首页 > 最新文献

2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
AI facial recognition and biometric detection: balancing consumer rights and corporate interests 人工智能面部识别与生物特征检测:平衡消费者权益与企业利益
Pub Date : 2021-01-01 DOI: 10.1109/ICCST49569.2021.9717403
Felipe Romero Moreno
{"title":"AI facial recognition and biometric detection: balancing consumer rights and corporate interests","authors":"Felipe Romero Moreno","doi":"10.1109/ICCST49569.2021.9717403","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717403","url":null,"abstract":"","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73231667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools 基于ADS-B和商业智能工具的雷达误差计算与校正系统
Pub Date : 2018-10-01 DOI: 10.1109/CCST.2018.8585728
Jimmy Anderson Florez Zuluaga, J. Vargas-Bonilla, José David Ortega Pabón, C. Rios
With the growth of air transport, the air traffic control needs to enforce the Communication navigation surveillance air traffic management (CNS-ATM) because this is the back bone of the air operation in any country. This system has the responsibility of guaranteeing air safety and management of the national air space (NAS) that nowadays needs to increase the flight density to respond to the demand. To accomplish this, new technologies like air dependent surveillance broadcast (ADS-B) have been used to increase the accuracy and time response of data air surveillance sensor integration of sensor location and the reliability of ATM system. CNS-ATM system for surveillance and control of aircrafts have been mainly used in primary and secondary radars to calculate the aircraft position through signal delay or time difference between transponder pulses. The accuracy of each sensor depends on internal and external factors such as frequency, power, target distance, noise, maintenance, and others. When an aerodyne is detected by multiple sensors, it could create a multiple track in a geographic and temporal space where the aircraft will be possibly flying. This space depends of radar update time, aerodyne speed, and the accuracy of each sensor, and it is difficult to know where the aircraft really is. This work proposes a technique based on ADS-B for making an error calculation of each sensor in a fusion system, using business intelligence techniques for understanding the error condition of each sensor in a geographical area. Based on results, we propose a technique that could make an error correction to avoid phase shifts between sensors. The information of this data study was used for statistical calculation values such as variance and standard deviation. For fusion accuracy improvement, three steps have been proposed in this research. First, the use of the radar error by region and statistical values by calculating the Kalman filters for each sensor to reduce the internal error of the radar. Second, the bias measured against ADS-B signal, used like a parameter to calculate radar bias correction that could be applied as a feedback input in a homogenization signal process or tracking process to reduce sensor bias in a recurrent process. Third, the use of Kalman prediction characteristic to replace missing points in a trajectory calculation. This technique was implemented by Colombian system to reduce error and bias sensor and a user's quality perception in a radar tracking and fusion track system in a surveillance network. In this process, it was found that it is possible to use it by a repetitive error measured ADS-B track like a reference track to calculate the error and in this way, it could be possible to reduce the uncertainty about the aircraft position. On the other hand, the use of data analysis process based on business intelligent tools allows us to easier understand the radar error behavior. Both methodology and results will be described here.
随着航空运输的发展,航空交通管制需要加强通信导航监视空中交通管理(CNS-ATM),因为这是任何国家航空运营的支柱。该系统承担着保障航空安全和管理国家空域(NAS)的责任,目前需要增加飞行密度以应对需求。为了实现这一目标,采用了空相关监视广播(ADS-B)等新技术来提高数据空监视传感器的精度和时间响应,传感器位置的集成和ATM系统的可靠性。CNS-ATM飞机监视与控制系统主要应用于一次和二次雷达,通过应答脉冲之间的信号延迟或时间差来计算飞机位置。每个传感器的精度取决于内部和外部因素,如频率、功率、目标距离、噪声、维护等。当一个飞行器被多个传感器探测到时,它可以在飞机可能飞行的地理和时间空间中创建一个多重轨迹。这个空间取决于雷达更新时间、航速和每个传感器的精度,很难知道飞机的真实位置。这项工作提出了一种基于ADS-B的技术,用于在融合系统中对每个传感器进行误差计算,使用商业智能技术来了解地理区域中每个传感器的误差情况。基于结果,我们提出了一种可以进行误差校正以避免传感器之间相移的技术。本数据研究信息用于方差、标准差等统计计算值。为了提高融合精度,本研究提出了三个步骤。首先,利用雷达误差的区域和统计值,通过对每个传感器计算卡尔曼滤波器来减小雷达的内部误差。其次,针对ADS-B信号测量的偏置,用作计算雷达偏置校正的参数,可作为均匀化信号过程或跟踪过程中的反馈输入,以减少循环过程中的传感器偏置。第三,利用卡尔曼预测特性替换轨迹计算中的缺失点。该技术由哥伦比亚系统实施,用于减少传感器的误差和偏差,以及监控网络中雷达跟踪和融合跟踪系统的用户质量感知。在此过程中,发现可以利用ADS-B航迹作为参考航迹的重复误差测量来计算误差,这样就有可能减少飞机位置的不确定性。另一方面,利用基于商业智能工具的数据分析过程可以让我们更容易地理解雷达的错误行为。这里将描述方法和结果。
{"title":"Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools","authors":"Jimmy Anderson Florez Zuluaga, J. Vargas-Bonilla, José David Ortega Pabón, C. Rios","doi":"10.1109/CCST.2018.8585728","DOIUrl":"https://doi.org/10.1109/CCST.2018.8585728","url":null,"abstract":"With the growth of air transport, the air traffic control needs to enforce the Communication navigation surveillance air traffic management (CNS-ATM) because this is the back bone of the air operation in any country. This system has the responsibility of guaranteeing air safety and management of the national air space (NAS) that nowadays needs to increase the flight density to respond to the demand. To accomplish this, new technologies like air dependent surveillance broadcast (ADS-B) have been used to increase the accuracy and time response of data air surveillance sensor integration of sensor location and the reliability of ATM system. CNS-ATM system for surveillance and control of aircrafts have been mainly used in primary and secondary radars to calculate the aircraft position through signal delay or time difference between transponder pulses. The accuracy of each sensor depends on internal and external factors such as frequency, power, target distance, noise, maintenance, and others. When an aerodyne is detected by multiple sensors, it could create a multiple track in a geographic and temporal space where the aircraft will be possibly flying. This space depends of radar update time, aerodyne speed, and the accuracy of each sensor, and it is difficult to know where the aircraft really is. This work proposes a technique based on ADS-B for making an error calculation of each sensor in a fusion system, using business intelligence techniques for understanding the error condition of each sensor in a geographical area. Based on results, we propose a technique that could make an error correction to avoid phase shifts between sensors. The information of this data study was used for statistical calculation values such as variance and standard deviation. For fusion accuracy improvement, three steps have been proposed in this research. First, the use of the radar error by region and statistical values by calculating the Kalman filters for each sensor to reduce the internal error of the radar. Second, the bias measured against ADS-B signal, used like a parameter to calculate radar bias correction that could be applied as a feedback input in a homogenization signal process or tracking process to reduce sensor bias in a recurrent process. Third, the use of Kalman prediction characteristic to replace missing points in a trajectory calculation. This technique was implemented by Colombian system to reduce error and bias sensor and a user's quality perception in a radar tracking and fusion track system in a surveillance network. In this process, it was found that it is possible to use it by a repetitive error measured ADS-B track like a reference track to calculate the error and in this way, it could be possible to reduce the uncertainty about the aircraft position. On the other hand, the use of data analysis process based on business intelligent tools allows us to easier understand the radar error behavior. Both methodology and results will be described here.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74814441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MIMO Cable Guided Radar MIMO电缆制导雷达
Pub Date : 2018-10-01 DOI: 10.1109/CCST.2018.8585477
C. Harman
Multiple Input Multiple Output (MIMO) cable guided radar presents a true paradigm shift in leaky coaxial cable sensing. Recent technology advancements in Software Defined Radio (SDR) allow this covert terrain following radar to provide reliable detection and pinpoint the location of intruders as they cross the perimeter. MIMO operation enables the use of end-to-end correlation (patents pending) using four times the data used by traditional leaky coaxial cable sensors. Utilizing contra-directionally coupled and co-directionally coupled responses from both ends of the cables, end-to-end correlation doubles the location accuracy for a given bandwidth and reduces sensitivity to RF interference (mutual and 3rd party) – a common problem with other leaky coaxial cable sensors. Since the noise created by nearby metallic fences is a form of multipath, end-to-end correlation suppresses this common source of nuisance alarms. In addition, end-to-end correlation eliminates the need for costly “graded” cables. The use of standard leaky coaxial cables like those made in large quantity for use in communications avoids much of the wasted cable associated with graded cables and it simplifies installation and repair of the cables. These cables are designed for direct burial in many types of mediums. A cable plough can be used in many types of soil as opposed to the traditional trench and backfill approach. The cost savings in using a plough can be dramatic. The co-directionally coupled responses are used to enhance the detection process as well as to communicate response data from one processor to the next. In addition to data, a novel “split-rail” power distribution over the sensor cables minimizes the need for costly infrastructure. Since the cables are in fact the sensor, the cable and processors creates a secure power and data network around the perimeter. Applications include; prisons, nuclear power plants, military sites, VIP residences and borders.
多输入多输出(MIMO)电缆制导雷达在泄漏同轴电缆传感方面呈现出真正的范式转变。软件定义无线电(SDR)的最新技术进步允许这种隐蔽地形跟踪雷达提供可靠的检测,并在入侵者穿过边界时精确定位入侵者的位置。MIMO操作可以使用端到端相关(正在申请专利),使用的数据是传统泄漏同轴电缆传感器的四倍。利用电缆两端的反向耦合和共向耦合响应,端到端相关性在给定带宽下将定位精度提高了一倍,并降低了对射频干扰(相互和第三方)的灵敏度——这是其他泄漏同轴电缆传感器的常见问题。由于附近金属栅栏产生的噪声是一种多路径形式,端到端的相关性抑制了这种常见的滋扰警报来源。此外,端到端相关消除了对昂贵的“分级”电缆的需求。使用标准的泄漏同轴电缆,如在通信中大量使用的电缆,避免了与分级电缆相关的大量浪费电缆,并简化了电缆的安装和维修。这些电缆设计用于直接埋藏在多种介质中。电缆犁可以用于许多类型的土壤,而不是传统的沟渠和回填方法。使用犁可以节省巨大的成本。共向耦合响应用于增强检测过程以及将响应数据从一个处理器传输到下一个处理器。除了数据之外,传感器电缆上的新型“分离轨道”配电将对昂贵的基础设施的需求降至最低。由于电缆实际上是传感器,电缆和处理器在周边创建了一个安全的电力和数据网络。应用包括;监狱、核电站、军事基地、贵宾住宅和边境。
{"title":"MIMO Cable Guided Radar","authors":"C. Harman","doi":"10.1109/CCST.2018.8585477","DOIUrl":"https://doi.org/10.1109/CCST.2018.8585477","url":null,"abstract":"Multiple Input Multiple Output (MIMO) cable guided radar presents a true paradigm shift in leaky coaxial cable sensing. Recent technology advancements in Software Defined Radio (SDR) allow this covert terrain following radar to provide reliable detection and pinpoint the location of intruders as they cross the perimeter. MIMO operation enables the use of end-to-end correlation (patents pending) using four times the data used by traditional leaky coaxial cable sensors. Utilizing contra-directionally coupled and co-directionally coupled responses from both ends of the cables, end-to-end correlation doubles the location accuracy for a given bandwidth and reduces sensitivity to RF interference (mutual and 3rd party) – a common problem with other leaky coaxial cable sensors. Since the noise created by nearby metallic fences is a form of multipath, end-to-end correlation suppresses this common source of nuisance alarms. In addition, end-to-end correlation eliminates the need for costly “graded” cables. The use of standard leaky coaxial cables like those made in large quantity for use in communications avoids much of the wasted cable associated with graded cables and it simplifies installation and repair of the cables. These cables are designed for direct burial in many types of mediums. A cable plough can be used in many types of soil as opposed to the traditional trench and backfill approach. The cost savings in using a plough can be dramatic. The co-directionally coupled responses are used to enhance the detection process as well as to communicate response data from one processor to the next. In addition to data, a novel “split-rail” power distribution over the sensor cables minimizes the need for costly infrastructure. Since the cables are in fact the sensor, the cable and processors creates a secure power and data network around the perimeter. Applications include; prisons, nuclear power plants, military sites, VIP residences and borders.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"135 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77068274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the common authorship of a set of questioned signature images 评估一组可疑签名图像的共同作者身份
Pub Date : 2017-01-01 DOI: 10.1109/CCST.2017.8167822
Moisís Díaz Cabrera, M. A. Ferrer-Ballester
{"title":"Assessing the common authorship of a set of questioned signature images","authors":"Moisís Díaz Cabrera, M. A. Ferrer-Ballester","doi":"10.1109/CCST.2017.8167822","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167822","url":null,"abstract":"","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"36 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76584273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle detection for traffic flow analysis 车辆检测用于交通流分析
Pub Date : 2016-10-24 DOI: 10.1109/CCST.2016.7815693
S. Ramalingam, V. Varsani
TYAs paper looks at some of the algorithms that can be used for effective detection and tracking of vehicles, in particular for statistical analysis. The main methods for tracking discussed and implemented are blob analysis, optical flow and foreground detection. A further analysis is also done testing two of the techniques using a number of video sequences that include different levels of difficulties.
tya的论文着眼于一些可用于有效检测和跟踪车辆的算法,特别是用于统计分析的算法。讨论和实现的主要跟踪方法有斑点分析、光流和前景检测。进一步的分析也完成了测试两种技术使用一些视频序列,包括不同的难度水平。
{"title":"Vehicle detection for traffic flow analysis","authors":"S. Ramalingam, V. Varsani","doi":"10.1109/CCST.2016.7815693","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815693","url":null,"abstract":"TYAs paper looks at some of the algorithms that can be used for effective detection and tracking of vehicles, in particular for statistical analysis. The main methods for tracking discussed and implemented are blob analysis, optical flow and foreground detection. A further analysis is also done testing two of the techniques using a number of video sequences that include different levels of difficulties.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83667480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fuzzy interval valued fusion technique for multi-modal 3D face recognition 多模态三维人脸识别的模糊区间值融合技术
Pub Date : 2016-10-24 DOI: 10.1109/CCST.2016.7815709
S. Ramalingam, U. Maheswari
This paper proposes a fuzzy interval valued multicriteria decision making (MCDM) technique that aggregates information from multi-modal feature sets during decision making in a 3D face recognition system. In this paper, an interval valued fuzzy TOPSIS technique is applied to a 3D face recognition system that is benchmarked against a set of databases. Such a system is shown to be useful in decision making when the choice of alternatives of the feature sets is combinatorial and complex.
提出了一种模糊区间值多准则决策(MCDM)技术,该技术在三维人脸识别系统的决策过程中聚合多模态特征集的信息。本文将区间值模糊TOPSIS技术应用于三维人脸识别系统,并对一组数据库进行基准测试。当特征集的选择是组合的和复杂的时,这种系统被证明是有用的决策。
{"title":"A fuzzy interval valued fusion technique for multi-modal 3D face recognition","authors":"S. Ramalingam, U. Maheswari","doi":"10.1109/CCST.2016.7815709","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815709","url":null,"abstract":"This paper proposes a fuzzy interval valued multicriteria decision making (MCDM) technique that aggregates information from multi-modal feature sets during decision making in a 3D face recognition system. In this paper, an interval valued fuzzy TOPSIS technique is applied to a 3D face recognition system that is benchmarked against a set of databases. Such a system is shown to be useful in decision making when the choice of alternatives of the feature sets is combinatorial and complex.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"3 5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76996144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Metadata extraction and classification of YouTube videos using sentiment analysis 基于情感分析的YouTube视频元数据提取与分类
Pub Date : 2016-10-24 DOI: 10.1109/CCST.2016.7815692
S. Rangaswamy, Shubham Ghosh, Srishti Jha, S. Ramalingam
MPEG media have been widely adopted and is very successful in promoting interoperable services that deliver video to consumers on a range of devices. However, media consumption is going beyond the mere playback of a media asset and is geared towards a richer user experience that relies on rich metadata and content description. This paper proposes a technique for extracting and analysing metadata from a video, followed by decision making related to the video content. The system uses sentiment analysis for such a classification. It is envisaged that the system when fully developed, is to be applied to determine the existence of illicit multimedia content on the Web.
MPEG媒体已经被广泛采用,并且在促进可互操作的服务方面非常成功,这些服务可以在一系列设备上向消费者提供视频。然而,媒体消费已经超越了单纯的媒体资产的播放,而是面向依赖于丰富元数据和内容描述的更丰富的用户体验。本文提出了一种从视频中提取和分析元数据的技术,然后进行与视频内容相关的决策。该系统使用情感分析进行分类。据设想,该系统在完全发展后,将用于确定网上是否存在非法多媒体内容。
{"title":"Metadata extraction and classification of YouTube videos using sentiment analysis","authors":"S. Rangaswamy, Shubham Ghosh, Srishti Jha, S. Ramalingam","doi":"10.1109/CCST.2016.7815692","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815692","url":null,"abstract":"MPEG media have been widely adopted and is very successful in promoting interoperable services that deliver video to consumers on a range of devices. However, media consumption is going beyond the mere playback of a media asset and is geared towards a richer user experience that relies on rich metadata and content description. This paper proposes a technique for extracting and analysing metadata from a video, followed by decision making related to the video content. The system uses sentiment analysis for such a classification. It is envisaged that the system when fully developed, is to be applied to determine the existence of illicit multimedia content on the Web.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87308152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The influence of stress on biometric signature stability 应力对生物特征稳定性的影响
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815680
V. Smejkal, L. Sieger, J. Kodl
This paper directly follows on from prior research into DBS, the properties of DBS, security, its resistance to forgery and its stability. Experiments under stress situations, conducted during a survival course at the University of Defence of the Czech Republic, are described herein. It was shown that a handwritten signature developed by way of long-term practice and the reinforcement of a dynamic stereotype, consisting of the physiological, anatomical and motoric properties of each and every individual, becomes automatic to such an extent that the subconscious appending of a signature protects it from outside influences to a similar degree as we proved in the past in relation to alcohol. The experiments also identified that shorter signatures (abbreviated signature, initials) show very high variability of conformity and non-conformity between individual signatures. It was proven that the quality of recognising a signature rises with the length of the information written down. It was also again confirmed that the use of a 1st signature as “practice”, not included in the results, reduced the variability of signatures among all participants.
本文在前人对星展系统的研究基础上,对星展系统的特性、安全性、抗伪造性和稳定性进行了深入的研究。现将捷克共和国国防大学生存课程期间在压力情况下进行的实验加以说明。研究表明,手写签名是通过长期练习和动态刻板印象的强化而形成的,这种刻板印象包括每个人的生理、解剖和运动特性,在某种程度上变得自动,以至于潜意识附加的签名可以保护它免受外界影响,这与我们过去在酒精方面所证明的程度相似。实验还发现,较短的签名(缩写签名,首字母)在个人签名之间显示出非常高的一致性和不一致性。事实证明,识别签名的质量随着所写信息的长度而提高。还再次证实,使用第一个签名作为“练习”(不包括在结果中)减少了所有参与者签名的可变性。
{"title":"The influence of stress on biometric signature stability","authors":"V. Smejkal, L. Sieger, J. Kodl","doi":"10.1109/CCST.2016.7815680","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815680","url":null,"abstract":"This paper directly follows on from prior research into DBS, the properties of DBS, security, its resistance to forgery and its stability. Experiments under stress situations, conducted during a survival course at the University of Defence of the Czech Republic, are described herein. It was shown that a handwritten signature developed by way of long-term practice and the reinforcement of a dynamic stereotype, consisting of the physiological, anatomical and motoric properties of each and every individual, becomes automatic to such an extent that the subconscious appending of a signature protects it from outside influences to a similar degree as we proved in the past in relation to alcohol. The experiments also identified that shorter signatures (abbreviated signature, initials) show very high variability of conformity and non-conformity between individual signatures. It was proven that the quality of recognising a signature rises with the length of the information written down. It was also again confirmed that the use of a 1st signature as “practice”, not included in the results, reduced the variability of signatures among all participants.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78807625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dealing with occlusions in face recognition by region-based fusion 基于区域融合处理人脸识别中的遮挡
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815707
E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia
The last research efforts made in the face recognition community have been focusing in improving the robustness of systems under different variability conditions like change of pose, expression, illumination, low resolution and occlusions. Occlusions are also a manner of evading identification, which is commonly used when committing crimes or thefts. In this work we propose an approach based on the fusion of non occluded facial regions that is robust to occlusions in a simple and effective manner. We evaluate the region-based approach in three face recognition systems: Face++ (a commercial software based on CNN) and two advancements over LBP systems, one considering multiple scales and other considering a larger number of facial regions. We report experiments based on the ARFace database and prove the robustness of using only non-occluded facial regions, the effectiveness of a large number of regions and the limitations of the commercial system when dealing with occlusions.
人脸识别领域最近的研究工作集中在提高系统在不同可变性条件下的鲁棒性,如姿态、表情、光照、低分辨率和遮挡的变化。遮挡也是一种逃避身份识别的方式,通常用于犯罪或盗窃。在这项工作中,我们提出了一种基于非遮挡面部区域融合的方法,该方法对遮挡具有简单有效的鲁棒性。我们在三种人脸识别系统中评估了基于区域的方法:face++(一种基于CNN的商业软件)和两种基于LBP系统的进步,一种考虑多尺度,另一种考虑更多的面部区域。我们报告了基于ARFace数据库的实验,证明了仅使用未遮挡的面部区域的鲁棒性,大量区域的有效性以及商业系统在处理遮挡时的局限性。
{"title":"Dealing with occlusions in face recognition by region-based fusion","authors":"E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/CCST.2016.7815707","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815707","url":null,"abstract":"The last research efforts made in the face recognition community have been focusing in improving the robustness of systems under different variability conditions like change of pose, expression, illumination, low resolution and occlusions. Occlusions are also a manner of evading identification, which is commonly used when committing crimes or thefts. In this work we propose an approach based on the fusion of non occluded facial regions that is robust to occlusions in a simple and effective manner. We evaluate the region-based approach in three face recognition systems: Face++ (a commercial software based on CNN) and two advancements over LBP systems, one considering multiple scales and other considering a larger number of facial regions. We report experiments based on the ARFace database and prove the robustness of using only non-occluded facial regions, the effectiveness of a large number of regions and the limitations of the commercial system when dealing with occlusions.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"44 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76495018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrusion prevention system of automotive network CAN bus 汽车网络CAN总线入侵防御系统
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815711
Sam Abbott-McCune, Lisa A. Shay
Automotive networks based on the Controller Area Network (CAN) bus (ISO 11898) family of protocols have been shown to be vulnerable to exploits by hackers who are outside the vehicle. These networks can be compromised in a manner which could jeopardize vehicle occupants. One well-publicized exploit led to a costly automotive recall that affected more than a million vehicles. Other exploits can allow criminals to steal cars without physically breaking into them. While no fatalities have yet occurred, hackers could trigger an event that led to accident involving serious injury or even death. The CAN bus connects electronic control units (ECUs), some of which are required for safety and emissions systems such as the anti-lock braking and fuel injection systems. In addition to controlling required functions, other ECUs provide consumer-oriented features such as infotainment and lighting. Whether factory installed or aftermarket add-ons, each ECU introduces attack vectors into the overall automotive network. This research focuses on securing these vehicle networks, specifically the CAN bus. This paper will analyze the current vulnerabilities and describe our design for a real-time intrusion prevention system (IPS) that neutralizes attacks by actively monitoring the CAN bus and eliminating malicious messages.
基于控制器局域网(CAN)总线(ISO 11898)协议家族的汽车网络已被证明容易受到车外黑客的攻击。这些网络可能会以一种危及车辆乘员的方式受到破坏。一个广为人知的漏洞导致了代价高昂的汽车召回,影响了100多万辆汽车。还有一些漏洞可以让犯罪分子在不强行打开汽车的情况下窃取汽车。虽然目前还没有造成人员伤亡,但黑客可能引发导致严重伤害甚至死亡的事故。CAN总线连接电子控制单元(ecu),其中一些是安全和排放系统(如防抱死制动和燃油喷射系统)所必需的。除了控制所需功能外,其他ecu还提供面向消费者的功能,如信息娱乐和照明。无论是工厂安装还是售后附加组件,每个ECU都将攻击向量引入整个汽车网络。本研究的重点是保护这些车辆网络,特别是CAN总线。本文将分析当前的漏洞,并描述我们设计的实时入侵防御系统(IPS),该系统通过主动监控CAN总线和消除恶意消息来中和攻击。
{"title":"Intrusion prevention system of automotive network CAN bus","authors":"Sam Abbott-McCune, Lisa A. Shay","doi":"10.1109/CCST.2016.7815711","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815711","url":null,"abstract":"Automotive networks based on the Controller Area Network (CAN) bus (ISO 11898) family of protocols have been shown to be vulnerable to exploits by hackers who are outside the vehicle. These networks can be compromised in a manner which could jeopardize vehicle occupants. One well-publicized exploit led to a costly automotive recall that affected more than a million vehicles. Other exploits can allow criminals to steal cars without physically breaking into them. While no fatalities have yet occurred, hackers could trigger an event that led to accident involving serious injury or even death. The CAN bus connects electronic control units (ECUs), some of which are required for safety and emissions systems such as the anti-lock braking and fuel injection systems. In addition to controlling required functions, other ECUs provide consumer-oriented features such as infotainment and lighting. Whether factory installed or aftermarket add-ons, each ECU introduces attack vectors into the overall automotive network. This research focuses on securing these vehicle networks, specifically the CAN bus. This paper will analyze the current vulnerabilities and describe our design for a real-time intrusion prevention system (IPS) that neutralizes attacks by actively monitoring the CAN bus and eliminating malicious messages.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83739537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1