2019 Eighth International Conference on Emerging Security Technologies (EST)最新文献

筛选
英文 中文
Risk Inference Models for Security Applications 安全应用的风险推理模型
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806210
Jonathan Graf, Shawn C. Eastwood, S. Yanushkevich, R. Ferber
{"title":"Risk Inference Models for Security Applications","authors":"Jonathan Graf, Shawn C. Eastwood, S. Yanushkevich, R. Ferber","doi":"10.1109/EST.2019.8806210","DOIUrl":"https://doi.org/10.1109/EST.2019.8806210","url":null,"abstract":"This paper focuses on the causal graph models for machine reasoning and its applications to risk assessment in biometrics. Specifically, we consider probabilistic inference performed on video data, images, speech and other human biometric data. In our approach, called the Multi-metric Inference Engine, the Bayesian network are constructed using different metrics of uncertainty, such as point probability, interval probability, fuzzy probability, and Dempster-Shafer model. We demonstrate the Inference Engine techniques using biometric-enabled security scenarios and propose a software tool for experimental study.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Hardware Design for Combined AES and AEGIS AES与AEGIS相结合的高效硬件设计
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806225
Amit Sardar, Bijoy Das, D. R. Chowdhury
{"title":"An Efficient Hardware Design for Combined AES and AEGIS","authors":"Amit Sardar, Bijoy Das, D. R. Chowdhury","doi":"10.1109/EST.2019.8806225","DOIUrl":"https://doi.org/10.1109/EST.2019.8806225","url":null,"abstract":"This paper presents an integrated design of AES, the block cipher standard and AEGIS, an AES based authenticated encryption. Our design tries to exploit the common functionalities of AES and AEGIS to achieve both confidentiality as well as confidentiality and authenticity together. The proposed design provides a cost-effective implementation on various FPGA platforms, and it achieves both the goals by using a minimum amount of extra resources compared to the stand-alone AES and AEGIS design. The performance of our design implementation has been compared with the similar design work, and it has been shown that the throughput and frequency of our design outperform the best result available in the literature.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems 生物识别系统中用于表示攻击检测的时空纹理特征
2019 Eighth International Conference on Emerging Security Technologies (EST) Pub Date : 2019-07-01 DOI: 10.1109/EST.2019.8806220
S. Pan, F. Deravi
{"title":"Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems","authors":"S. Pan, F. Deravi","doi":"10.1109/EST.2019.8806220","DOIUrl":"https://doi.org/10.1109/EST.2019.8806220","url":null,"abstract":"Spatio-temporal information is valuable as a discriminative cue for presentation attack detection, where the temporal texture changes and fine-grained motions (such as eye blinking) can be indicative of some types of spoofing attacks. In this paper, we propose a novel spatio-temporal feature, based on motion history, which can offer an efficient way to encapsulate temporal texture changes. Patterns of motion history are used as primary features followed by secondary feature extraction using Local Binary Patterns and Convolutional Neural Networks, and evaluated using the Replay Attack and CASIA-FASD datasets, demonstrating the effectiveness of the proposed approach.","PeriodicalId":102238,"journal":{"name":"2019 Eighth International Conference on Emerging Security Technologies (EST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信