首页 > 最新文献

2012 Third International Conference on Emerging Security Technologies最新文献

英文 中文
An ICMetrics Based Lightweight Security Architecture Using Lattice Signcryption 一种基于ICMetrics的使用点阵签名加密的轻量级安全体系结构
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.43
Ruhma Tahir, K. Mcdonald-Maier
The advent of embedded systems has completely transformed the information landscape. With the explosive growth in the use of interactive real-time technologies, this internet landscape aims to support an even broader range of application domains. The large amount of data that is exchanged by these applications has made them an attractive target for attacks. Thus it is important to employ security mechanisms to protect these systems from attackers. A major challenge facing researchers is the resource constrained nature of these systems, which renders most of the traditional security mechanisms almost useless. In this paper we propose a lightweight ICmetrics based security architecture using lattices. The features of the proposed architecture fulfill both the requirements of security as well as energy efficiency. The proposed architecture provides authentication, confidentiality, non-repudiation and integrity of data. Using the identity information derived from ICmetrics of the device, we further construct a sign cryption scheme based on lattices that makes use of certificate less PKC to achieve the security requirements of the design. This scheme is targeted on resource constrained environments, and can be used widely in applications that require sufficient levels of security with limited resources.
嵌入式系统的出现彻底改变了信息领域。随着交互式实时技术使用的爆炸式增长,这种互联网格局旨在支持更广泛的应用领域。这些应用程序交换的大量数据使它们成为有吸引力的攻击目标。因此,重要的是采用安全机制来保护这些系统免受攻击者的攻击。研究人员面临的一个主要挑战是这些系统的资源约束性质,这使得大多数传统的安全机制几乎毫无用处。在本文中,我们提出了一种使用格的轻量级的基于ICmetrics的安全架构。所提出的体系结构的特点既满足了安全性要求,又满足了能效要求。所提出的体系结构提供了数据的身份验证、机密性、不可否认性和完整性。利用从设备的ICmetrics中获得的身份信息,我们进一步构建了一个基于格的符号加密方案,该方案利用证书较少的PKC来实现设计的安全要求。该方案针对资源受限的环境,可广泛用于需要足够安全级别和有限资源的应用程序。
{"title":"An ICMetrics Based Lightweight Security Architecture Using Lattice Signcryption","authors":"Ruhma Tahir, K. Mcdonald-Maier","doi":"10.1109/EST.2012.43","DOIUrl":"https://doi.org/10.1109/EST.2012.43","url":null,"abstract":"The advent of embedded systems has completely transformed the information landscape. With the explosive growth in the use of interactive real-time technologies, this internet landscape aims to support an even broader range of application domains. The large amount of data that is exchanged by these applications has made them an attractive target for attacks. Thus it is important to employ security mechanisms to protect these systems from attackers. A major challenge facing researchers is the resource constrained nature of these systems, which renders most of the traditional security mechanisms almost useless. In this paper we propose a lightweight ICmetrics based security architecture using lattices. The features of the proposed architecture fulfill both the requirements of security as well as energy efficiency. The proposed architecture provides authentication, confidentiality, non-repudiation and integrity of data. Using the identity information derived from ICmetrics of the device, we further construct a sign cryption scheme based on lattices that makes use of certificate less PKC to achieve the security requirements of the design. This scheme is targeted on resource constrained environments, and can be used widely in applications that require sufficient levels of security with limited resources.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics 利用ICmetrics提高无线传感器网络抗节点捕获攻击的弹性
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.44
Ruhma Tahir, K. Mcdonald-Maier
Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly due to their ability to operate in unattended environments makes them even more vulnerable to various sorts of attacks. Among these attacks is node capture attack in WSNs, whose threat severity can range from a single node being compromised in the network to the whole network being compromised as a result of that single node compromise. In this paper, we propose the use of ICMetric technology to provide resilience against node compromise in WSN. ICmetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. These properties of ICmetrics can help safeguard WSNs from various node capture attacks.
无线传感器网络(wsn)具有从战场监视到日常应用(如智能家居和患者监测)的各种应用的潜力。安全性是目前所有基于无线传感器网络的应用所面临的主要挑战。首先,由于无线传感器网络的无线特性,其次,由于它们在无人值守的环境中运行的能力,使它们更容易受到各种攻击。其中一种攻击是wsn中的节点捕获攻击,其威胁程度可以从网络中的单个节点被攻破到单个节点被攻破导致整个网络被攻破。在本文中,我们建议使用ICMetric技术来提供WSN中针对节点妥协的弹性。ICmetrics根据集成电路的可测量硬件和软件特性生成传感器节点的安全属性。ICmetrics的这些属性可以帮助保护wsn免受各种节点捕获攻击。
{"title":"Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics","authors":"Ruhma Tahir, K. Mcdonald-Maier","doi":"10.1109/EST.2012.44","DOIUrl":"https://doi.org/10.1109/EST.2012.44","url":null,"abstract":"Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly due to their ability to operate in unattended environments makes them even more vulnerable to various sorts of attacks. Among these attacks is node capture attack in WSNs, whose threat severity can range from a single node being compromised in the network to the whole network being compromised as a result of that single node compromise. In this paper, we propose the use of ICMetric technology to provide resilience against node compromise in WSN. ICmetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. These properties of ICmetrics can help safeguard WSNs from various node capture attacks.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Computation of Cross-Coupling for Reliable System Operation 系统可靠运行的交叉耦合计算
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.10
H. Kadim, L. M. Coulibaly
Critical applications in areas such as defence, security and space exploration will have design challenges created by factors such as cost, size and tolerance. Scaled technologies will offer a huge potential in these areas, as they are inherently faster, low-power, low-cost and more harsh-environment tolerant. Moving toward nanoscale designs will trigger many design challenges that need to be addressed and dealt with for better system performance and reliability of operation. One such design challenge is the close proximity of on-chip interconnects coupled with reduced dielectric-thickness, leading to cross-coupling effects. The effect of cross-coupling may range from minor performance deterioration to system failure - thus impeding planned operations and tasks. A method for effectively and efficiently describing and determining the cross-coupling effects between multi-layer, multi-coupled interconnect-systems is presented.
国防、安全和空间探索等领域的关键应用将面临成本、尺寸和公差等因素带来的设计挑战。规模化技术将在这些领域提供巨大的潜力,因为它们固有的速度更快、低功耗、低成本和更恶劣的环境耐受性。纳米级设计将引发许多设计挑战,需要解决和处理更好的系统性能和运行可靠性。这样的设计挑战之一是片上互连的近距离加上减少的介电厚度,导致交叉耦合效应。交叉耦合的影响范围可能从轻微的性能下降到系统故障——从而阻碍计划的操作和任务。提出了一种有效地描述和确定多层多耦合互连系统间交叉耦合效应的方法。
{"title":"Computation of Cross-Coupling for Reliable System Operation","authors":"H. Kadim, L. M. Coulibaly","doi":"10.1109/EST.2012.10","DOIUrl":"https://doi.org/10.1109/EST.2012.10","url":null,"abstract":"Critical applications in areas such as defence, security and space exploration will have design challenges created by factors such as cost, size and tolerance. Scaled technologies will offer a huge potential in these areas, as they are inherently faster, low-power, low-cost and more harsh-environment tolerant. Moving toward nanoscale designs will trigger many design challenges that need to be addressed and dealt with for better system performance and reliability of operation. One such design challenge is the close proximity of on-chip interconnects coupled with reduced dielectric-thickness, leading to cross-coupling effects. The effect of cross-coupling may range from minor performance deterioration to system failure - thus impeding planned operations and tasks. A method for effectively and efficiently describing and determining the cross-coupling effects between multi-layer, multi-coupled interconnect-systems is presented.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and Classification of Repetitious Human Motions Combining Shift Variant and Invariant Features 结合移变与不变特征的重复人体动作检测与分类
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.7
I. Ide, Takumi Kuhara, Daisuke Deguchi, Tomokazu Takahashi, H. Murase
Detection and classification of significant human motions are important tasks when analyzing a video that records human activities. Among various human motions, we consider that repetitious motions are specially important since they are usually results of activities with clear intentions. In this paper, we propose and evaluate a method that detects video segments that contain repetitious motions, which is robust to motion shift. Experimental results showed the effectiveness of the proposed method compared to conventional methods. In addition, we report a preliminary result of an experiment on the classification of the types of the detected repetitious motions.
在分析记录人类活动的视频时,检测和分类重要的人类动作是重要的任务。在人类的各种动作中,我们认为重复的动作特别重要,因为它们通常是具有明确意图的活动的结果。在本文中,我们提出并评估了一种检测包含重复运动的视频片段的方法,该方法对运动移位具有鲁棒性。实验结果表明,与传统方法相比,该方法是有效的。此外,我们还报告了对检测到的重复动作类型进行分类的初步实验结果。
{"title":"Detection and Classification of Repetitious Human Motions Combining Shift Variant and Invariant Features","authors":"I. Ide, Takumi Kuhara, Daisuke Deguchi, Tomokazu Takahashi, H. Murase","doi":"10.1109/EST.2012.7","DOIUrl":"https://doi.org/10.1109/EST.2012.7","url":null,"abstract":"Detection and classification of significant human motions are important tasks when analyzing a video that records human activities. Among various human motions, we consider that repetitious motions are specially important since they are usually results of activities with clear intentions. In this paper, we propose and evaluate a method that detects video segments that contain repetitious motions, which is robust to motion shift. Experimental results showed the effectiveness of the proposed method compared to conventional methods. In addition, we report a preliminary result of an experiment on the classification of the types of the detected repetitious motions.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Thermal Face Recognition: A Fusion Approach 热人脸识别:一种融合方法
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.24
Stepán Mrácek, J. Váňa, M. Drahanský, R. Dvořák, S. Yanushkevich
One of underused biometric methods is the face recognition based on thermal images. Nevertheless, in the applications such as liveness detection or fever scan, the thermal face recognition is used as a standalone module, or as a part of a multimodal biometric system. This article presents an overview and comparison of various statistical methods for thermal facial image analysis and recognition. It also proposes an approach to fusion of some methods to improve the overall performance.
基于热图像的人脸识别是目前尚未得到充分利用的生物识别方法之一。然而,在活体检测或发热扫描等应用中,热人脸识别被用作独立模块,或作为多模态生物识别系统的一部分。本文对热人脸图像分析与识别的各种统计方法进行了综述和比较。提出了一种融合多种方法的方法,以提高系统的整体性能。
{"title":"Thermal Face Recognition: A Fusion Approach","authors":"Stepán Mrácek, J. Váňa, M. Drahanský, R. Dvořák, S. Yanushkevich","doi":"10.1109/EST.2012.24","DOIUrl":"https://doi.org/10.1109/EST.2012.24","url":null,"abstract":"One of underused biometric methods is the face recognition based on thermal images. Nevertheless, in the applications such as liveness detection or fever scan, the thermal face recognition is used as a standalone module, or as a part of a multimodal biometric system. This article presents an overview and comparison of various statistical methods for thermal facial image analysis and recognition. It also proposes an approach to fusion of some methods to improve the overall performance.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Liveness Detection Using Gaze Collinearity 使用凝视共线性的活体检测
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.12
Asad Ali, F. Deravi, Sanaul Hoque
This paper presents a liveness detection method based on tracking the gaze of the user of a face recognition system using a single camera. The user is required to follow a visual animation of a moving object on a display screen while his/her gaze is measured. The visual stimulus is designed to direct the gaze of the user to sets of collinear points on the screen. Features based on the measured collinearity of the observed gaze are then used to discriminate between live attempts at responding to this challenge and those conducted by "impostors" holding photographs and attempting to follow the stimulus. An initial set of experiments is reported that indicates the effectiveness of the proposed method in detecting this class of spoofing attacks.
本文提出了一种基于单摄像头跟踪人脸识别系统用户注视的动态检测方法。用户需要跟随屏幕上移动物体的视觉动画,同时测量他/她的视线。视觉刺激的目的是将用户的视线引导到屏幕上的一组共线点。基于观察到的凝视的共线性测量的特征,然后被用来区分对这个挑战做出反应的真实尝试和那些拿着照片并试图跟随刺激的“冒名顶替者”。一组初步的实验表明,该方法在检测这类欺骗攻击方面是有效的。
{"title":"Liveness Detection Using Gaze Collinearity","authors":"Asad Ali, F. Deravi, Sanaul Hoque","doi":"10.1109/EST.2012.12","DOIUrl":"https://doi.org/10.1109/EST.2012.12","url":null,"abstract":"This paper presents a liveness detection method based on tracking the gaze of the user of a face recognition system using a single camera. The user is required to follow a visual animation of a moving object on a display screen while his/her gaze is measured. The visual stimulus is designed to direct the gaze of the user to sets of collinear points on the screen. Features based on the measured collinearity of the observed gaze are then used to discriminate between live attempts at responding to this challenge and those conducted by \"impostors\" holding photographs and attempting to follow the stimulus. An initial set of experiments is reported that indicates the effectiveness of the proposed method in detecting this class of spoofing attacks.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
EKF Based Mobile Robot Localization 基于EKF的移动机器人定位
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.19
Ling Chen, Huosheng Hu, K. Mcdonald-Maier
Localization plays a significant role in the autonomous navigation of a mobile robot. This paper investigates mobile robot localization based on Extended Kalman Filter(EKF) algorithm and a feature based map. Corner angles in the environment are detected as the features, and the detailed processes of feature extraction are described. Then the motion model and odometry information are elaborated, and the EKF localization algorithm is presented. Finally, the experimental result is given to verify the feasibility and performance of the proposed localization algorithm.
定位在移动机器人的自主导航中起着至关重要的作用。研究了基于扩展卡尔曼滤波(EKF)算法和特征地图的移动机器人定位问题。将环境中的角作为特征进行检测,并详细描述了特征提取的过程。然后阐述了运动模型和里程计信息,提出了EKF定位算法。最后给出了实验结果,验证了所提出的定位算法的可行性和性能。
{"title":"EKF Based Mobile Robot Localization","authors":"Ling Chen, Huosheng Hu, K. Mcdonald-Maier","doi":"10.1109/EST.2012.19","DOIUrl":"https://doi.org/10.1109/EST.2012.19","url":null,"abstract":"Localization plays a significant role in the autonomous navigation of a mobile robot. This paper investigates mobile robot localization based on Extended Kalman Filter(EKF) algorithm and a feature based map. Corner angles in the environment are detected as the features, and the detailed processes of feature extraction are described. Then the motion model and odometry information are elaborated, and the EKF localization algorithm is presented. Finally, the experimental result is given to verify the feasibility and performance of the proposed localization algorithm.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Identity Management and Integrity Protection in the Internet of Things 物联网中的身份管理与完整性保护
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.15
A. Fongen
Authentication and Identity Management help to protect resources and justify trust in "bona fide" operation by service client and service provider. Besides, identity management can support hardware assisted integrity protection. In the Internet of Things (IoT), the high number of lightweight devices requires scalable and lightweight solutions to trust management. The paper proposes a framework for authentication and integrity protection well suited for anIoT environment.
身份验证和身份管理有助于保护资源,并证明服务客户端和服务提供者对“真实”操作的信任。此外,身份管理可以支持硬件辅助的完整性保护。在物联网(IoT)中,大量轻量级设备需要可扩展和轻量级的解决方案来进行信任管理。本文提出了一种适合于anot环境的认证和完整性保护框架。
{"title":"Identity Management and Integrity Protection in the Internet of Things","authors":"A. Fongen","doi":"10.1109/EST.2012.15","DOIUrl":"https://doi.org/10.1109/EST.2012.15","url":null,"abstract":"Authentication and Identity Management help to protect resources and justify trust in \"bona fide\" operation by service client and service provider. Besides, identity management can support hardware assisted integrity protection. In the Internet of Things (IoT), the high number of lightweight devices requires scalable and lightweight solutions to trust management. The paper proposes a framework for authentication and integrity protection well suited for anIoT environment.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
On the Effectiveness of EEG Signals as a Source of Biometric Information 脑电信号作为生物特征信息源的有效性研究
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.8
Su Yang, F. Deravi
This paper presents a biometric person recognition system using electroencephalogram (EEG) signals as the source of identity information. Wavelet transform is used for extracting features from raw EEG signals which are then classified using a support vector machine and a knearestneighbour classifier to recognize the individuals. A number of stimuli are explored using up to 18 subjects to generate person-specific EEG patterns to explore which type of stimulus may achieve better recognition rates. A comparison between two kinds of tasks - motor movement and motor imagery - appears to indicate that imagery tasks show better and more stable performance than movement tasks. The paper also reports on the impact of the number and positioning of the electrodes on performance.
提出了一种利用脑电图信号作为身份信息来源的生物特征人识别系统。利用小波变换从原始脑电图信号中提取特征,然后利用支持向量机和最近邻分类器进行分类,实现个体识别。研究人员使用多达18名受试者对多种刺激进行了探索,以生成个人特定的脑电图模式,以探索哪种类型的刺激可能达到更好的识别率。运动运动任务和运动想象任务之间的比较似乎表明,想象任务比运动任务表现出更好、更稳定的表现。本文还报道了电极的数量和位置对性能的影响。
{"title":"On the Effectiveness of EEG Signals as a Source of Biometric Information","authors":"Su Yang, F. Deravi","doi":"10.1109/EST.2012.8","DOIUrl":"https://doi.org/10.1109/EST.2012.8","url":null,"abstract":"This paper presents a biometric person recognition system using electroencephalogram (EEG) signals as the source of identity information. Wavelet transform is used for extracting features from raw EEG signals which are then classified using a support vector machine and a knearestneighbour classifier to recognize the individuals. A number of stimuli are explored using up to 18 subjects to generate person-specific EEG patterns to explore which type of stimulus may achieve better recognition rates. A comparison between two kinds of tasks - motor movement and motor imagery - appears to indicate that imagery tasks show better and more stable performance than movement tasks. The paper also reports on the impact of the number and positioning of the electrodes on performance.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Understanding Familiar Face Recognition for 3D Scanned Images: The Importance of Internal and External Facial Features 了解熟悉的人脸识别的3D扫描图像:内部和外部面部特征的重要性
Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.36
Anna Williams, H. Chang, C. Frowd
Clay or computerised facial reconstructions are often presented to the public for recognition without information about the external features of a head (hair, ears and neck) as these are thought to be potentially distracting or even misleading. In this context, the mechanisms of face recognition are poorly understood, but existing research using photographs of familiar faces suggests that external features play an important role for recognition, and external features may even be necessary for recognition to occur at all. The current research aimed to determine the contribution that external features make to the recognition of a familiar face rendered in 3D. It will also determine whether the inclusion or exclusion of external features from a reconstruction is likely to be beneficial. Volunteers were asked to name images of 3D faces of people known to them, presented as either full face 3D surface scans, or where the internal or external features had been removed. As was expected, a clear correlation was found between information presented in the scans and the recognition rate, with participants correctly naming full face images most often and images of external features least often. Logistic regression analysis demonstrated a significant linear trend in recognition rate in the order of external features, internal features and full face. Incorrect naming also increased linearly, indicating that participants were more likely to offer a name (correct or otherwise) when more useful facial information was provided.
粘土或计算机化的面部重建经常在没有头部外部特征(头发、耳朵和脖子)信息的情况下呈现给公众以供识别,因为这些被认为可能会分散注意力甚至误导。在这种背景下,人脸识别的机制尚不清楚,但现有的使用熟悉面孔照片的研究表明,外部特征在识别中起着重要作用,外部特征甚至可能是识别发生的必要条件。目前的研究旨在确定外部特征对3D图像中熟悉面孔的识别的贡献。它还将决定在重建中是否包含或排除外部特征可能是有益的。志愿者被要求说出他们认识的人的3D面部图像,这些图像要么是全脸的3D表面扫描,要么是内部或外部特征被删除的图像。正如预期的那样,在扫描中呈现的信息和识别率之间发现了明显的相关性,参与者正确命名全脸图像的频率最高,而外部特征图像的频率最低。Logistic回归分析表明,人脸的外部特征、内部特征和全脸特征的识别率呈显著的线性趋势。错误的命名也呈线性增加,这表明当提供更多有用的面部信息时,参与者更有可能提供一个名字(正确的或不正确的)。
{"title":"Understanding Familiar Face Recognition for 3D Scanned Images: The Importance of Internal and External Facial Features","authors":"Anna Williams, H. Chang, C. Frowd","doi":"10.1109/EST.2012.36","DOIUrl":"https://doi.org/10.1109/EST.2012.36","url":null,"abstract":"Clay or computerised facial reconstructions are often presented to the public for recognition without information about the external features of a head (hair, ears and neck) as these are thought to be potentially distracting or even misleading. In this context, the mechanisms of face recognition are poorly understood, but existing research using photographs of familiar faces suggests that external features play an important role for recognition, and external features may even be necessary for recognition to occur at all. The current research aimed to determine the contribution that external features make to the recognition of a familiar face rendered in 3D. It will also determine whether the inclusion or exclusion of external features from a reconstruction is likely to be beneficial. Volunteers were asked to name images of 3D faces of people known to them, presented as either full face 3D surface scans, or where the internal or external features had been removed. As was expected, a clear correlation was found between information presented in the scans and the recognition rate, with participants correctly naming full face images most often and images of external features least often. Logistic regression analysis demonstrated a significant linear trend in recognition rate in the order of external features, internal features and full face. Incorrect naming also increased linearly, indicating that participants were more likely to offer a name (correct or otherwise) when more useful facial information was provided.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"604 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134600466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Third International Conference on Emerging Security Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1