Skip to main content

Gestalt Aspects of Security Patterns

  • Conference paper
Computational Forensics (IWCF 2010)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6540))

Included in the following conference series:

  • 1100 Accesses

Abstract

In this contribution, we discuss specific aspects of patterns appearing in a humanized context (as for example in computational security or forensics) and that are not well reflected in a pure feature-classification framework. Gestalt laws are considered as a more appropriate way to approach these aspects, but then, we would merely focus on an empiricial description of matter, where models are needed that might even guide to engineering procedures. For the provision of such procedures, pure image processing based approaches, despite half a century of research, seemingly did not much progress. A recently emerging new family of neural network architectures, based on the model of neural group processing, on the contrary, shows even in its mostly still premature state (from engineering point of view) already a much stronger relevance to the modeling of Gestalt aspects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pattern - wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/pattern

  2. Gestalt Psychology: An Introduction to New Concepts in Modern Psychology. Liveright Publishing Corporation (1992)

    Google Scholar 

  3. Hawkings, J., Blakeslee, S.: On Intelligence. Time Books (2004)

    Google Scholar 

  4. Hecht-Nielsen, R.: Cogent confabulation. Neural Networks 18(2), 111–115 (2005), http://www.sciencedirect.com/science/article/B6T08-4F8TK3Y-1/2/85d7ad6a4233d48182a0ef6c7c74e5a4

    Article  Google Scholar 

  5. Hecht-Nielsen, R.: Confabulation Theory: The Mechanism of Thought. Springer, Heidelberg (2007)

    Google Scholar 

  6. Kanisza, G.: Organization in Vision: Essays on Gestalt Perception. Praeger Publishers, Westport CT (1979)

    Google Scholar 

  7. Kinoshita, Y., Köppen, M., Yoshida, K.: Perception of image similarity considering gestalt theory. In: Proc. of International Conference of Soft Computing and Human Sciences 2007, Kitakysuhu, Japan (August 2007)

    Google Scholar 

  8. Köppen, M., Yoshida, K.: User modeling by confabulation theory. In: Proceedings of 2008 IEEE Conference on Soft Computing in Industrial Applications (SMCia 2008), June 25-27, pp. 55–59. Muroran Institute of Technology (2008)

    Google Scholar 

  9. Köppen, M., Yoshida, K., Valle, P.A.: Gestalt theory in image processing: A discussion paper. In: Proceedings 2007 IEEE Three-Rivers Workshop on Soft Computing in Industrial Applications (SMCia 2007), August 1-3, VDE Verlag, Passau (2007)

    Google Scholar 

  10. Mountcastle, V.: An organizing principle for cerebral function: The unit module and the distributed system. In: Edelman, G., Mountcastle, V. (eds.) The Mindful Brain. MIT Press, Cambridge (1978)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Köppen, M. (2011). Gestalt Aspects of Security Patterns. In: Sako, H., Franke, K.Y., Saitoh, S. (eds) Computational Forensics. IWCF 2010. Lecture Notes in Computer Science, vol 6540. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19376-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19376-7_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19375-0

  • Online ISBN: 978-3-642-19376-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics