Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Aliveness Detection for IRIS Biometrics IRIS生物识别的活力检测
A. Pacut, A. Czajka
{"title":"Aliveness Detection for IRIS Biometrics","authors":"A. Pacut, A. Czajka","doi":"10.1109/CCST.2006.313440","DOIUrl":"https://doi.org/10.1109/CCST.2006.313440","url":null,"abstract":"Various experiments show an alarming lack of anti-spoofing mechanisms in devices already protecting many sensitive areas all over the world, proving that aliveness detection methods must be quickly included in commercial equipment. To introduce and systemize the topic, the paper begins with a survey of possible types of eye forgery, together with possible countermeasures. The authors introduce three solutions of eye aliveness detection, based on analyses of image frequency spectrum, controlled light reflection from the cornea, and pupil dynamics. A body of various fake (printed) eye images was used to test the developed methodologies, including different printers and printout carriers. The proposed methodology was embedded into the NASK iris recognition system and showed its large potential. For a local database of pairs of alive and printed eyes, all methods proposed in the paper revealed zero false acceptance rate of fakes FAR-F. The false rejection rate of genuines FRR-G reached 2.8% for the first proposed solution, and showed null value for the next two proposed methods. This very favorable compares to the commercial equipment tested: two popular iris cameras accepted 73% and 15% of the prepared fake irises","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124847397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Face Recognition Using A Radial Basis Function Classifier 基于径向基函数分类器的人脸识别
M. Faúndez-Zanuy, E. Monte‐Moreno
{"title":"Face Recognition Using A Radial Basis Function Classifier","authors":"M. Faúndez-Zanuy, E. Monte‐Moreno","doi":"10.1109/CCST.2006.313436","DOIUrl":"https://doi.org/10.1109/CCST.2006.313436","url":null,"abstract":"Face recognition is probably the most natural way to perform a biometric authentication between human beings. However, the available technology for automatic systems still presents some drawbacks and is far away from human performance. In this paper we use the same DCT feature extraction approach presented in previous ICCST03 and ICCST'05. However, we improve the experimental results using a radial basis function (RBF) neural network in combination with the coding of the recognized class. We explain why the RBF, do not have the limitations of other classifiers such as the MLP. We also propose a method for dealing with the high number of classes associated to the task of face recognition which takes into account the limitations of the RBF as classifiers, and discuss the weakness of these methods when the number of training samples is limited. We have performed an exhaustive study about the neural network architecture and parameters, which has let us to establish relevant conclusions about the optimal configuration","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Biometric access control and crisis management for athletic events 体育赛事的生物识别访问控制和危机管理
C. Dimitriadis, D. Polemi
{"title":"Biometric access control and crisis management for athletic events","authors":"C. Dimitriadis, D. Polemi","doi":"10.1109/CCST.2006.313433","DOIUrl":"https://doi.org/10.1109/CCST.2006.313433","url":null,"abstract":"This paper, proposes a system called Athlos that implements strong access control and crisis management, enhancing the safety of event spectators. Athlos is an integrated system for managing crisis situations during the course of large-scale athletic events. The system integrates intelligent biometric access control systems, smart cards, emergency mobile units and wireless links for authenticating participants, preventing unwanted incidents, providing first-aid and effectively activating all response teams needed in emergency situations","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130682788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keystroke Dynamics Verification Using a Spontaneously Generated Password 使用自发生成的密码进行击键动态验证
S. Modi, Stephen J. Elliott
{"title":"Keystroke Dynamics Verification Using a Spontaneously Generated Password","authors":"S. Modi, Stephen J. Elliott","doi":"10.1109/CCST.2006.313439","DOIUrl":"https://doi.org/10.1109/CCST.2006.313439","url":null,"abstract":"Current keystroke dynamics applications have tackled the problem of traditional knowledge-based static password verification, but the problem of spontaneous password verification persists. The intent of this study was to examine the predictive strength of typing patterns for spontaneous passwords. The typing patterns of an individual typing at a DELLreg keyboard on a DELL OptiPlexreg GX260 machine were recorded. Variables collected included keystroke press time and keystroke latency. Computed performance measures included false match rates (FMR) and false non match rates (FNMR) at various threshold levels","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
The Unexpected Value of Hybrid RMS Risk Management 混合RMS风险管理的意外价值
R. Goeres
{"title":"The Unexpected Value of Hybrid RMS Risk Management","authors":"R. Goeres","doi":"10.1109/CCST.2006.313453","DOIUrl":"https://doi.org/10.1109/CCST.2006.313453","url":null,"abstract":"The number of Boxing Day Tsunami victims could have been dramatically reduced had there been an emergency warning system in the countries bordering the Indian Ocean; the lack of such a system was due to cost-benefit analyses that set threat-mitigation resource-allocation priorities. Virtually all quantitative threat assessment and risk management programs use arithmetic means and expected values for analysis and resource prioritization and allocation. Although these methods work reasonably well around the centers of distributions, they underestimate the resources necessary to address threats from the tails of the distributions such as rare-but-deadly threats and ubiquitous-but-innocuous events; they also tend to over-allocate resources to relatively low-threat and low-impact risks. A cursory survey of current quantitative threat assessment and mitigation methodologies explains why their results may be inappropriate and how root-mean-square (RMS) methods for aggregating n-dimensional threat and impact components into effective risk levels (ERL) yields results that correspond to expectations for risk management and resource-allocation purposes. Motivations and procedures for deriving continuous threat-factor functions are described and integrated into these hybrid RMS (HRMS) aggregation techniques, which may be used to construct security return-on-investment (SROI) metrics for budget justification. These methods are also extensible to uncertain-programming applications (e.g. fuzzy logic) and reconciling differences of opinions among information security experts. When combined with operations research techniques such as multidimensional scaling, these methods may form the basis for developing the Emergent Standard Information Assurance Assessor","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129986740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Ergonomic Principles in a Biometric System: A Look at the Human Biometric Sensor Interaction (HBSI) 在生物识别系统中实现人体工程学原理:人体生物识别传感器交互(HBSI)
E. Kukula, Stephen J. Elliott
{"title":"Implementing Ergonomic Principles in a Biometric System: A Look at the Human Biometric Sensor Interaction (HBSI)","authors":"E. Kukula, Stephen J. Elliott","doi":"10.1109/CCST.2006.313434","DOIUrl":"https://doi.org/10.1109/CCST.2006.313434","url":null,"abstract":"This paper discusses the implementation of ergonomic principles in a biometric system. Historically, the biometrics community has performed limited work in the area of ergonomics and usability. This research discusses an experiment involving a swipe fingerprint sensor which examined the human interaction with the biometric device called the human biometric sensor interaction (HBSI). The purpose of this study was to examine issues related to fingerprint acquisition of all ten digits. The results revealed that there are fingerprints that have higher failure to acquire (FTA) rates than others, indicating others factors apart from image quality, such as how the user interacts with the device may be at play. Thus, more research is needed in the area of biometric usability and ergonomics, namely understanding how the human interacts with the biometric sensor","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Selected Systems for the Detection of Human Stowaways in Air Cargo Containers 侦测航空货柜内偷渡者的若干系统
B. Klock
{"title":"Selected Systems for the Detection of Human Stowaways in Air Cargo Containers","authors":"B. Klock","doi":"10.1109/CCST.2006.313425","DOIUrl":"https://doi.org/10.1109/CCST.2006.313425","url":null,"abstract":"In the spring of 2005, the United States Department of Homeland Security, Transportation Security Administration (TSA) commissioned a study to identify effective methods for the detection of human stowaways in air cargo containers. A market survey was initially conducted that identified existing COTS products. That survey identified four products that were deemed worthy of further test and evaluation: the CD-2 human occupancy detector (HOD), handheld carbon dioxide (CO2) detector; the RadarVision2, a through-wall motion sensor using ultra-wide band (UWB) radar technology; the advanced vehicle interrogation and notification (AVIAN) heartbeat detector (HBD), a vibration-sensing system; and the MicroSearch human presence detection system (HPDS), a vibration-sensing system (similar to the AVIAN HBD, above)","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131354916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intelligent Language Comprehension System for Automatic Data Analysis 面向自动数据分析的智能语言理解系统
Chang-Lung Tsai, Thomas C. Chuang
{"title":"Intelligent Language Comprehension System for Automatic Data Analysis","authors":"Chang-Lung Tsai, Thomas C. Chuang","doi":"10.1109/CCST.2006.313466","DOIUrl":"https://doi.org/10.1109/CCST.2006.313466","url":null,"abstract":"The 911 attacking, London and India explosion, South Asia tsunami, Pakistan earthquake and North Korea missile launching incidences all brought terrible disaster or big threat. It is quite important for government agencies to acquire significant information and have good preparation before the disaster occurs. However, there are huge pike of information. How to extract and display the significant information in real time from possible huge pike of emerging data is a challenge, especially for the information presented in different language. Therefore, building an automatic data acquisition and analysis system for early warning is a must. In this paper, we propose an automatic data analysis scheme which is based on efficient language comprehension and information understanding. Experimental results demonstrate the feasibility and validity of our proposed method","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Product Based Security Model for Smart Home Appliances 基于产品的智能家电安全模型
D. Pishva, Keiji Takeda
{"title":"A Product Based Security Model for Smart Home Appliances","authors":"D. Pishva, Keiji Takeda","doi":"10.1109/MAES.2008.4665323","DOIUrl":"https://doi.org/10.1109/MAES.2008.4665323","url":null,"abstract":"The idea of using existing electronics in smart home appliances and connecting them to the Internet is a new dimension along which technologies continue to grow. In Japan, electronics giants are selling various kinds of smart home appliances and have also joined hands to create standards for linking networked home appliances. While there is a huge potential market for such appliances, both in Japan and around the world, there are serious security challenges that have to be addressed in order to realize their true benefits. In this paper we examine a number of related security incidents that have occurred in Japan and identify existing challenges from technical, social, and practical aspects. We also discuss some countermeasures that can be used to prevent existing and projected security breaches","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134003176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Multimodal Biometric System based on Hand Geometry and Palm Print Texture 基于手几何和掌纹纹理的多模态生物识别系统
M. Ferrer, C. Travieso, J. B. Alonso
{"title":"Multimodal Biometric System based on Hand Geometry and Palm Print Texture","authors":"M. Ferrer, C. Travieso, J. B. Alonso","doi":"10.1109/CCST.2006.313435","DOIUrl":"https://doi.org/10.1109/CCST.2006.313435","url":null,"abstract":"This paper presents a multimodal biometric identification system based on the geometrical and palm print features of the human hand. The right hand images are acquired by a commercial scanner with a 150 dpi resolution. The geometrical features are obtained from the binarized images and consist on 15 measures. A support vector machines is used as verifier. The palm print texture is obtained by means of a 2D Gabor phase encoding scheme. A robust coordinate system is defined to make easier the image alignment. A Hamming distance and threshold are used for verifying the identity. A score and decision level fusion results have shown the improvement of the combined scheme","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114879228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信