2014 Fifth International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
Content Reconstruction Using Keystroke Dynamics: Preliminary Results 内容重建使用击键动力学:初步结果
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.15
Liang Wu, Patrick A. H. Bours
{"title":"Content Reconstruction Using Keystroke Dynamics: Preliminary Results","authors":"Liang Wu, Patrick A. H. Bours","doi":"10.1109/EST.2014.15","DOIUrl":"https://doi.org/10.1109/EST.2014.15","url":null,"abstract":"Keystroke dynamics is a technique used to verify the identity of a person, by investigating the way a person types on a keyboard. This can be used for example in combination with a password to get access to a computer system. In that case not only the correctness of the password is checked, but also if the manner in which it was typed is correct. This is because the typing rhythm of a person is fairly unique. In this research we investigated the possibility to reconstruct the content of the typed text from the keystroke dynamics typing data. We will show that under highly optimal conditions, a simple English sentence could be reconstructed from timing information only. These results indicate however that under ordinary circumstances, at this moment, it is not likely that an attacker can reconstruct a random text from the keystroke dynamics data. However this is a preliminary study and the specific techniques used in the method we employed can be optimized, which might result in a different conclusion. Our results indicate that an attacker can train the system by using his own keystroke data or similar data of a set of accomplices.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"374 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113983227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indoor Place Categorization Using Co-occurrences of LBPs in Gray and Depth Images from RGB-D Sensors 基于RGB-D传感器灰度和深度图像中lbp共现的室内场所分类
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.23
Hojung Jung, Óscar Martínez Mozos, Y. Iwashita, R. Kurazume
{"title":"Indoor Place Categorization Using Co-occurrences of LBPs in Gray and Depth Images from RGB-D Sensors","authors":"Hojung Jung, Óscar Martínez Mozos, Y. Iwashita, R. Kurazume","doi":"10.1109/EST.2014.23","DOIUrl":"https://doi.org/10.1109/EST.2014.23","url":null,"abstract":"Indoor place categorization is an important capability for service robots working and interacting in human environments. This paper presents a new place categorization method which uses information about the spatial correlation between the different image modalities provided by RGB-D sensors. Our approach applies co-occurrence histograms of local binary patterns (LBPs) from gray and depth images that correspond to the same indoor scene. The resulting histograms are used as feature vectors in a supervised classifier. Our experimental results show the effectiveness of our method to categorize indoor places using RGB-D cameras.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"30 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Incorporation of Secure Filter in ICMetrics Group Communications 安全过滤器在ICMetrics组通信中的应用研究
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.26
Hasan Tahir, G. Howells, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier
{"title":"On the Incorporation of Secure Filter in ICMetrics Group Communications","authors":"Hasan Tahir, G. Howells, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier","doi":"10.1109/EST.2014.26","DOIUrl":"https://doi.org/10.1109/EST.2014.26","url":null,"abstract":"Secure group communications present a unique environment where there can be multiple clients and hosts are trying to communicate securely within the group. As the number of clients and hosts increases the complexity of the communication security also increases. Group communications are based on a dynamic environment where the clients may join or leave the group at any moment. Hence it is important to ensure that only permitted entities have access to the group and those that have left the group or are not part of the group have no access to the group communications. This paper explores the delineation of a secure communication filter function that is applicable to group communications and is based on the latest Integrated Circuits Metrics (ICMetrics). The proposed scheme is based on the use of hash functions. To test the scalability of the scheme it has been implemented using SHA1 and SHA2.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128350960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fourth-Person Sensing for Pro-active Services 主动服务的第四人感知
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.17
Y. Iwashita, Kazuto Nakashima, YoonSeok Pyo, R. Kurazume
{"title":"Fourth-Person Sensing for Pro-active Services","authors":"Y. Iwashita, Kazuto Nakashima, YoonSeok Pyo, R. Kurazume","doi":"10.1109/EST.2014.17","DOIUrl":"https://doi.org/10.1109/EST.2014.17","url":null,"abstract":"Service robots, which co-exist with humans to provide various services, obtain information from sensors placed in an environment and/or sensors mounted on robots. In this paper we newly propose the concept of fourth-person sensing which combines wearable cameras (first-person sensing), sensors mounted on robots (second-person sensing), and distributed sensors in the environment (third-person sensing). The proposed concept takes advantages of all three sensing systems, while removing disadvantage of each of them. The first-person sensing can analyze what a person wearing a camera is doing and details around him/her, so the fourth-person sensing has chance to provide pro-active services, which are triggered by predicted human intention and difficult with the second- and third-person systems, by estimating his intention/behavior. We introduce an example scenario using the fourth-person sensing and show the effectiveness of the proposed concept through experiments.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133966183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FIBAR: Fingerprint Imaging by Binary Angular Reflection for Individual Identification of Metal Parts 基于二元角反射的金属零件个体识别指纹成像
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.25
Toru Takahashi, Rui Ishiyama
{"title":"FIBAR: Fingerprint Imaging by Binary Angular Reflection for Individual Identification of Metal Parts","authors":"Toru Takahashi, Rui Ishiyama","doi":"10.1109/EST.2014.25","DOIUrl":"https://doi.org/10.1109/EST.2014.25","url":null,"abstract":"This paper proposes an imaging method for individual identification of metal parts using the image features of the appearances as ``fingerprints''. The key to put such a method into the real applications is how to capture the unique features that are ``repeatable'' across varying environments. Since the image features of metal surface are quite unstable due to specular reflection, most previous methods require special imaging devices. In this paper, we propose an imaging method, named Fingerprint Imaging using Binary Angular Reflection (FIBAR), for capturing repeatable ``fingerprints'' from metal surface by using a common camera. FIBAR captures an image of the angular black/white intensity pattern that is reflected off the metal surface. Since FIBAR provides a common camera with plenty of repeatable ``fingerprints'', the registration and query images of the same part are robustly matched under varying environments. FIBAR is implemented as an inexpensive tool by 3D printing, and it is distributable for wide applications. In our experiments, 1,000 metal bolts with identical appearance manufactured with the same mold are perfectly identified by employing FIBAR.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114324412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Powered Wheelchair Platform for Assistive Technology Development 助力轮椅辅助技术开发平台
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.20
M. Henderson, Stephen Kelly, R. Horne, M. Gillham, M. Pepper, J. Capron
{"title":"Powered Wheelchair Platform for Assistive Technology Development","authors":"M. Henderson, Stephen Kelly, R. Horne, M. Gillham, M. Pepper, J. Capron","doi":"10.1109/EST.2014.20","DOIUrl":"https://doi.org/10.1109/EST.2014.20","url":null,"abstract":"Literature shows that numerous wheelchair platforms, of various complexities, have been developed and evaluated for Assistive Technology purposes. However there has been little consideration to providing researchers with an embedded system which is fully compatible, and communicates seamlessly with current manufacturer's wheelchair systems. We present our powered wheelchair platform which allows researchers to mount various inertial and environment sensors, and run guidance and navigation algorithms which can modify the human desired joystick trajectory, so as to assist users with negotiating obstacles, and moving from room to room. We are also able to directly access other currently manufactured human input devices and integrate new and novel input devices into the powered wheelchair platform for clinical and research assessment.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125901956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Locating Missing Persons Using Age-Progression Images from Forensic Artists 使用法医艺术家的年龄进展图像定位失踪人员
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.31
C. Frowd, W. B. Erickson, J. Lampinen
{"title":"Locating Missing Persons Using Age-Progression Images from Forensic Artists","authors":"C. Frowd, W. B. Erickson, J. Lampinen","doi":"10.1109/EST.2014.31","DOIUrl":"https://doi.org/10.1109/EST.2014.31","url":null,"abstract":"When a person goes missing for an extended period of time, years sometimes, forensic artists may be called upon to depict a recent likeness of the face. Artists use a variety of techniques based on out-of-date photographs to provide an up-to-date age progression of the face, and the current project explores whether these techniques are effective. In the following summary, preliminary results are outlined; in my talk, I will present more-recent findings.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"31 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120887607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Non-overlapping Dual Camera Fall Detection Using the Nao Humanoid Robot 基于Nao人形机器人的非重叠双摄像头跌倒检测
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.13
Edward Catley, K. Sirlantzis, G. Howells, Stephen Kelly
{"title":"Non-overlapping Dual Camera Fall Detection Using the Nao Humanoid Robot","authors":"Edward Catley, K. Sirlantzis, G. Howells, Stephen Kelly","doi":"10.1109/EST.2014.13","DOIUrl":"https://doi.org/10.1109/EST.2014.13","url":null,"abstract":"With an aging population and a greater desire for independence, the dangers of falling incidents in the elderly have become particularly pronounced. In light of this, several technologies have been developed with the aim of preventing or monitoring falls. Failing to strike the balance between several factors including reliability, complexity and invasion of privacy has seen prohibitive in the uptake of these systems. Some systems rely on cameras being mounted in all rooms of a user's home while others require being worn 24 hours a day. This paper explores a system using a humanoid NAO robot with dual vertically mounted cameras to perform the task of fall detection.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124886934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards 'Receipt-Freeness' in Remote Biometric Authentication 迈向“无收据”的远程生物识别认证
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.22
Yoshifumi Ueshige, K. Sakurai
{"title":"Towards 'Receipt-Freeness' in Remote Biometric Authentication","authors":"Yoshifumi Ueshige, K. Sakurai","doi":"10.1109/EST.2014.22","DOIUrl":"https://doi.org/10.1109/EST.2014.22","url":null,"abstract":"Recently, cancelable biometrics, zero-bio, PKI with biometrics, and some related methods have been proposed as remote biometrics. These proposals are discussed in the viewpoint of not forensics but privacy protection. When forensic techniques are abused on the remote biometric authentication systems by third person, he/she can collect information of authentication process, such as stored templates, intermediate calculated data and etc. This situation causes novel privacy issues about excessive collection of information. Therefore, we define 'greceipt-freeness'h of biometric authentication protocol, from the viewpoint of anti-forensics. As a first step for considering requirements for 'greceipt-freeness'h remote biometric protocols, some related works are analyzed about characteristic of 'greceipt-freeness.'h As a result, we show the all protocols do not satisfy 'greceipt-freeness'h except a few situations since the servers of these protocols remain some evidence such as transformed biometric data.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131694353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obscured Asymmetric Crypto-Functions for Secured Identification 用于安全识别的模糊非对称密码函数
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.14
W. Adi, Shaza Zeitouni
{"title":"Obscured Asymmetric Crypto-Functions for Secured Identification","authors":"W. Adi, Shaza Zeitouni","doi":"10.1109/EST.2014.14","DOIUrl":"https://doi.org/10.1109/EST.2014.14","url":null,"abstract":"Emerging self-reconfiguring VLSI devices as SoC-(system-on-chip) units are offering more and more powerful computational and hardware infrastructures. Such infrastructures allow internal self-creation of even asymmetric crypto-functions and keeping them obscured and unknown within the physical device unit. Conventional asymmetric crypto-systems assume the system initiator to be a person with intelligence and access to huge resources. In difference to this conventional use, our proposed initiator is a smart device with its controllable intelligence and capability. Assuming that self-reconfiguring non-volatile SoC units would become available in the near future then such units can be dedicated to act as the substitute system initiators however with monitored capabilities obeying completely our security requirements. Such units can then self-create asymmetric ciphers with completely unknown parameters and even crypto-functions. Such units may act in a novel way as obedient initiators without being capable to reveal any sensitive information. This new operational constellation is presented in this paper. It is shown conceptually how asymmetric (public-key) crypto-functions can be created with completely unknown \"obscured\" parameters in SoC units. Several possible resulting new operation scenarios are discussed. Few sample system constellation examples using different one-way locks are demonstrated. The use of such SoC units for realizing cloneresistant devices operating in public-key mode is demonstrated by some new generic protocols.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信