2019 Eighth International Conference on Emerging Security Technologies (EST)最新文献

筛选
英文 中文
Usability of Skin Texture Biometrics for Mixed-Resolution Images 混合分辨率图像皮肤纹理生物识别的可用性
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-08-22 DOI: 10.1109/EST.2019.8806212
H. Alsufyani, Sanaul Hoque, F. Deravi
{"title":"Usability of Skin Texture Biometrics for Mixed-Resolution Images","authors":"H. Alsufyani, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2019.8806212","DOIUrl":"https://doi.org/10.1109/EST.2019.8806212","url":null,"abstract":"There is a growing demand for alternative biometric modalities that can handle various real world challenges such as recognizing partially occluded individuals. Skin texture has been proposed as a potential alternative; however, such skin texture analysis can become difficult when captured images are at varying resolutions (due to different distances or devices). This paper explores the prospect of using mixed-resolution facial skin images as a source of biometric information. The four facial skin regions investigated here are the forehead, right cheek, left cheek, and chin which were selected because at least one of these are expected to be captured in real-world scenarios. The proposed framework first localises and assesses the usability of the extracted region of interest (ROI) for subsequent analysis. Local Binary Pattern (LBP) descriptors are then used for feature matching because of their reported effectiveness in extracting skin texture information. Experiments conducted using the XM2VTS database suggest that mixed resolution skin texture images can provide adequate information for biometric applications.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaze-based Presentation Attack Detection for Users Wearing Tinted Glasses 基于注视的有色眼镜用户呈现攻击检测
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-08-22 DOI: 10.1109/EST.2019.8806201
Asad Ali, Nawal Alsufyani, Sanaul Hoque, F. Deravi
{"title":"Gaze-based Presentation Attack Detection for Users Wearing Tinted Glasses","authors":"Asad Ali, Nawal Alsufyani, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2019.8806201","DOIUrl":"https://doi.org/10.1109/EST.2019.8806201","url":null,"abstract":"Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to address the security vulnerability of spoofing attacks where an attacker uses an artefact presented at the sensor to subvert the system. Gaze-tracking has been proposed for such attack detection. In this paper, we explore the sensitivity of a gaze-based approach to spoofing detection in the presence of eye-glasses that may impact detection performance. In particular, we investigate the use of partially tinted glasses such as may be used in hazardous environments or outdoors in mobile application scenarios The attack scenarios considered in this work include the use of projected photos, 2D and 3D masks. A gaze-based spoofing detection system has been extensively evaluated using data captured from volunteers performing genuine attempts (with and without wearing such tinted glasses) as well as spoofing attempts using various artefacts. The results of the evaluations indicate that the presence of tinted glasses has a small impact on the accuracy of attack detection, thereby making the use of such gaze-based features possible for a wider range of applications.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116055822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart Mobility 基于深度学习的实时目标检测、跟踪、距离和运动估计:在智能移动中的应用
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806222
Zhihao Chen, R. Khemmar, B. Decoux, A. Atahouet, J. Ertaud
{"title":"Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart Mobility","authors":"Zhihao Chen, R. Khemmar, B. Decoux, A. Atahouet, J. Ertaud","doi":"10.1109/EST.2019.8806222","DOIUrl":"https://doi.org/10.1109/EST.2019.8806222","url":null,"abstract":"In this paper, we will introduce our object detection, localization and tracking system for smart mobility applications like traffic road and railway environment. Firstly, an object detection and tracking approach was firstly carried out within two deep learning approaches: You Only Look Once (YOLO) V3 and Single Shot Detector (SSD). A comparison between the two methods allows us to identify their applicability in the traffic environment. Both the performances in road and in railway environments were evaluated. Secondly, object distance estimation based on Monodepth algorithm was developed. This model is trained on stereo images dataset but its inference uses monocular images. As the output data, we have a disparity map that we combine with the output of object detection. To validate our approach, we have tested two models with different backbones including VGG and ResNet used with two datasets: Cityscape and KITTI. As the last step of our approach, we have developed a new method-based SSD to analyse the behavior of pedestrian and vehicle by tracking their movements even in case of no detection on some images of a sequence. We have developed an algorithm based on the coordinates of the output bounding boxes of the SSD algorithm. The objective is to determine if the trajectory of a pedestrian or vehicle can lead to a dangerous situations. The whole of development is tested in real vehicle traffic conditions in Rouen city center, and with videos taken by embedded cameras along the Rouen tramway.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115803589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices 用于物理抗克隆设备的基于小块的密码类
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806216
Saleh Mulhem, Mouadh Ayache, W. Adi
{"title":"Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices","authors":"Saleh Mulhem, Mouadh Ayache, W. Adi","doi":"10.1109/EST.2019.8806216","DOIUrl":"https://doi.org/10.1109/EST.2019.8806216","url":null,"abstract":"Physical Unclonable Functions PUFs were proposed about two decades ago for creating physically unclonable VLSI units. PUFs as analog structures, are inherently rather costly in implementation and less consistent in the re-identification process. The novel technique proposed in this work, converts (mutates) a non-volatile SoC FPGA device at low cost into a consistent clone-resistant unit. A true random generator triggers an internal smart program which creates/mutates internally (in a post-production single-event process) a permanent physical Secret Unknown Cipher (SUC) module. This is seen as an electronic “mutation” in a self-reconfiguring non-volatile-FPGA SoC environment. The created entity results with some unknown, however operational Cipher SUC. As the SUC structure is non-volatile, the unit becomes permanently clone-resistant if any later changes are irreversibly prohibited. A large cipher class based on mini-blocks of 4-bit mappings and bundle permutations making use of the FPGA 4-input LUT structures is created. To create an SUC within a device, a single cipher is randomly selected from the large class. As nobody knows the internally selected cipher, the resulting cipher-module is unknown and could serve as a hard to clone physical identity. A perfect secret is the one which nobody knows. Once it is possible to know, it becomes clonable. A sample use case protocol challenging the particular created cipher is shown how to securely identify the device. A sample prototype implementation scenario for the proposed cipher is presented using Microsemi SmartFusion2 SoC FPGA technology. Complexity, performance and security aspects of the resulting new system are discussed and evaluated.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the Media EvoFIT面部合成图像:对法医从业人员、警察调查员、受害者、证人、罪犯和媒体影响的详细评估
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806211
C. Frowd, E. Portch, Abigail Killeen, Lydia Mullen, Alexander J. Martin, P. Hancock
{"title":"EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the Media","authors":"C. Frowd, E. Portch, Abigail Killeen, Lydia Mullen, Alexander J. Martin, P. Hancock","doi":"10.1109/EST.2019.8806211","DOIUrl":"https://doi.org/10.1109/EST.2019.8806211","url":null,"abstract":"This paper assesses use of the EvoFIT facial composite system by police practitioners in the UK and overseas. Results reveal that this forensic system is used extensively: a total of 2,440 times since September 2013. With a suspect identification rate of 60% and a conviction rate of 17%, the impact of this forensic technique is appreciable for helping the police to identify offenders. It was also found that empirically-driven enhancement techniques were used frequently by police practitioners-including use of detailed context reinstatement and holistic techniques during interview, and asking the witness to focus on the eye-region during construction. Research evaluating EvoFIT images published in the media also revealed that composites were produced mostly for serious offences, in particular for sexual crimes. In addition, the vast majority were of male offenders, in their early 30's; victims were female (aged mid 20's to mid 30's); these demographics were similar to composites emerging from another recognition system, EFIT-V / 6. Although this exercise revealed that EvoFIT composites were sometimes published using a more optimal stretched mode, some were presented in a way that did not faithfully represent the constructed image, with the external features cropped. In conclusion, the EvoFIT system is clearly being deployed frequently, with appreciable impact, in the fight against crime.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of Text 基于形状变形的字母数字符号转换:文本语境
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806219
A. Ledoux, Ngoc Bich Dao, Paul Lahmi, Mickaël Coustaty
{"title":"Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of Text","authors":"A. Ledoux, Ngoc Bich Dao, Paul Lahmi, Mickaël Coustaty","doi":"10.1109/EST.2019.8806219","DOIUrl":"https://doi.org/10.1109/EST.2019.8806219","url":null,"abstract":"In this paper, we present a new application of shape morphing in font generation. This method is adapted to the text tattooing context. The advantages of using this method for font generation are: the ability to generate all font characters in one step; all characters are changed; the user must only provide a shape towards which the characters will be distorted and define the percentage of deformation. In the context of text tattooing, the characters in the original text must be modified to embed information without disturbing the reading. Therefore, each character of the new font must be at the same time different and similar to the one of the font of the original document (Times New Roman, Arial, etc). In the results section, we show the visual similarity of the obtained characters as well as their ability to distinguish themselves in a classification process.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spreading Code Identification of Legal Drones in IoT Environment 物联网环境下合法无人机的传播码识别
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806215
K. Alheeti, M. Al-Ani, K. Mcdonald-Maier
{"title":"Spreading Code Identification of Legal Drones in IoT Environment","authors":"K. Alheeti, M. Al-Ani, K. Mcdonald-Maier","doi":"10.1109/EST.2019.8806215","DOIUrl":"https://doi.org/10.1109/EST.2019.8806215","url":null,"abstract":"The widespread use of drones has become very common today with large-scale civil and military applications. In the next few coming years, the outlook is expected that the number of drones will reach millions. So, these need to be well organised and managed in order to achieve the benefits of IoT with this accelerated environment. Drones or Unmanned Aerial Vehicles (UAVs) must achieved a level of communications to authenticate a legal working. The proposed approach concentrated on preparing each drone with identification key based on the combination of its international sim number with the date of the first action and the local country code. This approach is called Drone IDentification (DID) that generate a unique code for each drone via spreading technique. In this case any drone not apply this regulation is considered as unauthenticated drone and does not allowed to fly. This approach is very important to establish drone regulation via IoT.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications 安全无线航空电子内部通信的MAC-PRY跨层设计
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-22 DOI: 10.1109/EST.2019.8806208
R. Sámano-Robles
{"title":"MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications","authors":"R. Sámano-Robles","doi":"10.1109/EST.2019.8806208","DOIUrl":"https://doi.org/10.1109/EST.2019.8806208","url":null,"abstract":"This paper presents a framework for medium access control (MAC) and physical (PRY) cross-layer security design of wireless avionics intra-communications (WAICs). The paper explores the different options based on the latest results of MAC-PRY cross-layer design and the available standard technologies for WAICs. Particular emphasis is given to solutions based on multiple-input multiple-output (MIMO) systems and recent developments towards a wireless technology with ultra-low latency and high reliability in the context of 5G and machine-type traffic support. One major objective is to improve WAICs technology and thus match the real-time, reliability and safety critical performance of the internal aeronautics bus technologies (e.g., ARINC 664). The main identified vulnerabilities and potential solutions are explored, as well as their impact on system design complexity and feasibility for wireless networks on-board aircraft. The solutions are presented in the context of the European project SCOTT (secure connected trustable things) using the recently released reference architecture for trusted IoT systems. Other aspects of SCOTT such as trust, privacy, security classes, and safety are also discussed here for the aeronautics domain.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes 针对QCLDPC码mcelece密码系统反攻击的两种对策的进一步启发式讨论
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806207
P. Farkaš
{"title":"Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes","authors":"P. Farkaš","doi":"10.1109/EST.2019.8806207","DOIUrl":"https://doi.org/10.1109/EST.2019.8806207","url":null,"abstract":"Recently two countermeasures against reaction Attacks on McEliece cryptosystems with QC-LDPC and QC-MDPC codes were proposed. In this paper further heuristic discussion and elements of the protocol proposals are presented which can bring a system with these techniques closer to practical applications and also can enhance the overall security of the systems which will use them.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Device Identification Using Multidimensional Mapping 使用多维映射的安全设备识别
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806218
Supriya Yadav, G. Howells
{"title":"Secure Device Identification Using Multidimensional Mapping","authors":"Supriya Yadav, G. Howells","doi":"10.1109/EST.2019.8806218","DOIUrl":"https://doi.org/10.1109/EST.2019.8806218","url":null,"abstract":"In this paper we investigate several potential hardware features from multiple devices for suitability during the employment of a device identification. The generation of stable and unique digital identity from features is challenging in device identification because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a novel multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Furthermore, normalized distributions of features give the necessary data to model the characteristics, from which we derive intra-sample device feature distributions, and correlate the distinct features to generate a secure key to identify the device.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133983525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信