graphics & Image Processing (ICVGIP)

Topics of interest include (but are not limited to) the following. Stereo Vision, Motion and Video Analysis and compression, Sensors, Imaging Model and Simulation, Content based image retrieval, 3D Modelling and Visualization, Image based rendering, Biomedical and other applications, Image and Video processing architecture, Pattern analysis and classification



Periodicals related to Authenticity

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Technology in Biomedicine, IEEE Transactions on

Telemedicine, teleradiology, telepathology, telemonitoring, telediagnostics, 3D animations in health care, health information networks, clinical information systems, virtual reality applications in medicine, broadband technologies, and global information infrastructure design for health care.


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Medical Imaging, IEEE Transactions on

Imaging methods applied to living organisms with emphasis on innovative approaches that use emerging technologies supported by rigorous physical and mathematical analysis and quantitative evaluation of performance.


Multimedia, IEEE Transactions on

The goal of IEEE Transactions on Multimedia is to integrate all aspects of multimedia systems and technology, signal processing, and applications. It will cover various aspects of research in multimedia technology and applications including, but not limited to: circuits, algorithms and macro/micro-architectures, software, detailed design, synchronization, interaction, joint processing and coordination of multimedia and multimodal signals/data, compression, storage, retrieval, communication, ...


More Periodicals


Xplore Articles related to Authenticity

Back to Top

ISO/IEC/IEEE International Standard for Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1AE: Media access control (MAC) security - AMENDMENT 1: Galois Counter Model -- Advanced Encryption Standard-256 (GCMAES-256) Cipher Suite

ISO/IEC/ IEEE 8802-1AE First edition 2013-12-01 AMENDMENT 1 2015-05-01, 2015

This amendment specifies the GCM-AES-256 Cipher Suite as an option in addition to the existing mandatory to implement Default Cipher Suite, GCM-AES-128.


A location authentication scheme based on adjacent users

Liang Hua; Jiazhu Dai 2014 IEEE International Conference on Progress in Informatics and Computing, 2014

In recent years, LBS (Location-Based Service) have been widely used. In order to attract more users, some location service providers may unite merchants to give rewards to users who check in a place and evaluate for merchant services, and this has led to location cheating attack, where some dishonest users provide false location information to defraud the location service provider. ...


Castor: Secure Code Updates Using Symmetric Cryptosystems

Donnie H. Kim; Rajeev Gandhi; Priya Narasimhan 28th IEEE International Real-Time Systems Symposium (RTSS 2007), 2007

We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one- way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward ...


Fuzzy semantic hypernet for information authenticity controlling in electronic document circulation systems

Israil I. Jumanov; Akmal R. Akhatov 2010 4th International Conference on Application of Information and Communication Technologies, 2010

To design the methods of textual information authenticity controlling in systems of electronic document circulation authors offered the new approaches based on application the fuzzy semantic hyphernet and use of statistical and structural information redundancy. The models, algorithms and programmed-sold modules of text processing authenticity controlling system are developed for extraction of structural characteristics, formation of relations, construction of information ...


A Multi-agent Security Architecture

Rossilawati Sulaiman; Dharmendra Sharma; Wanli Ma; Dat Tran 2009 Third International Conference on Network and System Security, 2009

This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact with each other to secure ...


More Xplore Articles

Educational Resources on Authenticity

Back to Top

eLearning

ISO/IEC/IEEE International Standard for Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1AE: Media access control (MAC) security - AMENDMENT 1: Galois Counter Model -- Advanced Encryption Standard-256 (GCMAES-256) Cipher Suite

ISO/IEC/ IEEE 8802-1AE First edition 2013-12-01 AMENDMENT 1 2015-05-01, 2015

This amendment specifies the GCM-AES-256 Cipher Suite as an option in addition to the existing mandatory to implement Default Cipher Suite, GCM-AES-128.


A location authentication scheme based on adjacent users

Liang Hua; Jiazhu Dai 2014 IEEE International Conference on Progress in Informatics and Computing, 2014

In recent years, LBS (Location-Based Service) have been widely used. In order to attract more users, some location service providers may unite merchants to give rewards to users who check in a place and evaluate for merchant services, and this has led to location cheating attack, where some dishonest users provide false location information to defraud the location service provider. ...


Castor: Secure Code Updates Using Symmetric Cryptosystems

Donnie H. Kim; Rajeev Gandhi; Priya Narasimhan 28th IEEE International Real-Time Systems Symposium (RTSS 2007), 2007

We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one- way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward ...


Fuzzy semantic hypernet for information authenticity controlling in electronic document circulation systems

Israil I. Jumanov; Akmal R. Akhatov 2010 4th International Conference on Application of Information and Communication Technologies, 2010

To design the methods of textual information authenticity controlling in systems of electronic document circulation authors offered the new approaches based on application the fuzzy semantic hyphernet and use of statistical and structural information redundancy. The models, algorithms and programmed-sold modules of text processing authenticity controlling system are developed for extraction of structural characteristics, formation of relations, construction of information ...


A Multi-agent Security Architecture

Rossilawati Sulaiman; Dharmendra Sharma; Wanli Ma; Dat Tran 2009 Third International Conference on Network and System Security, 2009

This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact with each other to secure ...


More eLearning Resources

IEEE-USA E-Books

  • Native Stagings: Pirate Acts and the Complex of Authenticity

    This chapter contains sections titled: Staging the Native, Exclusive Indigeneity, Export Redemption, Authenticity's Complex, On Innovation and Adulteration, Augmenting Experience, Authentic Mutations

  • No title

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • A Survey of Information AuthenticationThis work was performed at Sandia National Laboratories and supported by the u.s. Department of Energy under contract no. DEAC0476DP00789.

    In both commercial and private transactions, authentication of information (messages) is of vital concern to all of the participants. For example, the party accepting a check usually insists on corroborating identification of the issuer - authentication of the originator, or as we shall say throughout this chapter, the transmitter - and the party issuing the check not only fils in the face amount in numerals, but also writes out the amount in script, and may even go so far as to emboss that part of the check to make it more difficult for anyone to subsequently alter the face amount appearing on an instrument bearing his valid signature, that is, a primitive means of providing for the later authentication of the communication or message. Although this example illustrates the two main concerns of the participants in the authentication of information, namely, the verification that the communication was originated by the purported transmitter and that it hasn't subsequently been substituted for or altered, it fails to illustrate perhaps the most important feature in the current use of authentication. The information conveyed on the check is inextricably linked to a physical instrument, the check itself, for which there exist legally accepted protocols to establish the authenticity of the signature and the integrity of what the issuer wrote in the event of a later dispute as to whether the check is valid or the signature genuine, independent of the information content (date, amount, etc.) recorded there. The contemporary concern in authentication, though, is with situations in which the exchange involves only information, that is, in which there is no physical instrument that can later be used to corroborate the authenticity of either the transmitter's identity or of the communication.

  • Authenticity Beats Eloquence

    Most experts stress the need for practice before making a presentation, but this chapter provides an anecdote illustrating the possible dangers of overpreparing and studied eloquence and losing on authenticity. Rehearsing before making a presentation probably does the most good for the most people. A quick flip through the slides just before the talk is fine, but frantic last-minute cramming will just get the presenter even more keyed up without really helping. This chapter suggests that if a person is not quite ready to face the audience, the bathroom mirror is always handy. After talking to the mirror, the person should relax. The chapter also suggests the following points for making the presentation: speaking up, standing tall, avoiding rhetoric, engaging audience, and staying in charge. The three rules of public speaking are being forthright; being brief; and being seated.

  • Forensic Authentication of Digital Audio and Video Files

    Requests of a forensic laboratory to conduct authenticity examinations of digital audio and video files are usually based on one or more of the following reasons: legal, investigative or administrative. This chapter discusses the types of common recording devices, digital file formats and evidence requirements. Next, it talks about the physical laboratory facility, and requisite software and equipment. The chapter explains the protocols for conducting scientific authenticity examinations of digital audio and video files, including critical listening and visual reviews, data analysis and temporal/frequency analyses. The protocol used when conducting forensic authenticity examinations of digital audio and video files is based on a number of different analysis steps, as applicable, which are generally categorized as follows: hashing and cloning; playback and conversion optimization; digital data analysis; audio analyses; video analyses; and preparation of work notes. The chapter also talks about the importance of expert testimony, and provides some case examples.

  • How to Insure That Data Acquired to Verify Treaty Compliance Are TrustworthyThis chapter first appeared in the Proceedings of the IEEE, vol. 76, no. 5, May 1988.

    In a series of papers [6-8] this author has documented the evolution at the Sandia National Laboratories of a solution to the problem of how to make it possible for two mutually distrusting (and presumed deceitful) parties, the host and the monitor, to both trust a data acquisition system whose function it is to inform the monitor, and perhaps third parties, whether the host has or has not violated the terms of a treaty. The even more important question of what data will adequately show compliance (or noncompliance) and of how this data can be gathered in a way that adequately insures against deception will not be discussed here. We start by assuming that such a data acquisition system exists, and that the opportunities for deception that are the subject of this chapter lie only in the manipulation of the data itself, that is, forgery, modification, retransmission, etc. The national interests of the various participants, host, monitor and third parties, at first appear to be mutually exclusive and irreconcilable, however we will arrive at the conclusion that it is possible to simultaneously satisfy the interests of all parties. The technical device on which this resolution depends is the concatenation of two or more private authentication channels to create a system in which each participant need only trust that part of the whole that he contributed. In the resulting scheme, no part of the data need be kept secret from any participant at any time; no party, nor collusion of fewer than all of the parties can utter an undetectable forgery; no unilateral action on the part of any party can lessen the confidence of the others as to the authenticity of the data and finally third parties, that is, arbiters, can be logically persuaded of the authenticity of data. Thus, finally after nearly two decades of development a complete technical solution is in hand for the problem of trustworthy verification of treaty compliance.

  • Network Security and Attack Defense

    This chapter contains sections titled: Introduction Confidentiality Integrity Authenticity Nonrepudiation Freshness Availability Intrusion Detection Key Management Summary Acknowledgments References

  • Image and Video Processing History Recovery

    This chapter describes the most useful traces used for image and video processing history recovery, and the main forensic techniques that are based on them. The important traces are those relying on specific properties of the encoding process. However, coding artifacts are rarely the only trace of processing. Editing operations, like resizing and colour enhancement, are commonly applied to both images and video. First, the chapter introduces the existing approaches used in the forensic literature to reveal the presence of coding and editing artifacts. Then, it explains how to employ such tools to recover several parameters characterizing the processing history. The chapter presents two case studies, showing possible applications of processing history recovery to tamper detection. It shows how the illustrated forensic techniques can be applied in realistic settings to partly recover the processing history, and how this information can provide useful hints about the authenticity of the analysed media.



Standards related to Authenticity

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...



Jobs related to Authenticity

Back to Top