{"title":"Comparative Study of Cryptographic and Biometric Signatures","authors":"V. Smejkal, J. Kodl","doi":"10.1109/ICCST49569.2021.9717373","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717373","url":null,"abstract":"The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717374","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717374","url":null,"abstract":"The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Variable Reflective Properties of UK Number Plates and Impact on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717378","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717378","url":null,"abstract":"This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy","authors":"F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717398","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717398","url":null,"abstract":"The estimation of perceived safeness and risk by individuals is very significant for security and safety managing. Every person is based on the judgments of other persons to do a choosing and the Internet personifies the location where these judgments are mostly tracked, obtained, and assessed. From this point of view, social networks have a significant influence. For this reason, Opinion Mining and Sentiment Analysis have found remarkable utilizes in a multiplicity of circumstances and one of the most notable is represented by public safety and security. The purpose of the present work is to investigate the perception of safeness and risk of drones during COVID-19 pandemic in Italy. It was considered the period from Aprile 15 to December 10, 2020, properly divided into 4 significant phases, highlighting the emotional components using the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy
{"title":"Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector","authors":"S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy","doi":"10.1109/ICCST49569.2021.9717404","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717404","url":null,"abstract":"For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods-Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing-resizing and converting to grayscale images-after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Security with QoS: Game changer for Industry and STEM Education","authors":"M. Jamro","doi":"10.1109/ICCST49569.2021.9717385","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717385","url":null,"abstract":"Security aspects of Internet of Things (IoT) focusing on quality of service (QoS) and quality of experience (QoE) are critically appraised. The paper highlights various useful features of viable IoT protocols and ranked these accordingly for qualitative assessments to develop a consensus towards a unified IoT standard. The IoT challenges to industry and academic institutions are addressed with recommendations to adopt a holistic approach developing and engaging graduates with more QoS/QoE related IoT mini-projects for STEM education.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPR","authors":"Robert Gurney, Mike Rhead, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717391","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717391","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of the EU.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona
{"title":"One vs. One Offline Signature Verification: A Forensic Handwriting Examiners Perspective","authors":"Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona","doi":"10.1109/ICCST49569.2021.9717381","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717381","url":null,"abstract":"Verifying the authorship of a questioned signature is a common task for forensic handwriting examiners. While the automatic systems are typically orientated to improve performance, their practical utility for forensics is not always guaranteed. In this paper, we propose an offline automatic signature verifier oriented to forensic handwriting examiners. Our design is based on likelihood ratios which translate the signature verification results into objective and understandable evidence for a jury in a courtroom. The likelihood ratios depend on a universal background model build with signatures from other users and distance measures between signature handcrafted features. These features can be more interpretable for forensics, even though others can be included in our verifier, like deep learning ones. In our experiments, a single signature was used as reference. Two universal background models have been developed - the first is based on the GPDS database, and the second on synthetic signatures. The scheme is tried and tested with signatures from MCYT75 and BiosecureID databases with promising results. The outcome of this work is an offline signature verifier for forensic handwriting examiner practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru
{"title":"Intelligent Video Surveillance Systems","authors":"V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru","doi":"10.1109/ICCST49569.2021.9717400","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717400","url":null,"abstract":"In the past decades, there has been tremendous growth in security-related issues throughout the world. With such a multifold increase in demand for security, video surveillance has become a critical research area. In the most recent studies, there were many attempts to integrate image processing algorithms. It was also possible to achieve artificial intelligence capabilities using computer vision. Intelligent video surveillance systems can be described as a technique to assist security personnel by providing reliable real-time alerts, thus supporting the investigations with efficient video analysis. This paper discusses a comprehensive and systematic overview of the existing video surveillance techniques and possible enhancements.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova
{"title":"Use of detection of suspicious behavior in ensuring the security of persons in transport","authors":"Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova","doi":"10.1109/ICCST49569.2021.9717399","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717399","url":null,"abstract":"The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"&NA; 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}