Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717369
M. Martín, F. Sunmola, D. Lauder
The study explores the influencing factors that Radio Frequency (RF) Engineers take into consideration when assessing the likelihood of unintentional electromagnetic radiation compromising the security of Information Technology Equipment. A focus group research methodology is adopted, and the results analyzed using a cause-and-effect technique. Two focus groups of RF Engineers identified twenty-six influencing factors they considered when assessing likelihood. Through the cause-and-effect technique it was possible to categorize the factors in terms of threat, vulnerability, and impact (the three constituents of a qualitative risk calculation). This information can be used by cyber security practitioners with little or no RF experience to provide a better understanding of the significance RF Engineers place on specific factors particularly when assessing vulnerability likelihood.
{"title":"Likelihood of Unintentional Electromagnetic Emanations Compromising IT Equipment Security: Perspectives of Practitioners on Causal Factors","authors":"M. Martín, F. Sunmola, D. Lauder","doi":"10.1109/ICCST49569.2021.9717369","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717369","url":null,"abstract":"The study explores the influencing factors that Radio Frequency (RF) Engineers take into consideration when assessing the likelihood of unintentional electromagnetic radiation compromising the security of Information Technology Equipment. A focus group research methodology is adopted, and the results analyzed using a cause-and-effect technique. Two focus groups of RF Engineers identified twenty-six influencing factors they considered when assessing likelihood. Through the cause-and-effect technique it was possible to categorize the factors in terms of threat, vulnerability, and impact (the three constituents of a qualitative risk calculation). This information can be used by cyber security practitioners with little or no RF experience to provide a better understanding of the significance RF Engineers place on specific factors particularly when assessing vulnerability likelihood.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717377
Ryan Carvalho, Norbert Tihanyi
Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.
{"title":"Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate","authors":"Ryan Carvalho, Norbert Tihanyi","doi":"10.1109/ICCST49569.2021.9717377","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717377","url":null,"abstract":"Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125352188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717387
F. Garzia, F. Borghini, Luca Canfora, M. Lombardi, S. Ramalingam
The evaluation of perceived safeness and risk by persons is particularly valuable for safety and security handling. Each individual is influenced by others' opinions on safety and security and the Internet embodies the place where these opinions are mostly pursued, acquired, and estimated. From this point of view, social networks play a considerable influential role. For this reason, Opinion Mining and Sentiment Analysis have found noteworthy uses in a variety of situations and one of the most interesting is embodied by public safety and security. The goal of this work is to examine the perception of safety and risk within the railway stations of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the railway stations of London Victoria and Waterloo and the railway stations of Rome Termini and Tiburtina were considered, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents present in Twitter.
{"title":"Emotional analysis of safeness and risk perception of London and Rome railway stations during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Luca Canfora, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717387","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717387","url":null,"abstract":"The evaluation of perceived safeness and risk by persons is particularly valuable for safety and security handling. Each individual is influenced by others' opinions on safety and security and the Internet embodies the place where these opinions are mostly pursued, acquired, and estimated. From this point of view, social networks play a considerable influential role. For this reason, Opinion Mining and Sentiment Analysis have found noteworthy uses in a variety of situations and one of the most interesting is embodied by public safety and security. The goal of this work is to examine the perception of safety and risk within the railway stations of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the railway stations of London Victoria and Waterloo and the railway stations of Rome Termini and Tiburtina were considered, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"57 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717382
Dora Kotkova, L. Kralik, Lukas Kotek
This article is focused on risk analysis with the help of multi-criteria decision making. We create many risk analyses for Soft targets, and we continually try to find new methods for objective evaluation of the risks. Many risk analyses are subjective, which is a problem for planning security measures and comparing the results (other events, object, place etc.). In this article, we pre-sent our case study, which deals with the utilization of fuzzy TOPSIS. We have chosen one cate-gory of the Soft targets - the cultural events. Our goal was to find the most endangered localization for the violent attacks in the cultural event selected - musical concert. Then we started to cooperate with three experts. They filled in data in our risk analysis, and then we compared the results with practice. We have chosen fuzzy TOPSIS because we assumed this method would be more objective. In the end, this hypothesis has confirmed. The results were objectively and in line with practice.
{"title":"Multiple Criteria Decision-making: Risk Analyses for Cultural Events as one of the Soft Target Categories","authors":"Dora Kotkova, L. Kralik, Lukas Kotek","doi":"10.1109/ICCST49569.2021.9717382","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717382","url":null,"abstract":"This article is focused on risk analysis with the help of multi-criteria decision making. We create many risk analyses for Soft targets, and we continually try to find new methods for objective evaluation of the risks. Many risk analyses are subjective, which is a problem for planning security measures and comparing the results (other events, object, place etc.). In this article, we pre-sent our case study, which deals with the utilization of fuzzy TOPSIS. We have chosen one cate-gory of the Soft targets - the cultural events. Our goal was to find the most endangered localization for the violent attacks in the cultural event selected - musical concert. Then we started to cooperate with three experts. They filled in data in our risk analysis, and then we compared the results with practice. We have chosen fuzzy TOPSIS because we assumed this method would be more objective. In the end, this hypothesis has confirmed. The results were objectively and in line with practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117174154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717373
V. Smejkal, J. Kodl
The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.
{"title":"Comparative Study of Cryptographic and Biometric Signatures","authors":"V. Smejkal, J. Kodl","doi":"10.1109/ICCST49569.2021.9717373","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717373","url":null,"abstract":"The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717372
H. Bıçakcı, Marco Santopietro, Matthew James Boakes, R. Guest
Biometric authentication is nowadays widely used in a multitude of scenarios. Several studies have been conducted on electrocardiogram (ECG) for subject identification or verification among the various modalities. However, none have considered a typical implementation with a mobile device and the necessity for a fast-training model with limited recording time for the signal. This study tackles this issue by exploring various classification models on short recordings and evaluating the performance varying the sample length and the training set size. We run our tests on two public datasets collected from wearable and medical devices and propose a pipeline for ECG authentication with limited data required for competitive usage across applications.
{"title":"Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable Recorders","authors":"H. Bıçakcı, Marco Santopietro, Matthew James Boakes, R. Guest","doi":"10.1109/ICCST49569.2021.9717372","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717372","url":null,"abstract":"Biometric authentication is nowadays widely used in a multitude of scenarios. Several studies have been conducted on electrocardiogram (ECG) for subject identification or verification among the various modalities. However, none have considered a typical implementation with a mobile device and the necessity for a fast-training model with limited recording time for the signal. This study tackles this issue by exploring various classification models on short recordings and evaluating the performance varying the sample length and the training set size. We run our tests on two public datasets collected from wearable and medical devices and propose a pipeline for ECG authentication with limited data required for competitive usage across applications.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717393
A. Wolniakowski, J. J. Quintana, Moisés Díaz, K. Miatliuk, M. A. Ferrer-Ballester
Safety in industrial robotic environments is a hot research topic in the area of human-robot interaction (HRI). Up to now, a robotic arm on an assembly line interacts with other machines away from human workers. Nowadays, robotic arm manufactures are aimed to their robots could increasingly perform tasks collaborating with humans. One of the ways to improve this collaboration is by making the movement of robots more humanlike. This way, it would be easier for a human to foresee the movement of the robot and approach it without fear of contact. The main difference between the movement of a human and of a robotic arm is that the former has a bell-shaped speed profile while the latter has a uniform speed one. To generate this speed profile, the kinematic theory of rapid human movements and its Sigma-Lognormal model has been used. This model is widely used to explain most of the basic phenomena related to the control of human movements. Both human-like and robotic-like movements are transferred to the UR3 robot. In this paper we detail the how the UR3 robot was programmed to produce both kinds of movement. The dissimilarities result between the input motion and output motion to the robot confirm the possibility to develop human-like velocities in the UR3 robot.
{"title":"Towards human-like kinematics in industrial robotic arms: a case study on a UR3 robot","authors":"A. Wolniakowski, J. J. Quintana, Moisés Díaz, K. Miatliuk, M. A. Ferrer-Ballester","doi":"10.1109/ICCST49569.2021.9717393","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717393","url":null,"abstract":"Safety in industrial robotic environments is a hot research topic in the area of human-robot interaction (HRI). Up to now, a robotic arm on an assembly line interacts with other machines away from human workers. Nowadays, robotic arm manufactures are aimed to their robots could increasingly perform tasks collaborating with humans. One of the ways to improve this collaboration is by making the movement of robots more humanlike. This way, it would be easier for a human to foresee the movement of the robot and approach it without fear of contact. The main difference between the movement of a human and of a robotic arm is that the former has a bell-shaped speed profile while the latter has a uniform speed one. To generate this speed profile, the kinematic theory of rapid human movements and its Sigma-Lognormal model has been used. This model is widely used to explain most of the basic phenomena related to the control of human movements. Both human-like and robotic-like movements are transferred to the UR3 robot. In this paper we detail the how the UR3 robot was programmed to produce both kinds of movement. The dissimilarities result between the input motion and output motion to the robot confirm the possibility to develop human-like velocities in the UR3 robot.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717402
Dimitrios Kolosov, I. Mporas
Wearing face masks is one of the direct measures that can help tackling the spread of the new coronavirus. In this paper we presented an architecture for face mask wearing detection using pre-trained deep learning models for computer vision and implementation of them on embedded hardware platforms. Three object detection models were fine-tuned and optimized to run on 4 different hardware platforms. The fine tuning and optimization of the models resulted in significant reduction of the inference time, thus making the use of this technology in IoT based security systems for real-time automatic monitoring of face masks wearing realisable.
{"title":"Face Masks Usage Monitoring for Public Health Security using Computer Vision on Hardware","authors":"Dimitrios Kolosov, I. Mporas","doi":"10.1109/ICCST49569.2021.9717402","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717402","url":null,"abstract":"Wearing face masks is one of the direct measures that can help tackling the spread of the new coronavirus. In this paper we presented an architecture for face mask wearing detection using pre-trained deep learning models for computer vision and implementation of them on embedded hardware platforms. Three object detection models were fine-tuned and optimized to run on 4 different hardware platforms. The fine tuning and optimization of the models resulted in significant reduction of the inference time, thus making the use of this technology in IoT based security systems for real-time automatic monitoring of face masks wearing realisable.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"49 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717374
F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam
The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.
{"title":"Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717374","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717374","url":null,"abstract":"The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717378
Mike Rhead, Robert Gurney, W. E. Martin
This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.
{"title":"The Variable Reflective Properties of UK Number Plates and Impact on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717378","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717378","url":null,"abstract":"This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}