Skip to main content

Behavioral Keys in Cryptography and Security Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 8))

Abstract

In this paper will be presented new ways of using some behavioral features and habits for security purposes and cryptography. In particular several different solutions will be described, which present possible application of selected behavioral patterns, characteristic for particular users. Such behavioral patterns can be extracted thanks to the application of new generation cognitive vision systems. Obtained personal feature, can be next use for security reasons, as well as in cognitive cryptographic protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cox, I.J., Miller, M.L., Bloom, J., Fridrich, J., Kalker, J.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers, Burlington (2008)

    Google Scholar 

  2. Jin, Z., Teoh, A.B.J., Goi, B.-M., Tay, Y.-H.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)

    Article  Google Scholar 

  3. Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intell. 309, 347–369 (2010)

    Google Scholar 

  4. Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58–69 (2013)

    Article  Google Scholar 

  5. Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science. In: Advances in Cognitive Information Systems. Cognitive Systems Monographs, vol. 17, pp. 1–18 (2012)

    Google Scholar 

  6. Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Salerno, Italy, pp. 257–261, 10–12 September 2014

    Google Scholar 

  7. Ogiela, L., Ogiela, M.R.: Management information systems. In: Park, J., Pan, Y., Chao, H.C., Yi, G. (eds.) Ubiquitous Computing Application and Wireless Sensor. LNEE, vol. 331, pp. 449–456. Springer, Dordrecht (2015)

    Google Scholar 

  8. Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, Hainan Island, China, vol. 1, pp. 377–380, 13–15 December 2008

    Google Scholar 

  9. Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intell. 226, 13–20 (2009)

    MATH  Google Scholar 

  10. Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. In: Ślęzak, D., Kim, T., Fang, W.C., Arnett, K.P. (eds.) Security Technology. CCIS, vol. 58, pp. 35–42. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T.-h., Adeli, H. (eds.) ACN/AST/ISA/UCMA -2010. LNCS, vol. 6059, pp. 175–182. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13577-4_15

    Chapter  Google Scholar 

  12. Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London (2014)

    Book  MATH  Google Scholar 

Download references

Acknowledgments

This work has been supported by the AGH University of Science and Technology research Grant No 11.11.120.329.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ogiela, M.R., Ogiela, L. (2018). Behavioral Keys in Cryptography and Security Systems. In: Barolli, L., Woungang, I., Hussain, O. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-65636-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65636-6_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65635-9

  • Online ISBN: 978-3-319-65636-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics