{"title":"Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric","authors":"Tasmina Islam, M. Fairhurst","doi":"10.1109/EST.2019.8806234","DOIUrl":"https://doi.org/10.1109/EST.2019.8806234","url":null,"abstract":"“Natural revocability” is an extremely simple and intuitive strategy for the revocation process in the event of compromise without the need for complex mathematical processing, This paper investigates the possibilities of adopting the strategy, in relation to security and reliability in handwritten signature analysis by exploring the effect of writer style, age and gender on signature analysis. This is examined by performing analysis of variance for the extracted features based on three style categories, two gender groups and three age groups. The results from the analysis provide some valuable insight into the concept of natural revocability as a function of writer style, age and gender.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Thermal Face Signature Abnormalities","authors":"O. Obi-Alago, S. Yanushkevich, H. M. Wetherley","doi":"10.1109/EST.2019.8806217","DOIUrl":"https://doi.org/10.1109/EST.2019.8806217","url":null,"abstract":"In this paper, we propose a novel method of applying deep learning techniques to face biometrics in infrared spectrum. It addresses detection of abnormal thermal patterns, thus identifying, in particular, indicators of insobriety. This finds its application for security and healthcare emergency detection in city shelters. We applied the deep learning approach on 16,000 usable images of 40 subjects from a publicly available Drunk-Sober database. Two Convolutional Neural Network architectures were investigated for the task of processing of two regions of interest - the forehead and the eyes. The accuracy of the neural network classifiers to predict subject's insobriety using the forehead and eye regions-of-interest reached 95.5% and 96.67%, respectively, compared to to best known results on the same data using a non-deep neural networks. To boost the accuracy of classification, both the feature-level and the score-level fusion were applied as well, thus improving the accuracy to 96.92%.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2019 Eighth International Conference on Emerging Security Technologies (EST)","authors":"","doi":"10.1109/est.2019.8806227","DOIUrl":"https://doi.org/10.1109/est.2019.8806227","url":null,"abstract":"","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"7 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Machine Learning Method For Sensor Authentication Using Hidden Markov Models","authors":"J. Murphy, G. Howells, K. Mcdonald-Maier","doi":"10.1109/EST.2019.8806200","DOIUrl":"https://doi.org/10.1109/EST.2019.8806200","url":null,"abstract":"A machine learning method for sensor based authentication is presented. It exploits hidden markov models to generate stable and synthetic probability density functions from variant sensor data. The principle, and novelty, of the new method are presented in detail together with a statistical evaluation. The results show a marked improvement in stability through the use of hidden markov models.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125092332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Metric Evaluation of Thermal-to-Visual Face Recognition","authors":"K. Lai, S. Yanushkevich","doi":"10.1109/EST.2019.8806202","DOIUrl":"https://doi.org/10.1109/EST.2019.8806202","url":null,"abstract":"In this paper, we aim to address the problem of heterogeneous or cross-spectral face recognition using machine learning to synthesize visual spectrum face from infrared images. The synthesis of visual-band face images allows for more optimal extraction of facial features to be used for face identification and/or verification. We explore the ability to use Generative Adversarial Networks (GANs) for face image synthesis, and examine the performance of these images using pre-trained Convolutional Neural Networks (CNNs). The features extracted using CNNs are applied in face identification and verification. We explore the performance in terms of acceptance rate when using various similarity measures for face verification.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"52 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ragot, R. Khemmar, Adithya Pokala, R. Rossi, J. Ertaud
{"title":"Benchmark of Visual SLAM Algorithms: ORB-SLAM2 vs RTAB-Map*","authors":"N. Ragot, R. Khemmar, Adithya Pokala, R. Rossi, J. Ertaud","doi":"10.1109/EST.2019.8806213","DOIUrl":"https://doi.org/10.1109/EST.2019.8806213","url":null,"abstract":"This works deals with a benchmark of two well-known visual Simultaneous Localization and Mapping (vSLAM) algorithms: ORB-SLAM2 proposed by Mur-Atal & al in 2015 [7] and RTAB-Map proposed by [8]. The benchmark has been carried out with an Intel real-sense camera 435D mounted on top of a robotics electrical powered wheelchair running a ROS platform. The ORB SLAM has been implemented taking into account a monocular, stereo and RGB-D camera. RTAB SLAM, meanwhile, has only implemented with monocular and RGB-D camera. Several experiments have been carried out in a controlled indoor environment at the ESIGELEC's Autonomous Navigation Laboratory. These experiments are supported by the use of the VICON motion capture system used as a ground-truth to validate our results [1]. Different motion scenarios are used to test and benchmark the SLAM algorithms in various configurations: straight-line, straight-line and back, circular path with loop closure, etc.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two, Three and Four Dimensional BB84: A Comparative Analysis Based on C# Simulation","authors":"Liliana Zisu","doi":"10.1109/EST.2019.8806204","DOIUrl":"https://doi.org/10.1109/EST.2019.8806204","url":null,"abstract":"Quantum Cryptography, the principles of which are based on the laws of quantum mechanics, is a new approach to secure communication. The main advantages of quantum cryptography as opposed to classical cryptography are: unconditional security, the transmission of an encryption key of a length equal to that of the message, the impossibility of creating an identical copy of an unknown quantum state, and the disruption of the quantum system when trying to measure it. BB84 is the first and best known quantum protocol. It was created in 1984 by Charles Bennett and Gilles Brassard and represents a quantum key distribution. The basic idea of the protocol is to encode bits using photon polarization, one bit for each photon. The paper presents an improvement of the protocol by using quantum memory and coding two, three or four bits for each photon, achieving a great efficiency and a higher security level.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis","authors":"Samuel D. Baba, Supriya Yadav, G. Howells","doi":"10.1109/EST.2019.8806214","DOIUrl":"https://doi.org/10.1109/EST.2019.8806214","url":null,"abstract":"This paper introduces a novel technique to detect spoof or fake software systems via the generation of a unique digital signature based on a direct analysis of the construction of the system. Specifically, we model a novel mechanism referred to as SortAlgo-Metrics analysis to identify cloud-based servers. We deployed four cloud-based servers to run four sorting algorithms to allow features extraction that are used for analysis. Consequently, the model has been validated by comparing training data and the testing data with 96% probability. Therefore, with more complex properties pulled out from the cloud-based servers and advanced statistical model, SortAlgo-Metrics mechanism could generate a higher degree of basis numbers for ICMetrics technology entropy key generation for cloud-based server authentication, and other complex systems.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Attributes and Detection of Drug Addicts","authors":"Sudarsini Tekkam Gnanasekar, S. Yanushkevich","doi":"10.1109/EST.2019.8806203","DOIUrl":"https://doi.org/10.1109/EST.2019.8806203","url":null,"abstract":"This paper addresses the problem of detecting the prolonged drug abuse marks using “soft” face biometrics. We propose a two-stage approach that integrates both the machine learning approach and the probabilistic reasoning. We identified “drug affect facial attributes” for attribute classification, and then performed probabilistic inference for detecting the drug addicts using the five face attributes. The experiments were performed using pre-trained convolutional neural networks, GoogleNet, ResNet50 and VGG16, for face attribute classification. PCA was applied on the extracted features for dimensionality reduction along with Fisher's linear discriminant feature selection method, and then a classification of attributes was performed using a linear SVM. The average accuracy of the five “drug affect facial attribute” detection reached, in particular, 90% using the ResNet50 model. We then applied this statistics to create a Bayesian network which represented the causal model for the final decision-making to classify the subjects as drug addicts. This approach reached the accuracy of 84%.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133197249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG Data","authors":"Thomas Truong, Jonathan Graf, S. Yanushkevich","doi":"10.1109/EST.2019.8806206","DOIUrl":"https://doi.org/10.1109/EST.2019.8806206","url":null,"abstract":"Uni-modal identification systems are vulnerable to errors in sensor data collection and are therefore more likely to misidentify subjects. For instance, relying on data solely from an RGB face camera can cause problems in poorly lit environments or if subjects do not face the camera. Other identification methods such as electrocardiograms (ECG) have issues with improper lead connections to the skin. Errors in identification are minimized through the fusion of information gathered from both of these models. This paper proposes a methodology for combining the identification results of face and ECG data using Part A of the BioVid Heat Pain Database containing synchronized RGB-video and ECG data on 87 subjects. Using 10-fold cross-validation, face identification was 98.8% accurate, while the ECG identification was 96.1% accurate. By using a fusion approach the identification accuracy improved to 99.8%. Our proposed methodology allows for identification accuracies to be significantly improved by using disparate face and ECG models that have non-overlapping modalities.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}