To solve some critical issues raised by anastylosis techniques, such as the deterioration of the original fragments due to continuous handling, and to compare alternative matching solutions for choosing the best one for real restoration, the pattern recognition and computer vision communities are proposing approaches that work on virtual copies of the fragments, providing new methodologies that help in the matching task. In this paper, we present Javastylosis, a tool that can support restorers for reassembling 2D images of damaged frescoes. With this computer-assisted methodology the user can apply chromatic and semantics principles. Each virtual fragments can be moved and rotated, and the same operations can be applied on groups of fragments. During the matching task, spurious elements can be discarded, and the final result is a digital solution of the 'puzzles' made by the artwork fragments, providing a table of coordinates useful to the restorers to correctly reposition the real fragments. The graphical interface, designed to be easy and intuitive, has been studied for and tested by people belonging to the autism spectrum but with very acute visual skills, so that inclusion opportunities can be given to this group of disadvantaged people.
{"title":"Javastylosis","authors":"Virginio Cantoni, Mauro Mosconi, Setti Alessandra","doi":"10.1145/3407982.3408025","DOIUrl":"https://doi.org/10.1145/3407982.3408025","url":null,"abstract":"To solve some critical issues raised by anastylosis techniques, such as the deterioration of the original fragments due to continuous handling, and to compare alternative matching solutions for choosing the best one for real restoration, the pattern recognition and computer vision communities are proposing approaches that work on virtual copies of the fragments, providing new methodologies that help in the matching task. In this paper, we present Javastylosis, a tool that can support restorers for reassembling 2D images of damaged frescoes. With this computer-assisted methodology the user can apply chromatic and semantics principles. Each virtual fragments can be moved and rotated, and the same operations can be applied on groups of fragments. During the matching task, spurious elements can be discarded, and the final result is a digital solution of the 'puzzles' made by the artwork fragments, providing a table of coordinates useful to the restorers to correctly reposition the real fragments. The graphical interface, designed to be easy and intuitive, has been studied for and tested by people belonging to the autism spectrum but with very acute visual skills, so that inclusion opportunities can be given to this group of disadvantaged people.","PeriodicalId":309371,"journal":{"name":"Proceedings of the 21st International Conference on Computer Systems and Technologies '20","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123853565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we propose a user authentication method on smartphone devices based on the popular pattern lock mechanism, called the Simple Game For Authentication (SGFA). The SGFA mechanism resembles a simple game involving connecting points on the touch screen that is relatively easy to perform. To provide increased security, the mechanism utilizes both the user's knowledge and behavioral biometrics based on touch screen interaction an active layer of defence against unauthorized access. Based on an initial experiment, we determine the minimum number of strokes forming a password to reach a satisfying level of success rate. We discuss possible problems and attacks that can potentially break the process and evaluate the impact of over-the-shoulder attacks on the security of the password-matching layer. We further evaluate the biometric layer in terms of user authentication error rates. In an experiment involving 33 participants, the biometric layer achieved the false acceptance rate (FAR) and false rejection rate (FRR) of approx. 1.4% and 2%, respectively. Combined with the password-matching layer, the SGFA mechanism provides a more secure approach than pattern locks.
{"title":"SGFA","authors":"Lukáš Janík, D. Chudá, Kamil Burda","doi":"10.1145/3407982.3408021","DOIUrl":"https://doi.org/10.1145/3407982.3408021","url":null,"abstract":"In this paper we propose a user authentication method on smartphone devices based on the popular pattern lock mechanism, called the Simple Game For Authentication (SGFA). The SGFA mechanism resembles a simple game involving connecting points on the touch screen that is relatively easy to perform. To provide increased security, the mechanism utilizes both the user's knowledge and behavioral biometrics based on touch screen interaction an active layer of defence against unauthorized access. Based on an initial experiment, we determine the minimum number of strokes forming a password to reach a satisfying level of success rate. We discuss possible problems and attacks that can potentially break the process and evaluate the impact of over-the-shoulder attacks on the security of the password-matching layer. We further evaluate the biometric layer in terms of user authentication error rates. In an experiment involving 33 participants, the biometric layer achieved the false acceptance rate (FAR) and false rejection rate (FRR) of approx. 1.4% and 2%, respectively. Combined with the password-matching layer, the SGFA mechanism provides a more secure approach than pattern locks.","PeriodicalId":309371,"journal":{"name":"Proceedings of the 21st International Conference on Computer Systems and Technologies '20","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}