A Brief Survey on Rootkit Techniques in Malicious Codes

Marek R. Ogiela* and Lidia Ogiela

 

AGH University of Science and Technology

Al. Mickiewicza 30, PL-30-059 Krakow, Poland

{mogiela, logiela, ogiela}@agh.edu.pl

 

Abstract

 

In this publication will be proposed a new algorithm of personal identification based on selected

non-standard visual patterns in the form of biomedical visualization. The proposed solutions will be

illustrated on the example of using intelligent information systems applied for extraction an unique

personal feature vector, which next will be used for personal identity analysis. Such procedure will

allow to support the identification processes based on several types of visual patterns, as well as using

feature vector in cryptographic procedures.

 

Keywords: cryptography, cognitive systems, semantic image analysis, personal identification processes

 

*Corresponding author: +48-12-617-38-54, Web: http://home.agh.edu.pl/~mogiela/


Journal of Internet Services and Information Security
(JISIS), 2(3/4): 148-153, November 2012 [pdf]