Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921994
Rima Masri, M. Aldwairi
The Internet economy is based on free access to content in exchange of viewing advertisements that might lead to online purchases. Advertisements represent an important source of revenue to Advertising companies. Those companies employ every possible technique and trick to maximize clicks and visits to advertisers' websites. Modern websites exchange advertisement contents from ads' providers (such as Google AdSense), which means they do not control the contents of those advertisements. Although large providers such as Google and Yahoo! are supposed to be trustworthy, ad arbitration allows them to auction of those ad slots to other providers. Therefore, web administrators cannot guarantee the source of the ads on their delegated website areas. Those advertisements contain Javascript and may redirect to malicious websites which might lead to malicious code being executed or malware being installed. This paper proposes and implements a system for automatically detecting malicious advertisements. It employs three different online malware domain detections systems (VirusTotal, URLVoid, and TrendMicro) for malicious advertisements detection purposes and reports the number of detected malicious advertisements using each system. In addition, we study the efficiency of each system by calculating the confusion matrix and accuracy. We find that URLVoid is the best in terms of accuracy (73%) because it uses a combination of well known website scanners and domain blacklists.
{"title":"Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro","authors":"Rima Masri, M. Aldwairi","doi":"10.1109/IACS.2017.7921994","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921994","url":null,"abstract":"The Internet economy is based on free access to content in exchange of viewing advertisements that might lead to online purchases. Advertisements represent an important source of revenue to Advertising companies. Those companies employ every possible technique and trick to maximize clicks and visits to advertisers' websites. Modern websites exchange advertisement contents from ads' providers (such as Google AdSense), which means they do not control the contents of those advertisements. Although large providers such as Google and Yahoo! are supposed to be trustworthy, ad arbitration allows them to auction of those ad slots to other providers. Therefore, web administrators cannot guarantee the source of the ads on their delegated website areas. Those advertisements contain Javascript and may redirect to malicious websites which might lead to malicious code being executed or malware being installed. This paper proposes and implements a system for automatically detecting malicious advertisements. It employs three different online malware domain detections systems (VirusTotal, URLVoid, and TrendMicro) for malicious advertisements detection purposes and reports the number of detected malicious advertisements using each system. In addition, we study the efficiency of each system by calculating the confusion matrix and accuracy. We find that URLVoid is the best in terms of accuracy (73%) because it uses a combination of well known website scanners and domain blacklists.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921961
Eyad Ben Tarif, S. Wibowo, S. Wasimi, Afaf Tareef, Abedalraheem Tareaf
With the rapid growth of the biometric-based identification and authentication systems, establishing the integrity and authenticity of biometric data has become a serious research issue. Information hiding has emerged as an efficient way to secure the biometric data during transmission in web-based applications. In this paper, a content authentication and tamper-proofing system is presented to localize and correct the corrupted area in color biometric data. Information hiding based on sparsity theory is utilized to hide a copy of the luminance component of the color biometric image. The proposed scheme has been evaluated using Georgia Technology face database, and the results have demonstrated the reliability and efficiency of the proposed scheme in identifying and restoring the tampered area, even when the biometric image is seriously corrupted.
{"title":"A secure hiding scheme for tamper-proofing and authentication of color biometrie templates","authors":"Eyad Ben Tarif, S. Wibowo, S. Wasimi, Afaf Tareef, Abedalraheem Tareaf","doi":"10.1109/IACS.2017.7921961","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921961","url":null,"abstract":"With the rapid growth of the biometric-based identification and authentication systems, establishing the integrity and authenticity of biometric data has become a serious research issue. Information hiding has emerged as an efficient way to secure the biometric data during transmission in web-based applications. In this paper, a content authentication and tamper-proofing system is presented to localize and correct the corrupted area in color biometric data. Information hiding based on sparsity theory is utilized to hide a copy of the luminance component of the color biometric image. The proposed scheme has been evaluated using Georgia Technology face database, and the results have demonstrated the reliability and efficiency of the proposed scheme in identifying and restoring the tampered area, even when the biometric image is seriously corrupted.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921995
Bahae Samhan
This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance motivation, perceived effectiveness of the safeguarding measure, perceived cost of the safeguarding measure, and the self-efficacy of using this safeguarding measure. The study also controlled for a number of variables and found that levels of education and age have significant influence on avoidance behavior towards the HIT.
{"title":"Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective","authors":"Bahae Samhan","doi":"10.1109/IACS.2017.7921995","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921995","url":null,"abstract":"This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance motivation, perceived effectiveness of the safeguarding measure, perceived cost of the safeguarding measure, and the self-efficacy of using this safeguarding measure. The study also controlled for a number of variables and found that levels of education and age have significant influence on avoidance behavior towards the HIT.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921959
Ala’ M. Al-Zoubi, Ja'far Alqatawna, Hossam Paris
In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close to NatWest customer support account and leaded users to a link of a phishing site. In this study, we investigate the nature of spam profiles in Twitter with a goal to improve social spam detection. Based on a set of publicly available features, we develop spam profiles detection models. At this stage, a dataset of 82 Twitter's profiles are collected and analyzed. With feature engineering, we investigate ten binary and simple features that can be used to classify spam profiles. Moreover, a feature selection process is utilized to identify the most influencing features in the process of detecting spam profiles. For feature selection, two methods are used ReliefF and Information Gain. While for classification, four classification algorithms are applied and compared: Decision Trees, Multilayer Perceptron, k-Nearest neighbors and Naive Bayes. Preliminary experiments in this work show that the promising detection rates can be obtained using such features regardless of the language of the tweets.
{"title":"Spam profile detection in social networks based on public features","authors":"Ala’ M. Al-Zoubi, Ja'far Alqatawna, Hossam Paris","doi":"10.1109/IACS.2017.7921959","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921959","url":null,"abstract":"In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close to NatWest customer support account and leaded users to a link of a phishing site. In this study, we investigate the nature of spam profiles in Twitter with a goal to improve social spam detection. Based on a set of publicly available features, we develop spam profiles detection models. At this stage, a dataset of 82 Twitter's profiles are collected and analyzed. With feature engineering, we investigate ten binary and simple features that can be used to classify spam profiles. Moreover, a feature selection process is utilized to identify the most influencing features in the process of detecting spam profiles. For feature selection, two methods are used ReliefF and Information Gain. While for classification, four classification algorithms are applied and compared: Decision Trees, Multilayer Perceptron, k-Nearest neighbors and Naive Bayes. Preliminary experiments in this work show that the promising detection rates can be obtained using such features regardless of the language of the tweets.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114851594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921945
Meriem Amel Guessoum, Rahma Djiroun, K. Boukhalfa
Business Intelligence aims at providing information to non expert users to make appropriate decisions. To access decisional information, the decision maker should express his/her requirements in Natural Language interfaces instead of technical languages, to avoid IT designer dependency and formal language's unfamiliarity. A Natural Language query is formulated according to several types such as WH-questions as “What, Who, Where, etc.” questions, Keyword-like questions, etc. We focus on “Why-Question” and we present an approach handling this kind of question. We begin by modelling the Why-Question, then we present a mathematical model based on numerical analysis to detect the eventual Why-Questions answers. We propose a tool called Why-Question analyser implementing our approach. A preliminary evaluation is presented.
{"title":"Dealing with decisional natural language why-question in business intelligence","authors":"Meriem Amel Guessoum, Rahma Djiroun, K. Boukhalfa","doi":"10.1109/IACS.2017.7921945","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921945","url":null,"abstract":"Business Intelligence aims at providing information to non expert users to make appropriate decisions. To access decisional information, the decision maker should express his/her requirements in Natural Language interfaces instead of technical languages, to avoid IT designer dependency and formal language's unfamiliarity. A Natural Language query is formulated according to several types such as WH-questions as “What, Who, Where, etc.” questions, Keyword-like questions, etc. We focus on “Why-Question” and we present an approach handling this kind of question. We begin by modelling the Why-Question, then we present a mathematical model based on numerical analysis to detect the eventual Why-Questions answers. We propose a tool called Why-Question analyser implementing our approach. A preliminary evaluation is presented.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129649543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921958
Dong Chen, A. Alsadoon, P. Prasad, A. Elchouemi
This study aims to analyse the current method in diagnosing early Alzheimer disease and offer a new method to improve the performance of bioinformatics techniques. It proposes a hybrid MRI image processing method to improve the image quality for Alzheimer disease classification. This hybrid method has four stages consisting of image pre-processing, segmentation, feature extraction, and classification. Experimental results using a hybrid image pre-processing method apply on original MRI image data. The study shows that the Mini Mental State Examination (MMSE) method together with the residual intensity non-uniformity method in the SPM machine could make MRI image more effective with high accuracy and sensitive rates. The study shows that a well-designed pre-processing stage could improve the image quality of the subject for final classification. It can help researchers to gain high value of diagnosing early Alzheimer disease by filtering most of the image noise.
{"title":"Early diagnosis of Alzheimer using mini mental state examination method: MMSE","authors":"Dong Chen, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2017.7921958","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921958","url":null,"abstract":"This study aims to analyse the current method in diagnosing early Alzheimer disease and offer a new method to improve the performance of bioinformatics techniques. It proposes a hybrid MRI image processing method to improve the image quality for Alzheimer disease classification. This hybrid method has four stages consisting of image pre-processing, segmentation, feature extraction, and classification. Experimental results using a hybrid image pre-processing method apply on original MRI image data. The study shows that the Mini Mental State Examination (MMSE) method together with the residual intensity non-uniformity method in the SPM machine could make MRI image more effective with high accuracy and sensitive rates. The study shows that a well-designed pre-processing stage could improve the image quality of the subject for final classification. It can help researchers to gain high value of diagnosing early Alzheimer disease by filtering most of the image noise.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921980
Fatima-Zohra Benhamida, A. Bouabdellah, Y. Challal
Delay Tolerant Network (DTN) is a class of network architectures that address the lack of continuous network connectivity. This issue has been studied for over a decade by promoting new routing protocols. However, recent researches in DTN should rekindle proposed solutions to support new emerging network-based applications, in which DTN techniques can be used to offer delay tolerant support. Example of these applications domains is Internet of Things (IoT). We survey the use of DTN solutions in IoT applications to overcome connectivity problems considering the opportunities and challenges for each technology. The purpose of this work is to introduce most recent solutions that enable delay tolerant IoT. We propose a taxonomy and discuss advantages and limitations for each study.
{"title":"Using delay tolerant network for the Internet of Things: Opportunities and challenges","authors":"Fatima-Zohra Benhamida, A. Bouabdellah, Y. Challal","doi":"10.1109/IACS.2017.7921980","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921980","url":null,"abstract":"Delay Tolerant Network (DTN) is a class of network architectures that address the lack of continuous network connectivity. This issue has been studied for over a decade by promoting new routing protocols. However, recent researches in DTN should rekindle proposed solutions to support new emerging network-based applications, in which DTN techniques can be used to offer delay tolerant support. Example of these applications domains is Internet of Things (IoT). We survey the use of DTN solutions in IoT applications to overcome connectivity problems considering the opportunities and challenges for each technology. The purpose of this work is to introduce most recent solutions that enable delay tolerant IoT. We propose a taxonomy and discuss advantages and limitations for each study.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921964
Hassan M. Najadat, A. Al-Badarneh, Rasha K. Al-Huthaifi, Assia Abo-Zaitoon, Yasmin Al-Omary
Websites of universities have become vital in evaluating universities' performance. These websites may face some weaknesses, including poor design, insecure system, bad performance or usability. There is a limited research work that evaluates the universities' websites performance. In this paper, a new approach is proposed in order to evaluate the Jordanian universities based on data envelopment analysis. The dataset is collected from 23 Jordanian universities' websites by using four tools to extract a set of vital features from each website. We applied data envelopment analysis to provide decision makers of universities a plan to improve the websites. In this paper, the websites' efficiencies are evaluated in three viewpoints including usability, design, and performance. The results of the usability show that 18 websites are usable while 5 websites are not usable, while the results of the design show that only 7 websites have good design. Finally, the websites' performances are classified into efficient or inefficient. The result shows that among 23 universities, there are 4 websites are rated as efficient and 19 sites are rated as inefficient.
{"title":"Evaluating Jordanian universities' websites based on data envelopment analysis","authors":"Hassan M. Najadat, A. Al-Badarneh, Rasha K. Al-Huthaifi, Assia Abo-Zaitoon, Yasmin Al-Omary","doi":"10.1109/IACS.2017.7921964","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921964","url":null,"abstract":"Websites of universities have become vital in evaluating universities' performance. These websites may face some weaknesses, including poor design, insecure system, bad performance or usability. There is a limited research work that evaluates the universities' websites performance. In this paper, a new approach is proposed in order to evaluate the Jordanian universities based on data envelopment analysis. The dataset is collected from 23 Jordanian universities' websites by using four tools to extract a set of vital features from each website. We applied data envelopment analysis to provide decision makers of universities a plan to improve the websites. In this paper, the websites' efficiencies are evaluated in three viewpoints including usability, design, and performance. The results of the usability show that 18 websites are usable while 5 websites are not usable, while the results of the design show that only 7 websites have good design. Finally, the websites' performances are classified into efficient or inefficient. The result shows that among 23 universities, there are 4 websites are rated as efficient and 19 sites are rated as inefficient.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115925774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921977
Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang
As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.
{"title":"Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard","authors":"Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang","doi":"10.1109/IACS.2017.7921977","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921977","url":null,"abstract":"As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921966
Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis
For a biometrics system, one of the principal challenges is to protect the biometric reference template, as if a malicious individual is able to obtain this template, the genuine user would not be able to reuse the biometric for any application. A solution may be to use a new form of authentication based on gesture recognition. This type of authentication has the added advantage that in the case of compromise, the gesture can be changed yet still retain the advantages of the biometric input. In this paper, we investigate whether it is feasible to implement a Gesture Recognition system on a personal limited device such as a smart card. To do this, we set out an experiment using sample gestures based on practical results of gesture authentication trials and an optimised version of Dynamic Time Warping (DTW) algorithm to analyse the data captured. We implemented them on both a contact Smart Card (SC) and the more powerful Samsung Galaxy S4 mobile phone, using Host Card Emulation (HCE). The result of this experiment was that it would take around a minute for the SC and a second for HCE.
{"title":"Gesture recognition implemented on a personal limited device","authors":"Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis","doi":"10.1109/IACS.2017.7921966","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921966","url":null,"abstract":"For a biometrics system, one of the principal challenges is to protect the biometric reference template, as if a malicious individual is able to obtain this template, the genuine user would not be able to reuse the biometric for any application. A solution may be to use a new form of authentication based on gesture recognition. This type of authentication has the added advantage that in the case of compromise, the gesture can be changed yet still retain the advantages of the biometric input. In this paper, we investigate whether it is feasible to implement a Gesture Recognition system on a personal limited device such as a smart card. To do this, we set out an experiment using sample gestures based on practical results of gesture authentication trials and an optimised version of Dynamic Time Warping (DTW) algorithm to analyse the data captured. We implemented them on both a contact Smart Card (SC) and the more powerful Samsung Galaxy S4 mobile phone, using Host Card Emulation (HCE). The result of this experiment was that it would take around a minute for the SC and a second for HCE.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}