T. Kutzner, C. Travieso, Ingrid Bonninger, J. B. Alonso, J. L. Vásquez
{"title":"Writer identification on mobile device based on handwritten","authors":"T. Kutzner, C. Travieso, Ingrid Bonninger, J. B. Alonso, J. L. Vásquez","doi":"10.1109/CCST.2013.6922063","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922063","url":null,"abstract":"This paper deals with exploring of the potential of writer identification by handwriting on a touch-screen phone for an application in access control systems. Our aim was to examine the possibility of writer recognition by a biometric model based on handwritten password. A mobile phone-server solution based on distributed blocks is proposed. The implemented approach performs a pre-processing block, in order to segment the handwritten password on the mobile phone. It also applies a feature extraction in order to have our biometric in-formation, running on the server. The classification is done with 10 online and offline features and is classified by a Naive Bayes classifier. We have used a database of 108 handwritten genuine (12 samples came from nine users) and 36 impostors (four false samples from nine users) written on a HTC Desire mobile phone with Android 2.2. The proposed system reached an accuracy of 96.87% in writer verification. The false acceptance rate of the proposed system is 11.11%.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117197918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Loveček, A. Veľas, K. Kampová, L. Mariš, V. Mózer
{"title":"Cumulative probability of detecting an intruder by alarm systems","authors":"T. Loveček, A. Veľas, K. Kampová, L. Mariš, V. Mózer","doi":"10.1109/CCST.2013.6922037","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922037","url":null,"abstract":"Currently various methodologies, procedures and software tools are used worldwide for the quantitative assessment of the reliability or effectiveness of the systems for protecting objects evaluating the interaction between the breakthrough resistances and the probabilities of detecting by alarm systems. Their frequent drawback is the fact that currently some concrete values or procedures for acquiring the individual variables are missing, or that these variables do not take into account all the significant influences of the environment. This article defines the possibility of a more complex calculation of one of the basic output quantities, i.e. the cumulative probability of detecting an intruder. Besides the newly defined functional dependences between the input parameters of this output quantity, the article also introduces concrete values of some parameters acquired through experiments (e.g. the probabilities of detecting an intruder by the PIR detector under standard or specific conditions).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miguel A. Ferrer, Moises Diaz-Cabrera, A. Morales, Javier Galbally, M. Gomez-Barrero
{"title":"Realistic synthetic off-line signature generation based on synthetic on-line data","authors":"Miguel A. Ferrer, Moises Diaz-Cabrera, A. Morales, Javier Galbally, M. Gomez-Barrero","doi":"10.1109/CCST.2013.6922041","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922041","url":null,"abstract":"A novel method for the generation of synthetic offline signatures is presented. The proposed algorithm follows a two steps scheme: first, the raw synthetic dynamic functions of the synthetic signature are generated; second, several ink and paper models are applied to transform the on-line data to realistic static signatures. The novel approach is validated using four different publicly available databases both real and synthetic. The experimental protocol includes the comparison of both types of signatures in terms of: i) performance evaluation of two competitive and totally different verification systems; and ii) visual appearance according to human observers. The experimental results show the high similarity existing between synthetically generated and humanly produced samples, and the potential of the proposed method for the study of the signature trait.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130216408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johanna Carvajal-González, J. Valencia-Aguirre, G. Castellanos-Domínguez
{"title":"Silhouette classification by using manifold learning for automated threat detection","authors":"Johanna Carvajal-González, J. Valencia-Aguirre, G. Castellanos-Domínguez","doi":"10.1109/CCST.2013.6922080","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922080","url":null,"abstract":"Video surveillance systems have become an essential tool to enhance security in both public and private places, especially to prevent potentially dangerous situations. However, these systems usually have a high number of nuisance alarms, when they are aimed at detecting automatically abandoned objects. It was found that people waiting (sitting or standing still) in airports, train stations and bus stops are the main cause of false alarms, as available video surveillance technologies are not focused on recognizing the abandoned objects. In this paper, we present a methodology to recognize abandoned objects. The goal is to determinate if the alarm is caused by an unattended baggage or a stationery person, as the former may pose potential security threats. The R transform, which is a geometric invariant feature descriptor and has low computational complexity, is applied to each of the four patches in which the silhouette of the object to be recognized is divided. Afterwards a covariance matrix representation is calculated from both the original high dimensional space and a low dimensional space obtained with Laplacian Egienmaps, being this matrix a point in a Riemannian Manifold. The proposed methodology is evaluated in a single person dataset and a baggage dataset (gathered from the web) and good performance was obtained.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High variability geographical obfuscation for location privacy","authors":"P. Wightman, M. Zurbarán, A. Santander","doi":"10.1109/CCST.2013.6922079","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922079","url":null,"abstract":"In the last few years, the number of applications that use the location of the users in order to provide a more personalized service have been increasing, mainly due to easy access to low cost smartphones, geographical positioning systems and other factors, like social networking. The concern of protecting this information is also increasing due to the capabilities than an eventual attacker could have if the location information is obtained. Some protection techniques have been proposed in the literature; for example, location obfuscation which slightly alters the location to hide the real one. However, this technique could be filtered out with time series-based mechanisms. In this work, the Pinwheel obfuscation technique is proposed in order to reduce the possibility of EMA-based filtering based on high variability and asymmetry of the induced noise. The results show that the level of filtered noise is reduced from 35% in N-RAND and 30% in θ-Rand obfuscation techniques, to 15% in Pinwheel, with asymmetric scenarios, while preserving a long final average distance from the original path after a filtering attack.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126951879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing trustworthy dynamic biometric signature according to the electronic signature regulations","authors":"V. Smejkal, J. Kodl","doi":"10.1109/CCST.2013.6922039","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922039","url":null,"abstract":"Many countries of the world exercise legal regulations, which embedded electronic signature based on asymmetric cryptography in their legislation. However, this kind of signature is cumbersome and not yet overly accepted by the public. This paper studies the possibility of replacing it by dynamic biometric signature (DBS) in relation with demands of the legal regulations (EU in particular) not only as “current” electronic signature (ES) but also as “advanced” electronic signature (AES). However, in order to satisfy the requirements for AES, whilst being implemented it must fulfill demands given by the legislation for this type of signature. The authors describe the methods how to satisfy such demands and thus build a system utilizing DBS with high level of security. Furthermore, the authors discuss the issues of uniqueness of DBS in terms of individual's characteristic motion, and hence the validity of parameters required for unique identification of the user. The study then proposes important methods for identification of an individual. The authors then conclude that DBS under the right implementation can form significant alternative to ES and AES.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129203261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing the training a guard in the operation of a high-tech facility access control system","authors":"D. Shane","doi":"10.1109/CCST.2013.6922074","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922074","url":null,"abstract":"As security requirements deepen, today's enterprise-level high-tech entry control systems automate many of the decision functions that a guard would otherwise perform in a manual system. These automated functions escalate into higher tiered infrastructure operations the guard is typically unaware of. The remaining functions, the entry/denial decisions the guard must make, are the exceptions type, the kind that the guard encounters that the system wont or cant handle. How well the guard performs these functions determines the sustainabililty of the system and its security posture over the long haul. Insight into the performance risks during the initial and sustainment periods due to lack of managed training of all the stakeholders is captured by experience gained from deployment and sustainment of a working system over a five-year period. The maturity of the man-machine interface, the dilemmas the guard faces as the “front man” to the public, the measures that can define his performance in providing requisite security while meeting transit times, the relevance of other stakeholders, and the factors that influence the depth of overall training are presented“.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130129178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak
{"title":"A concept of behavioral reputation system in wireless networks","authors":"Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak","doi":"10.1109/CCST.2013.6922057","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922057","url":null,"abstract":"Nowadays wireless networks are becoming important in personal and public communication. Most of them are secured by 802.11i standard with strong AES cipher - WPA2. In many cases an attacker has the ability to listen to all encrypted network traffic, which may become a potential intrusion. Each client in wireless network is vulnerable to a variety of threats and attacks. Many attacks, especially in corporate networks, are realized from internal environment. Identity theft is another serious problem of wireless networks. We present a concept of reputation system based on user behavior. Our goal is to precisely identify every entity in wireless network, and then determine malicious behavior of these entities.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Carmona-Duarte, M. A. Ferrer-Ballester, J. Calvo-Gallego, B. Dorta-Naranjo
{"title":"Vessel identification study for non-coherent high-resolution radar","authors":"C. Carmona-Duarte, M. A. Ferrer-Ballester, J. Calvo-Gallego, B. Dorta-Naranjo","doi":"10.1109/CCST.2013.6922052","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922052","url":null,"abstract":"This paper presents a vessel identification study based on vessel profile. The study was developed with real data obtained with high-resolution Continuous Wave Lineal Frequency Modulated (CW-LFM) radar. Cases studied in this work are vessels entering and leaving the harbor. Also, in this paper, a comparison between different classification techniques such as Neural Networks, Support Vector Machine and k-Nearest Neighbor is introduced. The differences between normalization methods are evaluated for each classification technique.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of information technology risk event prediction markets","authors":"Erol Ozan","doi":"10.1109/CCST.2013.6922047","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922047","url":null,"abstract":"Information technology risk prediction markets have potential to identify the probabilities of risk events that are relevant to information systems. Prediction markets provide a bidding mechanism that allows large number of participants to compete for forming the most accurate predictions for future events. The accuracy of forecasts regarding the frequency, nature, and the form of cyber attacks is crucial for managers and various stakeholders to make effective decisions for investment in cyber defense systems. This paper identifies the key design elements that are involved in the development of a prediction market. The identification of the best configuration for the prediction markets helps organizations to build better defenses against cyber attacks.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}