C. Frowd, P. Heard, Laura Foord, E. Cook, Ruth Murray, D. Bird, Robin Hoyle, Duncan Smith, P. Hancock
{"title":"Development and Evaluation of a Forensic Exhibit for Science Centres","authors":"C. Frowd, P. Heard, Laura Foord, E. Cook, Ruth Murray, D. Bird, Robin Hoyle, Duncan Smith, P. Hancock","doi":"10.1109/EST.2013.6","DOIUrl":"https://doi.org/10.1109/EST.2013.6","url":null,"abstract":"A new hands-on experiment was devised for science centres to demonstrate EvoFIT, a facial-composite system used by police with witnesses to construct facial likenesses of villains. Visitors watch a video of a man pretending to commit a crime and then construct a composite of his face by repeatedly selecting from an array of faces, with the software 'breeding' together choices to evolve a face. The new hands-on EvoFIT (Version D) takes a few minutes to complete compared with an hour or so for the police version. It has many differences from its first incarnation in 2007 (Version A): some changes incorporated recent improvements in the EvoFIT program, such as adding the hair last, while others improved engagement of the visitors and incorporated an attractive Graphical User Interface (GUI). Two main evaluations of the hands-on EvoFIT were carried out. Firstly, we compared the original exhibit (Version A) with one where external features such as hair were added at the end (Version B). Both were enjoyed by users and given similar likenesses for faces created. Secondly, we evaluated the effect of adding a new GUI and holistic tools (Versions C and D) to allow visitors to adjust features such as age and face weight. Again, use of the exhibit with and without the holistic tools were both enjoyed and gave better likenesses than the previous versions evaluated.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Private Cloud Document Archival System Architecture Based on ICmetrics","authors":"Hasan Tahir, Ruhma Tahir, K. Mcdonald-Maier","doi":"10.1109/EST.2013.24","DOIUrl":"https://doi.org/10.1109/EST.2013.24","url":null,"abstract":"This paper proposes a novel architecture that offers features for a truly interactive yet private document archival cloud. The proposed secure document archival system has been specifically designed for the elimination of paper based systems in organization. The architecture attempts to shift paper based systems to an electronic archival system where the documents are secure and the system is supportive to user demands and features. Therefore besides document archival the proposed architecture also offers the authentication and encryption for secure keeping of data on the cloud. We propose a novel combination of SSL coupled with ICMetrics for the document archival system, which will prove to be a very valuable tool for encrypting and authenticating in the cloud world.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128450167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accuracy of Relational and Featural Information in Facial-Composite Images","authors":"Cristina Fodarella, C. Frowd","doi":"10.1109/EST.2013.9","DOIUrl":"https://doi.org/10.1109/EST.2013.9","url":null,"abstract":"Facial-composite images are crucial in helping to bring perpetrators to justice and thereby maintain national and international security. Psychology can assist in identifying the accuracy of such facial information as well as ways to improve their identification rates. The current experiment demonstrates that composites tend to differ in terms of their accuracy of featural information (individual facial features) and relational information (spacing between those facial features) depending on the type of composite software used. Composites constructed with feature systems tend to have more-accurate feature information, whilst those constructed with holistic systems tend to have more-accurate relational information. Further, it was found that not only the addition of sunglasses on poor-quality composites, but also viewing composites from the side, can increase their identifiability. This could be applied by the police to potentially increase identification and arrest rates of perpetrators.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatio-temporal Role Based Access Control for Physical Access Control Systems","authors":"Emsaieb Geepalla, B. Bordbar, Xiaofeng Du","doi":"10.1109/EST.2013.13","DOIUrl":"https://doi.org/10.1109/EST.2013.13","url":null,"abstract":"Due to the large size of the global enterprise and the complexity of job's functions within organisations, managing Physical Access Control (PAC) policies has become a challenging problem. It is therefore, very important to develop Access Control mechanisms that can be deployed by organizations to meet their information security needs. In this paper we first demonstrate that current Access Control models such as Spatio-Temporal Role Based Access Control (STRBAC) are not adequate for representing PAC specifications. We then discuss some of the limitations of the current models, which we highlight by conducting a case study involving the modelling of an Access Control mechanism used by a leading telecommunications company. To overcome such limitations, we present an extension of the STRBAC model which considers the physical aspects of Access Control systems. The second contribution in this paper is using our earlier method AC2Alloy to analyse PAC specifications using Alloy analyser to ensure the consistency of the specifications.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Zhai, Kofi Appiah, Shoaib Ehsan, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Wah M. Cheung, G. Howells
{"title":"Application of ICmetrics for Embedded System Security","authors":"X. Zhai, Kofi Appiah, Shoaib Ehsan, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Wah M. Cheung, G. Howells","doi":"10.1109/EST.2013.21","DOIUrl":"https://doi.org/10.1109/EST.2013.21","url":null,"abstract":"Integrated Circuit Metrics (ICmetrics) technology is concerned with the extraction of measurable features of an embedded system, capable of uniquely identifying the system's behaviour. Any changes in these identifiers (profiles) during consequent devices' operation would signal about a possible safety or security breach within the electronic system. This paper explores the combination of program counter (PC) and Cycles per Instructions (CPI) of a processor core as a potential ICmetrics source for embedded system security. The use of this combination exhibits that while isolated PC values may not always generate a stable identifier (profile) for a device that would distinguish the device from the rest in a considered set, the PC and CPI sequences and frequencies in the execution flow may serve as suitable ICmetrics features.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"34 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruijiao Li, M. A. Oskoei, K. Mcdonald-Maier, Huosheng Hu
{"title":"ROS Based Multi-sensor Navigation of Intelligent Wheelchair","authors":"Ruijiao Li, M. A. Oskoei, K. Mcdonald-Maier, Huosheng Hu","doi":"10.1109/EST.2013.35","DOIUrl":"https://doi.org/10.1109/EST.2013.35","url":null,"abstract":"Our society is moving towards an ageing society and the number of population with physical impairments and disabilities will increase dramatically. It is necessary to provide mobility support to these people so that they can live independently at home and integrated into the society. This paper presents a ROS (Robot Operating System) based multi-sensor navigation for an intelligent wheelchair that can help the elderly and disabled people. ROS provides an easy to use framework for rapid system development at a reduced cost. Some experimental results are given in the paper to demonstrate the feasibility and performance of the developed system.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123188465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Joint Watermarking and WSQ Compression Scheme","authors":"Khalil Zebbiche, F. Khelifi, K. A. Saadi","doi":"10.1109/EST.2013.27","DOIUrl":"https://doi.org/10.1109/EST.2013.27","url":null,"abstract":"In this paper, an efficient joint watermarking and Wavelet Scalar Quantization (WSQ) compression scheme based on Quantization Index Modulation (QIM) watermarking approach is proposed to attenuate the impact of the compression operation on the embedded watermark. The proposed scheme allows the embedding of secret message directly into the fingerprint data when compressed by the WSQ algorithm. Experimental results have shown the robustness of the proposed scheme against the WSQ compression while slightly affecting its compression performance (i.e. visual quality and compression rate).","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129931150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Multiscale Vesselness Filter for Facial Feature Detection","authors":"A. Poursaberi, S. Yanushkevich, M. Gavrilova","doi":"10.1109/EST.2013.10","DOIUrl":"https://doi.org/10.1109/EST.2013.10","url":null,"abstract":"The paper introduces a new filter inspired by Frangi's Vesselness filter. The latter has been used for enhancement and noise/background suppression in medical images. The proposed modification allows for the filter parameters adjustment to detect facial features, including eyes, eyebrows, nose and lips. The main contributions of this paper include: 1) re-defining the multiscale filter previously used for vessel detection, and applying it to facial biometric, 2) proposing a way to adjust scales of the filter for facial images. In addition, the modified filter does not require applying different scales to perform filtering. This allows us to avoid the complex procedure for finding suitable scales, and, therefore, computational complexity. The method has been tested over multiple controlled and uncontrolled face databases and the results show the effectiveness of algorithm.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133895080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Zhai, Kofi Appiah, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
{"title":"A Self-Organising Map Based Algorithm for Analysis of ICmetrics Features","authors":"X. Zhai, Kofi Appiah, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2013.22","DOIUrl":"https://doi.org/10.1109/EST.2013.22","url":null,"abstract":"ICmetrics is a new approach that exploits the characteristic and behaviour of an embedded system to obtain a collection of properties and features, which aims to uniquely identify and secure an embedded system based on its own behavioural identity. In this paper, an algorithm based on a self-organising map (SOM) neural network is proposed to extract and analyse the features derived from a processor's performance profile (i.e. average cycles per instruction (CPI)), where the extracted features are used to help finding the main behaviours of the system. The proposed algorithm has been tested with different programs selected from the MiBench benchmark suite, and the results achieved show that it can successfully segment each program into different main phases based on the unique extracted features, which confirms its utility for the ICmetrics technology.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115605056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
{"title":"Program Counter as an Integrated Circuit Metrics for Secured Program Identification","authors":"Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2013.23","DOIUrl":"https://doi.org/10.1109/EST.2013.23","url":null,"abstract":"Integrated Circuit Metrics is mainly concerned with the extraction of measurable properties or features of a given hardware device, capable of uniquely identifying the system's behaviour. This paper presents features that can be extracted from software executing on a device and identify the very software in execution. The main contribution of this paper is in two folds. The ability to extract features whiles the software is in execution as well as correctly identifying the software to divulge any tampering or malicious exploitation. Our aim is to use program counter values generated during program execution to train a k-means algorithm optimized for vector quantization, and later use the system to associate program counter values with an application.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114739356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}