首页 > 最新文献

2015 Sixth International Conference on Emerging Security Technologies (EST)最新文献

英文 中文
UAVs You Can't See or Hear - A Survey of Key Technologies 你看不见或听不到的无人机——关键技术综述
A. Stoica, E. Dente, Y. Iwashita, A. Chiolerio
The paper addresses unmanned aerial vehicles (UAVs - aka drones) designed to be undetected by humans, i.e. stealth drones, or more generally, to have a minimal impact on living beings and environment, i.e. 'blue' drones, in the sense of preserving unaltered the blue color of the sky. Being 'blue' might be highly desirable in the future when drones will proliferate in large numbers, stealth is a special case, desirable to covert military and security operations. The paper explores general characteristics of blue drones and alternatives of making them, offering both system and component level solutions.
本文讨论了无人驾驶飞行器(UAVs - aka drones)设计为不被人类发现,即隐形无人机,或者更一般地说,对生物和环境的影响最小,即。“蓝色”无人机,在保持天空的蓝色不变的意义上。在未来,当无人机大量激增时,“蓝色”可能是非常可取的,隐形是一个特殊情况,适合秘密军事和安全行动。本文探讨了蓝色无人机的一般特点和制造它们的替代方案,提供了系统和组件级的解决方案。
{"title":"UAVs You Can't See or Hear - A Survey of Key Technologies","authors":"A. Stoica, E. Dente, Y. Iwashita, A. Chiolerio","doi":"10.1109/EST.2015.21","DOIUrl":"https://doi.org/10.1109/EST.2015.21","url":null,"abstract":"The paper addresses unmanned aerial vehicles (UAVs - aka drones) designed to be undetected by humans, i.e. stealth drones, or more generally, to have a minimal impact on living beings and environment, i.e. 'blue' drones, in the sense of preserving unaltered the blue color of the sky. Being 'blue' might be highly desirable in the future when drones will proliferate in large numbers, stealth is a special case, desirable to covert military and security operations. The paper explores general characteristics of blue drones and alternatives of making them, offering both system and component level solutions.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131923317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Photo-Realistic Generator of Most Expressive and Discriminant Changes in 2D Face Images 在二维人脸图像中最具表现力和区别性变化的逼真生成器
I. Xavier, M. Pereira, G. Giraldi, S. Gibson, C. Solomon, D. Rueckert, D. Gillies, C. Thomaz
This work describes a photo-realistic generator that creates semi-automatically face images of unseen subjects. Unlike previously described methods for generating face imagery, the approach described herein incorporates texture and shape information in a single computational framework based on high dimensional encoding of variance and discriminant information from sample groups. The method produces realistic, frontal pose, images with minimum manual intervention. We believe that the work presented describes a useful tool for face perception applications where privacy-preserving analysis might be an issue and the goal is not the recognition of the face itself, but rather its characteristics like gender, age or race, commonly explored in social and forensic contexts.
这项工作描述了一个逼真的生成器,它可以半自动地创建看不见的对象的面部图像。与先前描述的生成人脸图像的方法不同,本文描述的方法将纹理和形状信息结合在基于样本组方差和判别信息的高维编码的单个计算框架中。该方法以最少的人工干预产生逼真的正面姿态图像。我们认为,这项工作为面部感知应用描述了一个有用的工具,在这些应用中,隐私保护分析可能是一个问题,目标不是识别面部本身,而是识别其特征,如性别、年龄或种族,这些特征通常在社会和法医环境中被探索。
{"title":"A Photo-Realistic Generator of Most Expressive and Discriminant Changes in 2D Face Images","authors":"I. Xavier, M. Pereira, G. Giraldi, S. Gibson, C. Solomon, D. Rueckert, D. Gillies, C. Thomaz","doi":"10.1109/EST.2015.17","DOIUrl":"https://doi.org/10.1109/EST.2015.17","url":null,"abstract":"This work describes a photo-realistic generator that creates semi-automatically face images of unseen subjects. Unlike previously described methods for generating face imagery, the approach described herein incorporates texture and shape information in a single computational framework based on high dimensional encoding of variance and discriminant information from sample groups. The method produces realistic, frontal pose, images with minimum manual intervention. We believe that the work presented describes a useful tool for face perception applications where privacy-preserving analysis might be an issue and the goal is not the recognition of the face itself, but rather its characteristics like gender, age or race, commonly explored in social and forensic contexts.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131309359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Taxonomy and Modeling of Impersonation in e-Border Authentication 电子边界认证中模拟的分类与建模
S. Yanushkevich, Shawn C. Eastwood, S. Samoil, V. Shmerko, Travis Manderson, M. Drahanský
Impersonation is a phenomenon of biometric-enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (e-borders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of e-borders to the specified impersonation strategies.
模拟是启用生物识别技术的身份验证机器的一种现象。本文的重点是跨境应用程序(电子边界)的身份验证机器。提出了一种新的模拟分类方法和七种模拟策略。我们确定了模拟的条件和各种电子边境自动化场景的强化因素。介绍了一个使用Dempster-Shafer方法检测模拟现象的示范实验。这为研究电子边界对特定模拟策略的脆弱性奠定了基础。
{"title":"Taxonomy and Modeling of Impersonation in e-Border Authentication","authors":"S. Yanushkevich, Shawn C. Eastwood, S. Samoil, V. Shmerko, Travis Manderson, M. Drahanský","doi":"10.1109/EST.2015.18","DOIUrl":"https://doi.org/10.1109/EST.2015.18","url":null,"abstract":"Impersonation is a phenomenon of biometric-enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (e-borders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of e-borders to the specified impersonation strategies.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fault Detection and Correction in Processing AES Encryption Algorithm 处理AES加密算法中的故障检测与校正
M. Basil, W. Adi
Robust and stringent fault detection and correction techniques in executing Advanced Encryption Standard (AES) are still interesting issues for many critical applications. The purpose of fault detection and correction techniques is not only to ensure the reliability of a cryptosystem, but also protect the system against side channel attacks. Such errors could result due to a fault injection attack, production faults, noise or radiation effects in deep space. Devising a proper error control mechanisms for AES cipher during execution would improve both system reliability and security. In this work a novel fault detection and correction algorithm is proposed. The proposed mechanism is making use of the linear mappings of AES round structure to detect errors in the ShiftRow (SR) and MixColumn (MC) transformations. The error correction is achieved by creating temporary redundant check words through the combined SR and MC mapping to create in case of errors an error syndrome leading to error correction with relatively minor additional complexity. The proposed technique is making use of an error detecting and correcting capability in the combined mapping of SR and MC rather than detecting and/or correcting errors in each transformation separately. The proposed technique is making use especially of the MC mapping exhibiting efficient ECC properties, which can be deployed to simplify the design of a fault-tolerance technique. The performance of the algorithm proposed is evaluated by a simulated system model in FPGA technology. The simulation results demonstrate the ability to reach relatively high fault coverage with error correction up to four bytes of execution errors in the merged transformation SR-MC. The overall gate complexity overhead of the resulting system is estimated for proposed technique in FPGA technology.
在执行高级加密标准(Advanced Encryption Standard, AES)时,鲁棒性和严格的故障检测和纠正技术仍然是许多关键应用程序关注的问题。故障检测和纠错技术的目的不仅是为了保证密码系统的可靠性,而且是为了保护系统免受侧信道攻击。这种错误可能是由于断层注入攻击、生产故障、噪声或深空辐射影响造成的。在AES密码执行过程中设计适当的错误控制机制,可以提高系统的可靠性和安全性。本文提出了一种新的故障检测与校正算法。提出的机制是利用AES圆形结构的线性映射来检测ShiftRow (SR)和MixColumn (MC)转换中的错误。通过组合SR和MC映射创建临时冗余校验字来实现错误纠正,以便在出现错误时创建错误综合症,从而以相对较小的额外复杂性进行错误纠正。所提出的技术是利用SR和MC组合映射中的错误检测和纠正能力,而不是单独检测和/或纠正每个转换中的错误。该技术特别利用了MC映射的高效ECC特性,可以简化容错技术的设计。通过FPGA技术中的仿真系统模型对所提出算法的性能进行了评价。仿真结果表明,在合并转换SR-MC中,通过纠错高达4字节的执行错误,能够达到相对较高的故障覆盖率。在FPGA技术中,估计了所提出的技术所产生的系统的总体门复杂度开销。
{"title":"Fault Detection and Correction in Processing AES Encryption Algorithm","authors":"M. Basil, W. Adi","doi":"10.1109/EST.2015.13","DOIUrl":"https://doi.org/10.1109/EST.2015.13","url":null,"abstract":"Robust and stringent fault detection and correction techniques in executing Advanced Encryption Standard (AES) are still interesting issues for many critical applications. The purpose of fault detection and correction techniques is not only to ensure the reliability of a cryptosystem, but also protect the system against side channel attacks. Such errors could result due to a fault injection attack, production faults, noise or radiation effects in deep space. Devising a proper error control mechanisms for AES cipher during execution would improve both system reliability and security. In this work a novel fault detection and correction algorithm is proposed. The proposed mechanism is making use of the linear mappings of AES round structure to detect errors in the ShiftRow (SR) and MixColumn (MC) transformations. The error correction is achieved by creating temporary redundant check words through the combined SR and MC mapping to create in case of errors an error syndrome leading to error correction with relatively minor additional complexity. The proposed technique is making use of an error detecting and correcting capability in the combined mapping of SR and MC rather than detecting and/or correcting errors in each transformation separately. The proposed technique is making use especially of the MC mapping exhibiting efficient ECC properties, which can be deployed to simplify the design of a fault-tolerance technique. The performance of the algorithm proposed is evaluated by a simulated system model in FPGA technology. The simulation results demonstrate the ability to reach relatively high fault coverage with error correction up to four bytes of execution errors in the merged transformation SR-MC. The overall gate complexity overhead of the resulting system is estimated for proposed technique in FPGA technology.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Stable Image Registration for People Tracking from the Sky 稳定图像配准的人从天空跟踪
Y. Iwashita, R. Kurazume
We propose a novel method for stabilizing videos taken by a low altitude aerial vehicle, for the purpose of monitoring activities on the ground. A popular choice for aerial video stabilization is the use of homography-based methods, which assume that the scene consists mostly of planar regions. When videos are recorded in low altitude flight, the regions with buildings, trees and hills are non-planar areas (with relatively big changes in height), and making the planar assumption would decrease the accuracy of stabilization with respect to the ground. The idea presented in this paper is to stabilize aerial images, where height changes exist, by explicitly estimating a planar area in the scene. For the estimation of planar region, a relative pose between two images is estimated by taking advantages of the homography-based method and the essential matrix-based method. Positions in the 3D space are reconstructed from feature points on the images, which are used for the pose estimation, and points on the plane are estimated based on RANSAC. The points on the flat area are used for stabilization of images with high accuracy. The experimental results with simulated aerial images illustrate the proposed method can estimate relative pose with higher accuracy compared with previous approaches, even when noise is present. The proposed method is also applied to real aerial images, in people tracking. Experimental results show that tracking using the proposed method has better performance than tracking using the homography-based method.
我们提出了一种稳定低空飞行器拍摄的视频的新方法,用于监测地面活动。航空视频稳定的一个流行选择是使用基于同形图的方法,它假设场景主要由平面区域组成。在低空录制视频时,有建筑物、树木和山丘的区域是非平面区域(高度变化较大),做平面假设会降低相对于地面的稳定精度。本文提出的思想是通过明确估计场景中的平面区域来稳定存在高度变化的航空图像。对于平面区域的估计,利用基于同形图的方法和基于本质矩阵的方法估计两幅图像之间的相对位姿。从图像上的特征点重构三维空间中的位置,用于姿态估计,并基于RANSAC估计平面上的点。平面区域上的点用于高精度稳定图像。模拟航拍图像的实验结果表明,即使在存在噪声的情况下,该方法也能比以前的方法具有更高的相对位姿估计精度。该方法也适用于真实航拍图像中的人物跟踪。实验结果表明,该方法比基于同形图的方法具有更好的跟踪性能。
{"title":"Stable Image Registration for People Tracking from the Sky","authors":"Y. Iwashita, R. Kurazume","doi":"10.1109/EST.2015.14","DOIUrl":"https://doi.org/10.1109/EST.2015.14","url":null,"abstract":"We propose a novel method for stabilizing videos taken by a low altitude aerial vehicle, for the purpose of monitoring activities on the ground. A popular choice for aerial video stabilization is the use of homography-based methods, which assume that the scene consists mostly of planar regions. When videos are recorded in low altitude flight, the regions with buildings, trees and hills are non-planar areas (with relatively big changes in height), and making the planar assumption would decrease the accuracy of stabilization with respect to the ground. The idea presented in this paper is to stabilize aerial images, where height changes exist, by explicitly estimating a planar area in the scene. For the estimation of planar region, a relative pose between two images is estimated by taking advantages of the homography-based method and the essential matrix-based method. Positions in the 3D space are reconstructed from feature points on the images, which are used for the pose estimation, and points on the plane are estimated based on RANSAC. The points on the flat area are used for stabilization of images with high accuracy. The experimental results with simulated aerial images illustrate the proposed method can estimate relative pose with higher accuracy compared with previous approaches, even when noise is present. The proposed method is also applied to real aerial images, in people tracking. Experimental results show that tracking using the proposed method has better performance than tracking using the homography-based method.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126690232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing MEMS Based Sensor Nodes in the Internet of Things 保护物联网中基于MEMS的传感器节点
Hasan Tahir, Ruhma Tahir, K. Mcdonald-Maier
Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric technology is an innovation in the field of cryptography that generates a device identification based on the inherent features of a device. Devices in the internet of things (IoT) are cyber physical systems with varying purpose and platforms. Since these devices are deeply entwined with the physical world, the chances of a security failure are higher. In this paper we suggest coupling the ICMetric technology and IoT. We prove that device identification can be generated by using the accelerometer found in many pervasive devices. Our experiments are based on a set of health sensors equipped with a MEMS accelerometer. Periodic readings are obtained from the sensor and analysed mathematically and statistically to generate a stable ICMetric number.
如果加密密钥被泄露,安全方案将变得不切实际。ICMetric技术是密码学领域的一项创新,它基于设备的固有特征生成设备标识。物联网(IoT)中的设备是具有不同用途和平台的网络物理系统。由于这些设备与物理世界紧密相连,因此发生安全故障的可能性更高。在本文中,我们建议将ICMetric技术与物联网相结合。我们证明了可以使用在许多普及设备中发现的加速度计来生成设备识别。我们的实验是基于一组配备了MEMS加速度计的健康传感器。从传感器获得周期性读数,并进行数学和统计分析,以生成稳定的ICMetric数。
{"title":"Securing MEMS Based Sensor Nodes in the Internet of Things","authors":"Hasan Tahir, Ruhma Tahir, K. Mcdonald-Maier","doi":"10.1109/EST.2015.8","DOIUrl":"https://doi.org/10.1109/EST.2015.8","url":null,"abstract":"Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric technology is an innovation in the field of cryptography that generates a device identification based on the inherent features of a device. Devices in the internet of things (IoT) are cyber physical systems with varying purpose and platforms. Since these devices are deeply entwined with the physical world, the chances of a security failure are higher. In this paper we suggest coupling the ICMetric technology and IoT. We prove that device identification can be generated by using the accelerometer found in many pervasive devices. Our experiments are based on a set of health sensors equipped with a MEMS accelerometer. Periodic readings are obtained from the sensor and analysed mathematically and statistically to generate a stable ICMetric number.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Facial Stereotypes and Perceived Mental Illness 面部刻板印象和感知的精神疾病
C. Frowd, S. Underwood, P. Athwal, J. Lampinen, W. B. Erickson, G. Mahony, J. Marsh
It is well established that we carry stereotypes that impact on human perception and behaviour (e.g. G.W. Allport, "The nature of prejudice". Reading, MA: Addison-Wesley, 1954). Here, we investigate the possibility that we hold a stereotype for a face indicating that its owner may have a mental illness. A three-stage face-perception experiment suggested the presence of such a stereotype. Participants first rated 200 synthetic male faces from the EvoFIT facial-composite system for perceived mental illness (PMI). These faces were used to create a computer-based rating scale that was used by a second sample of participants to make a set of faces appear mentally ill. There was evidence to suggest that the faces that participants identified using the PMI scale differed along this dimension (although not entirely as expected). In the final stage of the study, another set of synthetic faces were created by artificially increasing and decreasing levels along the scale. Participants were asked to rate these items for PMI and for six criminal types. It was found that participants assigned higher PMI ratings (cf. veridical) for items with inflated PMI (although there was no reliable difference in ratings between veridical faces and faces with decreased PMI). Implications of the findings are discussed.
众所周知,我们的刻板印象会影响人类的感知和行为(如G.W.奥尔波特的《偏见的本质》)。阅读,麻萨诸塞州:Addison-Wesley, 1954)。在这里,我们调查了我们对一张脸的刻板印象表明它的主人可能有精神疾病的可能性。一项分为三个阶段的面部感知实验表明了这种刻板印象的存在。参与者首先对来自EvoFIT面部合成系统的200张合成男性面孔进行了心理疾病感知(PMI)评分。这些面孔被用来创建一个基于计算机的评定量表,第二组参与者用这个量表来判断一组面孔是否患有精神疾病。有证据表明,参与者使用PMI量表识别的面孔在这个维度上有所不同(尽管不完全像预期的那样)。在研究的最后阶段,通过人为地增加和减少尺度上的水平来创建另一组合成面孔。参与者被要求对这些项目的PMI和六种犯罪类型进行评级。研究发现,参与者对PMI膨胀的项目给出了更高的PMI评级(参考真实)(尽管真实面孔和PMI下降的面孔之间的评级没有可靠的差异)。讨论了研究结果的含义。
{"title":"Facial Stereotypes and Perceived Mental Illness","authors":"C. Frowd, S. Underwood, P. Athwal, J. Lampinen, W. B. Erickson, G. Mahony, J. Marsh","doi":"10.1109/EST.2015.25","DOIUrl":"https://doi.org/10.1109/EST.2015.25","url":null,"abstract":"It is well established that we carry stereotypes that impact on human perception and behaviour (e.g. G.W. Allport, \"The nature of prejudice\". Reading, MA: Addison-Wesley, 1954). Here, we investigate the possibility that we hold a stereotype for a face indicating that its owner may have a mental illness. A three-stage face-perception experiment suggested the presence of such a stereotype. Participants first rated 200 synthetic male faces from the EvoFIT facial-composite system for perceived mental illness (PMI). These faces were used to create a computer-based rating scale that was used by a second sample of participants to make a set of faces appear mentally ill. There was evidence to suggest that the faces that participants identified using the PMI scale differed along this dimension (although not entirely as expected). In the final stage of the study, another set of synthetic faces were created by artificially increasing and decreasing levels along the scale. Participants were asked to rate these items for PMI and for six criminal types. It was found that participants assigned higher PMI ratings (cf. veridical) for items with inflated PMI (although there was no reliable difference in ratings between veridical faces and faces with decreased PMI). Implications of the findings are discussed.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Depth Assisted Palm Region Extraction Using the Kinect v2 Sensor 使用Kinect v2传感器的深度辅助手掌区域提取
S. Samoil, S. Yanushkevich
This paper evaluates the feasibility of using the fusion of multispectral data from a Kinect v2 sensor as a way to extract the palm region of hand in an unconstrained environment. The depth data was used to both track the hand and extract palm regions. This extracted palm region was then used to extract the palm region in the RGB and Near Infrared data. One of the underlying goals was to maintain real time performance and as such relatively simple techniques such as using a sliding window were used. The lower boundary of the usable frames extracted was 50%, while in the case when the user is positioned directly in front of the sensor with hands extended outward from the body, the percentage of usable frames reached 75%.
本文评估了在无约束环境中使用Kinect v2传感器多光谱数据融合提取手掌区域的可行性。深度数据用于跟踪手部和提取手掌区域。然后将提取的手掌区域用于提取RGB和近红外数据中的手掌区域。其中一个基本目标是保持实时性能,因此使用了相对简单的技术,例如使用滑动窗口。提取的可用帧的下边界为50%,而当用户位置直接在传感器前方,双手伸出身体时,可用帧的百分比达到75%。
{"title":"Depth Assisted Palm Region Extraction Using the Kinect v2 Sensor","authors":"S. Samoil, S. Yanushkevich","doi":"10.1109/EST.2015.11","DOIUrl":"https://doi.org/10.1109/EST.2015.11","url":null,"abstract":"This paper evaluates the feasibility of using the fusion of multispectral data from a Kinect v2 sensor as a way to extract the palm region of hand in an unconstrained environment. The depth data was used to both track the hand and extract palm regions. This extracted palm region was then used to extract the palm region in the RGB and Near Infrared data. One of the underlying goals was to maintain real time performance and as such relatively simple techniques such as using a sliding window were used. The lower boundary of the usable frames extracted was 50%, while in the case when the user is positioned directly in front of the sensor with hands extended outward from the body, the percentage of usable frames reached 75%.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"230 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124222339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms WhatsApp数据在流行移动平台上的取证收购
Adam Shortall, M. Azhar
Encryption techniques used by popular messaging services such as Skype, Viber and WhatsApp make traces of illegal activities by criminal groups almost undetectable. This paper reports challenges involved to examine data of the WhatsApp application on popular mobile platforms (iOS, Android and Windows Phone) using latest forensic software such as EnCase, UFED and Oxygen Forensic Suite. The operating systems used were Windows phone 8.1, Android 5.0.1 (Lollipop) and iOS 8.3. Results show that due to strong security features built into the Windows 8.1 system forensic examiners may not be able to access data with standard forensic suite and they must decide whether to perform a live forensic acquisition. This paper provides forensics examiners with practical techniques for recovering evidences of WhatsApp data from Windows 8.1 mobile operating systems that would otherwise be inaccessible.
Skype、Viber和WhatsApp等流行通讯服务使用的加密技术,使得犯罪集团非法活动的痕迹几乎无法察觉。本文报告了使用最新的取证软件(如EnCase, UFED和Oxygen forensic Suite)检查流行移动平台(iOS, Android和Windows Phone)上WhatsApp应用程序数据所涉及的挑战。使用的操作系统是Windows phone 8.1、Android 5.0.1 (Lollipop)和iOS 8.3。结果表明,由于Windows 8.1系统内置的强大安全功能,取证检查人员可能无法使用标准取证套件访问数据,他们必须决定是否执行实时取证采集。本文为取证审查员提供了从Windows 8.1移动操作系统中恢复WhatsApp数据证据的实用技术,否则这些数据将无法访问。
{"title":"Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms","authors":"Adam Shortall, M. Azhar","doi":"10.1109/EST.2015.16","DOIUrl":"https://doi.org/10.1109/EST.2015.16","url":null,"abstract":"Encryption techniques used by popular messaging services such as Skype, Viber and WhatsApp make traces of illegal activities by criminal groups almost undetectable. This paper reports challenges involved to examine data of the WhatsApp application on popular mobile platforms (iOS, Android and Windows Phone) using latest forensic software such as EnCase, UFED and Oxygen Forensic Suite. The operating systems used were Windows phone 8.1, Android 5.0.1 (Lollipop) and iOS 8.3. Results show that due to strong security features built into the Windows 8.1 system forensic examiners may not be able to access data with standard forensic suite and they must decide whether to perform a live forensic acquisition. This paper provides forensics examiners with practical techniques for recovering evidences of WhatsApp data from Windows 8.1 mobile operating systems that would otherwise be inaccessible.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Integrating Multi-modal Cloud Features within a Multi-dimensional Encryption Space 在多维加密空间中集成多模态云特性
Bin Ye, G. Howells
The problem of combining multi-modal features which extract from characteristics of given Cloud Computing Servers in the pattern recognition system is well known difficult. This paper addresses a novel efficient technique for normalizing sets of features which are highly multi-modal in nature, so as to allow them to be incorporated from a multi-dimensional feature distribution space. The intend system identify the modes of each distribution and for removing any possible correlation between the feature data to allow to be used in an encryption key generation system.
在模式识别系统中,从给定云计算服务器的特征中提取多模态特征进行组合是一个非常困难的问题。本文提出了一种新的、有效的技术,用于对本质上具有高度多模态的特征集进行归一化,从而使它们能够从多维特征分布空间中被合并。该意图系统识别每个分布的模式,并用于消除特征数据之间的任何可能的相关性,以允许在加密密钥生成系统中使用。
{"title":"Integrating Multi-modal Cloud Features within a Multi-dimensional Encryption Space","authors":"Bin Ye, G. Howells","doi":"10.1109/EST.2015.12","DOIUrl":"https://doi.org/10.1109/EST.2015.12","url":null,"abstract":"The problem of combining multi-modal features which extract from characteristics of given Cloud Computing Servers in the pattern recognition system is well known difficult. This paper addresses a novel efficient technique for normalizing sets of features which are highly multi-modal in nature, so as to allow them to be incorporated from a multi-dimensional feature distribution space. The intend system identify the modes of each distribution and for removing any possible correlation between the feature data to allow to be used in an encryption key generation system.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127597517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 Sixth International Conference on Emerging Security Technologies (EST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1