首页 > 最新文献

2019 Eighth International Conference on Emerging Security Technologies (EST)最新文献

英文 中文
Usability of Skin Texture Biometrics for Mixed-Resolution Images 混合分辨率图像皮肤纹理生物识别的可用性
Pub Date : 2019-08-22 DOI: 10.1109/EST.2019.8806212
H. Alsufyani, Sanaul Hoque, F. Deravi
There is a growing demand for alternative biometric modalities that can handle various real world challenges such as recognizing partially occluded individuals. Skin texture has been proposed as a potential alternative; however, such skin texture analysis can become difficult when captured images are at varying resolutions (due to different distances or devices). This paper explores the prospect of using mixed-resolution facial skin images as a source of biometric information. The four facial skin regions investigated here are the forehead, right cheek, left cheek, and chin which were selected because at least one of these are expected to be captured in real-world scenarios. The proposed framework first localises and assesses the usability of the extracted region of interest (ROI) for subsequent analysis. Local Binary Pattern (LBP) descriptors are then used for feature matching because of their reported effectiveness in extracting skin texture information. Experiments conducted using the XM2VTS database suggest that mixed resolution skin texture images can provide adequate information for biometric applications.
对替代生物识别模式的需求日益增长,这些模式可以处理各种现实世界的挑战,例如识别部分遮挡的个体。皮肤纹理被认为是一种潜在的替代方案;然而,当捕获的图像以不同的分辨率(由于不同的距离或设备)时,这种皮肤纹理分析可能会变得困难。本文探讨了使用混合分辨率面部皮肤图像作为生物特征信息来源的前景。这里研究的四个面部皮肤区域是前额、右脸颊、左脸颊和下巴,之所以选择这些区域,是因为这些区域中至少有一个有望在现实场景中被捕获。该框架首先定位并评估提取的感兴趣区域(ROI)的可用性,以供后续分析。由于局部二值模式(LBP)描述符在提取皮肤纹理信息方面的有效性,因此将其用于特征匹配。使用XM2VTS数据库进行的实验表明,混合分辨率皮肤纹理图像可以为生物识别应用提供足够的信息。
{"title":"Usability of Skin Texture Biometrics for Mixed-Resolution Images","authors":"H. Alsufyani, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2019.8806212","DOIUrl":"https://doi.org/10.1109/EST.2019.8806212","url":null,"abstract":"There is a growing demand for alternative biometric modalities that can handle various real world challenges such as recognizing partially occluded individuals. Skin texture has been proposed as a potential alternative; however, such skin texture analysis can become difficult when captured images are at varying resolutions (due to different distances or devices). This paper explores the prospect of using mixed-resolution facial skin images as a source of biometric information. The four facial skin regions investigated here are the forehead, right cheek, left cheek, and chin which were selected because at least one of these are expected to be captured in real-world scenarios. The proposed framework first localises and assesses the usability of the extracted region of interest (ROI) for subsequent analysis. Local Binary Pattern (LBP) descriptors are then used for feature matching because of their reported effectiveness in extracting skin texture information. Experiments conducted using the XM2VTS database suggest that mixed resolution skin texture images can provide adequate information for biometric applications.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaze-based Presentation Attack Detection for Users Wearing Tinted Glasses 基于注视的有色眼镜用户呈现攻击检测
Pub Date : 2019-08-22 DOI: 10.1109/EST.2019.8806201
Asad Ali, Nawal Alsufyani, Sanaul Hoque, F. Deravi
Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to address the security vulnerability of spoofing attacks where an attacker uses an artefact presented at the sensor to subvert the system. Gaze-tracking has been proposed for such attack detection. In this paper, we explore the sensitivity of a gaze-based approach to spoofing detection in the presence of eye-glasses that may impact detection performance. In particular, we investigate the use of partially tinted glasses such as may be used in hazardous environments or outdoors in mobile application scenarios The attack scenarios considered in this work include the use of projected photos, 2D and 3D masks. A gaze-based spoofing detection system has been extensively evaluated using data captured from volunteers performing genuine attempts (with and without wearing such tinted glasses) as well as spoofing attempts using various artefacts. The results of the evaluations indicate that the presence of tinted glasses has a small impact on the accuracy of attack detection, thereby making the use of such gaze-based features possible for a wider range of applications.
生物识别身份验证容易受到表示(欺骗)攻击。解决欺骗攻击的安全漏洞非常重要,在这种攻击中,攻击者使用传感器上呈现的工件来破坏系统。针对这种攻击检测,提出了注视跟踪方法。在本文中,我们探讨了在可能影响检测性能的眼镜存在的情况下,基于凝视的欺骗检测方法的灵敏度。特别是,我们调查了部分有色眼镜的使用,例如可能在危险环境或户外移动应用场景中使用的眼镜。本工作中考虑的攻击场景包括使用投影照片,2D和3D面具。基于凝视的欺骗检测系统已被广泛评估,使用从志愿者进行真实尝试(戴或不戴这种有色眼镜)以及使用各种人工制品的欺骗尝试中捕获的数据。评估结果表明,有色眼镜的存在对攻击检测的准确性影响很小,从而使这种基于凝视的特征在更广泛的应用中使用成为可能。
{"title":"Gaze-based Presentation Attack Detection for Users Wearing Tinted Glasses","authors":"Asad Ali, Nawal Alsufyani, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2019.8806201","DOIUrl":"https://doi.org/10.1109/EST.2019.8806201","url":null,"abstract":"Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to address the security vulnerability of spoofing attacks where an attacker uses an artefact presented at the sensor to subvert the system. Gaze-tracking has been proposed for such attack detection. In this paper, we explore the sensitivity of a gaze-based approach to spoofing detection in the presence of eye-glasses that may impact detection performance. In particular, we investigate the use of partially tinted glasses such as may be used in hazardous environments or outdoors in mobile application scenarios The attack scenarios considered in this work include the use of projected photos, 2D and 3D masks. A gaze-based spoofing detection system has been extensively evaluated using data captured from volunteers performing genuine attempts (with and without wearing such tinted glasses) as well as spoofing attempts using various artefacts. The results of the evaluations indicate that the presence of tinted glasses has a small impact on the accuracy of attack detection, thereby making the use of such gaze-based features possible for a wider range of applications.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116055822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart Mobility 基于深度学习的实时目标检测、跟踪、距离和运动估计:在智能移动中的应用
Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806222
Zhihao Chen, R. Khemmar, B. Decoux, A. Atahouet, J. Ertaud
In this paper, we will introduce our object detection, localization and tracking system for smart mobility applications like traffic road and railway environment. Firstly, an object detection and tracking approach was firstly carried out within two deep learning approaches: You Only Look Once (YOLO) V3 and Single Shot Detector (SSD). A comparison between the two methods allows us to identify their applicability in the traffic environment. Both the performances in road and in railway environments were evaluated. Secondly, object distance estimation based on Monodepth algorithm was developed. This model is trained on stereo images dataset but its inference uses monocular images. As the output data, we have a disparity map that we combine with the output of object detection. To validate our approach, we have tested two models with different backbones including VGG and ResNet used with two datasets: Cityscape and KITTI. As the last step of our approach, we have developed a new method-based SSD to analyse the behavior of pedestrian and vehicle by tracking their movements even in case of no detection on some images of a sequence. We have developed an algorithm based on the coordinates of the output bounding boxes of the SSD algorithm. The objective is to determine if the trajectory of a pedestrian or vehicle can lead to a dangerous situations. The whole of development is tested in real vehicle traffic conditions in Rouen city center, and with videos taken by embedded cameras along the Rouen tramway.
在本文中,我们将介绍我们的目标检测,定位和跟踪系统,用于智能移动应用,如交通道路和铁路环境。首先,在两种深度学习方法:You Only Look Once (YOLO) V3和Single Shot Detector (SSD)中首先进行了目标检测和跟踪方法。通过对两种方法的比较,我们可以确定它们在交通环境中的适用性。对其在公路和铁路环境下的性能进行了评价。其次,提出了基于Monodepth算法的目标距离估计方法。该模型是在立体图像数据集上训练的,但其推理使用的是单眼图像。作为输出数据,我们有一个视差图,我们结合输出的目标检测。为了验证我们的方法,我们测试了两个具有不同主干的模型,包括VGG和ResNet,使用两个数据集:Cityscape和KITTI。作为我们方法的最后一步,我们开发了一种基于SSD的新方法,即使在序列的某些图像没有检测的情况下,也可以通过跟踪行人和车辆的运动来分析他们的行为。我们开发了一种基于SSD算法的输出边界框坐标的算法。目的是确定行人或车辆的轨迹是否会导致危险情况。整个开发过程在鲁昂市中心的真实车辆交通条件下进行了测试,并通过鲁昂有轨电车沿线的嵌入式摄像头拍摄了视频。
{"title":"Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart Mobility","authors":"Zhihao Chen, R. Khemmar, B. Decoux, A. Atahouet, J. Ertaud","doi":"10.1109/EST.2019.8806222","DOIUrl":"https://doi.org/10.1109/EST.2019.8806222","url":null,"abstract":"In this paper, we will introduce our object detection, localization and tracking system for smart mobility applications like traffic road and railway environment. Firstly, an object detection and tracking approach was firstly carried out within two deep learning approaches: You Only Look Once (YOLO) V3 and Single Shot Detector (SSD). A comparison between the two methods allows us to identify their applicability in the traffic environment. Both the performances in road and in railway environments were evaluated. Secondly, object distance estimation based on Monodepth algorithm was developed. This model is trained on stereo images dataset but its inference uses monocular images. As the output data, we have a disparity map that we combine with the output of object detection. To validate our approach, we have tested two models with different backbones including VGG and ResNet used with two datasets: Cityscape and KITTI. As the last step of our approach, we have developed a new method-based SSD to analyse the behavior of pedestrian and vehicle by tracking their movements even in case of no detection on some images of a sequence. We have developed an algorithm based on the coordinates of the output bounding boxes of the SSD algorithm. The objective is to determine if the trajectory of a pedestrian or vehicle can lead to a dangerous situations. The whole of development is tested in real vehicle traffic conditions in Rouen city center, and with videos taken by embedded cameras along the Rouen tramway.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115803589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices 用于物理抗克隆设备的基于小块的密码类
Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806216
Saleh Mulhem, Mouadh Ayache, W. Adi
Physical Unclonable Functions PUFs were proposed about two decades ago for creating physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in implementation and less consistent in the re-identification process. The novel technique proposed in this work, converts (mutates) a non-volatile SoC FPGA device at low cost into a consistent clone-resistant unit. A true random generator triggers an internal smart program which creates/mutates internally (in a post-production single-event process) a permanent physical Secret Unknown Cipher (SUC) module. This is seen as an electronic “mutation” in a self-reconfiguring non-volatile-FPGA SoC environment. The created entity results with some unknown, however operational Cipher SUC. As the SUC structure is non-volatile, the unit becomes permanently clone-resistant if any later changes are irreversibly prohibited. A large cipher class based on mini-blocks of 4-bit mappings and bundle permutations making use of the FPGA 4-input LUT structures is created. To create an SUC within a device, a single cipher is randomly selected from the large class. As nobody knows the internally selected cipher, the resulting cipher-module is unknown and could serve as a hard to clone physical identity. A perfect secret is the one which nobody knows. Once it is possible to know, it becomes clonable. A sample use case protocol challenging the particular created cipher is shown how to securely identify the device. A sample prototype implementation scenario for the proposed cipher is presented using Microsemi SmartFusion2 SoC FPGA technology. Complexity, performance and security aspects of the resulting new system are discussed and evaluated.
物理不可克隆功能puf是在大约二十年前提出的,用于创建物理不可克隆的VLSI单元。puf作为模拟结构,在实现上成本很高,并且在重新识别过程中一致性较差。这项工作中提出的新技术以低成本将非易失性SoC FPGA器件转换(突变)为一致的抗克隆单元。一个真正的随机生成器触发一个内部智能程序,该程序在内部(在后期单事件过程中)创建/变异一个永久的物理未知密码(SUC)模块。这被视为自重新配置非易失性fpga SoC环境中的电子“突变”。创建的实体产生一些未知的,但可操作的密码SUC。由于SUC结构是非易失性的,因此如果以后的任何更改被不可逆地禁止,则该单元将具有永久的克隆抗性。基于4位映射的小块和利用FPGA 4输入LUT结构的束排列,创建了一个大型密码类。为了在设备中创建SUC,从大类中随机选择一个密码。由于没有人知道内部选择的密码,因此产生的密码模块是未知的,可以作为难以克隆的物理身份。完美的秘密就是没有人知道的秘密。一旦有可能知道,它就变得可克隆。一个示例用例协议挑战特定创建的密码显示如何安全地识别设备。采用Microsemi SmartFusion2 SoC FPGA技术,给出了该密码的一个示例原型实现场景。讨论并评估了由此产生的新系统的复杂性、性能和安全性。
{"title":"Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices","authors":"Saleh Mulhem, Mouadh Ayache, W. Adi","doi":"10.1109/EST.2019.8806216","DOIUrl":"https://doi.org/10.1109/EST.2019.8806216","url":null,"abstract":"Physical Unclonable Functions PUFs were proposed about two decades ago for creating physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in implementation and less consistent in the re-identification process. The novel technique proposed in this work, converts (mutates) a non-volatile SoC FPGA device at low cost into a consistent clone-resistant unit. A true random generator triggers an internal smart program which creates/mutates internally (in a post-production single-event process) a permanent physical Secret Unknown Cipher (SUC) module. This is seen as an electronic “mutation” in a self-reconfiguring non-volatile-FPGA SoC environment. The created entity results with some unknown, however operational Cipher SUC. As the SUC structure is non-volatile, the unit becomes permanently clone-resistant if any later changes are irreversibly prohibited. A large cipher class based on mini-blocks of 4-bit mappings and bundle permutations making use of the FPGA 4-input LUT structures is created. To create an SUC within a device, a single cipher is randomly selected from the large class. As nobody knows the internally selected cipher, the resulting cipher-module is unknown and could serve as a hard to clone physical identity. A perfect secret is the one which nobody knows. Once it is possible to know, it becomes clonable. A sample use case protocol challenging the particular created cipher is shown how to securely identify the device. A sample prototype implementation scenario for the proposed cipher is presented using Microsemi SmartFusion2 SoC FPGA technology. Complexity, performance and security aspects of the resulting new system are discussed and evaluated.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the Media EvoFIT面部合成图像:对法医从业人员、警察调查员、受害者、证人、罪犯和媒体影响的详细评估
Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806211
C. Frowd, E. Portch, Abigail Killeen, Lydia Mullen, Alexander J. Martin, P. Hancock
This paper assesses use of the EvoFIT facial composite system by police practitioners in the UK and overseas. Results reveal that this forensic system is used extensively: a total of 2,440 times since September 2013. With a suspect identification rate of 60% and a conviction rate of 17%, the impact of this forensic technique is appreciable for helping the police to identify offenders. It was also found that empirically-driven enhancement techniques were used frequently by police practitioners-including use of detailed context reinstatement and holistic techniques during interview, and asking the witness to focus on the eye-region during construction. Research evaluating EvoFIT images published in the media also revealed that composites were produced mostly for serious offences, in particular for sexual crimes. In addition, the vast majority were of male offenders, in their early 30's; victims were female (aged mid 20's to mid 30's); these demographics were similar to composites emerging from another recognition system, EFIT-V / 6. Although this exercise revealed that EvoFIT composites were sometimes published using a more optimal stretched mode, some were presented in a way that did not faithfully represent the constructed image, with the external features cropped. In conclusion, the EvoFIT system is clearly being deployed frequently, with appreciable impact, in the fight against crime.
本文评估了EvoFIT面部合成系统在英国和海外警察从业人员的使用情况。结果表明,该取证系统被广泛使用:自2013年9月以来,共使用2440次。嫌疑犯的识别率为60%,定罪率为17%,这项法医技术在帮助警方识别罪犯方面的影响是显而易见的。研究还发现,警察从业人员经常使用经验驱动的增强技术,包括在采访中使用详细的背景恢复和整体技术,以及在构建过程中要求证人专注于眼睛区域。对媒体上发布的EvoFIT图像进行评估的研究还显示,合成材料主要用于严重犯罪,特别是性犯罪。此外,绝大多数罪犯都是30岁出头的男性;受害者为女性(20岁至30岁左右);这些人口统计数据与另一种识别系统EFIT-V / 6产生的复合数据相似。虽然这个实验表明EvoFIT复合材料有时使用更优化的拉伸模式发布,但有些复合材料的呈现方式并不能忠实地表示构建的图像,因为外部特征被裁剪了。综上所述,EvoFIT系统显然经常被部署,并在打击犯罪方面产生了明显的影响。
{"title":"EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the Media","authors":"C. Frowd, E. Portch, Abigail Killeen, Lydia Mullen, Alexander J. Martin, P. Hancock","doi":"10.1109/EST.2019.8806211","DOIUrl":"https://doi.org/10.1109/EST.2019.8806211","url":null,"abstract":"This paper assesses use of the EvoFIT facial composite system by police practitioners in the UK and overseas. Results reveal that this forensic system is used extensively: a total of 2,440 times since September 2013. With a suspect identification rate of 60% and a conviction rate of 17%, the impact of this forensic technique is appreciable for helping the police to identify offenders. It was also found that empirically-driven enhancement techniques were used frequently by police practitioners-including use of detailed context reinstatement and holistic techniques during interview, and asking the witness to focus on the eye-region during construction. Research evaluating EvoFIT images published in the media also revealed that composites were produced mostly for serious offences, in particular for sexual crimes. In addition, the vast majority were of male offenders, in their early 30's; victims were female (aged mid 20's to mid 30's); these demographics were similar to composites emerging from another recognition system, EFIT-V / 6. Although this exercise revealed that EvoFIT composites were sometimes published using a more optimal stretched mode, some were presented in a way that did not faithfully represent the constructed image, with the external features cropped. In conclusion, the EvoFIT system is clearly being deployed frequently, with appreciable impact, in the fight against crime.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of Text 基于形状变形的字母数字符号转换:文本语境
Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806219
A. Ledoux, Ngoc Bich Dao, Paul Lahmi, Mickaël Coustaty
In this paper, we present a new application of shape morphing in font generation. This method is adapted to the text tattooing context. The advantages of using this method for font generation are: the ability to generate all font characters in one step; all characters are changed; the user must only provide a shape towards which the characters will be distorted and define the percentage of deformation. In the context of text tattooing, the characters in the original text must be modified to embed information without disturbing the reading. Therefore, each character of the new font must be at the same time different and similar to the one of the font of the original document (Times New Roman, Arial, etc). In the results section, we show the visual similarity of the obtained characters as well as their ability to distinguish themselves in a classification process.
本文提出了形状变形在字体生成中的一种新应用。这种方法适合于文字文身的语境。使用这种方法生成字体的优点是:能够在一步中生成所有字体字符;所有的字符都改变了;用户必须只提供一个形状,字符将被扭曲,并定义变形的百分比。在文字纹身的情况下,必须对原文中的文字进行修改,在不干扰阅读的情况下嵌入信息。因此,新字体的每个字符必须与原文档的字体(Times new Roman, Arial等)中的一个字符不同,同时又相似。在结果部分,我们展示了所获得字符的视觉相似性以及它们在分类过程中区分自己的能力。
{"title":"Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of Text","authors":"A. Ledoux, Ngoc Bich Dao, Paul Lahmi, Mickaël Coustaty","doi":"10.1109/EST.2019.8806219","DOIUrl":"https://doi.org/10.1109/EST.2019.8806219","url":null,"abstract":"In this paper, we present a new application of shape morphing in font generation. This method is adapted to the text tattooing context. The advantages of using this method for font generation are: the ability to generate all font characters in one step; all characters are changed; the user must only provide a shape towards which the characters will be distorted and define the percentage of deformation. In the context of text tattooing, the characters in the original text must be modified to embed information without disturbing the reading. Therefore, each character of the new font must be at the same time different and similar to the one of the font of the original document (Times New Roman, Arial, etc). In the results section, we show the visual similarity of the obtained characters as well as their ability to distinguish themselves in a classification process.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spreading Code Identification of Legal Drones in IoT Environment 物联网环境下合法无人机的传播码识别
Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806215
K. Alheeti, M. Al-Ani, K. Mcdonald-Maier
The widespread use of drones has become very common today with large-scale civil and military applications. In the next few coming years, the outlook is expected that the number of drones will reach millions. So, these need to be well organised and managed in order to achieve the benefits of IoT with this accelerated environment. Drones or Unmanned Aerial Vehicles (UAVs) must achieved a level of communications to authenticate a legal working. The proposed approach concentrated on preparing each drone with identification key based on the combination of its international sim number with the date of the first action and the local country code. This approach is called Drone IDentification (DID) that generate a unique code for each drone via spreading technique. In this case any drone not apply this regulation is considered as unauthenticated drone and does not allowed to fly. This approach is very important to establish drone regulation via IoT.
无人机的广泛使用在今天已经变得非常普遍,具有大规模的民用和军事应用。在接下来的几年里,预计无人机的数量将达到数百万。因此,这些需要很好地组织和管理,以便在这种加速的环境中实现物联网的好处。无人机或无人驾驶飞行器(uav)必须达到一定程度的通信才能验证合法工作。该方法的重点是根据无人机的国际sim卡号码、第一次行动的日期和当地国家代码的组合,为每架无人机准备识别密钥。这种方法被称为无人机识别(DID),通过扩散技术为每架无人机生成唯一的代码。在这种情况下,任何不适用本规定的无人机都被视为未经认证的无人机,不允许飞行。这种方法对于通过物联网建立无人机监管非常重要。
{"title":"Spreading Code Identification of Legal Drones in IoT Environment","authors":"K. Alheeti, M. Al-Ani, K. Mcdonald-Maier","doi":"10.1109/EST.2019.8806215","DOIUrl":"https://doi.org/10.1109/EST.2019.8806215","url":null,"abstract":"The widespread use of drones has become very common today with large-scale civil and military applications. In the next few coming years, the outlook is expected that the number of drones will reach millions. So, these need to be well organised and managed in order to achieve the benefits of IoT with this accelerated environment. Drones or Unmanned Aerial Vehicles (UAVs) must achieved a level of communications to authenticate a legal working. The proposed approach concentrated on preparing each drone with identification key based on the combination of its international sim number with the date of the first action and the local country code. This approach is called Drone IDentification (DID) that generate a unique code for each drone via spreading technique. In this case any drone not apply this regulation is considered as unauthenticated drone and does not allowed to fly. This approach is very important to establish drone regulation via IoT.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications 安全无线航空电子内部通信的MAC-PRY跨层设计
Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806208
R. Sámano-Robles
This paper presents a framework for medium access control (MAC) and physical (PRY) cross-layer security design of wireless avionics intra-communications (WAICs). The paper explores the different options based on the latest results of MAC-PRY cross-layer design and the available standard technologies for WAICs. Particular emphasis is given to solutions based on multiple-input multiple-output (MIMO) systems and recent developments towards a wireless technology with ultra-low latency and high reliability in the context of 5G and machine-type traffic support. One major objective is to improve WAICs technology and thus match the real-time, reliability and safety critical performance of the internal aeronautics bus technologies (e.g., ARINC 664). The main identified vulnerabilities and potential solutions are explored, as well as their impact on system design complexity and feasibility for wireless networks on-board aircraft. The solutions are presented in the context of the European project SCOTT (secure connected trustable things) using the recently released reference architecture for trusted IoT systems. Other aspects of SCOTT such as trust, privacy, security classes, and safety are also discussed here for the aeronautics domain.
提出了无线航空电子内部通信(WAICs)的介质访问控制(MAC)和物理(PRY)跨层安全设计框架。本文根据MAC-PRY跨层设计的最新成果和WAICs的现有标准技术,探讨了不同的选择。特别强调基于多输入多输出(MIMO)系统的解决方案,以及在5G和机器类型流量支持背景下超低延迟和高可靠性无线技术的最新发展。一个主要目标是改进WAICs技术,从而达到内部航空总线技术(例如arinc664)的实时性、可靠性和安全关键性能。探讨了已确定的主要漏洞和潜在解决方案,以及它们对机载无线网络系统设计复杂性和可行性的影响。这些解决方案是在欧洲项目SCOTT(安全连接的可信任事物)的背景下提出的,该项目使用了最近发布的可信任物联网系统参考架构。SCOTT的其他方面,如信任、隐私、安全类和安全性,也将在此讨论航空领域。
{"title":"MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications","authors":"R. Sámano-Robles","doi":"10.1109/EST.2019.8806208","DOIUrl":"https://doi.org/10.1109/EST.2019.8806208","url":null,"abstract":"This paper presents a framework for medium access control (MAC) and physical (PRY) cross-layer security design of wireless avionics intra-communications (WAICs). The paper explores the different options based on the latest results of MAC-PRY cross-layer design and the available standard technologies for WAICs. Particular emphasis is given to solutions based on multiple-input multiple-output (MIMO) systems and recent developments towards a wireless technology with ultra-low latency and high reliability in the context of 5G and machine-type traffic support. One major objective is to improve WAICs technology and thus match the real-time, reliability and safety critical performance of the internal aeronautics bus technologies (e.g., ARINC 664). The main identified vulnerabilities and potential solutions are explored, as well as their impact on system design complexity and feasibility for wireless networks on-board aircraft. The solutions are presented in the context of the European project SCOTT (secure connected trustable things) using the recently released reference architecture for trusted IoT systems. Other aspects of SCOTT such as trust, privacy, security classes, and safety are also discussed here for the aeronautics domain.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes 针对QCLDPC码mcelece密码系统反攻击的两种对策的进一步启发式讨论
Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806207
P. Farkaš
Recently two countermeasures against reaction Attacks on McEliece cryptosystems with QC-LDPC and QC-MDPC codes were proposed. In this paper further heuristic discussion and elements of the protocol proposals are presented which can bring a system with these techniques closer to practical applications and also can enhance the overall security of the systems which will use them.
最近提出了两种针对QC-LDPC和QC-MDPC码的McEliece密码系统反攻击的对策。在本文中,提出了进一步的启发式讨论和协议建议的元素,可以使使用这些技术的系统更接近实际应用,也可以提高使用它们的系统的整体安全性。
{"title":"Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes","authors":"P. Farkaš","doi":"10.1109/EST.2019.8806207","DOIUrl":"https://doi.org/10.1109/EST.2019.8806207","url":null,"abstract":"Recently two countermeasures against reaction Attacks on McEliece cryptosystems with QC-LDPC and QC-MDPC codes were proposed. In this paper further heuristic discussion and elements of the protocol proposals are presented which can bring a system with these techniques closer to practical applications and also can enhance the overall security of the systems which will use them.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Device Identification Using Multidimensional Mapping 使用多维映射的安全设备识别
Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806218
Supriya Yadav, G. Howells
In this paper we investigate several potential hardware features from multiple devices for suitability during the employment of a device identification. The generation of stable and unique digital identity from features is challenging in device identification because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a novel multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Furthermore, normalized distributions of features give the necessary data to model the characteristics, from which we derive intra-sample device feature distributions, and correlate the distinct features to generate a secure key to identify the device.
在本文中,我们研究了多个设备在使用设备标识期间的适用性的几个潜在硬件特征。从特征中生成稳定和唯一的数字身份在设备识别中是具有挑战性的,因为不稳定的操作环境意味着所采用的特征在正常操作条件下可能会发生变化。为了解决这个问题,我们引入了一种新的多维密钥生成技术,该技术可以从多维特征空间直接映射到密钥空间。此外,特征的归一化分布为特征建模提供了必要的数据,从中我们推导出样本内设备特征分布,并将不同的特征关联起来以生成识别设备的安全密钥。
{"title":"Secure Device Identification Using Multidimensional Mapping","authors":"Supriya Yadav, G. Howells","doi":"10.1109/EST.2019.8806218","DOIUrl":"https://doi.org/10.1109/EST.2019.8806218","url":null,"abstract":"In this paper we investigate several potential hardware features from multiple devices for suitability during the employment of a device identification. The generation of stable and unique digital identity from features is challenging in device identification because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a novel multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Furthermore, normalized distributions of features give the necessary data to model the characteristics, from which we derive intra-sample device feature distributions, and correlate the distinct features to generate a secure key to identify the device.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133983525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 Eighth International Conference on Emerging Security Technologies (EST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1