首页 > 最新文献

2013 Fourth International Conference on Emerging Security Technologies最新文献

英文 中文
On the Feasibility and Performance of Pass-Thought Authentication Systems 思想传递认证系统的可行性及性能研究
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.12
A. Jolfaei, Xin-Wen Wu, V. Muthukkumarasamy
With recent advances in cognitive biometrics, user authentication using brain-computer interfaces (BCIs), namely a pass-thought system, has received much attention in the cryptographic community. However, as the performance of BCIs hinges upon human factors, the feasibility of a pass-thought system needs to be examined. In this paper, we show that classification accuracy can be increased by increasing the number of test trials. More importantly, we propose a new information-theoretic measure (termed communication rate) based on a binary asymmetric channel model, for measuring the performance of pass-thought systems. We show that the maximum spelling rate of a pass-thought authentication system lies within the acceptable speed range of user comfort, indicating the practicality of this system. The relationships among classification accuracy, number of symbols, number of trials, and communication rate are investigated. The communication rate of a pass-thought authentication system is found to be directly proportional to accuracy and number of symbols, but it is inversely proportional to the number of trials.
随着认知生物识别技术的发展,基于脑机接口(bci)的用户身份认证,即一种传递思维系统,受到了密码学界的广泛关注。然而,由于脑机接口的性能取决于人为因素,因此需要审查一个经过思考的系统的可行性。在本文中,我们证明了分类精度可以通过增加测试次数来提高。更重要的是,我们提出了一种基于二元非对称信道模型的新的信息论度量(称为通信速率),用于测量传递思想系统的性能。结果表明,思想传递认证系统的最大拼写率在用户可接受的速度范围内,表明了该系统的实用性。研究了分类准确率、符号数、试验次数和通过率之间的关系。通过思想认证系统的通信速率与准确性和符号数量成正比,但与试验次数成反比。
{"title":"On the Feasibility and Performance of Pass-Thought Authentication Systems","authors":"A. Jolfaei, Xin-Wen Wu, V. Muthukkumarasamy","doi":"10.1109/EST.2013.12","DOIUrl":"https://doi.org/10.1109/EST.2013.12","url":null,"abstract":"With recent advances in cognitive biometrics, user authentication using brain-computer interfaces (BCIs), namely a pass-thought system, has received much attention in the cryptographic community. However, as the performance of BCIs hinges upon human factors, the feasibility of a pass-thought system needs to be examined. In this paper, we show that classification accuracy can be increased by increasing the number of test trials. More importantly, we propose a new information-theoretic measure (termed communication rate) based on a binary asymmetric channel model, for measuring the performance of pass-thought systems. We show that the maximum spelling rate of a pass-thought authentication system lies within the acceptable speed range of user comfort, indicating the practicality of this system. The relationships among classification accuracy, number of symbols, number of trials, and communication rate are investigated. The communication rate of a pass-thought authentication system is found to be directly proportional to accuracy and number of symbols, but it is inversely proportional to the number of trials.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127451035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Feasibility of Using Gyro and EMG Fusion as a Multi-position Computer Interface for Amputees 陀螺仪与肌电融合作为截肢者多位置计算机接口的可行性
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.33
J. Cannan, Huosheng Hu
This paper demonstrates how a wearable armband that incorporates Gyro and EMG sensor fusion, can be used as a simple input device for upper body amputees. The armband enables any user with some level of yaw and pitch arm movement, and arm muscle voluntary contraction, to potentially control an electrical device like a computer, robotic arm, or mobile phone. Simple Gyro data calculates pitch and yaw, while EMG threshold based techniques are used for a virtual enter button. Only light weight signal processing is required to achieve acceptable results, reducing the required processing time on the microcontroller and receiving device, thereby allowing the Fusion Band to be interfaced with almost any device. Three locations on a users arm: wrist, upper forearm and bicep were tested, in order to simulate variations in amputation, while experiments on text input and computer navigation were preformed to analyze the devices usability as a computer interface. The device aims to make interaction in computer applications more intuitive for amputee users.
本文演示了如何将陀螺仪和肌电传感器融合在一起的可穿戴臂带作为上肢截肢者的简单输入设备。这款臂带可以让任何有一定程度的手臂偏航和俯仰运动以及手臂肌肉自主收缩的用户控制电子设备,比如电脑、机械臂或手机。简单的陀螺数据计算俯仰和偏航,而基于肌电阈值的技术用于虚拟进入按钮。只需要轻量级的信号处理就可以达到可接受的结果,减少了微控制器和接收设备上所需的处理时间,从而允许Fusion Band与几乎任何设备接口。测试了用户手臂上的三个位置:手腕,上臂和二头肌,以模拟截肢的变化,同时进行了文本输入和计算机导航实验,以分析设备作为计算机界面的可用性。该设备旨在为截肢用户提供更直观的计算机应用交互。
{"title":"Feasibility of Using Gyro and EMG Fusion as a Multi-position Computer Interface for Amputees","authors":"J. Cannan, Huosheng Hu","doi":"10.1109/EST.2013.33","DOIUrl":"https://doi.org/10.1109/EST.2013.33","url":null,"abstract":"This paper demonstrates how a wearable armband that incorporates Gyro and EMG sensor fusion, can be used as a simple input device for upper body amputees. The armband enables any user with some level of yaw and pitch arm movement, and arm muscle voluntary contraction, to potentially control an electrical device like a computer, robotic arm, or mobile phone. Simple Gyro data calculates pitch and yaw, while EMG threshold based techniques are used for a virtual enter button. Only light weight signal processing is required to achieve acceptable results, reducing the required processing time on the microcontroller and receiving device, thereby allowing the Fusion Band to be interfaced with almost any device. Three locations on a users arm: wrist, upper forearm and bicep were tested, in order to simulate variations in amputation, while experiments on text input and computer navigation were preformed to analyze the devices usability as a computer interface. The device aims to make interaction in computer applications more intuitive for amputee users.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bi-modal Human Machine Interface for Controlling an Intelligent Wheelchair 智能轮椅控制的双模态人机界面
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.19
E. Rechy-Ramirez, Huosheng Hu
This paper presents a bi-modal human machine interface (HMI) alternative for hands-free control of an electric powered wheelchair (EPW) by means of head movements and facial expressions. The head movements and the facial expressions are detected by using the gyroscope and the cognitiv suite of the Emotiv EPOC sensor, respectively. By employing the cognitiv suite, the user can choose his/her most comfortable facial expressions. Three head movements are used to stop the wheelchair and display the turning commands in the graphical interface (GI) of the HMI, while two facial expressions are employed to move forward the wheelchair and confirm the execution of the turning command displayed on the GI of the HMI. By doing this, the user is free of turning his/her head while the wheelchair is being controlled without the execution of an undesired command. Two subjects have tested the proposed HMI by operating a wheelchair in an indoor environment. Furthermore, five facial expressions have been tested in order to determine that the users can employ different facial expressions for executing the control commands on the wheelchair. The preliminary experiments reveal that our HMI is reliable for operating the wheelchair.
本文提出了一种基于头部运动和面部表情的双模态人机界面(HMI)替代方案,用于电动轮椅(EPW)的免提控制。头部运动和面部表情分别通过陀螺仪和Emotiv EPOC传感器的认知套件进行检测。通过使用认知套件,用户可以选择自己最舒服的面部表情。三个头部动作用于停止轮椅并在人机界面的图形界面显示转弯命令,两个面部表情用于移动轮椅并确认人机界面图形界面显示的转弯命令的执行。这样,当轮椅被控制时,使用者就不用转动他/她的头,而不会执行一个不希望执行的命令。两名受试者通过在室内环境中操作轮椅来测试拟议的人机界面。此外,还测试了五种面部表情,以确定用户可以使用不同的面部表情来执行轮椅上的控制命令。初步实验表明,我们的人机界面是可靠的轮椅操作。
{"title":"Bi-modal Human Machine Interface for Controlling an Intelligent Wheelchair","authors":"E. Rechy-Ramirez, Huosheng Hu","doi":"10.1109/EST.2013.19","DOIUrl":"https://doi.org/10.1109/EST.2013.19","url":null,"abstract":"This paper presents a bi-modal human machine interface (HMI) alternative for hands-free control of an electric powered wheelchair (EPW) by means of head movements and facial expressions. The head movements and the facial expressions are detected by using the gyroscope and the cognitiv suite of the Emotiv EPOC sensor, respectively. By employing the cognitiv suite, the user can choose his/her most comfortable facial expressions. Three head movements are used to stop the wheelchair and display the turning commands in the graphical interface (GI) of the HMI, while two facial expressions are employed to move forward the wheelchair and confirm the execution of the turning command displayed on the GI of the HMI. By doing this, the user is free of turning his/her head while the wheelchair is being controlled without the execution of an undesired command. Two subjects have tested the proposed HMI by operating a wheelchair in an indoor environment. Furthermore, five facial expressions have been tested in order to determine that the users can employ different facial expressions for executing the control commands on the wheelchair. The preliminary experiments reveal that our HMI is reliable for operating the wheelchair.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation 基于传感器模式噪声估计的高效源相机图像锐化
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.25
Ashref Lawgaly, F. Khelifi, A. Bouridane
Sensor pattern noise (SPN) has been widely used for image authentication and camera source identification. Its abundance in terms of the information that it carries along a wide frequency range allows for reliable identification in the presence of many imaging sensors. SPN estimation relies on the difference between a set of images and their smoothened versions to capture the characteristics of the sensor. Therefore, this process uses a part of the sensor noise content which is concentrated in the high frequency range and present in edges, contours and textured areas of the images. In this report, we propose to use a sharpening method to amplify the PRNU components for better estimation, thus enhancing the performance of camera source identification (CSI). Significant improvements have been achieved by the proposed method as demonstrated with two recent source camera identification techniques.
传感器模式噪声(SPN)已广泛应用于图像认证和相机源识别。其丰富的信息,它沿着宽频率范围允许在许多成像传感器的存在可靠的识别。SPN估计依赖于一组图像与其平滑版本之间的差异来捕获传感器的特性。因此,该过程使用了一部分传感器噪声内容,这些噪声内容集中在高频范围内,存在于图像的边缘、轮廓和纹理区域。在本文中,我们提出了一种锐化方法来放大PRNU分量以获得更好的估计,从而提高相机源识别(CSI)的性能。通过两种最新的源相机识别技术,所提出的方法已经取得了显著的改进。
{"title":"Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation","authors":"Ashref Lawgaly, F. Khelifi, A. Bouridane","doi":"10.1109/EST.2013.25","DOIUrl":"https://doi.org/10.1109/EST.2013.25","url":null,"abstract":"Sensor pattern noise (SPN) has been widely used for image authentication and camera source identification. Its abundance in terms of the information that it carries along a wide frequency range allows for reliable identification in the presence of many imaging sensors. SPN estimation relies on the difference between a set of images and their smoothened versions to capture the characteristics of the sensor. Therefore, this process uses a part of the sensor noise content which is concentrated in the high frequency range and present in edges, contours and textured areas of the images. In this report, we propose to use a sharpening method to amplify the PRNU components for better estimation, thus enhancing the performance of camera source identification (CSI). Significant improvements have been achieved by the proposed method as demonstrated with two recent source camera identification techniques.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection 活体检测中注视共线性特征的方向灵敏度
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.7
Asad Ali, F. Deravi, Sanaul Hoque
To increase the trust in using face recognition systems, these need to be capable of differentiating between face images captured from a real person and those captured from photos or similar artifacts presented at the sensor. Methods have been published for face liveness detection by measuring the gaze of a user while the user tracks an object on the screen, which appears at pre-defined, places randomly. In this paper we explore the sensitivity of such a system to different stimulus alignments. The aim is to establish whether there is such sensitivity and if so to explore how this may be exploited for improving the design of the stimulus. The results suggest that collecting feature points along the horizontal direction is more effective than the vertical direction for liveness detection.
为了增加使用人脸识别系统的信任度,这些系统需要能够区分从真人拍摄的人脸图像和从传感器上呈现的照片或类似人工制品中拍摄的人脸图像。当用户跟踪屏幕上随机出现在预定义位置的物体时,通过测量用户的凝视,已经发布了面部活动检测方法。在本文中,我们探讨了这种系统对不同刺激排列的敏感性。目的是确定是否存在这种敏感性,如果存在,则探索如何利用这种敏感性来改进刺激的设计。结果表明,水平方向的特征点采集比垂直方向的特征点采集更有效。
{"title":"Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection","authors":"Asad Ali, F. Deravi, Sanaul Hoque","doi":"10.1109/EST.2013.7","DOIUrl":"https://doi.org/10.1109/EST.2013.7","url":null,"abstract":"To increase the trust in using face recognition systems, these need to be capable of differentiating between face images captured from a real person and those captured from photos or similar artifacts presented at the sensor. Methods have been published for face liveness detection by measuring the gaze of a user while the user tracks an object on the screen, which appears at pre-defined, places randomly. In this paper we explore the sensitivity of such a system to different stimulus alignments. The aim is to establish whether there is such sensitivity and if so to explore how this may be exploited for improving the design of the stimulus. The results suggest that collecting feature points along the horizontal direction is more effective than the vertical direction for liveness detection.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Context-Aware Mobile Biometric Authentication based on Support Vector Machines 基于支持向量机的上下文感知移动生物特征认证
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.38
H. Witte, C. Rathgeb, C. Busch
The ubiquitous use of smartphones raises the need for stronger device protection. Traditional authentication methods on mobile devices are still knowledge-based, exhibiting well- known drawbacks. In addition, requests for passwords, PINs, or screen lock patterns represent an interruption of the device usage. In this paper a context-aware mobile biometric system is proposed. Modern smartphone devices comprise a multitude of sensors which can be utilized to measure a variety of environmental aspects, e.g. noise level or location. Based on this contextual information subject-specific context models are constructed in order to train SVMs, providing an alternative user-friendly authentication mechanism. In experiments a self- acquired database is employed where obtained results confirm the feasibility of the proposed system.
智能手机的普遍使用提高了对更强设备保护的需求。移动设备上的传统认证方法仍然是基于知识的,显示出众所周知的缺陷。此外,请求密码、pin或屏幕锁定模式表示设备使用中断。本文提出了一种情境感知移动生物识别系统。现代智能手机设备包括许多传感器,可用于测量各种环境方面,例如噪音水平或位置。基于这些上下文信息,构建了特定于主题的上下文模型,以训练支持向量机,提供一种替代的用户友好的身份验证机制。在实验中使用了一个自获取数据库,实验结果证实了该系统的可行性。
{"title":"Context-Aware Mobile Biometric Authentication based on Support Vector Machines","authors":"H. Witte, C. Rathgeb, C. Busch","doi":"10.1109/EST.2013.38","DOIUrl":"https://doi.org/10.1109/EST.2013.38","url":null,"abstract":"The ubiquitous use of smartphones raises the need for stronger device protection. Traditional authentication methods on mobile devices are still knowledge-based, exhibiting well- known drawbacks. In addition, requests for passwords, PINs, or screen lock patterns represent an interruption of the device usage. In this paper a context-aware mobile biometric system is proposed. Modern smartphone devices comprise a multitude of sensors which can be utilized to measure a variety of environmental aspects, e.g. noise level or location. Based on this contextual information subject-specific context models are constructed in order to train SVMs, providing an alternative user-friendly authentication mechanism. In experiments a self- acquired database is employed where obtained results confirm the feasibility of the proposed system.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Fourier-Mellin transform for Robust Image Hashing 鲁棒图像哈希的Fourier-Mellin变换
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.17
Supakorn Prungsinchai, F. Khelifi, A. Bouridane
This paper proposes a new perceptual image hashing technique based on the Fourier-Mellin Transform (FMT). The idea consists of exploiting the invariance property of the FMT to extract robust hashes using overlapping blocks in the transform domain. To secure the system, two secrete keys are used in different stages. The results show good robustness against signal processing operations and geometric attacks including translation and rotation and demonstrate the superiority of the proposed technique over related transform based hashing techniques.
提出了一种基于Fourier-Mellin变换(FMT)的感知图像哈希算法。该思想包括利用FMT的不变性在变换域中使用重叠块提取鲁棒哈希。为了保证系统的安全,在不同的阶段使用了两个秘钥。结果表明,该算法对信号处理操作和几何攻击(包括平移和旋转)具有良好的鲁棒性,并证明了该算法优于相关的基于变换的哈希算法。
{"title":"Fourier-Mellin transform for Robust Image Hashing","authors":"Supakorn Prungsinchai, F. Khelifi, A. Bouridane","doi":"10.1109/EST.2013.17","DOIUrl":"https://doi.org/10.1109/EST.2013.17","url":null,"abstract":"This paper proposes a new perceptual image hashing technique based on the Fourier-Mellin Transform (FMT). The idea consists of exploiting the invariance property of the FMT to extract robust hashes using overlapping blocks in the transform domain. To secure the system, two secrete keys are used in different stages. The results show good robustness against signal processing operations and geometric attacks including translation and rotation and demonstrate the superiority of the proposed technique over related transform based hashing techniques.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Age Sensitivity of Face Recognition Algorithms 人脸识别算法的年龄敏感性
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.8
Dk H. Phm Yassin, Sanaul Hoque, F. Deravi
This paper investigates the performance degradation of facial recognition systems due to the influence of age. A comparative analysis of verification performance is conducted for four subspace projection techniques combined with four different distance metrics. The experimental results based on a subset of the MORPH-II database show that the choice of subspace projection technique and associated distance metric can have a significant impact on the performance of the face recognition system for particular age groups.
本文研究了年龄对人脸识别系统性能的影响。对比分析了四种子空间投影技术结合四种不同距离度量的验证性能。基于morphi - ii数据库子集的实验结果表明,子空间投影技术和相关距离度量的选择对特定年龄组人脸识别系统的性能有显著影响。
{"title":"Age Sensitivity of Face Recognition Algorithms","authors":"Dk H. Phm Yassin, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2013.8","DOIUrl":"https://doi.org/10.1109/EST.2013.8","url":null,"abstract":"This paper investigates the performance degradation of facial recognition systems due to the influence of age. A comparative analysis of verification performance is conducted for four subspace projection techniques combined with four different distance metrics. The experimental results based on a subset of the MORPH-II database show that the choice of subspace projection technique and associated distance metric can have a significant impact on the performance of the face recognition system for particular age groups.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construction of Software-Based Digital Physical Clone Resistant Functions 基于软件的数字物理抗克隆功能构建
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.37
Marc Fyrbiak, Christian Kison, W. Adi
Due to the emerging sophisticated physical attacks on security systems, secure authentication of electronic devices becomes more difficult to attain. Recent research showed alarming vulnerabilities in existing cryptographic systems through side channel and (semi)-invasive attacks. The main challenging problem is the break one break all phenomena. As if one successful attack is found, then it may be deployed automatically on any units incorporating similar implementations. Physical Unclonable Functions (PUFs) were introduced as promising solutions to provide resilient device authentication. However, recent research on PUFs showed that PUFs exhibit several implementation complexity, inconsistency and security drawbacks for long-term use. PUF structures, especially for existing microcontroller low-cost applications showed serious drawbacks and cloning vulnerabilities. The objective of this work is to propose a digital PUF alternative by pure software entities with robustness to side channel attacks. The resulting implementation size is comparable to lightweight cryptographic algorithms. The key implementation idea is based on self-creation of secret unknown cryptographic functions. As the implementation is pure digital, no inconsistency compared to that of conventional PUFs is possible and the resulting system would exhibit a long-term resilient consistency. Due to their pure software implementation the cost per unit may reach zero which is quite attractive for practical cloning-protection in many massproduct applications.
由于针对安全系统的复杂物理攻击不断出现,电子设备的安全认证变得越来越困难。最近的研究表明,通过侧信道和(半)侵入性攻击,现有密码系统存在令人担忧的漏洞。主要的挑战问题是打破一个打破所有的现象。如果发现了一个成功的攻击,那么它可能会自动部署到包含类似实现的任何单元上。引入物理不可克隆功能(puf)作为提供弹性设备认证的有前途的解决方案。然而,最近对puf的研究表明,长期使用puf会出现一些实现复杂性、不一致性和安全性缺点。PUF结构,特别是现有的低成本微控制器应用显示出严重的缺陷和克隆漏洞。这项工作的目的是提出一种纯软件实体的数字PUF替代方案,具有对侧信道攻击的鲁棒性。最终的实现大小与轻量级加密算法相当。密钥实现思想是基于秘密未知密码函数的自创建。由于实现是纯数字化的,与传统puf相比,不可能出现不一致性,并且最终的系统将表现出长期的弹性一致性。由于它们的纯软件实现,单位成本可能达到零,这对许多大规模产品应用中的实际克隆保护非常有吸引力。
{"title":"Construction of Software-Based Digital Physical Clone Resistant Functions","authors":"Marc Fyrbiak, Christian Kison, W. Adi","doi":"10.1109/EST.2013.37","DOIUrl":"https://doi.org/10.1109/EST.2013.37","url":null,"abstract":"Due to the emerging sophisticated physical attacks on security systems, secure authentication of electronic devices becomes more difficult to attain. Recent research showed alarming vulnerabilities in existing cryptographic systems through side channel and (semi)-invasive attacks. The main challenging problem is the break one break all phenomena. As if one successful attack is found, then it may be deployed automatically on any units incorporating similar implementations. Physical Unclonable Functions (PUFs) were introduced as promising solutions to provide resilient device authentication. However, recent research on PUFs showed that PUFs exhibit several implementation complexity, inconsistency and security drawbacks for long-term use. PUF structures, especially for existing microcontroller low-cost applications showed serious drawbacks and cloning vulnerabilities. The objective of this work is to propose a digital PUF alternative by pure software entities with robustness to side channel attacks. The resulting implementation size is comparable to lightweight cryptographic algorithms. The key implementation idea is based on self-creation of secret unknown cryptographic functions. As the implementation is pure digital, no inconsistency compared to that of conventional PUFs is possible and the resulting system would exhibit a long-term resilient consistency. Due to their pure software implementation the cost per unit may reach zero which is quite attractive for practical cloning-protection in many massproduct applications.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimizing 2D Gabor Filters for Iris Recognition 优化用于虹膜识别的二维Gabor滤波器
Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.15
P. Radu, K. Sirlantzis, W. Howells, Sanaul Hoque, F. Deravi
The randomness and richness present in the iris texture make the 2D Gabor filter bank analysis a suitable technique to be used for iris recognition systems. To accurately characterize complex texture structures using 2D Gabor filters it is necessary to use multiple sets of parameters of this type of filters. This paper proposes a technique of optimizing multiple sets of 2D Gabor filter parameters to gradually enhance the accuracy of an iris recognition system. The proposed methodology is suitable to be applied on both near infrared and visible spectrum iris images. To illustrate the efficiency of the filter bank design technique, UBIRISv1 database was used for benchmarking.
虹膜纹理的随机性和丰富性使二维Gabor滤波器组分析成为虹膜识别系统的一种合适的分析方法。为了使用二维Gabor滤波器准确表征复杂的纹理结构,需要使用多组这类滤波器的参数。本文提出了一种优化多组二维Gabor滤波器参数的技术,以逐步提高虹膜识别系统的精度。该方法适用于近红外和可见光谱虹膜图像。为了说明滤波器组设计技术的效率,使用UBIRISv1数据库进行基准测试。
{"title":"Optimizing 2D Gabor Filters for Iris Recognition","authors":"P. Radu, K. Sirlantzis, W. Howells, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2013.15","DOIUrl":"https://doi.org/10.1109/EST.2013.15","url":null,"abstract":"The randomness and richness present in the iris texture make the 2D Gabor filter bank analysis a suitable technique to be used for iris recognition systems. To accurately characterize complex texture structures using 2D Gabor filters it is necessary to use multiple sets of parameters of this type of filters. This paper proposes a technique of optimizing multiple sets of 2D Gabor filter parameters to gradually enhance the accuracy of an iris recognition system. The proposed methodology is suitable to be applied on both near infrared and visible spectrum iris images. To illustrate the efficiency of the filter bank design technique, UBIRISv1 database was used for benchmarking.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 Fourth International Conference on Emerging Security Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1