2013 Fourth International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
On the Feasibility and Performance of Pass-Thought Authentication Systems 思想传递认证系统的可行性及性能研究
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.12
A. Jolfaei, Xin-Wen Wu, V. Muthukkumarasamy
{"title":"On the Feasibility and Performance of Pass-Thought Authentication Systems","authors":"A. Jolfaei, Xin-Wen Wu, V. Muthukkumarasamy","doi":"10.1109/EST.2013.12","DOIUrl":"https://doi.org/10.1109/EST.2013.12","url":null,"abstract":"With recent advances in cognitive biometrics, user authentication using brain-computer interfaces (BCIs), namely a pass-thought system, has received much attention in the cryptographic community. However, as the performance of BCIs hinges upon human factors, the feasibility of a pass-thought system needs to be examined. In this paper, we show that classification accuracy can be increased by increasing the number of test trials. More importantly, we propose a new information-theoretic measure (termed communication rate) based on a binary asymmetric channel model, for measuring the performance of pass-thought systems. We show that the maximum spelling rate of a pass-thought authentication system lies within the acceptable speed range of user comfort, indicating the practicality of this system. The relationships among classification accuracy, number of symbols, number of trials, and communication rate are investigated. The communication rate of a pass-thought authentication system is found to be directly proportional to accuracy and number of symbols, but it is inversely proportional to the number of trials.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127451035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Feasibility of Using Gyro and EMG Fusion as a Multi-position Computer Interface for Amputees 陀螺仪与肌电融合作为截肢者多位置计算机接口的可行性
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.33
J. Cannan, Huosheng Hu
{"title":"Feasibility of Using Gyro and EMG Fusion as a Multi-position Computer Interface for Amputees","authors":"J. Cannan, Huosheng Hu","doi":"10.1109/EST.2013.33","DOIUrl":"https://doi.org/10.1109/EST.2013.33","url":null,"abstract":"This paper demonstrates how a wearable armband that incorporates Gyro and EMG sensor fusion, can be used as a simple input device for upper body amputees. The armband enables any user with some level of yaw and pitch arm movement, and arm muscle voluntary contraction, to potentially control an electrical device like a computer, robotic arm, or mobile phone. Simple Gyro data calculates pitch and yaw, while EMG threshold based techniques are used for a virtual enter button. Only light weight signal processing is required to achieve acceptable results, reducing the required processing time on the microcontroller and receiving device, thereby allowing the Fusion Band to be interfaced with almost any device. Three locations on a users arm: wrist, upper forearm and bicep were tested, in order to simulate variations in amputation, while experiments on text input and computer navigation were preformed to analyze the devices usability as a computer interface. The device aims to make interaction in computer applications more intuitive for amputee users.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bi-modal Human Machine Interface for Controlling an Intelligent Wheelchair 智能轮椅控制的双模态人机界面
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.19
E. Rechy-Ramirez, Huosheng Hu
{"title":"Bi-modal Human Machine Interface for Controlling an Intelligent Wheelchair","authors":"E. Rechy-Ramirez, Huosheng Hu","doi":"10.1109/EST.2013.19","DOIUrl":"https://doi.org/10.1109/EST.2013.19","url":null,"abstract":"This paper presents a bi-modal human machine interface (HMI) alternative for hands-free control of an electric powered wheelchair (EPW) by means of head movements and facial expressions. The head movements and the facial expressions are detected by using the gyroscope and the cognitiv suite of the Emotiv EPOC sensor, respectively. By employing the cognitiv suite, the user can choose his/her most comfortable facial expressions. Three head movements are used to stop the wheelchair and display the turning commands in the graphical interface (GI) of the HMI, while two facial expressions are employed to move forward the wheelchair and confirm the execution of the turning command displayed on the GI of the HMI. By doing this, the user is free of turning his/her head while the wheelchair is being controlled without the execution of an undesired command. Two subjects have tested the proposed HMI by operating a wheelchair in an indoor environment. Furthermore, five facial expressions have been tested in order to determine that the users can employ different facial expressions for executing the control commands on the wheelchair. The preliminary experiments reveal that our HMI is reliable for operating the wheelchair.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation 基于传感器模式噪声估计的高效源相机图像锐化
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.25
Ashref Lawgaly, F. Khelifi, A. Bouridane
{"title":"Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation","authors":"Ashref Lawgaly, F. Khelifi, A. Bouridane","doi":"10.1109/EST.2013.25","DOIUrl":"https://doi.org/10.1109/EST.2013.25","url":null,"abstract":"Sensor pattern noise (SPN) has been widely used for image authentication and camera source identification. Its abundance in terms of the information that it carries along a wide frequency range allows for reliable identification in the presence of many imaging sensors. SPN estimation relies on the difference between a set of images and their smoothened versions to capture the characteristics of the sensor. Therefore, this process uses a part of the sensor noise content which is concentrated in the high frequency range and present in edges, contours and textured areas of the images. In this report, we propose to use a sharpening method to amplify the PRNU components for better estimation, thus enhancing the performance of camera source identification (CSI). Significant improvements have been achieved by the proposed method as demonstrated with two recent source camera identification techniques.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection 活体检测中注视共线性特征的方向灵敏度
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.7
Asad Ali, F. Deravi, Sanaul Hoque
{"title":"Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection","authors":"Asad Ali, F. Deravi, Sanaul Hoque","doi":"10.1109/EST.2013.7","DOIUrl":"https://doi.org/10.1109/EST.2013.7","url":null,"abstract":"To increase the trust in using face recognition systems, these need to be capable of differentiating between face images captured from a real person and those captured from photos or similar artifacts presented at the sensor. Methods have been published for face liveness detection by measuring the gaze of a user while the user tracks an object on the screen, which appears at pre-defined, places randomly. In this paper we explore the sensitivity of such a system to different stimulus alignments. The aim is to establish whether there is such sensitivity and if so to explore how this may be exploited for improving the design of the stimulus. The results suggest that collecting feature points along the horizontal direction is more effective than the vertical direction for liveness detection.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Context-Aware Mobile Biometric Authentication based on Support Vector Machines 基于支持向量机的上下文感知移动生物特征认证
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.38
H. Witte, C. Rathgeb, C. Busch
{"title":"Context-Aware Mobile Biometric Authentication based on Support Vector Machines","authors":"H. Witte, C. Rathgeb, C. Busch","doi":"10.1109/EST.2013.38","DOIUrl":"https://doi.org/10.1109/EST.2013.38","url":null,"abstract":"The ubiquitous use of smartphones raises the need for stronger device protection. Traditional authentication methods on mobile devices are still knowledge-based, exhibiting well- known drawbacks. In addition, requests for passwords, PINs, or screen lock patterns represent an interruption of the device usage. In this paper a context-aware mobile biometric system is proposed. Modern smartphone devices comprise a multitude of sensors which can be utilized to measure a variety of environmental aspects, e.g. noise level or location. Based on this contextual information subject-specific context models are constructed in order to train SVMs, providing an alternative user-friendly authentication mechanism. In experiments a self- acquired database is employed where obtained results confirm the feasibility of the proposed system.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Fourier-Mellin transform for Robust Image Hashing 鲁棒图像哈希的Fourier-Mellin变换
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.17
Supakorn Prungsinchai, F. Khelifi, A. Bouridane
{"title":"Fourier-Mellin transform for Robust Image Hashing","authors":"Supakorn Prungsinchai, F. Khelifi, A. Bouridane","doi":"10.1109/EST.2013.17","DOIUrl":"https://doi.org/10.1109/EST.2013.17","url":null,"abstract":"This paper proposes a new perceptual image hashing technique based on the Fourier-Mellin Transform (FMT). The idea consists of exploiting the invariance property of the FMT to extract robust hashes using overlapping blocks in the transform domain. To secure the system, two secrete keys are used in different stages. The results show good robustness against signal processing operations and geometric attacks including translation and rotation and demonstrate the superiority of the proposed technique over related transform based hashing techniques.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Age Sensitivity of Face Recognition Algorithms 人脸识别算法的年龄敏感性
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.8
Dk H. Phm Yassin, Sanaul Hoque, F. Deravi
{"title":"Age Sensitivity of Face Recognition Algorithms","authors":"Dk H. Phm Yassin, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2013.8","DOIUrl":"https://doi.org/10.1109/EST.2013.8","url":null,"abstract":"This paper investigates the performance degradation of facial recognition systems due to the influence of age. A comparative analysis of verification performance is conducted for four subspace projection techniques combined with four different distance metrics. The experimental results based on a subset of the MORPH-II database show that the choice of subspace projection technique and associated distance metric can have a significant impact on the performance of the face recognition system for particular age groups.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construction of Software-Based Digital Physical Clone Resistant Functions 基于软件的数字物理抗克隆功能构建
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.37
Marc Fyrbiak, Christian Kison, W. Adi
{"title":"Construction of Software-Based Digital Physical Clone Resistant Functions","authors":"Marc Fyrbiak, Christian Kison, W. Adi","doi":"10.1109/EST.2013.37","DOIUrl":"https://doi.org/10.1109/EST.2013.37","url":null,"abstract":"Due to the emerging sophisticated physical attacks on security systems, secure authentication of electronic devices becomes more difficult to attain. Recent research showed alarming vulnerabilities in existing cryptographic systems through side channel and (semi)-invasive attacks. The main challenging problem is the break one break all phenomena. As if one successful attack is found, then it may be deployed automatically on any units incorporating similar implementations. Physical Unclonable Functions (PUFs) were introduced as promising solutions to provide resilient device authentication. However, recent research on PUFs showed that PUFs exhibit several implementation complexity, inconsistency and security drawbacks for long-term use. PUF structures, especially for existing microcontroller low-cost applications showed serious drawbacks and cloning vulnerabilities. The objective of this work is to propose a digital PUF alternative by pure software entities with robustness to side channel attacks. The resulting implementation size is comparable to lightweight cryptographic algorithms. The key implementation idea is based on self-creation of secret unknown cryptographic functions. As the implementation is pure digital, no inconsistency compared to that of conventional PUFs is possible and the resulting system would exhibit a long-term resilient consistency. Due to their pure software implementation the cost per unit may reach zero which is quite attractive for practical cloning-protection in many massproduct applications.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimizing 2D Gabor Filters for Iris Recognition 优化用于虹膜识别的二维Gabor滤波器
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.15
P. Radu, K. Sirlantzis, W. Howells, Sanaul Hoque, F. Deravi
{"title":"Optimizing 2D Gabor Filters for Iris Recognition","authors":"P. Radu, K. Sirlantzis, W. Howells, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2013.15","DOIUrl":"https://doi.org/10.1109/EST.2013.15","url":null,"abstract":"The randomness and richness present in the iris texture make the 2D Gabor filter bank analysis a suitable technique to be used for iris recognition systems. To accurately characterize complex texture structures using 2D Gabor filters it is necessary to use multiple sets of parameters of this type of filters. This paper proposes a technique of optimizing multiple sets of 2D Gabor filter parameters to gradually enhance the accuracy of an iris recognition system. The proposed methodology is suitable to be applied on both near infrared and visible spectrum iris images. To illustrate the efficiency of the filter bank design technique, UBIRISv1 database was used for benchmarking.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信