2013 47th International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Influence of HEVC compression on event detection in security video sequences HEVC压缩对安全视频序列事件检测的影响
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922066
S. Vítek, Lukáš Krasula, M. Klima, Vojtech Hvezda, Marcelo Herrera Martínez
{"title":"Influence of HEVC compression on event detection in security video sequences","authors":"S. Vítek, Lukáš Krasula, M. Klima, Vojtech Hvezda, Marcelo Herrera Martínez","doi":"10.1109/CCST.2013.6922066","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922066","url":null,"abstract":"In this paper, the impact of the degree of compression by High Efficiency Video Coding (HEVC) on observers ability of detecting certain events in videos obtained by outdoor CCTV cameras is studied. This was done by extensive subjective testing. The testing was performed also for H.264/MPEG-4 Part 10 AVC compression on similar bitrates and the capabilities of detection were compared and thus the superiority of HEVC was proven. Also the threshold for encoder setting, where the increase of bit rate or decrease of quantization parameter (QP) do not improve observers ability to detect the events, was proposed.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126863345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic region segmentation for high-resolution palmprint recognition: Towards forensic scenarios 高分辨率掌纹识别的自动区域分割:面向法医场景
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922078
Ruifang Wang, D. Ramos, Julian Fierrez, Ram P. Krish
{"title":"Automatic region segmentation for high-resolution palmprint recognition: Towards forensic scenarios","authors":"Ruifang Wang, D. Ramos, Julian Fierrez, Ram P. Krish","doi":"10.1109/CCST.2013.6922078","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922078","url":null,"abstract":"Recently, a novel matching strategy based on regional fusion for high resolution palmprint recognition arises for both forensic and civil applications, under the concept of different regional discriminability of three palm regions, i.e., interdigital, hypothenar and thenar. This matching strategy requires accurate automatic region segmentation techniques since manual region segmentation is time consuming. In this work, we develop automatic region segmentation techniques based on datum point detection for high-resolution palmprint recognition which can be further applied to forensic applications. Firstly, Canny edge detector is applied to a full palmprint to obtain gradient magnitudes and strong edges. Then a first datum point, i.e., the endpoint of heart line, is detected by using convex hull on gradient magnitude image and its left/right differential image and strong edge image. A second datum point, i.e., the endpoint of life line, is estimated based on the position and direction of the first datum point and statistical average distance between the two datum points. Finally, segmented palm regions are generated based on the two datum points and their perpendicular bisector. To evaluate the accuracy of our region segmentation method, we compare the automatic segmentation with manual segmentation performed on a public high resolution palmprint database THUPALMLAB with full palmprint images. The regional error rates of interdigital, thenar and hypothenar regions are 15.72%, 17.05% and 21.38% respectively. And the total error rate is 19.54% relative to full palmprint images.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Ephemeral Biometrics: What are they and what do they solve? 短暂生物识别技术:它们是什么?它们能解决什么问题?
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922044
Sung Choi, David Zage
{"title":"Ephemeral Biometrics: What are they and what do they solve?","authors":"Sung Choi, David Zage","doi":"10.1109/CCST.2013.6922044","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922044","url":null,"abstract":"For critical infrastructure facilities, mitigation techniques for insider threats are primarily non-technical in nature and rely heavily on policies/procedures. Traditional access control measures (access cards, biometrics, PIN numbers, etc.) are built on a philosophy of trust that enables those with appropriate permissions to access facilities without additional monitoring or restrictions. Systems based on these measures have three main limitations: 1) access is typically bound to a single authentication occurrence; 2) the authentication factors have little impact against human (insider) threats to security systems; and 3) many of the authentication systems inconvenience end-users. In order to mitigate the aforementioned deficiencies, we propose utilizing the concept of Ephemeral Biometrics to construct strong, persistent authentication protocols.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threat characterization in vital area identification process 关键区域识别过程中的威胁表征
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922050
Tereza Malachova, J. Malach, Z. Vintr
{"title":"Threat characterization in vital area identification process","authors":"Tereza Malachova, J. Malach, Z. Vintr","doi":"10.1109/CCST.2013.6922050","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922050","url":null,"abstract":"The identification of a potential attacker's targets is fundamental in the design of a physical protection system for complex technological facilities such as nuclear facilities. An attack can be carried out to sabotage, or gain control of, targets that are physically represented by different parts of systems, structures and components (SSC), or their combination. Those SSCs that need to be protected in order to prevent radiological consequences in a nuclear facility are called vital and are located within vital areas. The use of attack trees in the vital area identification is an innovative approach that enables modeling of both the SSCs and the threat including their mutual interaction. Threat characteristics are described by a well-designed and scaled set of attributes. Required attacker's capabilities to disable each SSC have to be assessed. Methods of expert opinion elicitation are mostly used for the assessment of attacker's abilities to perform malevolent events on an individual SSC represented by tree leaf nodes. This paper presents the selected findings from the attack tree implementation in the vital area identification focusing on threat and supplementary attributes for the attack tree model. The protection tree is used to evaluate and identify vital area candidates. The suggested method of threat characterization in an attack tree enables time-effective, more precise and well-documented vital area identification.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131611539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emotion recognition from telephone speech using acoustic and nonlinear features 基于声学和非线性特征的电话语音情感识别
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922055
S. Bedoya-Jaramillo, J. Orozco-Arroyave, J. D. Arias-Londoño, J. Vargas-Bonilla
{"title":"Emotion recognition from telephone speech using acoustic and nonlinear features","authors":"S. Bedoya-Jaramillo, J. Orozco-Arroyave, J. D. Arias-Londoño, J. Vargas-Bonilla","doi":"10.1109/CCST.2013.6922055","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922055","url":null,"abstract":"This paper addresses the problem of the automatic recognition of emotional states from speech recordings, especially those kind of emotions reflecting that the life or the human integrity are at risk. The paper compares the performance of two different systems: one being fed with speech signals recorded directly from the people (whole spectrum) and other one in which the speech signals are recorded through a telephone channel. The characterization stage is based on cepstral, noise and nonlinear features, and the classification strategy uses a fusion of multiple classifiers (Gaussian Mixture Models - Universal Background Model and Support Vector Machines). The proposed system achieves classification rates around 99%, even in the case of telephone speech.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"29 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New technique for the optimization of security communication wired networks in historical buildings 历史建筑安全通信有线网络优化新技术
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922033
F. Garzia, R. Cusani
{"title":"New technique for the optimization of security communication wired networks in historical buildings","authors":"F. Garzia, R. Cusani","doi":"10.1109/CCST.2013.6922033","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922033","url":null,"abstract":"The purpose of this paper is to illustrate an optimal design procedure for security fixed communication networks that, thanks to Genetic Algorithms (GAs), is capable of reaching the desired goal of preserving the architecture of buildings characterized by installation constrains, such as the historical ones, and of reducing the cost of installation, ensuring a high level of benefit/cost ratio. This technique has been used in the design of security systems of historical sites such as Vatican City State, Senate of Italian Republic, museums, churches, etc. in Italy giving excellent results.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Identifying indicators of insider threats: Insider IT sabotage 识别内部威胁的指示器:内部IT破坏
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922038
W. Claycomb, Carly L. Huth, Brittany Phillips, Lori Flynn, David M. McIntire
{"title":"Identifying indicators of insider threats: Insider IT sabotage","authors":"W. Claycomb, Carly L. Huth, Brittany Phillips, Lori Flynn, David M. McIntire","doi":"10.1109/CCST.2013.6922038","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922038","url":null,"abstract":"This paper describes results of a study seeking to identify observable events related to insider sabotage. We collected information from actual insider threat cases, created chronological timelines of the incidents, identified key points in each timeline such as when attack planning began, measured the time between key events, and looked for specific observable events or patterns that insiders held in common that may indicate insider sabotage is imminent or likely. Such indicators could be used by security experts to potentially identify malicious activity at or before the time of attack. Our process included critical steps such as identifying the point of damage to the organization as well as any malicious events prior to zero hour that enabled the attack but did not immediately cause harm. We found that nearly 71% of the cases we studied had either no observable malicious action prior to attack, or had one that occurred less than one day prior to attack. Most of the events observed prior to attack were behavioral, not technical, especially those occurring earlier in the case timelines. Of the observed technical events prior to attack, nearly one third involved installation of software onto the victim organizations IT systems.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Kalman filter and ARMA filter as approach to multiple sensor data fusion problem 卡尔曼滤波和ARMA滤波在多传感器数据融合中的应用
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922059
M. A. Munoz Gutierrez, J. A. Florez Zuluaga, S. Kofuji
{"title":"Kalman filter and ARMA filter as approach to multiple sensor data fusion problem","authors":"M. A. Munoz Gutierrez, J. A. Florez Zuluaga, S. Kofuji","doi":"10.1109/CCST.2013.6922059","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922059","url":null,"abstract":"The Air Traffic Control (ATC) systems are critical due the amount of information that they have to process in real time. These systems combined different kind of information, like primary and secondary radar information and flight planning information. Depending the extent of a country different RADAR are installed trying to cover most of the country area. This could become a problem, because different RADAR can detect and locate the same object at different position on the map, this is a multiple sensor data fusion problem. In this paper we present a technique that combines conventional Kalman filter techniques with an ARMA filter to provide a solution to the problem. Multiple objects tracking examples are presented.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A network challenge identification strategy based on firewall performance analysis 基于防火墙性能分析的网络挑战识别策略
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922069
Andrés F. Ocampo, N. Gaviria
{"title":"A network challenge identification strategy based on firewall performance analysis","authors":"Andrés F. Ocampo, N. Gaviria","doi":"10.1109/CCST.2013.6922069","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922069","url":null,"abstract":"In this papper, we study a resource starvation challenge caused by low rate DoS (Denial of Service)-DDoS (Distributed DoS) attacks targeting the last-matching rules of the firewall's security policy. Our onset challenge detection mechanisms considers a CPU utilization threshold to keep track of firewall processing performance. In this way, when this threshold is reached, an initial alarm of the occurrence of an attack is triggered. Such a methodology enable to deploy an strategy of impact mitigation. Initial remediation actions against challenges are then considered once the detection part is performed, it includes the temporary swap of the most likely last-rule matched, in order to improve the system performance. We evaluate our strategy through simulations performed in Network Simulator 2, results show the performance of this scheme when subjected to normal traffic flows as well as DoS and DDoS attack flows.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of local descriptors features and its robustness applied to ear recognition 局部描述子特征及其在人耳识别中的鲁棒性分析
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922040
A. Morales, Miguel A. Ferrer, Moises Diaz-Cabrera, E. González
{"title":"Analysis of local descriptors features and its robustness applied to ear recognition","authors":"A. Morales, Miguel A. Ferrer, Moises Diaz-Cabrera, E. González","doi":"10.1109/CCST.2013.6922040","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922040","url":null,"abstract":"In last ten years, ear recognition has attracted the interest of scientific community. The advantages of this biometric technology include the remote acquisition, permanence in shape and appearance along time and relatively uniqueness for each individual. This paper focuses on the robustness of local descriptors features for ear recognition and includes the evaluation of two promising techniques: SIFT and Dense-SIFT. The experiments include two public available databases as well as synthetic and real occlusion. The obtained results suggest the promising performance of the proposed local descriptors under controlled conditions. Nevertheless, the distortions and the quality of the sample are strongly determined by the level of collaboration of the subjects. In security applications related to surveillance or forensics such collaboration could be null. The results under hard conditions highlight the difficulties of such features in presence of elevate real distortion and the necessity of further improve the traditional approaches.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信