16
Yue Hao Jiming Liu Yuping Wang Yiu-ming Cheung Hujun Yin Licheng Jiao Jianfeng Ma Yong-Chang Jiao (Eds.) Computational Intelligence and Security International Conference, CIS 2005 Xi'an, China, December 15-19, 2005 Proceedings, Part II 4^ Springer

Computational intelligence ; Part 2

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Yue Hao Jiming Liu Yuping Wang

Yiu-ming Cheung Hujun Yin

Licheng Jiao Jianfeng Ma

Yong-Chang Jiao (Eds.)

ComputationalIntelligenceand Security

International Conference, CIS 2005

Xi'an, China, December 15-19, 2005

Proceedings, Part II

4^ Springer

Table of Contents - Part II

Cryptography and Coding

A Fast Inversion Algorithm and Low-Complexity Architecture over

GF(2m)Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park,

JonginLim 1

An ID-Based Optimistic Fair Signature Exchange Protocol from PairingsChunxiang Gu, Yuefei Zhu, Yajuan Zhang 9

FMS Attack-Resistant WEP Implementation Is Still Broken

Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii 17

Design of a New Kind of Encryption Kernel Based on RSA AlgorithmPing Dong, Xiangdong Shi, Jiehui Yang 27

On the Security of Condorcet Electronic Voting Scheme

Yoon Cheol Lee, Hiroshi Doi 33

Special Distribution of the Shortest Linear Recurring Sequences in

Z/(p) Field

Qian Yin, Yunlun Luo, Ping Guo 43

Cryptanalysis of a Cellular Automata CryptosystemJingmei Liu, Xiangguo Cheng, Xinmei Wang 49

A New Conceptual Framework Within Information Privacy: Meta

PrivacyGeoff Skinner, Song Han, Elizabeth Chang 55

Error Oracle Attacks on Several Modes of OperationFengtong Wen, Wenling Wu, Qiaoyan Wen 62

Stability of the Linear Complexity of the Generalized Self-shrinkingSequences

Lihua Dong, Yong Zeng, Yupu Hu 68

On the Construction of Some Optimal Polynomial Codes

Yajing Li, Weihong Chen 74

XIV Table of Contents - Part II

Perceptual Hashing of Video Content Based on Differential Block

Similarity

Xuebing Zhou, Martin Schmucker, Christopher L. Brown 80

Cryptographic Protocols

Secure Software Smartcard Resilient to Capture

Seung Wook Jung, Christoph Ruland 86

Revised Fischlin's (Blind) Signature Schemes

Kewei Lv 96

Certificateless Threshold Signature Schemes

Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian 104

An Efficient Certificateless Signature Scheme

M. Choudary Gorantla, Ashutosh Saxena 110

ID-Based Restrictive Partially Blind SignaturesXiaofeng Chen, Fangguo Zhang, Shengli Liu 117

Batch Verification with DSA-Type Digital Signatures for Ubiquitous

ComputingSeungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho 125

On Anonymity of Group Signatures

Sujing Zhou, Dongdai Lin 131

The Running-Mode Analysis of Two-Party Optimistic Fair ExchangeProtocols

Yuqing Zhang, Zhiling Wang, Bo Yang 137

Password-Based Group Key Exchange Secure Against Insider GuessingAttacks

Jin Wook Byun, Dong Boon Lee, Jongin Lim 143

On the Security of Some Password-Based Key Agreement Schemes

Qiang Tang, Chris J. Mitchell 149

A New Group Rekeying Method in Secure Multicast

Yong Xu, Yuxiang Sun 155

Pairing-Based Provable Blind Signature Scheme Without Random

Oracles

Jian Liao, Yinghao Qi, Peiwei Huang, Mention Rong 161

Table of Contents - Part II XV

Efficient ID-Based Proxy Signature and Proxy Signcryption Form

Bilinear Pairings

Qin Wang, Zhenfu Cao 167

An Identity-Based Threshold Signcryption Scheme with Semantic

Security

Changgen Peng, Xiang Li 173

A Token-Based Single Sign-On Protocol

Li Hui, Shen Ting 180

Simple Threshold RSA Signature Scheme Based on Simple Secret

SharingShaohua Tang 186

Efficient Compilers for Authenticated Group Key Exchange

Qiang Tang, Chris J. Mitchell 192

Insider Impersonation-MIM Attack to Tripartite Key AgreementScheme and an Efficient Protocol for Multiple Keys

Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto 198

Intrusion Detection

An Immune System Inspired Approach of Collaborative Intrusion

Detection System Using Mobile Agents in Wireless Ad Hoc Networks

Ki- Won Yeom, Ji-Hyung Park 204

A New User-Habit Based Approach for Early Warning of Worms

Ping Wang, Binxing Fang, Xiaochun Yun 212

A Multi-gigabit Virus Detection Algorithm Using Ternary CAM

Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon 220

Sampling Distance Analysis of Gigantic Data Mining for Intrusion

Detection Systems

Yong Zeng, Jianfeng Ma 228

Hardware-Software Hybrid Packet Processing for Intrusion Detection

SystemsSaraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan. . . 236

D-S Evidence Theory and Its Data Fusion Application in Intrusion

Detection

Junfeng Tian, Weidong Zhao, Ruizhong Du 244

XVI Table of Contents - Part II

A New Network Anomaly Detection Technique Based on Per-Flow and

Per-Service Statistics

Yuji Waizumi, Daisuke Kudo, Nei Koto, Yoshiaki Nemoto 252

SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention

System and Its Implementation

SeongJe Cho, Hye-Young Chang, HongGeun Kim,

WoongChul Choi 260

A Statistical Model for Detecting Abnormality in Static-Priority

Scheduling Networks with Differentiated Services

Ming Li, Wei Zhao 267

Tamper Detection for Ubiquitous RFID-Enabled Supply Chain

Vidyasagar Potdar, Chen Wu, Elizabeth Chang 273

Measuring the Histogram Feature Vector for Anomaly Network Traffic

WeiYan 279

Efficient Small Face Detection in Surveillance Images Using MajorColor Component and LDA Scheme

Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn 285

Fast Motion Detection Based on Accumulative Optical Flow and

Double Background Model

Jin Zheng, Bo Li, Bing Zhou, Wei Li 291

Reducing Worm Detection Time and False Alarm in Virus Throttling

Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi 297

Protection Against Format String Attacks by Binary RewritingJin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi,

Sang Jun Lee, Byung Ki Kim 303

Masquerade Detection System Based on Principal Component Analysisand Radial Basics Function

Zhanchun Li, Zhitang Li, Yao Li, Bin Liu 309

Anomaly Detection Method Based on HMMs Using System Call and

Call Stack Information

Cheng Zhang, Qinke Peng 315

Parallel Optimization Technology for Backbone Network Intrusion

Detection System

Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen 322

Table of Contents - Part II XVII

Attack Scenario Construction Based on Rule and Fuzzy ClusteringLinru Ma, Lin Yang, Jianxin Wang 328

A CBR Engine Adapting to IDS

Lingjuan Li, Wenyu Tang, Ruchuan Wang 334

Application of Fuzzy Logic for Distributed Intrusion Detection

Hee Suk Seo, Tat Ho Cho 340

Security Models and Architecture

Dynamic Access Control for Pervasive Grid Applications

Syed Naqvi, Michel Riguidel 348

On the Security of the Canetti-Krawczyk Model

Xinghua Li, Jianfeng Ma, SangJae Moon 356

A Novel Architecture for Detecting and Defending AgainstFlooding-Based DDoS Attacks

Yi Shi, Xinyu Yang 364

A Variant of Poly1305 MAC and Its Security Proof

Dayin Wang, Dongdai Lin, Wenling Wu 375

Covert Channel Identification Founded on Information Flow Analysis

Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li 381

Real-Time Risk Assessment with Network Sensors and Intrusion

Detection SystemsAndre Ames, Karin Sallhammar, Kjetil Haslum, T0nnes Brekne,Marie Elisabeth Gaup Moe, Svein Johan Knapskog 388

Design and Implementation of a Parallel Crypto Server

Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou 398

Survivability Computation of Networked Information SystemsXuegang Lin, Rongsheng Xu, Miaoliang Zhu 407

Assessment of Windows System Security Using Vulnerability

Relationship GraphYongzheng Zhang, Binxing Fang, Yue Chi, Xiaochun Yun 415

A New (t, n)-Threshold Multi-secret Sharing Scheme

HuiXian Li, ChunTian Cheng, LiaoJun Pang 421

XVIII Table of Contents - Part II

An Efficient Message Broadcast Authentication Scheme for Sensor

Networks

Sang-ho Park, Taekyoung Kwon 427

Digital Image Authentication Based on Error-Correction Codes

Fan Zhang, Xinhong Zhang, Zhiguo Chen 433

Design and Implementation of Efficient Cipher Engine for IEEE 802.1li

Compatible with IEEE 802.1 In and IEEE 802.lie

Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park,

Ohyoung Song 439

Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme

Shanshan Duan, Zhenfu Cao, Yuan Zhou 445

Building Security Requirements Using State Transition Diagram at

Security Threat Location

Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi,

Sang Jun Lee, Byung Ki Kim 451

Study on Security iSCSI Based on SSH

Weiping Liu, Wandong Cai 457

A Scheduling Algorithm Based on a Trust Mechanism in Grid

Kenli Li, Yan He, Renfa Li, Tao Yang 463

Enhanced Security and Privacy Mechanism of RFID Service for

Pervasive Mobile Device

Byungil Lee, Howon Kim 469

Worm Propagation Modeling and Analysis on Network

Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma .... 476

An Extensible AAA Infrastructure for IPv6

Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu 482

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.Hi

Fan Zhang, Jianfeng Ma, SangJae Moon 488

A Noble Key Pre-distribution Scheme with LU Matrix for Secure

Wireless Sensor Networks

Chang Won Park, Sung Jin Choi, Hee Yong Youn 494

Table of Contents - Part II XIX

Security Management

A Virtual Bridge Certificate Authority Model

Haibo Tian, Xi Sun, Yumin Wang 500

Weak Signals in Information Security ManagementJorma Kajava, Reijo Savola, Rauno Varonen 508

PDTM: A Policy-Driven Trust Management Framework in Distributed

SystemsWu Liu, Haixin Duan, Jianping Wu, Xing Li 518

Methodology of Quantitative Risk Assessment for Information System

Security

Mengquan Lin, Qiangmin Wang, Jianhua Li 526

A Secure and Efficient (t, n) Threshold Verifiable Multi-secret SharingScheme

Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie 532

Improvement on an Optimized Protocol for Mobile Network

Authentication and SecurityChinChen Chang, JungSan Lee 538

Neural Network Based Flow Forecast and Diagnosis

Qianmu Li, Manwu Xu, Hong Zhang, Fengyu Liu 542

Protecting Personal Data with Various Granularities: A Logic-BasedAccess Control Approach

Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai,Yoshinari Kanamori, Cherri M. Pancake 548

Enhancement of an Authenticated Multiple-Key Agreement Protocol

Without Using Conventional One-Way Function

Huifeng Huang, Chinchen Chang 554

Topology-Based Macroscopical Response and Control Technology for

Network Security Event

Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang 560

Watermarking and Information Hiding

Adaptive Hiding Scheme Based on VQ-Indices Using Commutable

Codewords

Chinchen Chang, Chiachen Lin, Junbin Yeh 567

XX Table of Contents - Part II

Reversible Data Hiding for Image Based on Histogram Modification of

Wavelet Coefficients

Xiaoping Liang, Xiaoyun Wu, Jiwu Huang 573

An Image Steganography Using Pixel Characteristics

Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon...

581

Alternatives for Multimedia Messaging System SteganographyKonstantinos Papapanagiotou, Emmanouel Kellinis,Giannis F. Marias, Panagiotis Georgiadis 589

Error Concealment for Video Transmission Based on WatermarkingShuai Wan, Yilin Chang, Fuzheng Yang 597

Applying the AES and Its Extended Versions in a General Framework

for Hiding Information in Digital ImagesTran Minh Triet, Duong Anh Due 605

An Image Hiding Algorithm Based on Bit Plane

Bin Liu, Zhitang Li, Zhanchun Li 611

A Blind Audio Watermarking Algorithm Robust AgainstSynchronization Attack

Xiangyang Wang, Hong Zhao 617

Semi-fragile Watermarking Algorithm for Detection and Localization

of Temper Using Hybrid Watermarking Method in MPEG-2 Video

Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong 623

Public Watermarking Scheme Based on Multiresolution Representationand Double Hilbert Scanning

Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou,

Licong Chen 629

Performance Evaluation of Watermarking Techniques for Secure

Multimodal Biometric Systems

Daesung Moon, Taehae Kim, SeungHwan Jung, Yongwha Chung,Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim 635

An Improvement of Auto-correlation Based Video WatermarkingScheme Using Independent Component Analysis

Seong- Whan Kim, Hyun-Sung Sung 643

A Digital Watermarking Technique Based on Wavelet PackagesChen Xu, Weiqiang Zhang, Francis R. Austin 649

Table of Contents - Part II XXI

A Spectral Images Digital Watermarking AlgorithmLong Ma, Changjun Li, Shuni Song 655

Restoration in Secure Text Document Image Authentication UsingErasable Watermarks

Niladri B. Puhan, Anthony T.S. Ho 661

Web and Network Applications

The Study of RED Algorithm Used Multicast Router Based Buffer

Management

Won-Hyuck Choi, Doo-Hyun Kim, Kwnag-Jae Lee,

Jung-Sun Kim 669

Genetic Algorithm Utilized in Cost-Reduction Driven Web Service

Selection

Lei Cao, Jian Cao, Minglu Li 679

MacroOS: A Pervasive Computing Platform Supporting Context

Awareness and Context ManagementXiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan 687

A Frame for Selecting Replicated Multicast Servers Using Genetic

Algorithm

Qin Liu, Chanle Wu 695

On a Novel Methodology for Estimating Available Bandwidth AlongNetwork Paths

Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu 703

A New AQM Algorithm for Enhancing Internet Capability AgainstUnresponsive Flows

Liyuan Zhao, Keqin Liu, Jun Zheng 711

Client Server Access: Wired vs. Wireless LEO Satellite-ATM

Connectivity; A (MS-Ro-BAC) ExperimentTerry C. House 719

An Algorithm for Automatic Inference of Referential Integrities DuringTranslation from Relational Database to XML Schema

Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik 725

A Fuzzy Integral Method to Merge Search Engine Results on Web

Shuning Cui, Boqin Feng 731

XXII Table of Contents - Part II

The Next Generation PARLAY X with QoS/QoESungjune Hong, Sunyoung Han 737

A Design of Platform for QoS-Guaranteed Multimedia Services

Provisioning on IP-Based Convergence Network

Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim 743

Introduction of Knowledge Management System for Technical Supportin Construction Industries

Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim 749

An Event Correlation Approach Based on the Combination of IHU and

Codebook

Qiuhua Zheng, Yuntao Qian 757

Image and Signal Processing

Face Recognition Based on Support Vector Machine Fusion and

Wavelet Transform

Bicheng Li, Hujun Yin 764

A Dynamic Face and Fingerprint Fusion System for IdentityAuthentication

Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li 772

Image Recognition for Security Verification Using Real-Time Joint

Transform Correlation with Scanning Technique

Kyu B. Doh, Jungho Ohn, Ting-C Poon 780

Binarized Revocable Biometrics in Face Recognition

Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling 788

Short Critical Area Computational Method Using Mathematical

Morphology

Junping Wang, Yue Hao 796

A Robust Lane Detection Approach Based on MAP Estimate and

Particle Swarm OptimizationYong Zhou, Xiaofeng Hu, Qingtai Ye 804

MFCC and SVM Based Recognition of Chinese Vowels

Fuhai Li, Jinwen Ma, Dezhi Huang 812

Table of Contents - Part II XXIII

A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification

in the DCT Domain

Zhe-Ming Lu, Hui Pei, Hans Burkhardt 820

Removing of Metal Highlight Spots Based on Total Variation Inpaintingwith Multi-sources-flashing

Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang 826

Component-Based Online Learning for Face Detection and Verification

Kyoung-Mi Lee 832

SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image

Compression

Wenbing Fan, Jing Chen, Jina Zhen 838

Modified EZW Coding for Stereo Residual

Han-Suh Koo, Chang-Sung Jeong 845

Optimal Prototype Filters for Near-Perfect-Reconstruction

Cosine-Modulated Filter Banks

Xuemei Xie, Guangming Shi, Xuyang Chen 851

Fast Motion Estimation Scheme for Real Time Multimedia Streamingwith H.264

Chan Lim, Hyun-Soo Kang, Tae- Yong Kim 857

Motion-Compensated 3D Wavelet Video Coding Based on Adaptive

Temporal Lifting Filter Implementation

Guiguang Ding, Qionghai Dai, Wenli Xu 863

Accurate Contouring Technique for Object Boundary Extraction in

Stereoscopic ImageriesShin Hyoung Kim, Jong Whan Jang, Seung Phil Lee,Jae Ho Choi 869

Robust Object Tracking Based on Uncertainty Factorization SubspaceConstraints Optical Flow

Yunshu Hou, Yanning Zhang, Rongchun Zhao 875

Bearings-Only Target Tracking Using Node Selection Based on an

Accelerated Ant Colony OptimizationBenlian Xu, Zhiquan Wang 881

Image Classification and Delineation of FragmentsWeixing Wang 887

XXIV Table of Contents - Part II

A Novel Wavelet Image Coding Based on Non-uniform Scalar

Quantization

Guoyuo Wang, Wentao Wang 893

A General Image Based Nematode Identification System Design

Bai- Tao Zhou, Won Nah, Kang- Woong Lee, Joong-Hwan Baek 899

A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for

CDMA Systems

Ling Zhang, Xian-Da Zhang 905

New Electronic Digital Image Stabilization Algorithm in Wavelet

Transform Domain

Jung-Youp Suk, Gun-Woo Lee, Kuhn-Ii Lee 911

Line Segments and Dominate Points Detection Based on Hough

Transform

Z.W. Liao, S.X. Hu, T.Z. Huang 917

The Study of the Auto Color Image SegmentationMan Zhuang, Haifeng Du, Jinhua Zhang, Sun'an Wang 923

Regularized Image Restoration by Means of Fusion for Digital Auto

FocusingVivek Maik, Jeongho Shin, Joonki Paik 929

Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature

Points Detection

Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye,

Yong-Deak Kim 935

Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN

Estimation

Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu 941

SUSAN Window Based Cost Calculation for Fast Stereo Matching

Kyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong 947

An Efficient Adaptive De-blocking Algorithm

Zhiliang Xu, Shengli Xie, Youjun Xiang 953

Facial Features Location by Analytic Boosted Cascade Detector

Lei Wang, Beiji Zou, Jiaguang Sun 959

Table of Contents - Part II XXV

New Approach for Segmentation and Pattern Recognition of Jacquard

ImagesZhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo,

Jinxiang Dong

Nonstationarity of Network Traffic Within Multi-scale Burstiness

Constraint

Jinwu Wei, Jiangxing Wu

Principle of Image Encrypting Algorithm Based on Magic Cube

Transformation

Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan,

Guanjun Bao

A Study on Motion Prediction and Coding for In-Band Motion

Compensated Temporal Filtering

Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong

Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis

Entropy

Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert....

Applications

Incremental Fuzzy Decision Tree-Based Network Forensic System

Zaiqiang Liu, Dengguo Feng 995

Robust Reliable Control for a Class of Fuzzy Dynamic Systems with

Time-Varying Delay

Youqing Wang, Donghua Zhou 1003

Using Concept Taxonomies for Effective Tree Induction

Hong Yan Yi, B. de la Iglesia, V.J. Rayward-Smith 1011

A Similarity-Based Recommendation Filtering Algorithm for

Establishing Reputation-Based Trust in Peer-to-Peer Electronic

Communities

Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen ...1017

Automatic Classification of Korean Traditional Music Using Robust

Multi-feature Clustering

Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh 1025

A Private and Efficient Mobile Payment Protocol

Changjie Wang, Ho-fung Leung 1030

965

971

977

983

989

XXVI Table of Contents - Part II

Universal Designated-Verifier Proxy Blind Signatures for E-Commerce

Tianjie Cao, Dongdai Lin, Rui Xue 1036

An Efficient Control Method for Elevator Group Control SystemUlvi Dagdelen, Aytekin Bagis, Dervis Karaboga 1042

Next Generation Military Communication Systems Architecture

Qijian Xu, Naitong Zhang, Jie Zhang, Yu Sun 1048

Early Warning for Network Worms

Antti Tikkanen, Teemupekka Virianen 1054

Skeleton Representation of Character Based on Multiscale ApproachXinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang,Yuan Yan Tang 1060

Channel Equalization Based on Two Weights Neural Network

Wenming Cao, Wanfang Chai, Shoujue Wang 1068

Assessment of Uncertainty in Mineral Prospectivity Prediction UsingInterval Neutrosophic Set

Pawalai Kraipeerapun, Chun Che Fung, Warick Brown 1074

Ring-Based Anonymous Fingerprinting Scheme

Qiang Lei, Zhengtao Jiang, Yumin Wang 1080

Scalable and Robust Fingerprinting Scheme Using Statistically Secure

Extension of Anti-collusion Code

Jae-Min Seol, Seong-Whan Kim 1086

Broadcast Encryption Using Identity-Based Public-Key CryptosystemLv Xixiang, Bo Yang 1092

Multimedia Digital Right Management Using Selective Scrambling for

Mobile Handset

Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin,Sung-JeaKo 1098

Design and Implementation of Crypto Co-processor and Its Applicationto Security Systems

Ho Won Kim, Mun-Kyu Lee, Dong-Kyue Kim, Sang-Kyoon Chung,Kyoil Chung 1104

Continuous Speech Research Based on HyperSausage Neuron

Wenming Cao, Jianqing Li, Shoujue Wang 1110

Table of Contents - Part II XXVII

Variable-Rate Channel Coding for Space-Time Coded MIMO System

Changcai Han, Dongfeng Yuan 1116

A New Watermarking Method Based on DWT

Xiang-chu Feng, Yongdong Yang 1122

Efficient Point Rendering Method Using Sequential Level-of-Detail

Daniel Kang, Byeong-Seok Shin 1127

Construction of a Class of Compactly Supported Biorthogonal MultipleVector-Valued Wavelets

Tongqi Zhang, Qingjiang Chen 1134

Metabolic Visualization and Intelligent Shape Analysis of the

HippocampusYoo-Joo Choi, Jeong-Sik Kirn, Min-Jeong Kim, Soo-Mi Choi,

Myoung-~H.ee Kim 1140

Characteristic Classification and Correlation Analysis of Source-Level

Vulnerabilities in the Linux Kernel

Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee,

Young Ik Eom 1149

Author Index 1157