2021 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Comparative Study of Cryptographic and Biometric Signatures 密码与生物特征签名的比较研究
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717373
V. Smejkal, J. Kodl
{"title":"Comparative Study of Cryptographic and Biometric Signatures","authors":"V. Smejkal, J. Kodl","doi":"10.1109/ICCST49569.2021.9717373","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717373","url":null,"abstract":"The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马交通工具和汽车和摩托车旅行的安全性和风险认知的情感分析
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717374
F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717374","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717374","url":null,"abstract":"The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Variable Reflective Properties of UK Number Plates and Impact on ANPR 英国车牌的可变反射特性及其对ANPR的影响
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717378
Mike Rhead, Robert Gurney, W. E. Martin
{"title":"The Variable Reflective Properties of UK Number Plates and Impact on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717378","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717378","url":null,"abstract":"This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy 意大利新冠肺炎疫情期间无人机安全性与风险感知的情感分析
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717398
F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy","authors":"F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717398","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717398","url":null,"abstract":"The estimation of perceived safeness and risk by individuals is very significant for security and safety managing. Every person is based on the judgments of other persons to do a choosing and the Internet personifies the location where these judgments are mostly tracked, obtained, and assessed. From this point of view, social networks have a significant influence. For this reason, Opinion Mining and Sentiment Analysis have found remarkable utilizes in a multiplicity of circumstances and one of the most notable is represented by public safety and security. The purpose of the present work is to investigate the perception of safeness and risk of drones during COVID-19 pandemic in Italy. It was considered the period from Aprile 15 to December 10, 2020, properly divided into 4 significant phases, highlighting the emotional components using the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector 基于定向梯度直方图和Canny边缘检测器的水下水雷探测
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717404
S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy
{"title":"Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector","authors":"S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy","doi":"10.1109/ICCST49569.2021.9717404","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717404","url":null,"abstract":"For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods-Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing-resizing and converting to grayscale images-after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Security with QoS: Game changer for Industry and STEM Education 具有QoS的物联网安全:工业和STEM教育的游戏规则改变者
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717385
M. Jamro
{"title":"IoT Security with QoS: Game changer for Industry and STEM Education","authors":"M. Jamro","doi":"10.1109/ICCST49569.2021.9717385","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717385","url":null,"abstract":"Security aspects of Internet of Things (IoT) focusing on quality of service (QoS) and quality of experience (QoE) are critically appraised. The paper highlights various useful features of viable IoT protocols and ranked these accordingly for qualitative assessments to develop a consensus towards a unified IoT standard. The IoT challenges to industry and academic institutions are addressed with recommendations to adopt a holistic approach developing and engaging graduates with more QoS/QoE related IoT mini-projects for STEM education.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPR 评估英国道路上的外国拖车号牌,对ANPR的影响
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717391
Robert Gurney, Mike Rhead, W. E. Martin
{"title":"Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPR","authors":"Robert Gurney, Mike Rhead, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717391","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717391","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of the EU.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One vs. One Offline Signature Verification: A Forensic Handwriting Examiners Perspective 一对一离线签名验证:法医笔迹鉴定人的视角
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717381
Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona
{"title":"One vs. One Offline Signature Verification: A Forensic Handwriting Examiners Perspective","authors":"Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona","doi":"10.1109/ICCST49569.2021.9717381","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717381","url":null,"abstract":"Verifying the authorship of a questioned signature is a common task for forensic handwriting examiners. While the automatic systems are typically orientated to improve performance, their practical utility for forensics is not always guaranteed. In this paper, we propose an offline automatic signature verifier oriented to forensic handwriting examiners. Our design is based on likelihood ratios which translate the signature verification results into objective and understandable evidence for a jury in a courtroom. The likelihood ratios depend on a universal background model build with signatures from other users and distance measures between signature handcrafted features. These features can be more interpretable for forensics, even though others can be included in our verifier, like deep learning ones. In our experiments, a single signature was used as reference. Two universal background models have been developed - the first is based on the GPDS database, and the second on synthetic signatures. The scheme is tried and tested with signatures from MCYT75 and BiosecureID databases with promising results. The outcome of this work is an offline signature verifier for forensic handwriting examiner practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Video Surveillance Systems 智能视频监控系统
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717400
V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru
{"title":"Intelligent Video Surveillance Systems","authors":"V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru","doi":"10.1109/ICCST49569.2021.9717400","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717400","url":null,"abstract":"In the past decades, there has been tremendous growth in security-related issues throughout the world. With such a multifold increase in demand for security, video surveillance has become a critical research area. In the most recent studies, there were many attempts to integrate image processing algorithms. It was also possible to achieve artificial intelligence capabilities using computer vision. Intelligent video surveillance systems can be described as a technique to assist security personnel by providing reliable real-time alerts, thus supporting the investigations with efficient video analysis. This paper discusses a comprehensive and systematic overview of the existing video surveillance techniques and possible enhancements.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of detection of suspicious behavior in ensuring the security of persons in transport 利用侦测可疑行为来确保运输中人员的安全
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717399
Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova
{"title":"Use of detection of suspicious behavior in ensuring the security of persons in transport","authors":"Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova","doi":"10.1109/ICCST49569.2021.9717399","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717399","url":null,"abstract":"The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"&NA; 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信