A Brief Survey on Rootkit
Techniques in Malicious Codes
Marek R. Ogiela* and Lidia Ogiela
AGH University of Science and Technology
Al. Mickiewicza 30, PL-30-059
Krakow, Poland
{mogiela, logiela, ogiela}@agh.edu.pl
Abstract
In this publication will be proposed a new algorithm of
personal identification based on selected
non-standard visual patterns in the form of biomedical visualization. The proposed
solutions will be
illustrated on the example of using intelligent information systems applied for
extraction an unique
personal feature
vector, which next will be used for personal identity analysis. Such procedure
will
allow to support
the identification processes based on several types of visual patterns, as well
as using
feature vector in
cryptographic procedures.
Keywords: cryptography,
cognitive systems, semantic image analysis, personal identification processes
*Corresponding author: +48-12-617-38-54, Web: http://home.agh.edu.pl/~mogiela/
Journal of Internet Services and Information
Security (JISIS), 2(3/4): 148-153, November 2012 [pdf]