首页 > 最新文献

2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
The development of a test harness for biometric data collection and validation 开发用于生物特征数据收集和验证的测试工具
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815696
Michael Brockly, S. Elliott, R. Proctor, R. Guest
Biometric test reports are an important tool in the evaluation of biometric systems, and therefore the data entered into the system needs to be of the highest integrity. Data collection, especially across multiple modalities, can be a challenging experience for test administrators. They have to ensure that the data are collected properly, the test subjects are treated appropriately, and the test plan is followed. Tests become more complex as the number of sensors are increased, and therefore it becomes increasingly important that a test harness be developed to improve the accuracy of the data collection. This paper describes the development of a test harness for a complex multi-sensor, multi-visit data collection, and explains the processes for the development of such a harness. The applicability of such a software package for the broader biometric community is also considered.
生物识别测试报告是评估生物识别系统的重要工具,因此输入系统的数据需要具有最高的完整性。数据收集,特别是跨多种模式的数据收集,对于测试管理员来说可能是一个具有挑战性的体验。他们必须确保正确地收集数据,适当地对待测试对象,并遵循测试计划。随着传感器数量的增加,测试变得更加复杂,因此开发测试工具以提高数据收集的准确性变得越来越重要。本文介绍了一种复杂的多传感器、多访问数据采集测试线束的开发,并说明了该测试线束的开发过程。还考虑了这种软件包对更广泛的生物识别社区的适用性。
{"title":"The development of a test harness for biometric data collection and validation","authors":"Michael Brockly, S. Elliott, R. Proctor, R. Guest","doi":"10.1109/CCST.2016.7815696","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815696","url":null,"abstract":"Biometric test reports are an important tool in the evaluation of biometric systems, and therefore the data entered into the system needs to be of the highest integrity. Data collection, especially across multiple modalities, can be a challenging experience for test administrators. They have to ensure that the data are collected properly, the test subjects are treated appropriately, and the test plan is followed. Tests become more complex as the number of sensors are increased, and therefore it becomes increasingly important that a test harness be developed to improve the accuracy of the data collection. This paper describes the development of a test harness for a complex multi-sensor, multi-visit data collection, and explains the processes for the development of such a harness. The applicability of such a software package for the broader biometric community is also considered.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"32 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80122751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel long-range perimeter security sensor based on hybrid michelson and Mach-Zehnder interferometers 一种基于混合迈克尔逊和马赫-曾德干涉仪的新型远程周边安全传感器
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815725
K. Harman, Shailesh Singh
Over the past 25 years a number of fiber optic sensors have been developed to address fence and buried perimeters, and pipeline security. Today, sensors that locate targets along the length of the fiber sensor dominate the long-range perimeter market. There are a number of fiber optic sensors that locate targets including sensors based on interferometry and C-OTDR (Coherent Optical Time Domain Reflectometry). In general, existing interferometric techniques infer the location of a disturbance based on the magnitude of the interfering signals, as opposed to the actual phase differences, and critically suffer from polarization induced fading. A novel technology is developed, as discussed in Optellios' earlier patent, which measures the actual phase difference of the interferometric signal. As a result, this technology is more accurate and precise for locating a disturbance, works well with any magnitude of disturbance, and does not critically depend on polarization of the interfering signals. The technology uses a hybrid Michelson and Mach-Zehnder interferometer architecture that shares the same two sensing fibers. The laser light is frequency modulated, and the In-phase and Quadrature phase responses of the sensor are measured to extract the phase difference of the interfering signals. A disturbance of the sensor cable causes the phase difference of the sensor to change. This phase change is measured from each end of the fiber sensor, and the time delay between the two phase signals is used to locate the disturbance along the length of the sensor cable. The Michelson interferometer is terminated in Faraday Rotational Mirrors to avoid the issues relating to polarization induced fading. Fundamentals of this novel technology will be presented along with its relative performance and merits compared to other interferometric technologies. This technology will be further compared with C-OTDR technology, and experimental data will be discussed.
在过去的25年里,已经开发了许多光纤传感器来解决围栏和埋地周界以及管道安全问题。今天,沿着光纤传感器长度定位目标的传感器主导了远程周界市场。有许多光纤传感器用于定位目标,包括基于干涉测量和C-OTDR(相干光时域反射)的传感器。一般来说,现有的干涉测量技术根据干扰信号的大小来推断干扰的位置,而不是实际的相位差,并且严重受到极化诱导衰落的影响。正如Optellios早期专利中所讨论的那样,开发了一种测量干涉信号实际相位差的新技术。因此,该技术在定位干扰时更加准确和精确,在任何程度的干扰下都能很好地工作,并且不依赖于干扰信号的极化。该技术使用迈克尔逊和马赫-曾德混合干涉仪架构,共享相同的两种传感光纤。对激光进行频率调制,测量传感器的同相响应和正交相位响应,提取干扰信号的相位差。传感器电缆的扰动会引起传感器相位差的变化。这种相位变化是从光纤传感器的每一端测量的,两个相位信号之间的时间延迟被用来定位沿传感器电缆长度的扰动。迈克尔逊干涉仪被终止在法拉第旋转镜,以避免有关的问题,极化诱导衰落。本文将介绍这种新技术的基本原理,以及它与其他干涉测量技术相比的相对性能和优点。该技术将进一步与C-OTDR技术进行比较,并对实验数据进行讨论。
{"title":"A novel long-range perimeter security sensor based on hybrid michelson and Mach-Zehnder interferometers","authors":"K. Harman, Shailesh Singh","doi":"10.1109/CCST.2016.7815725","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815725","url":null,"abstract":"Over the past 25 years a number of fiber optic sensors have been developed to address fence and buried perimeters, and pipeline security. Today, sensors that locate targets along the length of the fiber sensor dominate the long-range perimeter market. There are a number of fiber optic sensors that locate targets including sensors based on interferometry and C-OTDR (Coherent Optical Time Domain Reflectometry). In general, existing interferometric techniques infer the location of a disturbance based on the magnitude of the interfering signals, as opposed to the actual phase differences, and critically suffer from polarization induced fading. A novel technology is developed, as discussed in Optellios' earlier patent, which measures the actual phase difference of the interferometric signal. As a result, this technology is more accurate and precise for locating a disturbance, works well with any magnitude of disturbance, and does not critically depend on polarization of the interfering signals. The technology uses a hybrid Michelson and Mach-Zehnder interferometer architecture that shares the same two sensing fibers. The laser light is frequency modulated, and the In-phase and Quadrature phase responses of the sensor are measured to extract the phase difference of the interfering signals. A disturbance of the sensor cable causes the phase difference of the sensor to change. This phase change is measured from each end of the fiber sensor, and the time delay between the two phase signals is used to locate the disturbance along the length of the sensor cable. The Michelson interferometer is terminated in Faraday Rotational Mirrors to avoid the issues relating to polarization induced fading. Fundamentals of this novel technology will be presented along with its relative performance and merits compared to other interferometric technologies. This technology will be further compared with C-OTDR technology, and experimental data will be discussed.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"54 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85234152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Human interaction recognition through deep learning network 通过深度学习网络进行人机交互识别
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815695
S. J. Berlin, M. John
This paper provides an efficient framework for recognizing human interactions based on deep learning based architecture. The Harris corner points and the histogram form the feature vector of the spatiotemporal volume. The feature vector extraction is restricted to the region of interaction. A stacked autoencoder configuration is embedded in the deep learning framework used for classification. The method is evaluated on the benchmark UT interaction dataset and average recognition rates as high as 95% and 88% are obtained on setl and set2 respectively.
本文提供了一种基于深度学习架构的高效人机交互识别框架。Harris角点和直方图构成了时空体的特征向量。特征向量的提取被限制在交互区域。堆叠的自动编码器配置嵌入到用于分类的深度学习框架中。在基准UT交互数据集上对该方法进行了评估,在setl和set2上的平均识别率分别高达95%和88%。
{"title":"Human interaction recognition through deep learning network","authors":"S. J. Berlin, M. John","doi":"10.1109/CCST.2016.7815695","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815695","url":null,"abstract":"This paper provides an efficient framework for recognizing human interactions based on deep learning based architecture. The Harris corner points and the histogram form the feature vector of the spatiotemporal volume. The feature vector extraction is restricted to the region of interaction. A stacked autoencoder configuration is embedded in the deep learning framework used for classification. The method is evaluated on the benchmark UT interaction dataset and average recognition rates as high as 95% and 88% are obtained on setl and set2 respectively.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77377479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Evidence accrual technique for information assurance 信息保障的证据应计技术
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815676
S. Stubberud, K. Kramer
Information assurance is the process of protecting information from theft, destruction, or manipulation. While many attacks are straightforward such as denial of service or viruses in that they require just a step or two to implement, more dangerous can require numerous steps to implement. Often, these steps need not be done in quick succession or even in a definite order. While techniques have been developed to behave as sensors to quickly assess elements of attacks, they rely on a decision engine to fuse the information to estimate whether or not an attack is underway. To identify such attacks, an evidence accrual system is proposed fuse information and estimate the possibility of an attack. The technique is based on a systems approach to combining information and provides nit only a level of evidence but a degree of uncertainty about the estimate.
信息保障是保护信息免遭盗窃、破坏或操纵的过程。许多攻击(如拒绝服务攻击或病毒攻击)都很简单,只需要一两个步骤就可以实现,而更危险的攻击可能需要许多步骤才能实现。通常,这些步骤不需要快速连续地完成,甚至不需要以明确的顺序完成。虽然技术已经发展到像传感器一样快速评估攻击的要素,但它们依赖于决策引擎来融合信息以估计攻击是否正在进行。为了识别这种攻击,提出了一种证据累积系统,融合信息并估计攻击的可能性。该技术基于综合信息的系统方法,不仅提供了一定程度的证据,而且还提供了估计的一定程度的不确定性。
{"title":"Evidence accrual technique for information assurance","authors":"S. Stubberud, K. Kramer","doi":"10.1109/CCST.2016.7815676","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815676","url":null,"abstract":"Information assurance is the process of protecting information from theft, destruction, or manipulation. While many attacks are straightforward such as denial of service or viruses in that they require just a step or two to implement, more dangerous can require numerous steps to implement. Often, these steps need not be done in quick succession or even in a definite order. While techniques have been developed to behave as sensors to quickly assess elements of attacks, they rely on a decision engine to fuse the information to estimate whether or not an attack is underway. To identify such attacks, an evidence accrual system is proposed fuse information and estimate the possibility of an attack. The technique is based on a systems approach to combining information and provides nit only a level of evidence but a degree of uncertainty about the estimate.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81800492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure order-preserving indexing scheme for outsourced data 外包数据的安全顺序保持索引方案
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815719
Somayeh Sobati Moghadam, G. Gavin, J. Darmont
Cloud computing offers the opportunity of data outsourcing as well as data management. However, because of various privacy issues, confidential data must be encrypted before being outsourced to the cloud. But query processing over encrypted data without decrypting data is a very challenging task. Property-preserving encryption schemes allow encrypting data while still enabling efficient querying over encrypted data. The inherent merits of property-preserving encryption schemes make them very suitable and efficient for cloud data outsourcing. However, the security of such schemes is still a challenge because they are vulnerable to statistical attacks. We present a new order-preserving scheme for indexing encrypted data, as an alternative to propertypreserving schemes, which hides data frequency to achieve a strictly stronger notion of security. The proposed indexing method is secure against statistical attacks. Hence, data cannot be recovered from indexes. Moreover, our scheme is still efficient for query processing.
云计算提供了数据外包和数据管理的机会。然而,由于各种隐私问题,机密数据必须在外包给云之前进行加密。但是在不解密数据的情况下对加密数据进行查询处理是一项非常具有挑战性的任务。保持属性的加密方案允许加密数据,同时仍然支持对加密数据的有效查询。属性保护加密方案的固有优点使其非常适合和高效地用于云数据外包。然而,这种方案的安全性仍然是一个挑战,因为它们很容易受到统计攻击。我们提出了一种新的顺序保持方案用于索引加密数据,作为属性保持方案的替代方案,它隐藏了数据频率以实现严格更强的安全概念。所提出的索引方法对统计攻击是安全的。因此,不能从索引中恢复数据。此外,我们的方案仍然是高效的查询处理。
{"title":"A secure order-preserving indexing scheme for outsourced data","authors":"Somayeh Sobati Moghadam, G. Gavin, J. Darmont","doi":"10.1109/CCST.2016.7815719","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815719","url":null,"abstract":"Cloud computing offers the opportunity of data outsourcing as well as data management. However, because of various privacy issues, confidential data must be encrypted before being outsourced to the cloud. But query processing over encrypted data without decrypting data is a very challenging task. Property-preserving encryption schemes allow encrypting data while still enabling efficient querying over encrypted data. The inherent merits of property-preserving encryption schemes make them very suitable and efficient for cloud data outsourcing. However, the security of such schemes is still a challenge because they are vulnerable to statistical attacks. We present a new order-preserving scheme for indexing encrypted data, as an alternative to propertypreserving schemes, which hides data frequency to achieve a strictly stronger notion of security. The proposed indexing method is secure against statistical attacks. Hence, data cannot be recovered from indexes. Moreover, our scheme is still efficient for query processing.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"89 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90608109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gait recognition using smartphone 智能手机步态识别技术
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815698
Pablo Fernández López, J. Liu-Jimenez, Carlos Sanchez-Redondo, R. Sánchez-Reillo
Gait recognition on smartphones could be considered as one of the most user-friendly biometric modalities. The main benefit of gait recognition is that it is an unobtrusive biometric modality, since it requires little interaction with the user. Users would only have to carry the sensor device and walk as normally. Its unobtrusiveness make it suitable for a user-friendly access system. Up to date, most studies on gait recognition have been done using dedicated hardware acquisition sensors. Nevertheless, one possible solution for gait recognition is using sensors embedded on smartphones. This paper compares the performance of four state-of-art algorithms on a smartphone. These algorithms have already been tested on dedicated hardware but not in a commercial phone. For such purpose, a database using a smartphone as acquisition device has been obtained. State-of-art gait recognition algorithms have been tested on this data base, as well as a new cycle detection algorithm which has been designed to have the same starting point. As a result, the algorithms have shown EER ranging from 16.38% to 29.07%, These EERs are significantly higher than the ones obtained in dedicated hardware which ranged from 5.7% to 13%.
智能手机上的步态识别可以被认为是最友好的生物识别方式之一。步态识别的主要好处是它是一种不显眼的生物识别方式,因为它几乎不需要与用户交互。用户只需要携带传感器设备,像往常一样走路就可以了。它的不显眼性使它适合于用户友好的访问系统。迄今为止,大多数步态识别研究都是使用专用硬件采集传感器完成的。然而,一种可能的步态识别解决方案是使用嵌入智能手机的传感器。本文比较了四种最先进算法在智能手机上的性能。这些算法已经在专用硬件上进行了测试,但还没有在商用手机上进行测试。为此,已经获得了使用智能手机作为采集设备的数据库。在此数据库上测试了最先进的步态识别算法,以及设计了具有相同起点的新的周期检测算法。结果表明,该算法的等效等效系数在16.38% ~ 29.07%之间,显著高于专用硬件的等效等效系数5.7% ~ 13%。
{"title":"Gait recognition using smartphone","authors":"Pablo Fernández López, J. Liu-Jimenez, Carlos Sanchez-Redondo, R. Sánchez-Reillo","doi":"10.1109/CCST.2016.7815698","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815698","url":null,"abstract":"Gait recognition on smartphones could be considered as one of the most user-friendly biometric modalities. The main benefit of gait recognition is that it is an unobtrusive biometric modality, since it requires little interaction with the user. Users would only have to carry the sensor device and walk as normally. Its unobtrusiveness make it suitable for a user-friendly access system. Up to date, most studies on gait recognition have been done using dedicated hardware acquisition sensors. Nevertheless, one possible solution for gait recognition is using sensors embedded on smartphones. This paper compares the performance of four state-of-art algorithms on a smartphone. These algorithms have already been tested on dedicated hardware but not in a commercial phone. For such purpose, a database using a smartphone as acquisition device has been obtained. State-of-art gait recognition algorithms have been tested on this data base, as well as a new cycle detection algorithm which has been designed to have the same starting point. As a result, the algorithms have shown EER ranging from 16.38% to 29.07%, These EERs are significantly higher than the ones obtained in dedicated hardware which ranged from 5.7% to 13%.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"36 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73265870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Biometric identification via retina scanning with liveness detection using speckle contrast imaging 生物识别通过视网膜扫描和活体检测使用散斑对比成像
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815706
Nazariy K. Shaydyuk, T. Cleland
Current biometric modalities include fingerprint, palm, voice, face, gate, iris and even DNA recognition. Another known biometric technique involves subject identification using retinal Mood vasculature pattern matching. Regardless of the modality, however, there is an inherent requirement for liveness detection so as to make the acquisition system less susceptible to deception. One possible solution for retina scanning systems is verification of blood llow in the retinal vessels - the definite feature of live tissue. Laser speckle contrast imaging is a common method of blood flow detection and could be used to explicitly confirm liveness. The dynamics of the speckle pattern can be statistically quantified and interpreted as the regions with and without flow. Using a model of the retinal vasculature, this paper reviews speckle contrast imaging as it applies to liveness verification by means of blood flow detection in retina-based biometric systems.
目前的生物识别方式包括指纹、手掌、声音、面部、门、虹膜甚至DNA识别。另一种已知的生物识别技术涉及使用视网膜情绪血管模式匹配来识别受试者。然而,无论何种方式,都有一个内在的要求,即动态检测,以使采集系统不易被欺骗。视网膜扫描系统的一个可能的解决方案是验证视网膜血管中的血液-活组织的明确特征。激光散斑对比成像是一种常用的血流检测方法,可用于明确确认活动性。散斑模式的动力学可以统计量化,并解释为有和没有流动的区域。利用视网膜血管系统的模型,本文回顾了斑点对比成像,因为它适用于活体验证的手段血流检测视网膜为基础的生物识别系统。
{"title":"Biometric identification via retina scanning with liveness detection using speckle contrast imaging","authors":"Nazariy K. Shaydyuk, T. Cleland","doi":"10.1109/CCST.2016.7815706","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815706","url":null,"abstract":"Current biometric modalities include fingerprint, palm, voice, face, gate, iris and even DNA recognition. Another known biometric technique involves subject identification using retinal Mood vasculature pattern matching. Regardless of the modality, however, there is an inherent requirement for liveness detection so as to make the acquisition system less susceptible to deception. One possible solution for retina scanning systems is verification of blood llow in the retinal vessels - the definite feature of live tissue. Laser speckle contrast imaging is a common method of blood flow detection and could be used to explicitly confirm liveness. The dynamics of the speckle pattern can be statistically quantified and interpreted as the regions with and without flow. Using a model of the retinal vasculature, this paper reviews speckle contrast imaging as it applies to liveness verification by means of blood flow detection in retina-based biometric systems.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89630889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Threat Image Projection (TIP) into X-ray images of cargo containers for training humans and machines 威胁图像投影(TIP)到货物集装箱的x射线图像中,用于培训人员和机器
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815717
T. W. Rogers, Nicolas Jaccard, E. Protonotarios, J. Ollier, E. Morton, Lewis D. Griffin
We propose a framework for Threat Image Projection (TIP) in cargo transmission X-ray imagery. The method exploits the approximately multiplicative nature of X-ray imagery to extract a library of threat items. These items can then be projected into real cargo. We show using experimental data that there is no significant qualitative or quantitative difference between real threat images and TIP images. We also describe methods for adding realistic variation to TIP images in order to robustify Machine Learning (ML) based algorithms trained on TIP. These variations are derived from cargo X-ray image formation, and include: (i) translations; (ii) magnification; (iii) rotations; (iv) noise; (v) illumination; (vi) volume and density; and (vii) obscuration. These methods are particularly relevant for representation learning, since it allows the system to learn features that are invariant to these variations. The framework also allows efficient addition of new or emerging threats to a detection system, which is important if time is critical. We have applied the framework to training ML-based cargo algorithms for (i) detection of loads (empty verification), (ii) detection of concealed cars (ii) detection of Small Metallic Threats (SMTs). TIP also enables algorithm testing under controlled conditions, allowing one to gain a deeper understanding of performance. Whilst we have focused on robustifying ML-based threat detectors, our TIP method can also be used to train and robustify human threat detectors as is done in cabin baggage screening.
我们提出了一种货物透射x射线成像中的威胁图像投影(TIP)框架。该方法利用x射线图像的近似乘法特性提取威胁项库。然后,这些物品可以投射成真正的货物。我们使用实验数据表明,真实威胁图像与TIP图像之间没有显著的定性或定量差异。我们还描述了在TIP图像中添加真实变化的方法,以增强基于TIP训练的机器学习(ML)算法。这些变化来自货物x射线图像的形成,包括:(i)翻译;(2)放大;(3)旋转;(四)噪声;(v)照明;(六)体积和密度;(七)遮蔽。这些方法与表示学习特别相关,因为它允许系统学习对这些变化不变的特征。该框架还允许有效地将新的或正在出现的威胁添加到检测系统中,这在时间紧迫的情况下非常重要。我们已经将该框架应用于训练基于ml的货物算法,用于(i)检测货物(空载验证),(ii)检测隐藏车辆(ii)检测小金属威胁(smt)。TIP还支持在受控条件下进行算法测试,使人们能够更深入地了解性能。虽然我们专注于增强基于机器学习的威胁检测器,但我们的TIP方法也可以用于训练和增强人类威胁检测器,就像在机舱行李检查中所做的那样。
{"title":"Threat Image Projection (TIP) into X-ray images of cargo containers for training humans and machines","authors":"T. W. Rogers, Nicolas Jaccard, E. Protonotarios, J. Ollier, E. Morton, Lewis D. Griffin","doi":"10.1109/CCST.2016.7815717","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815717","url":null,"abstract":"We propose a framework for Threat Image Projection (TIP) in cargo transmission X-ray imagery. The method exploits the approximately multiplicative nature of X-ray imagery to extract a library of threat items. These items can then be projected into real cargo. We show using experimental data that there is no significant qualitative or quantitative difference between real threat images and TIP images. We also describe methods for adding realistic variation to TIP images in order to robustify Machine Learning (ML) based algorithms trained on TIP. These variations are derived from cargo X-ray image formation, and include: (i) translations; (ii) magnification; (iii) rotations; (iv) noise; (v) illumination; (vi) volume and density; and (vii) obscuration. These methods are particularly relevant for representation learning, since it allows the system to learn features that are invariant to these variations. The framework also allows efficient addition of new or emerging threats to a detection system, which is important if time is critical. We have applied the framework to training ML-based cargo algorithms for (i) detection of loads (empty verification), (ii) detection of concealed cars (ii) detection of Small Metallic Threats (SMTs). TIP also enables algorithm testing under controlled conditions, allowing one to gain a deeper understanding of performance. Whilst we have focused on robustifying ML-based threat detectors, our TIP method can also be used to train and robustify human threat detectors as is done in cabin baggage screening.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83318605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Techniques in hacking and simulating a modem automotive controller area network 现代汽车控制器局域网的入侵与仿真技术
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815712
Sam Abbott-McCune, Lisa A. Shay
This research will demonstrate hacking techniques on the modern automotive network and describe the design and implementation of a benchtop simulator. In currently-produced vehicles, the primary network is based on the Controller Area Network (CAN) bus described in the ISO 11898 family of protocols. The CAN bus performs well in the electronically noisy environment found in the modern automobile. While the CAN bus is ideal for the exchange of information in this environment, when the protocol was designed security was not a priority due to the presumed isolation of the network. That assumption has been invalidated by recent, well-publicized attacks where hackers were able to remotely control an automobile, leading to a product recall that affected more than a million vehicles. The automobile has a multitude of electronic control units (ECUs) which are interconnected with the CAN bus to control the various systems which include the infotainment, light, and engine systems. The CAN bus allows the ECUs to share information along a common bus which has led to improvements in fuel and emission efficiency, but has also introduced vulnerabilities by giving access on the same network to cyber-physical systems (CPS). These CPS systems include the anti-lock braking systems (ABS) and on late model vehicles the ability to turn the steering wheel and control the accelerator. Testing functionality on an operational vehicle can be dangerous and place others in harm's way, but simulating the vehicle network and functionality of the ECUs on a bench-top system provides a safe way to test for vulnerabilities and to test possible security solutions to prevent CPS access over the CAN bus network. This paper will describe current research on the automotive network, provide techniques in capturing network traffic for playback, and demonstrate the design and implementation of a benchtop system for continued research on the CAN bus.
本研究将展示现代汽车网络上的黑客技术,并描述一个台式模拟器的设计和实现。在目前生产的车辆中,主要网络是基于ISO 11898协议家族中描述的控制器局域网(CAN)总线。CAN总线在现代汽车的电子噪声环境中表现良好。虽然CAN总线对于这种环境中的信息交换是理想的,但在设计协议时,由于假定网络是隔离的,安全性并不是优先考虑的问题。这一假设已经被最近广为人知的黑客攻击所推翻,黑客能够远程控制一辆汽车,导致100多万辆汽车受到影响的产品召回。汽车有许多电子控制单元(ecu),它们与CAN总线相互连接,以控制各种系统,包括信息娱乐、照明和发动机系统。CAN总线允许ecu沿着公共总线共享信息,从而提高了燃油和排放效率,但也引入了漏洞,因为可以在同一网络上访问网络物理系统(CPS)。这些CPS系统包括防抱死制动系统(ABS),以及在新款车型上的转向方向盘和控制加速器的能力。在运行车辆上测试功能可能是危险的,并且会使其他人受到伤害,但是在台式系统上模拟车辆网络和ecu的功能提供了一种安全的方法来测试漏洞,并测试可能的安全解决方案,以防止CPS通过can总线网络访问。本文将描述当前汽车网络的研究,提供捕获网络流量的回放技术,并演示一个台式系统的设计和实现,以继续研究CAN总线。
{"title":"Techniques in hacking and simulating a modem automotive controller area network","authors":"Sam Abbott-McCune, Lisa A. Shay","doi":"10.1109/CCST.2016.7815712","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815712","url":null,"abstract":"This research will demonstrate hacking techniques on the modern automotive network and describe the design and implementation of a benchtop simulator. In currently-produced vehicles, the primary network is based on the Controller Area Network (CAN) bus described in the ISO 11898 family of protocols. The CAN bus performs well in the electronically noisy environment found in the modern automobile. While the CAN bus is ideal for the exchange of information in this environment, when the protocol was designed security was not a priority due to the presumed isolation of the network. That assumption has been invalidated by recent, well-publicized attacks where hackers were able to remotely control an automobile, leading to a product recall that affected more than a million vehicles. The automobile has a multitude of electronic control units (ECUs) which are interconnected with the CAN bus to control the various systems which include the infotainment, light, and engine systems. The CAN bus allows the ECUs to share information along a common bus which has led to improvements in fuel and emission efficiency, but has also introduced vulnerabilities by giving access on the same network to cyber-physical systems (CPS). These CPS systems include the anti-lock braking systems (ABS) and on late model vehicles the ability to turn the steering wheel and control the accelerator. Testing functionality on an operational vehicle can be dangerous and place others in harm's way, but simulating the vehicle network and functionality of the ECUs on a bench-top system provides a safe way to test for vulnerabilities and to test possible security solutions to prevent CPS access over the CAN bus network. This paper will describe current research on the automotive network, provide techniques in capturing network traffic for playback, and demonstrate the design and implementation of a benchtop system for continued research on the CAN bus.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82280020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A novel DdTS technology based on fiber optics for early leak detection in pipelines 基于光纤的管道泄漏早期检测新技术
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815724
Chaofan Wang, Michael Olson, Nyambuu Dorjkhand, Shailesh Singh
Leaks in pipelines transporting oil, gas, or any tluid may cause enormous propern and environmental damage, hence early leak detection and accurate localization are highly desirable. Sensors to detect leaks can be broadly classified into internal and external sensors depending on where they are installed. In general, internal sensors have matured over decades while external sensors based on fiber optics are just beginning to show promise for early and precise leak detection. In this work, a novel technology DdTS (Distributed Differential Temperature Sensor) is developed that can almost instantaneously detect differential temperature in the optical fiber of as little as 0.0005 C with a location accuracy of several meters. The temperature sensitivity is several orders of magnitude higher than other Brillouin or Raman based distributed temperature sensors based on fiber optics in the market. The technology utilizes standard optical fibers installed adjacent to a pipeline and can be retrofitted to a preexisting cable in most cases. In addition to detecting differential temperature, the DdTS technology also uses acoustic signatures to detect leaks, which is effective in cases where the fluid temperature closely matches that of the background soil. The DdTS technology is based on an enhanced version of Coherent Optical Time-Domain Reflectometry (C-OTDR) and can measure not only the quasi-static changes, such as temperature or strain, but also dynamic acoustic signals in the fiber. Experimental results for gas leaks from a simulated buried pipeline are discussed for different vertical and horizontal offsets, gas pressures, leak-hole sizes, and orifice acoustic signals. Experimental data simulating a liquid leak are also discussed. All experiments confirmed the theoretical capabilities of the DdTS sensor.
在输送石油、天然气或任何液体的管道中,泄漏可能会造成巨大的财产和环境损害,因此早期发现泄漏并准确定位是非常必要的。根据安装位置的不同,可以将检测泄漏的传感器大致分为内部传感器和外部传感器。一般来说,内部传感器已经成熟了几十年,而基于光纤的外部传感器才刚刚开始显示出早期和精确泄漏检测的希望。在这项工作中,开发了一种新技术DdTS(分布式差分温度传感器),它几乎可以即时检测光纤中的温差,温度低至0.0005℃,定位精度为几米。温度灵敏度比市场上其他基于光纤的布里渊或拉曼分布式温度传感器高几个数量级。该技术利用安装在管道附近的标准光纤,在大多数情况下可以对现有电缆进行改造。除了检测温差外,DdTS技术还使用声学特征来检测泄漏,这在流体温度与背景土壤温度密切匹配的情况下是有效的。DdTS技术基于增强版的相干光时域反射(C-OTDR),不仅可以测量准静态变化,如温度或应变,还可以测量光纤中的动态声信号。讨论了不同垂直偏移量、不同水平偏移量、不同气体压力、不同泄漏孔尺寸和不同孔口声信号下模拟埋地管道气体泄漏的实验结果。对模拟液体泄漏的实验数据也进行了讨论。所有实验都证实了DdTS传感器的理论性能。
{"title":"A novel DdTS technology based on fiber optics for early leak detection in pipelines","authors":"Chaofan Wang, Michael Olson, Nyambuu Dorjkhand, Shailesh Singh","doi":"10.1109/CCST.2016.7815724","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815724","url":null,"abstract":"Leaks in pipelines transporting oil, gas, or any tluid may cause enormous propern and environmental damage, hence early leak detection and accurate localization are highly desirable. Sensors to detect leaks can be broadly classified into internal and external sensors depending on where they are installed. In general, internal sensors have matured over decades while external sensors based on fiber optics are just beginning to show promise for early and precise leak detection. In this work, a novel technology DdTS (Distributed Differential Temperature Sensor) is developed that can almost instantaneously detect differential temperature in the optical fiber of as little as 0.0005 C with a location accuracy of several meters. The temperature sensitivity is several orders of magnitude higher than other Brillouin or Raman based distributed temperature sensors based on fiber optics in the market. The technology utilizes standard optical fibers installed adjacent to a pipeline and can be retrofitted to a preexisting cable in most cases. In addition to detecting differential temperature, the DdTS technology also uses acoustic signatures to detect leaks, which is effective in cases where the fluid temperature closely matches that of the background soil. The DdTS technology is based on an enhanced version of Coherent Optical Time-Domain Reflectometry (C-OTDR) and can measure not only the quasi-static changes, such as temperature or strain, but also dynamic acoustic signals in the fiber. Experimental results for gas leaks from a simulated buried pipeline are discussed for different vertical and horizontal offsets, gas pressures, leak-hole sizes, and orifice acoustic signals. Experimental data simulating a liquid leak are also discussed. All experiments confirmed the theoretical capabilities of the DdTS sensor.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"29 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80880022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1