2013 Fourth International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
Development and Evaluation of a Forensic Exhibit for Science Centres 科学中心法医展品的开发和评价
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.6
C. Frowd, P. Heard, Laura Foord, E. Cook, Ruth Murray, D. Bird, Robin Hoyle, Duncan Smith, P. Hancock
{"title":"Development and Evaluation of a Forensic Exhibit for Science Centres","authors":"C. Frowd, P. Heard, Laura Foord, E. Cook, Ruth Murray, D. Bird, Robin Hoyle, Duncan Smith, P. Hancock","doi":"10.1109/EST.2013.6","DOIUrl":"https://doi.org/10.1109/EST.2013.6","url":null,"abstract":"A new hands-on experiment was devised for science centres to demonstrate EvoFIT, a facial-composite system used by police with witnesses to construct facial likenesses of villains. Visitors watch a video of a man pretending to commit a crime and then construct a composite of his face by repeatedly selecting from an array of faces, with the software 'breeding' together choices to evolve a face. The new hands-on EvoFIT (Version D) takes a few minutes to complete compared with an hour or so for the police version. It has many differences from its first incarnation in 2007 (Version A): some changes incorporated recent improvements in the EvoFIT program, such as adding the hair last, while others improved engagement of the visitors and incorporated an attractive Graphical User Interface (GUI). Two main evaluations of the hands-on EvoFIT were carried out. Firstly, we compared the original exhibit (Version A) with one where external features such as hair were added at the end (Version B). Both were enjoyed by users and given similar likenesses for faces created. Secondly, we evaluated the effect of adding a new GUI and holistic tools (Versions C and D) to allow visitors to adjust features such as age and face weight. Again, use of the exhibit with and without the holistic tools were both enjoyed and gave better likenesses than the previous versions evaluated.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Private Cloud Document Archival System Architecture Based on ICmetrics 一种基于ICmetrics的私有云文档归档系统架构
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.24
Hasan Tahir, Ruhma Tahir, K. Mcdonald-Maier
{"title":"A Novel Private Cloud Document Archival System Architecture Based on ICmetrics","authors":"Hasan Tahir, Ruhma Tahir, K. Mcdonald-Maier","doi":"10.1109/EST.2013.24","DOIUrl":"https://doi.org/10.1109/EST.2013.24","url":null,"abstract":"This paper proposes a novel architecture that offers features for a truly interactive yet private document archival cloud. The proposed secure document archival system has been specifically designed for the elimination of paper based systems in organization. The architecture attempts to shift paper based systems to an electronic archival system where the documents are secure and the system is supportive to user demands and features. Therefore besides document archival the proposed architecture also offers the authentication and encryption for secure keeping of data on the cloud. We propose a novel combination of SSL coupled with ICMetrics for the document archival system, which will prove to be a very valuable tool for encrypting and authenticating in the cloud world.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128450167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Accuracy of Relational and Featural Information in Facial-Composite Images 人脸合成图像中关系信息和特征信息的准确性
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.9
Cristina Fodarella, C. Frowd
{"title":"Accuracy of Relational and Featural Information in Facial-Composite Images","authors":"Cristina Fodarella, C. Frowd","doi":"10.1109/EST.2013.9","DOIUrl":"https://doi.org/10.1109/EST.2013.9","url":null,"abstract":"Facial-composite images are crucial in helping to bring perpetrators to justice and thereby maintain national and international security. Psychology can assist in identifying the accuracy of such facial information as well as ways to improve their identification rates. The current experiment demonstrates that composites tend to differ in terms of their accuracy of featural information (individual facial features) and relational information (spacing between those facial features) depending on the type of composite software used. Composites constructed with feature systems tend to have more-accurate feature information, whilst those constructed with holistic systems tend to have more-accurate relational information. Further, it was found that not only the addition of sunglasses on poor-quality composites, but also viewing composites from the side, can increase their identifiability. This could be applied by the police to potentially increase identification and arrest rates of perpetrators.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spatio-temporal Role Based Access Control for Physical Access Control Systems 基于时空角色的物理访问控制系统访问控制
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.13
Emsaieb Geepalla, B. Bordbar, Xiaofeng Du
{"title":"Spatio-temporal Role Based Access Control for Physical Access Control Systems","authors":"Emsaieb Geepalla, B. Bordbar, Xiaofeng Du","doi":"10.1109/EST.2013.13","DOIUrl":"https://doi.org/10.1109/EST.2013.13","url":null,"abstract":"Due to the large size of the global enterprise and the complexity of job's functions within organisations, managing Physical Access Control (PAC) policies has become a challenging problem. It is therefore, very important to develop Access Control mechanisms that can be deployed by organizations to meet their information security needs. In this paper we first demonstrate that current Access Control models such as Spatio-Temporal Role Based Access Control (STRBAC) are not adequate for representing PAC specifications. We then discuss some of the limitations of the current models, which we highlight by conducting a case study involving the modelling of an Access Control mechanism used by a leading telecommunications company. To overcome such limitations, we present an extension of the STRBAC model which considers the physical aspects of Access Control systems. The second contribution in this paper is using our earlier method AC2Alloy to analyse PAC specifications using Alloy analyser to ensure the consistency of the specifications.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Application of ICmetrics for Embedded System Security ICmetrics在嵌入式系统安全中的应用
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.21
X. Zhai, Kofi Appiah, Shoaib Ehsan, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Wah M. Cheung, G. Howells
{"title":"Application of ICmetrics for Embedded System Security","authors":"X. Zhai, Kofi Appiah, Shoaib Ehsan, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Wah M. Cheung, G. Howells","doi":"10.1109/EST.2013.21","DOIUrl":"https://doi.org/10.1109/EST.2013.21","url":null,"abstract":"Integrated Circuit Metrics (ICmetrics) technology is concerned with the extraction of measurable features of an embedded system, capable of uniquely identifying the system's behaviour. Any changes in these identifiers (profiles) during consequent devices' operation would signal about a possible safety or security breach within the electronic system. This paper explores the combination of program counter (PC) and Cycles per Instructions (CPI) of a processor core as a potential ICmetrics source for embedded system security. The use of this combination exhibits that while isolated PC values may not always generate a stable identifier (profile) for a device that would distinguish the device from the rest in a considered set, the PC and CPI sequences and frequencies in the execution flow may serve as suitable ICmetrics features.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"34 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
ROS Based Multi-sensor Navigation of Intelligent Wheelchair 基于ROS的智能轮椅多传感器导航
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.35
Ruijiao Li, M. A. Oskoei, K. Mcdonald-Maier, Huosheng Hu
{"title":"ROS Based Multi-sensor Navigation of Intelligent Wheelchair","authors":"Ruijiao Li, M. A. Oskoei, K. Mcdonald-Maier, Huosheng Hu","doi":"10.1109/EST.2013.35","DOIUrl":"https://doi.org/10.1109/EST.2013.35","url":null,"abstract":"Our society is moving towards an ageing society and the number of population with physical impairments and disabilities will increase dramatically. It is necessary to provide mobility support to these people so that they can live independently at home and integrated into the society. This paper presents a ROS (Robot Operating System) based multi-sensor navigation for an intelligent wheelchair that can help the elderly and disabled people. ROS provides an easy to use framework for rapid system development at a reduced cost. Some experimental results are given in the paper to demonstrate the feasibility and performance of the developed system.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123188465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient Joint Watermarking and WSQ Compression Scheme 高效联合水印和WSQ压缩方案
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.27
Khalil Zebbiche, F. Khelifi, K. A. Saadi
{"title":"Efficient Joint Watermarking and WSQ Compression Scheme","authors":"Khalil Zebbiche, F. Khelifi, K. A. Saadi","doi":"10.1109/EST.2013.27","DOIUrl":"https://doi.org/10.1109/EST.2013.27","url":null,"abstract":"In this paper, an efficient joint watermarking and Wavelet Scalar Quantization (WSQ) compression scheme based on Quantization Index Modulation (QIM) watermarking approach is proposed to attenuate the impact of the compression operation on the embedded watermark. The proposed scheme allows the embedding of secret message directly into the fingerprint data when compressed by the WSQ algorithm. Experimental results have shown the robustness of the proposed scheme against the WSQ compression while slightly affecting its compression performance (i.e. visual quality and compression rate).","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129931150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified Multiscale Vesselness Filter for Facial Feature Detection 改进的多尺度血管度滤波器用于人脸特征检测
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.10
A. Poursaberi, S. Yanushkevich, M. Gavrilova
{"title":"Modified Multiscale Vesselness Filter for Facial Feature Detection","authors":"A. Poursaberi, S. Yanushkevich, M. Gavrilova","doi":"10.1109/EST.2013.10","DOIUrl":"https://doi.org/10.1109/EST.2013.10","url":null,"abstract":"The paper introduces a new filter inspired by Frangi's Vesselness filter. The latter has been used for enhancement and noise/background suppression in medical images. The proposed modification allows for the filter parameters adjustment to detect facial features, including eyes, eyebrows, nose and lips. The main contributions of this paper include: 1) re-defining the multiscale filter previously used for vessel detection, and applying it to facial biometric, 2) proposing a way to adjust scales of the filter for facial images. In addition, the modified filter does not require applying different scales to perform filtering. This allows us to avoid the complex procedure for finding suitable scales, and, therefore, computational complexity. The method has been tested over multiple controlled and uncontrolled face databases and the results show the effectiveness of algorithm.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133895080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Self-Organising Map Based Algorithm for Analysis of ICmetrics Features 基于自组织映射的ICmetrics特征分析算法
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.22
X. Zhai, Kofi Appiah, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
{"title":"A Self-Organising Map Based Algorithm for Analysis of ICmetrics Features","authors":"X. Zhai, Kofi Appiah, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2013.22","DOIUrl":"https://doi.org/10.1109/EST.2013.22","url":null,"abstract":"ICmetrics is a new approach that exploits the characteristic and behaviour of an embedded system to obtain a collection of properties and features, which aims to uniquely identify and secure an embedded system based on its own behavioural identity. In this paper, an algorithm based on a self-organising map (SOM) neural network is proposed to extract and analyse the features derived from a processor's performance profile (i.e. average cycles per instruction (CPI)), where the extracted features are used to help finding the main behaviours of the system. The proposed algorithm has been tested with different programs selected from the MiBench benchmark suite, and the results achieved show that it can successfully segment each program into different main phases based on the unique extracted features, which confirms its utility for the ICmetrics technology.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115605056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Program Counter as an Integrated Circuit Metrics for Secured Program Identification 程序计数器作为安全程序识别的集成电路度量
2013 Fourth International Conference on Emerging Security Technologies Pub Date : 2013-09-09 DOI: 10.1109/EST.2013.23
Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
{"title":"Program Counter as an Integrated Circuit Metrics for Secured Program Identification","authors":"Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2013.23","DOIUrl":"https://doi.org/10.1109/EST.2013.23","url":null,"abstract":"Integrated Circuit Metrics is mainly concerned with the extraction of measurable properties or features of a given hardware device, capable of uniquely identifying the system's behaviour. This paper presents features that can be extracted from software executing on a device and identify the very software in execution. The main contribution of this paper is in two folds. The ability to extract features whiles the software is in execution as well as correctly identifying the software to divulge any tampering or malicious exploitation. Our aim is to use program counter values generated during program execution to train a k-means algorithm optimized for vector quantization, and later use the system to associate program counter values with an application.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114739356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信