2019 Eighth International Conference on Emerging Security Technologies (EST)最新文献

筛选
英文 中文
Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric 作者风格、年龄和性别对手写签名自然可撤销性分析的影响研究
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806234
Tasmina Islam, M. Fairhurst
{"title":"Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric","authors":"Tasmina Islam, M. Fairhurst","doi":"10.1109/EST.2019.8806234","DOIUrl":"https://doi.org/10.1109/EST.2019.8806234","url":null,"abstract":"“Natural revocability” is an extremely simple and intuitive strategy for the revocation process in the event of compromise without the need for complex mathematical processing, This paper investigates the possibilities of adopting the strategy, in relation to security and reliability in handwritten signature analysis by exploring the effect of writer style, age and gender on signature analysis. This is examined by performing analysis of variance for the extracted features based on three style categories, two gender groups and three age groups. The results from the analysis provide some valuable insight into the concept of natural revocability as a function of writer style, age and gender.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Thermal Face Signature Abnormalities 热面特征异常检测
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806217
O. Obi-Alago, S. Yanushkevich, H. M. Wetherley
{"title":"Detecting Thermal Face Signature Abnormalities","authors":"O. Obi-Alago, S. Yanushkevich, H. M. Wetherley","doi":"10.1109/EST.2019.8806217","DOIUrl":"https://doi.org/10.1109/EST.2019.8806217","url":null,"abstract":"In this paper, we propose a novel method of applying deep learning techniques to face biometrics in infrared spectrum. It addresses detection of abnormal thermal patterns, thus identifying, in particular, indicators of insobriety. This finds its application for security and healthcare emergency detection in city shelters. We applied the deep learning approach on 16,000 usable images of 40 subjects from a publicly available Drunk-Sober database. Two Convolutional Neural Network architectures were investigated for the task of processing of two regions of interest - the forehead and the eyes. The accuracy of the neural network classifiers to predict subject's insobriety using the forehead and eye regions-of-interest reached 95.5% and 96.67%, respectively, compared to to best known results on the same data using a non-deep neural networks. To boost the accuracy of classification, both the feature-level and the score-level fusion were applied as well, thus improving the accuracy to 96.92%.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2019 Eighth International Conference on Emerging Security Technologies (EST) 2019第八届新兴安全技术国际会议(EST)
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/est.2019.8806227
{"title":"2019 Eighth International Conference on Emerging Security Technologies (EST)","authors":"","doi":"10.1109/est.2019.8806227","DOIUrl":"https://doi.org/10.1109/est.2019.8806227","url":null,"abstract":"","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"7 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Method For Sensor Authentication Using Hidden Markov Models 基于隐马尔可夫模型的传感器认证机器学习方法
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806200
J. Murphy, G. Howells, K. Mcdonald-Maier
{"title":"A Machine Learning Method For Sensor Authentication Using Hidden Markov Models","authors":"J. Murphy, G. Howells, K. Mcdonald-Maier","doi":"10.1109/EST.2019.8806200","DOIUrl":"https://doi.org/10.1109/EST.2019.8806200","url":null,"abstract":"A machine learning method for sensor based authentication is presented. It exploits hidden markov models to generate stable and synthetic probability density functions from variant sensor data. The principle, and novelty, of the new method are presented in detail together with a statistical evaluation. The results show a marked improvement in stability through the use of hidden markov models.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125092332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Metric Evaluation of Thermal-to-Visual Face Recognition 热视觉人脸识别的多度量评价
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806202
K. Lai, S. Yanushkevich
{"title":"Multi-Metric Evaluation of Thermal-to-Visual Face Recognition","authors":"K. Lai, S. Yanushkevich","doi":"10.1109/EST.2019.8806202","DOIUrl":"https://doi.org/10.1109/EST.2019.8806202","url":null,"abstract":"In this paper, we aim to address the problem of heterogeneous or cross-spectral face recognition using machine learning to synthesize visual spectrum face from infrared images. The synthesis of visual-band face images allows for more optimal extraction of facial features to be used for face identification and/or verification. We explore the ability to use Generative Adversarial Networks (GANs) for face image synthesis, and examine the performance of these images using pre-trained Convolutional Neural Networks (CNNs). The features extracted using CNNs are applied in face identification and verification. We explore the performance in terms of acceptance rate when using various similarity measures for face verification.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"52 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Benchmark of Visual SLAM Algorithms: ORB-SLAM2 vs RTAB-Map* 视觉SLAM算法的基准:ORB-SLAM2与RTAB-Map*
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806213
N. Ragot, R. Khemmar, Adithya Pokala, R. Rossi, J. Ertaud
{"title":"Benchmark of Visual SLAM Algorithms: ORB-SLAM2 vs RTAB-Map*","authors":"N. Ragot, R. Khemmar, Adithya Pokala, R. Rossi, J. Ertaud","doi":"10.1109/EST.2019.8806213","DOIUrl":"https://doi.org/10.1109/EST.2019.8806213","url":null,"abstract":"This works deals with a benchmark of two well-known visual Simultaneous Localization and Mapping (vSLAM) algorithms: ORB-SLAM2 proposed by Mur-Atal & al in 2015 [7] and RTAB-Map proposed by [8]. The benchmark has been carried out with an Intel real-sense camera 435D mounted on top of a robotics electrical powered wheelchair running a ROS platform. The ORB SLAM has been implemented taking into account a monocular, stereo and RGB-D camera. RTAB SLAM, meanwhile, has only implemented with monocular and RGB-D camera. Several experiments have been carried out in a controlled indoor environment at the ESIGELEC's Autonomous Navigation Laboratory. These experiments are supported by the use of the VICON motion capture system used as a ground-truth to validate our results [1]. Different motion scenarios are used to test and benchmark the SLAM algorithms in various configurations: straight-line, straight-line and back, circular path with loop closure, etc.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Two, Three and Four Dimensional BB84: A Comparative Analysis Based on C# Simulation 二、三、四维BB84:基于c#仿真的比较分析
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806204
Liliana Zisu
{"title":"Two, Three and Four Dimensional BB84: A Comparative Analysis Based on C# Simulation","authors":"Liliana Zisu","doi":"10.1109/EST.2019.8806204","DOIUrl":"https://doi.org/10.1109/EST.2019.8806204","url":null,"abstract":"Quantum Cryptography, the principles of which are based on the laws of quantum mechanics, is a new approach to secure communication. The main advantages of quantum cryptography as opposed to classical cryptography are: unconditional security, the transmission of an encryption key of a length equal to that of the message, the impossibility of creating an identical copy of an unknown quantum state, and the disruption of the quantum system when trying to measure it. BB84 is the first and best known quantum protocol. It was created in 1984 by Charles Bennett and Gilles Brassard and represents a quantum key distribution. The basic idea of the protocol is to encode bits using photon polarization, one bit for each photon. The paper presents an improvement of the protocol by using quantum memory and coding two, three or four bits for each photon, achieving a great efficiency and a higher security level.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis SortAlgo-Metrics:通过简单的算法分析识别基于云的服务器
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806214
Samuel D. Baba, Supriya Yadav, G. Howells
{"title":"SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis","authors":"Samuel D. Baba, Supriya Yadav, G. Howells","doi":"10.1109/EST.2019.8806214","DOIUrl":"https://doi.org/10.1109/EST.2019.8806214","url":null,"abstract":"This paper introduces a novel technique to detect spoof or fake software systems via the generation of a unique digital signature based on a direct analysis of the construction of the system. Specifically, we model a novel mechanism referred to as SortAlgo-Metrics analysis to identify cloud-based servers. We deployed four cloud-based servers to run four sorting algorithms to allow features extraction that are used for analysis. Consequently, the model has been validated by comparing training data and the testing data with 96% probability. Therefore, with more complex properties pulled out from the cloud-based servers and advanced statistical model, SortAlgo-Metrics mechanism could generate a higher degree of basis numbers for ICMetrics technology entropy key generation for cloud-based server authentication, and other complex systems.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Attributes and Detection of Drug Addicts 面孔属性与吸毒成瘾者的检测
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806203
Sudarsini Tekkam Gnanasekar, S. Yanushkevich
{"title":"Face Attributes and Detection of Drug Addicts","authors":"Sudarsini Tekkam Gnanasekar, S. Yanushkevich","doi":"10.1109/EST.2019.8806203","DOIUrl":"https://doi.org/10.1109/EST.2019.8806203","url":null,"abstract":"This paper addresses the problem of detecting the prolonged drug abuse marks using “soft” face biometrics. We propose a two-stage approach that integrates both the machine learning approach and the probabilistic reasoning. We identified “drug affect facial attributes” for attribute classification, and then performed probabilistic inference for detecting the drug addicts using the five face attributes. The experiments were performed using pre-trained convolutional neural networks, GoogleNet, ResNet50 and VGG16, for face attribute classification. PCA was applied on the extracted features for dimensionality reduction along with Fisher's linear discriminant feature selection method, and then a classification of attributes was performed using a linear SVM. The average accuracy of the five “drug affect facial attribute” detection reached, in particular, 90% using the ResNet50 model. We then applied this statistics to create a Bayesian network which represented the causal model for the final decision-making to classify the subjects as drug addicts. This approach reached the accuracy of 84%.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133197249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG Data 基于人脸和心电数据的混合评分和秩-水平融合人脸识别
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806206
Thomas Truong, Jonathan Graf, S. Yanushkevich
{"title":"Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG Data","authors":"Thomas Truong, Jonathan Graf, S. Yanushkevich","doi":"10.1109/EST.2019.8806206","DOIUrl":"https://doi.org/10.1109/EST.2019.8806206","url":null,"abstract":"Uni-modal identification systems are vulnerable to errors in sensor data collection and are therefore more likely to misidentify subjects. For instance, relying on data solely from an RGB face camera can cause problems in poorly lit environments or if subjects do not face the camera. Other identification methods such as electrocardiograms (ECG) have issues with improper lead connections to the skin. Errors in identification are minimized through the fusion of information gathered from both of these models. This paper proposes a methodology for combining the identification results of face and ECG data using Part A of the BioVid Heat Pain Database containing synchronized RGB-video and ECG data on 87 subjects. Using 10-fold cross-validation, face identification was 98.8% accurate, while the ECG identification was 96.1% accurate. By using a fusion approach the identification accuracy improved to 99.8%. Our proposed methodology allows for identification accuracies to be significantly improved by using disparate face and ECG models that have non-overlapping modalities.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信