Table of Content

    05 January 2016, Volume 2 Issue 1
    Promoting “Internet+”Action: Explanation to Cyber Security of JD
    2016, 2(1):  2-11. 
    Asbtract ( )   PDF (1695KB) ( )  
    Related Articles | Metrics
    Overview of Biometric Recognition Technology
    2016, 2(1):  12-26. 
    Asbtract ( )   PDF (13255KB) ( )  
    Related Articles | Metrics
    The identity authentication based on biometric identification technology is the demand of the development of information and economic globalization, and also one of the important technologies in governmental and commercial fields. In this paper, the fundamental principles, performance evaluation, key technologies, research status and application of biometric recognition are introduced. Through the overview of the research on different biometric recognition technologies of fingerprint, palmprint, iris, face, fingervein, and voiceprint, we compare them in term of error rate, stability, usability, processing speed, and antispoofing. Then their applications in various aspects for both identification and verification scenarios are illustrated; the fusion technology and security problem are discussed; and the industrial and national standardization is introduced. Finally, the prospects of biometric recognition technologies are discussed additionally.
    Biometric Technology and Its Application in Financial Payment Security
    2016, 2(1):  27-32. 
    Asbtract ( )   PDF (5460KB) ( )  
    References | Related Articles | Metrics
    The development of biometric technology, the improvement of financial payment security and the promotion of users payment experience have led to the development of biometric payment. This new model of payment has put forward higher requirements on the hardware and software of biometric technology. On the basis of the development of big data, cloud computing and intelligent hardware, the acquisition accuracy, processing speed and storage capacity of biological characteristics have been greatly improved, and the hardware is not the most important bottleneck in the development of biometric technology. At present, the biggest problem is how to improve the success rate and reliability of the biological payment through the optimal identification algorithm, and to find a more competitive biological recognition payment scenarios. In this paper, we first analyze the current problems and solutions of biometric identification technology and its process, based on the analysis of the application of biometric identification technology in the field of financial security.
    The Comprehensive Technology Development of Face Recognition
    2016, 2(1):  33-39. 
    Asbtract ( )   PDF (5416KB) ( )  
    References | Related Articles | Metrics
    This paper elaborates the comprehensive technology development of face recognition from the aspects of algorithm, system, standard and application. In the aspect of algorithm, the MMPPCA face recognition method and the deep learning based face recognition method are introduced. In the aspect of face recognition system, the system structure of face recognition is introduced. In the aspect of standard, the relevant standards of the public safety in our country are introduced. In the aspect of application, the paper mainly introduces the application of face recognition in public security. At the same time, this paper also combeds the development process of face recognition technology and pointes out the challenges of face recognition.
    Progress and Trends in Iris Recognition
    2016, 2(1):  40-43. 
    Asbtract ( )   PDF (3703KB) ( )  
    References | Related Articles | Metrics
    Iris recognition is very accurate and stable and has been widely applied in finance, border control and access control, etc. Much progress has been achieved both in iris imaging and recognition algorithms in the past two decades. On one hand, iris imaging devices are with further standoff distance, larger capture volume and smaller size, which greatly improves the ease of use of iris recognition systems. On the other hand, large scale applications promote the research in low quality iris image processing, fast classification and retrieval, crosssensor recognition, data security and privacy protection. In the next several years, iris recognition will present the following six trends in technology, application and industry: from near infrared to multispectral illumination, from rule based to data driven algorithm development, from passive to active user interaction, from fixed and standalone devices to mobile and connected devices, from constrained to complex applications, from disordered to standardized industry.
    Overview of Voiceprint Recognition Technology and Applications
    2016, 2(1):  44-57. 
    Asbtract ( )   PDF (12707KB) ( )  
    References | Related Articles | Metrics
    With the rapid development of information technology, how to identify a person to protect hisher personal privacy as well as information security has become a hot issue. Comparing with the traditional identity authentication, the biometric authentication technologies have the features of not being to get lost, to be stolen or forgotten when being used. The use of them is not only fast and convenient, but also accurate and reliable. Being one of the most popular biometric authentication technologies, the voiceprint recognition technology has its unique advantages in the field of remote authentication and other areas, and has attracted more and more attention. In this paper, the voiceprint recognition technology and its applications will be mainly introduced, including the fundamental concept, development history, technology applications and industrial standardizations. Various kinds of problems and corresponding solutions are overviewed, and the prospects are pointed out finally.
    A Colors Based Algorithm for License Plate Location
    2016, 2(1):  58-65. 
    Asbtract ( )   PDF (5707KB) ( )  
    References | Related Articles | Metrics
    Nowadays processing methods for license plate usually convert photos to gray scale images at first, and then find the characteristics based on the character of the edge texture for positioning. These methods do not work well on some conditions that there are the disturbance near the license plate, the instability of the light illumination and character edge gradient caused by floating dust. Then if it is in the fog and haze, these methods are more powerless. For that, in this paper a color based location algorithm is proposed, which is to select the candidate region according to the pixel color similarity and color domain in different color spaces and then based on a variety of geometric features to select the license plate region. This algorithm realizes the location of being at different light conditions, the strong interference of complex background and damaged license plates. Even in the fog and haze, this method performs excellent for those extremely blurred image.
    Webshell Detection Method Research Based on Web Log
    2016, 2(1):  66-73. 
    Asbtract ( )   PDF (5409KB) ( )  
    References | Related Articles | Metrics
    In this paper, a new method of Webshell detection based on Web log is proposed, which is based on the analysis of the server log text file, and the Webshell is detected from three angles: text feature, statistical feature and correlation feature. In the text feature, it is mainly to match the file access path and the parameters that are submitted. The experimental results show that the normal Web documents and Webshell files have obvious differences in the characteristics of the file access path and the parameters. In the statistical characteristics, the first is the comparison of the frequency of access to the file, and the experiment proved that the frequency of the Web page file access, combined with the depth of the Web page file directory, the starting time and the number of individual visitors, can accurately identify abnormal file. Page correlation is found by calculating the access of Web documents, the experiment shows that the Webshell is usually a solitary file, and the normal Web documents are clearly distinguished.
    A Malicious Code Detection Method Based on Data Mining and Machine Learning
    2016, 2(1):  74-79. 
    Asbtract ( )   PDF (4535KB) ( )  
    References | Related Articles | Metrics
    In recent years, malicious code uses flower instructions and packers and other methods to bypass the detection of antivirus software, while the identification of existing methods for variants of malicious code can not be accurate.In the view of threat of malicious code on computer security and features of fast spread and wide variety, this paper uses the data mining and machine learning method to recognize and detect malicious code. Firstly, it proposes a malicious code detection framework based on data mining and machine learning, and extracts the code features from text structure layer, byte layer and code layer respectively. Secondly, it adapts the principal component analysis to reduce the dimension of combined feature matrix. Finally, it recognizes and classifies the malicious code using various classification methods. The result shows that the accuracy rate of every classification method based on combined feature matrix is higher than 90%, and among them, the method of decision tree gets the best .It is able to achieve effective detection of variants of malicious code, and provide a very effective method for malware killing to detect the variants of malicious code.
    Research on Strategy of Malicious URL MultiLayer Filtering Detection Model
    2016, 2(1):  80-85. 
    Asbtract ( )   PDF (5042KB) ( )  
    References | Related Articles | Metrics
    Malicious URL detection is always a hot research topic in the field of Web security. This paper proposes a malicious URL multilevel filtering detection model. This model contains 4 layers of filter: black and white list filter, Naive Bayesian filter, CART decision tree filter and Support Vector Machine filter. In this paper several key strategies of multilayer filtering model are discussed, including support vector machine filter layer voting strategy; filter order strategy and filtering threshold tuning strategy. Filter voting strategies are discussed in separate voting, parallel voting and weighted parallel voting three voting methods. The filter order strategy discusses the order of the four filters. Filter threshold strategy discusses the method of determining the threshold of the filter. The validity of the above methods is verified by experiments. According to the experimental results, this paper implements a Web application.
    Study of Finger Vein Recognition Application
    2016, 2(1):  86-92. 
    Asbtract ( )   PDF (5765KB) ( )  
    References | Related Articles | Metrics
    With the national attention on public safety and information security, biometric technology has been gradually integrated into every aspect of peoples work and life. Based on the lots of advantages, such as natural living, difficult theft, difficult imitation and etc., fingervein recognition technology becomes the research focus for the research institutions and enterprises. With the development of technology, Chinas finger vein recognition technology has reached the world firstclass level.Based on the research resultsr on finger vein recognition for years, the paper has described the theory, advantage, system and terminal equipment of finger vein recognition, compared current development of the domestic and foreign finger vein recognition technology, and pointed out the future application direction of finger vein recognition. It can be predicted that the finger vein recognition can be more applied to peoples work and life.
    Chinese Speed and Strength of the Global Internet Governance
    2016, 2(1):  93-99. 
    Asbtract ( )   PDF (921KB) ( )  
    References | Related Articles | Metrics