首页 > 最新文献

2017 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Image processing techniques for improving vascular hand biometrics 改进血管手生物识别的图像处理技术
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167807
Paloma Tirado-Martin, Ramón Blanco-Gonzalo, Alba Alvarez-Nieto, Alvaro Romero-Diaz
Since the beginning of hand vein biometrics, the approaches to this problem have been countless, making this modality suitable for commercial use in some countries. This paper shows some of them and tries to show which are the most common procedures in each of the main stages of these systems. We will be able to see that the same database usage is not common along the literature, being the main problem when evaluating the performance of a new system.
自手部静脉生物识别技术开始以来,解决这一问题的方法数不胜数,使得这种模式适合在一些国家进行商业应用。本文展示了其中的一些,并试图展示在这些系统的每个主要阶段中哪些是最常见的过程。我们将能够看到,相同的数据库使用在文献中并不常见,这是评估新系统性能时的主要问题。
{"title":"Image processing techniques for improving vascular hand biometrics","authors":"Paloma Tirado-Martin, Ramón Blanco-Gonzalo, Alba Alvarez-Nieto, Alvaro Romero-Diaz","doi":"10.1109/CCST.2017.8167807","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167807","url":null,"abstract":"Since the beginning of hand vein biometrics, the approaches to this problem have been countless, making this modality suitable for commercial use in some countries. This paper shows some of them and tries to show which are the most common procedures in each of the main stages of these systems. We will be able to see that the same database usage is not common along the literature, being the main problem when evaluating the performance of a new system.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing e-learning and blended learning for threat detection in airport security X-ray screening 比较电子学习和混合学习在机场安检x射线检查中的威胁检测
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167810
S. Michel, Nicole Hättenschwiler, Melina Zeballos, A. Schwaninger
This study investigated the effectiveness of e-learning and blended learning for airport security officers (screeners) aimed at increasing their detection of novel prohibited items in X-ray images of passenger bags. 80 screeners from a large European airport conducted a simulated X-ray baggage screening task (SXBST). Based on hit- and false alarm rates, d-prime, age, gender and job experience, four equivalent screener groups were created. The first group (EL1) conducted six different e-learning modules. The second group (EL2) repeated the e-learning modules once with a predefined time interval of one week in-between. The third group (BL) participated in an asynchrony blended learning course where all participants first conducted the six e-learning modules followed by classroom training. The control group (CG) did neither conduct e-learning nor participate in the blended learning course. All four groups conducted the SXBST again after these interventions. Statistical analyses of the hit rates for novel prohibited items showed a significant main effect of group (EL1, EL2, BL, CG). Post-hoc tests showed that the increase of the hit rate for EL1 vs. CG, EL2 vs. CG and BL vs. CG was significant. Therefore, all interventions helped to increase the detection of novel prohibited items in X-ray images of passenger bags. Additionally, the hit rate for BL was significantly higher compared to EL1, which underlies the benefit of blended learning as a combination of classroom and online-training. The repetition of the e-learning modules (EL2) led to a marginally significant increase of the hit rate compared to EL1. The difference between EL2 and BL was not significant. This suggests that when training duration is controlled, the advantage of blended learning compared to e-learning vanishes. In addition, training did not impact false alarm rate as the main effect of group was not significant. Analysis of response times showed no speed-accuracy tradeoff but screeners needed significantly more time to analyze target-absent images than target-present images and this effect was independent of group. Overall, these findings suggest that e-learning as well as blended learning are effective to improve screeners' detection of novel prohibited items in X-ray images of passenger bags. Implications for X-ray image interpretation training for screeners are discussed.
本研究调查了电子学习和混合学习对机场安检人员(安检人员)的有效性,旨在提高他们对旅客行李x光图像中新型违禁物品的检测。来自欧洲某大型机场的80名安检人员进行了一项模拟x光行李检查任务(SXBST)。根据击中率和误报率、d-prime、年龄、性别和工作经验,创建了四个相同的筛选组。第一组(EL1)进行了六个不同的电子学习模块。第二组(EL2)重复一次电子学习模块,中间间隔一周。第三组(BL)参加了一个异步混合学习课程,所有参与者首先进行了六个电子学习模块,然后进行了课堂培训。对照组(CG)既不进行电子学习,也不参加混合学习课程。所有四组在干预后再次进行SXBST。对新型违禁物品命中率的统计分析显示,组(EL1、EL2、BL、CG)的主效应显著。事后测试显示,EL1与CG、EL2与CG、BL与CG的命中率均有显著提高。因此,所有干预措施都有助于在旅客行李的x光图像中增加对新型违禁物品的检测。此外,与EL1相比,BL的命中率明显更高,这是混合学习作为课堂和在线培训结合的潜在好处。与EL1相比,重复的电子学习模块(EL2)导致命中率略微显着增加。EL2与BL差异不显著。这表明,当训练时间受到控制时,混合学习与电子学习相比的优势就消失了。此外,训练不影响误报率,组的主效应不显著。对反应时间的分析显示,没有速度和准确性的权衡,但筛选者需要更多的时间来分析目标缺失的图像,而不是目标存在的图像,这种影响与组无关。总的来说,这些发现表明,电子学习和混合学习可以有效提高安检人员对旅客行李x射线图像中新型违禁物品的检测。讨论了筛选人员x射线图像解译训练的意义。
{"title":"Comparing e-learning and blended learning for threat detection in airport security X-ray screening","authors":"S. Michel, Nicole Hättenschwiler, Melina Zeballos, A. Schwaninger","doi":"10.1109/CCST.2017.8167810","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167810","url":null,"abstract":"This study investigated the effectiveness of e-learning and blended learning for airport security officers (screeners) aimed at increasing their detection of novel prohibited items in X-ray images of passenger bags. 80 screeners from a large European airport conducted a simulated X-ray baggage screening task (SXBST). Based on hit- and false alarm rates, d-prime, age, gender and job experience, four equivalent screener groups were created. The first group (EL1) conducted six different e-learning modules. The second group (EL2) repeated the e-learning modules once with a predefined time interval of one week in-between. The third group (BL) participated in an asynchrony blended learning course where all participants first conducted the six e-learning modules followed by classroom training. The control group (CG) did neither conduct e-learning nor participate in the blended learning course. All four groups conducted the SXBST again after these interventions. Statistical analyses of the hit rates for novel prohibited items showed a significant main effect of group (EL1, EL2, BL, CG). Post-hoc tests showed that the increase of the hit rate for EL1 vs. CG, EL2 vs. CG and BL vs. CG was significant. Therefore, all interventions helped to increase the detection of novel prohibited items in X-ray images of passenger bags. Additionally, the hit rate for BL was significantly higher compared to EL1, which underlies the benefit of blended learning as a combination of classroom and online-training. The repetition of the e-learning modules (EL2) led to a marginally significant increase of the hit rate compared to EL1. The difference between EL2 and BL was not significant. This suggests that when training duration is controlled, the advantage of blended learning compared to e-learning vanishes. In addition, training did not impact false alarm rate as the main effect of group was not significant. Analysis of response times showed no speed-accuracy tradeoff but screeners needed significantly more time to analyze target-absent images than target-present images and this effect was independent of group. Overall, these findings suggest that e-learning as well as blended learning are effective to improve screeners' detection of novel prohibited items in X-ray images of passenger bags. Implications for X-ray image interpretation training for screeners are discussed.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process 分割,重组和征服:语法模式-重组算法应用于密码猜测过程
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167849
Iwen Coisel, Ignacio Sanchez, Javier Galbally
This work proposes a novel password guessing approach based on the identification, extraction and recombination of meaningful syntactic patterns present in human-chosen passwords. The proposed method exploits the existence of these patterns across user-selected passwords in order to effectively reduce the search space to be explored during the password guessing process. The password guessing scheme follows a two stage strategy. In the first step, a novel algorithm based on machine learning principles, identifies and extracts the syntactic meaningful patterns from a dataset of passwords. Then, in a second stage, these parts-of-passwords previously segmented are recombined in order to generate new statistically relevant password candidates that are used against a blind evaluation set. The experimental results show that this novel approach is able to guess complex passwords usually robust to traditional password guessing techniques.
本文提出了一种基于识别、提取和重组人工选择密码中有意义的语法模式的新型密码猜测方法。该方法利用用户选择的密码中存在的这些模式,从而有效地减少了密码猜测过程中需要探索的搜索空间。密码猜测方案遵循两阶段策略。在第一步,一种基于机器学习原理的新算法,从密码数据集中识别和提取有语法意义的模式。然后,在第二阶段,这些先前分割的密码部分被重新组合,以生成新的统计相关的候选密码,这些候选密码用于盲评估集。实验结果表明,该方法对复杂密码具有较强的鲁棒性。
{"title":"Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process","authors":"Iwen Coisel, Ignacio Sanchez, Javier Galbally","doi":"10.1109/CCST.2017.8167849","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167849","url":null,"abstract":"This work proposes a novel password guessing approach based on the identification, extraction and recombination of meaningful syntactic patterns present in human-chosen passwords. The proposed method exploits the existence of these patterns across user-selected passwords in order to effectively reduce the search space to be explored during the password guessing process. The password guessing scheme follows a two stage strategy. In the first step, a novel algorithm based on machine learning principles, identifies and extracts the syntactic meaningful patterns from a dataset of passwords. Then, in a second stage, these parts-of-passwords previously segmented are recombined in order to generate new statistically relevant password candidates that are used against a blind evaluation set. The experimental results show that this novel approach is able to guess complex passwords usually robust to traditional password guessing techniques.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges in detecting UAS with radar 雷达探测无人机的挑战
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167852
P. Poitevin, M. Pelletier, Patrick Lamontagne
The recent proliferation of drones has contributed to the emergence of new threats in security applications. Because of their great agility and small size, UAS can be used for numerous missions and are very challenging to detect. Radar technology with its all-weather capability can play an important role in detecting UAS-based threats and in protecting critical assets. However, to be successful, radars have to quickly scan large volumes with great sensitivity, eliminate nuisance alarms from birds and discriminate UAS from ground targets. Radar parameters, antenna scan techniques and target classification requirements for UAS detection are analyzed. A radar implementation is discussed and preliminary results presented. Overall, an X-band radar with electronic scanning capability can contribute to a reliable and affordable solution for detecting UAS-based threats.
最近无人机的扩散导致安全应用中出现了新的威胁。由于其巨大的灵活性和小尺寸,无人机可以用于许多任务,并且非常具有挑战性。雷达技术具有全天候能力,可以在探测基于无人机的威胁和保护关键资产方面发挥重要作用。然而,为了取得成功,雷达必须以高灵敏度快速扫描大容量,消除鸟类的滋扰警报,并区分无人机和地面目标。分析了无人机探测的雷达参数、天线扫描技术和目标分类要求。讨论了一种雷达的实现方法,并给出了初步结果。总体而言,具有电子扫描能力的x波段雷达可以为探测基于无人机的威胁提供可靠且经济的解决方案。
{"title":"Challenges in detecting UAS with radar","authors":"P. Poitevin, M. Pelletier, Patrick Lamontagne","doi":"10.1109/CCST.2017.8167852","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167852","url":null,"abstract":"The recent proliferation of drones has contributed to the emergence of new threats in security applications. Because of their great agility and small size, UAS can be used for numerous missions and are very challenging to detect. Radar technology with its all-weather capability can play an important role in detecting UAS-based threats and in protecting critical assets. However, to be successful, radars have to quickly scan large volumes with great sensitivity, eliminate nuisance alarms from birds and discriminate UAS from ground targets. Radar parameters, antenna scan techniques and target classification requirements for UAS detection are analyzed. A radar implementation is discussed and preliminary results presented. Overall, an X-band radar with electronic scanning capability can contribute to a reliable and affordable solution for detecting UAS-based threats.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A multi-language approach towards the identification of suspicious users on social networks 一种多语言识别社交网络可疑用户的方法
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167794
A. Tundis, M. Mühlhäuser
The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the social media, it is possible not only to divulge advertising for the disclosure of illicit activities, but also to take action that in the past needed to have people in place and at the moment the activity took place. In fact, this phenomenon allows criminals to be less exposed to the risk of being discovered. Furthermore, the technology tends to encourage international collaborations, which makes the process of identifying illegal activities even more complex because of the lack of adequate tools that can operate effectively by considering multi-cultural aspects. Consequently, this evolving phenomenon towards cyber-crime requires new models and analysis techniques to address these challenges. In this context, the paper proposes an approach based on a multi-language model that aims to support the identification of suspicious users on social networks. It exploits the effectiveness of web translation services along with specific stand-alone libraries for normalizing user profiles in a common language. In addition, different text analysis techniques are combined for supporting the user profiles evaluation. The proposed approach is exemplified through a case study by analyzing Twitter users profile by showing step by step the overall process and related results.
近年,利用资讯科技策划和实施非法活动的情况越来越普遍。如今,通过网络和社交媒体,不仅可以泄露广告以披露非法活动,还可以采取行动,而在过去,这些行动需要有人在活动发生的那一刻到位。事实上,这种现象使罪犯较少暴露于被发现的风险。此外,该技术倾向于鼓励国际合作,这使得识别非法活动的过程更加复杂,因为缺乏适当的工具,可以有效地考虑到多元文化方面。因此,这种不断演变的网络犯罪现象需要新的模型和分析技术来应对这些挑战。在此背景下,本文提出了一种基于多语言模型的方法,旨在支持社交网络上可疑用户的识别。它利用了web翻译服务的有效性,以及用通用语言规范化用户配置文件的特定独立库。此外,还结合了不同的文本分析技术来支持用户配置文件的评估。通过一个案例研究,通过逐步展示整个过程和相关结果,分析Twitter用户的个人资料,对所提出的方法进行了举例说明。
{"title":"A multi-language approach towards the identification of suspicious users on social networks","authors":"A. Tundis, M. Mühlhäuser","doi":"10.1109/CCST.2017.8167794","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167794","url":null,"abstract":"The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the social media, it is possible not only to divulge advertising for the disclosure of illicit activities, but also to take action that in the past needed to have people in place and at the moment the activity took place. In fact, this phenomenon allows criminals to be less exposed to the risk of being discovered. Furthermore, the technology tends to encourage international collaborations, which makes the process of identifying illegal activities even more complex because of the lack of adequate tools that can operate effectively by considering multi-cultural aspects. Consequently, this evolving phenomenon towards cyber-crime requires new models and analysis techniques to address these challenges. In this context, the paper proposes an approach based on a multi-language model that aims to support the identification of suspicious users on social networks. It exploits the effectiveness of web translation services along with specific stand-alone libraries for normalizing user profiles in a common language. In addition, different text analysis techniques are combined for supporting the user profiles evaluation. The proposed approach is exemplified through a case study by analyzing Twitter users profile by showing step by step the overall process and related results.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134080607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints 手机内置磁强计的指纹识别:指纹的便携性分析
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167855
G. Baldini, G. Steri, Irene Amerini, R. Caldelli
The identification of mobile phones through their built-in electronic sensors has been proven in literature for cameras, microphones and accelerometers demonstrating to have various applications in security, forensics or in the fight against the counterfeiting of electronic products. The identification of a sensor (and consequently of the mobile phone) is possible through the exploitation of small but significant differences in the physical components of the sensor itself. These physical differences are mainly generated during the production process of the sensor in the manufacturing plant producing small but reproducible variations in the digital output generated by the built-in sensor. In particular, in this paper, we investigate the identification of mobile phones through the built-in magnetometer sensor, which has received very limited attention by the research community so far. In particular, the specific aspects of robustness and portability of such a fingerprint have been analyzed. Different stimulation conditions, diverse kinds of features and classification procedures have been considered achieving very promising results.
通过内置电子传感器识别手机已在相机,麦克风和加速度计的文献中得到证明,证明在安全,取证或打击假冒电子产品方面具有各种应用。通过利用传感器本身的物理组件的微小但显著的差异,可以识别传感器(从而识别移动电话)。这些物理差异主要是在制造工厂的传感器生产过程中产生的,在内置传感器产生的数字输出中产生微小但可重复的变化。特别是,在本文中,我们研究了通过内置磁强计传感器识别手机,这是迄今为止受到研究界非常有限的关注。特别是,分析了这种指纹的鲁棒性和可移植性的具体方面。不同的增产条件、不同的特征和分类方法被认为取得了非常有希望的结果。
{"title":"The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints","authors":"G. Baldini, G. Steri, Irene Amerini, R. Caldelli","doi":"10.1109/CCST.2017.8167855","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167855","url":null,"abstract":"The identification of mobile phones through their built-in electronic sensors has been proven in literature for cameras, microphones and accelerometers demonstrating to have various applications in security, forensics or in the fight against the counterfeiting of electronic products. The identification of a sensor (and consequently of the mobile phone) is possible through the exploitation of small but significant differences in the physical components of the sensor itself. These physical differences are mainly generated during the production process of the sensor in the manufacturing plant producing small but reproducible variations in the digital output generated by the built-in sensor. In particular, in this paper, we investigate the identification of mobile phones through the built-in magnetometer sensor, which has received very limited attention by the research community so far. In particular, the specific aspects of robustness and portability of such a fingerprint have been analyzed. Different stimulation conditions, diverse kinds of features and classification procedures have been considered achieving very promising results.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"2 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of local binary patterns and uniform local binary patterns for palm vein biometric recognition 局部二值模式和均匀局部二值模式在手掌静脉生物识别中的应用
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167808
Alicia Aglio-Caballero, Belén Ríos-Sánchez, C. S. Ávila, Maria Jose Melcon De Giles
Palm vein recognition has emerged as a novelty highly invariant biometric technique that is difficult to forge due to their internal nature. In this work the texture descriptors Local Binary Patterns (LBP) and Uniform Local Binary Patterns (LBPU) are analyzed as feature extraction methods for biometric verification based on palm veins. Their performance and efficiency has been studied through a multivariate analysis including the impact of different wavelengths and the parameters of the texture descriptor number of neighboors and radio. CASIA Multi-Spectral Palmprint Image Database V1.0 has been used for the evaluation of the system.
手掌静脉识别是一种新颖的高度不变性的生物识别技术,由于其内在的特性而难以伪造。本文分析了纹理描述符局部二值模式(LBP)和均匀局部二值模式(LBPU)作为基于掌纹生物特征验证的特征提取方法。通过多变量分析,包括不同波长、纹理描述子参数、邻居数和无线电的影响,研究了它们的性能和效率。采用CASIA多光谱掌纹图像数据库V1.0对系统进行了评价。
{"title":"Analysis of local binary patterns and uniform local binary patterns for palm vein biometric recognition","authors":"Alicia Aglio-Caballero, Belén Ríos-Sánchez, C. S. Ávila, Maria Jose Melcon De Giles","doi":"10.1109/CCST.2017.8167808","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167808","url":null,"abstract":"Palm vein recognition has emerged as a novelty highly invariant biometric technique that is difficult to forge due to their internal nature. In this work the texture descriptors Local Binary Patterns (LBP) and Uniform Local Binary Patterns (LBPU) are analyzed as feature extraction methods for biometric verification based on palm veins. Their performance and efficiency has been studied through a multivariate analysis including the impact of different wavelengths and the parameters of the texture descriptor number of neighboors and radio. CASIA Multi-Spectral Palmprint Image Database V1.0 has been used for the evaluation of the system.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116774002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A tamper-resistant digital token-based rights management system 一种基于数字令牌的防篡改权限管理系统
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167837
M. F. F. Khan, K. Sakamura
Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's accountability, digital tokens should be tamper-resistant as much as possible in order for them to withstand physical attacks as well. In this paper, we present a rights management system that leverages tamper-resistant digital tokens created by hardware-software collaboration in our eTRON architecture. The system features the complete life cycle of a digital token from generation to storage and redemption. Additionally, it provides a secure mechanism for transfer of rights in a peer-to-peer manner over the Internet. The proposed system specifies protocols for permissible manipulation on digital tokens, and subsequently provides a set of APIs for seamless application development. Access privileges to the tokens are strictly defined and state-of-the-art asymmetric cryptography is used for ensuring their confidentiality. Apart from the digital tokens being physically tamper-resistant, the protocols involved in the system are proven to be secure against attacks. Furthermore, an authentication mechanism is implemented that invariably precedes any operation involving the digital token in question. The proposed system presents clear security gains compared to existing systems that do not take tamper-resistance into account, and schemes that use symmetric key cryptography.
如今,使用数字代币——证明持有者对某种产品或服务的权利——因其方便、易用和成本效益而相当普遍。然而,许多这样的数字令牌是由软件单独制作的,这使得它们很容易被伪造,包括修改和复制。为了更安全地保护代币所有者的权利和服务提供商的责任,数字代币应该尽可能地防篡改,以便它们也能承受物理攻击。在本文中,我们提出了一个权利管理系统,该系统利用了由我们的eTRON架构中的硬件-软件协作创建的防篡改数字令牌。该系统具有数字代币从生成到存储和赎回的完整生命周期。此外,它还提供了一种安全的机制,用于在Internet上以点对点的方式传输权利。提议的系统指定了允许对数字令牌进行操作的协议,随后提供了一组无缝应用程序开发的api。对令牌的访问权限是严格定义的,并且使用了最先进的非对称加密技术来确保其机密性。除了数字令牌具有物理防篡改性外,系统中涉及的协议已被证明是安全的,不会受到攻击。此外,还实现了一种身份验证机制,该机制总是先于涉及所讨论的数字令牌的任何操作。与不考虑防篡改的现有系统和使用对称密钥加密的方案相比,所提出的系统具有明显的安全性收益。
{"title":"A tamper-resistant digital token-based rights management system","authors":"M. F. F. Khan, K. Sakamura","doi":"10.1109/CCST.2017.8167837","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167837","url":null,"abstract":"Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's accountability, digital tokens should be tamper-resistant as much as possible in order for them to withstand physical attacks as well. In this paper, we present a rights management system that leverages tamper-resistant digital tokens created by hardware-software collaboration in our eTRON architecture. The system features the complete life cycle of a digital token from generation to storage and redemption. Additionally, it provides a secure mechanism for transfer of rights in a peer-to-peer manner over the Internet. The proposed system specifies protocols for permissible manipulation on digital tokens, and subsequently provides a set of APIs for seamless application development. Access privileges to the tokens are strictly defined and state-of-the-art asymmetric cryptography is used for ensuring their confidentiality. Apart from the digital tokens being physically tamper-resistant, the protocols involved in the system are proven to be secure against attacks. Furthermore, an authentication mechanism is implemented that invariably precedes any operation involving the digital token in question. The proposed system presents clear security gains compared to existing systems that do not take tamper-resistance into account, and schemes that use symmetric key cryptography.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT: Secured and automated house 物联网:安全的自动化房屋
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167862
Hakar Mohsin Saber, Nawzad K. Al-Salihi
In recent years, dramatic evolution of network has been introduced in the home environment that enables digital technologies to be used as the appliances in the home. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. A part of this network evolution is Internet-of-Things (IoT), which is the expansion of the services provided by internet. The IoT can be used for various fields and home automation is one of the applications of IoT. This method allows more opportunities to increase the connectivity between devices within the home and outside the home through internet for automating the home appliances. This paper includes the design and implementation of a secured and automated house using a hybrid communication system such as IoT and mobile communication methods for the communication part with using Arduino Microcontroller, GSM Shield, Ethernet Shield, and varieties of sensors. With the advancement in the field of IoT, there is an increasing demand of real time security for ones need. Secured and automated house is a house which is secured via electronic devices and sensors to protect the house from different kinds of intrusions such as motion in the house and disasters for example fire and gas leakage in the house. This paper focuses on designing a robust and reliable system using the home automation system to overcome these problems and to alert the owner of the house with a message once suspicious act are occurred. The results are very helpful in the desire to achieve an efficient and reliable solution contributing in the field of IoT, considering various aspects which include fast processing, system cost, robustness and precision for the modern, technological and needs.
近年来,在家庭环境中引入了网络的急剧发展,使数字技术能够作为家庭中的电器使用。这些设备可以使用现有的网络基础设施进行远程访问和控制,从而允许计算系统与物理世界的直接集成。网络演进的一部分是物联网(IoT),这是互联网提供的服务的扩展。物联网可以应用于各个领域,家庭自动化是物联网的应用之一。这种方法允许更多机会通过互联网增加家庭内外设备之间的连接,以实现家用电器的自动化。本文介绍了利用物联网等混合通信系统和移动通信方式,利用Arduino单片机、GSM Shield、Ethernet Shield以及多种传感器,设计并实现了一个安全自动化的住宅。随着物联网领域的发展,人们对实时安全的需求越来越高。安全自动化房屋是一种通过电子设备和传感器保护房屋免受各种入侵的房屋,例如房屋中的运动和房屋中的火灾和燃气泄漏等灾害。本文的重点是利用家庭自动化系统设计一个鲁棒可靠的系统来克服这些问题,并在发生可疑行为时向房主发出消息。考虑到快速处理、系统成本、现代技术和需求的鲁棒性和精度等各个方面,研究结果对于在物联网领域实现高效可靠的解决方案非常有帮助。
{"title":"IoT: Secured and automated house","authors":"Hakar Mohsin Saber, Nawzad K. Al-Salihi","doi":"10.1109/CCST.2017.8167862","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167862","url":null,"abstract":"In recent years, dramatic evolution of network has been introduced in the home environment that enables digital technologies to be used as the appliances in the home. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. A part of this network evolution is Internet-of-Things (IoT), which is the expansion of the services provided by internet. The IoT can be used for various fields and home automation is one of the applications of IoT. This method allows more opportunities to increase the connectivity between devices within the home and outside the home through internet for automating the home appliances. This paper includes the design and implementation of a secured and automated house using a hybrid communication system such as IoT and mobile communication methods for the communication part with using Arduino Microcontroller, GSM Shield, Ethernet Shield, and varieties of sensors. With the advancement in the field of IoT, there is an increasing demand of real time security for ones need. Secured and automated house is a house which is secured via electronic devices and sensors to protect the house from different kinds of intrusions such as motion in the house and disasters for example fire and gas leakage in the house. This paper focuses on designing a robust and reliable system using the home automation system to overcome these problems and to alert the owner of the house with a message once suspicious act are occurred. The results are very helpful in the desire to achieve an efficient and reliable solution contributing in the field of IoT, considering various aspects which include fast processing, system cost, robustness and precision for the modern, technological and needs.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational optical physical unclonable functions 计算光学物理不可克隆函数
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167828
G. Birch, Bryana L. Woo, C. LaCasse, Jaclynn J. Stubbs, Amber L. Dagel
Physical unclonable functions (PUFs) are devices which are easily probed but difficult to predict. Optical PUFs have been discussed within the literature, with traditional optical PUFs typically using spatial light modulators, coherent illumination, and scattering volumes; however, these systems can be large, expensive, and difficult to maintain alignment in practical conditions. We propose and demonstrate a new kind of optical PUF based on computational imaging and compressive sensing to address these challenges with traditional optical PUFs. This work describes the design, simulation, and prototyping of this computational optical PUF (COPUF) that utilizes incoherent polychromatic illumination passing through an additively manufactured refracting optical polymer element. We demonstrate the ability to pass information through a COPUF using a variety of sampling methods, including the use of compressive sensing. The sensitivity of the COPUF system is also explored. We explore non-traditional PUF configurations enabled by the COPUF architecture. The double COPUF system, which employees two serially connected COPUFs, is proposed and analyzed as a means to authenticate and communicate between two entities that have previously agreed to communicate. This configuration enables estimation of a message inversion key without the calculation of individual COPUF inversion keys at any point in the PUF life cycle. Our results show that it is possible to construct inexpensive optical PUFs using computational imaging. This could lead to new uses of PUFs in places where electrical PUFs cannot be utilized effectively, as low cost tags and seals, and potentially as authenticating and communicating devices.
物理不可克隆功能(PUFs)是一种容易探测但难以预测的器件。文献中已经讨论过光学puf,传统的光学puf通常使用空间光调制器、相干照明和散射体;然而,这些系统可能是大型的,昂贵的,并且难以在实际条件下保持对齐。我们提出并演示了一种基于计算成像和压缩感知的新型光学PUF,以解决传统光学PUF所面临的这些挑战。这项工作描述了这种计算光学PUF (COPUF)的设计、仿真和原型,该PUF利用非相干多色照明通过加式制造的折射光学聚合物元件。我们演示了使用各种采样方法(包括压缩感知的使用)通过COPUF传递信息的能力。探讨了COPUF系统的灵敏度。我们将探索由COPUF架构支持的非传统PUF配置。本文提出并分析了双COPUF系统,该系统使用两个串行连接的COPUF,作为先前同意通信的两个实体之间进行认证和通信的一种手段。此配置支持对消息反转键进行估计,而无需在PUF生命周期的任何时刻计算单个COPUF反转键。我们的研究结果表明,利用计算成像技术构建廉价的光学puf是可能的。这可能会导致puf在不能有效利用电puf的地方的新用途,作为低成本的标签和密封,并可能作为身份验证和通信设备。
{"title":"Computational optical physical unclonable functions","authors":"G. Birch, Bryana L. Woo, C. LaCasse, Jaclynn J. Stubbs, Amber L. Dagel","doi":"10.1109/CCST.2017.8167828","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167828","url":null,"abstract":"Physical unclonable functions (PUFs) are devices which are easily probed but difficult to predict. Optical PUFs have been discussed within the literature, with traditional optical PUFs typically using spatial light modulators, coherent illumination, and scattering volumes; however, these systems can be large, expensive, and difficult to maintain alignment in practical conditions. We propose and demonstrate a new kind of optical PUF based on computational imaging and compressive sensing to address these challenges with traditional optical PUFs. This work describes the design, simulation, and prototyping of this computational optical PUF (COPUF) that utilizes incoherent polychromatic illumination passing through an additively manufactured refracting optical polymer element. We demonstrate the ability to pass information through a COPUF using a variety of sampling methods, including the use of compressive sensing. The sensitivity of the COPUF system is also explored. We explore non-traditional PUF configurations enabled by the COPUF architecture. The double COPUF system, which employees two serially connected COPUFs, is proposed and analyzed as a means to authenticate and communicate between two entities that have previously agreed to communicate. This configuration enables estimation of a message inversion key without the calculation of individual COPUF inversion keys at any point in the PUF life cycle. Our results show that it is possible to construct inexpensive optical PUFs using computational imaging. This could lead to new uses of PUFs in places where electrical PUFs cannot be utilized effectively, as low cost tags and seals, and potentially as authenticating and communicating devices.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1