S. Vítek, Lukáš Krasula, M. Klima, Vojtech Hvezda, Marcelo Herrera Martínez
{"title":"Influence of HEVC compression on event detection in security video sequences","authors":"S. Vítek, Lukáš Krasula, M. Klima, Vojtech Hvezda, Marcelo Herrera Martínez","doi":"10.1109/CCST.2013.6922066","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922066","url":null,"abstract":"In this paper, the impact of the degree of compression by High Efficiency Video Coding (HEVC) on observers ability of detecting certain events in videos obtained by outdoor CCTV cameras is studied. This was done by extensive subjective testing. The testing was performed also for H.264/MPEG-4 Part 10 AVC compression on similar bitrates and the capabilities of detection were compared and thus the superiority of HEVC was proven. Also the threshold for encoder setting, where the increase of bit rate or decrease of quantization parameter (QP) do not improve observers ability to detect the events, was proposed.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126863345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruifang Wang, D. Ramos, Julian Fierrez, Ram P. Krish
{"title":"Automatic region segmentation for high-resolution palmprint recognition: Towards forensic scenarios","authors":"Ruifang Wang, D. Ramos, Julian Fierrez, Ram P. Krish","doi":"10.1109/CCST.2013.6922078","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922078","url":null,"abstract":"Recently, a novel matching strategy based on regional fusion for high resolution palmprint recognition arises for both forensic and civil applications, under the concept of different regional discriminability of three palm regions, i.e., interdigital, hypothenar and thenar. This matching strategy requires accurate automatic region segmentation techniques since manual region segmentation is time consuming. In this work, we develop automatic region segmentation techniques based on datum point detection for high-resolution palmprint recognition which can be further applied to forensic applications. Firstly, Canny edge detector is applied to a full palmprint to obtain gradient magnitudes and strong edges. Then a first datum point, i.e., the endpoint of heart line, is detected by using convex hull on gradient magnitude image and its left/right differential image and strong edge image. A second datum point, i.e., the endpoint of life line, is estimated based on the position and direction of the first datum point and statistical average distance between the two datum points. Finally, segmented palm regions are generated based on the two datum points and their perpendicular bisector. To evaluate the accuracy of our region segmentation method, we compare the automatic segmentation with manual segmentation performed on a public high resolution palmprint database THUPALMLAB with full palmprint images. The regional error rates of interdigital, thenar and hypothenar regions are 15.72%, 17.05% and 21.38% respectively. And the total error rate is 19.54% relative to full palmprint images.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ephemeral Biometrics: What are they and what do they solve?","authors":"Sung Choi, David Zage","doi":"10.1109/CCST.2013.6922044","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922044","url":null,"abstract":"For critical infrastructure facilities, mitigation techniques for insider threats are primarily non-technical in nature and rely heavily on policies/procedures. Traditional access control measures (access cards, biometrics, PIN numbers, etc.) are built on a philosophy of trust that enables those with appropriate permissions to access facilities without additional monitoring or restrictions. Systems based on these measures have three main limitations: 1) access is typically bound to a single authentication occurrence; 2) the authentication factors have little impact against human (insider) threats to security systems; and 3) many of the authentication systems inconvenience end-users. In order to mitigate the aforementioned deficiencies, we propose utilizing the concept of Ephemeral Biometrics to construct strong, persistent authentication protocols.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat characterization in vital area identification process","authors":"Tereza Malachova, J. Malach, Z. Vintr","doi":"10.1109/CCST.2013.6922050","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922050","url":null,"abstract":"The identification of a potential attacker's targets is fundamental in the design of a physical protection system for complex technological facilities such as nuclear facilities. An attack can be carried out to sabotage, or gain control of, targets that are physically represented by different parts of systems, structures and components (SSC), or their combination. Those SSCs that need to be protected in order to prevent radiological consequences in a nuclear facility are called vital and are located within vital areas. The use of attack trees in the vital area identification is an innovative approach that enables modeling of both the SSCs and the threat including their mutual interaction. Threat characteristics are described by a well-designed and scaled set of attributes. Required attacker's capabilities to disable each SSC have to be assessed. Methods of expert opinion elicitation are mostly used for the assessment of attacker's abilities to perform malevolent events on an individual SSC represented by tree leaf nodes. This paper presents the selected findings from the attack tree implementation in the vital area identification focusing on threat and supplementary attributes for the attack tree model. The protection tree is used to evaluate and identify vital area candidates. The suggested method of threat characterization in an attack tree enables time-effective, more precise and well-documented vital area identification.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131611539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bedoya-Jaramillo, J. Orozco-Arroyave, J. D. Arias-Londoño, J. Vargas-Bonilla
{"title":"Emotion recognition from telephone speech using acoustic and nonlinear features","authors":"S. Bedoya-Jaramillo, J. Orozco-Arroyave, J. D. Arias-Londoño, J. Vargas-Bonilla","doi":"10.1109/CCST.2013.6922055","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922055","url":null,"abstract":"This paper addresses the problem of the automatic recognition of emotional states from speech recordings, especially those kind of emotions reflecting that the life or the human integrity are at risk. The paper compares the performance of two different systems: one being fed with speech signals recorded directly from the people (whole spectrum) and other one in which the speech signals are recorded through a telephone channel. The characterization stage is based on cepstral, noise and nonlinear features, and the classification strategy uses a fusion of multiple classifiers (Gaussian Mixture Models - Universal Background Model and Support Vector Machines). The proposed system achieves classification rates around 99%, even in the case of telephone speech.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"29 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New technique for the optimization of security communication wired networks in historical buildings","authors":"F. Garzia, R. Cusani","doi":"10.1109/CCST.2013.6922033","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922033","url":null,"abstract":"The purpose of this paper is to illustrate an optimal design procedure for security fixed communication networks that, thanks to Genetic Algorithms (GAs), is capable of reaching the desired goal of preserving the architecture of buildings characterized by installation constrains, such as the historical ones, and of reducing the cost of installation, ensuring a high level of benefit/cost ratio. This technique has been used in the design of security systems of historical sites such as Vatican City State, Senate of Italian Republic, museums, churches, etc. in Italy giving excellent results.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Claycomb, Carly L. Huth, Brittany Phillips, Lori Flynn, David M. McIntire
{"title":"Identifying indicators of insider threats: Insider IT sabotage","authors":"W. Claycomb, Carly L. Huth, Brittany Phillips, Lori Flynn, David M. McIntire","doi":"10.1109/CCST.2013.6922038","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922038","url":null,"abstract":"This paper describes results of a study seeking to identify observable events related to insider sabotage. We collected information from actual insider threat cases, created chronological timelines of the incidents, identified key points in each timeline such as when attack planning began, measured the time between key events, and looked for specific observable events or patterns that insiders held in common that may indicate insider sabotage is imminent or likely. Such indicators could be used by security experts to potentially identify malicious activity at or before the time of attack. Our process included critical steps such as identifying the point of damage to the organization as well as any malicious events prior to zero hour that enabled the attack but did not immediately cause harm. We found that nearly 71% of the cases we studied had either no observable malicious action prior to attack, or had one that occurred less than one day prior to attack. Most of the events observed prior to attack were behavioral, not technical, especially those occurring earlier in the case timelines. Of the observed technical events prior to attack, nearly one third involved installation of software onto the victim organizations IT systems.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Munoz Gutierrez, J. A. Florez Zuluaga, S. Kofuji
{"title":"Kalman filter and ARMA filter as approach to multiple sensor data fusion problem","authors":"M. A. Munoz Gutierrez, J. A. Florez Zuluaga, S. Kofuji","doi":"10.1109/CCST.2013.6922059","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922059","url":null,"abstract":"The Air Traffic Control (ATC) systems are critical due the amount of information that they have to process in real time. These systems combined different kind of information, like primary and secondary radar information and flight planning information. Depending the extent of a country different RADAR are installed trying to cover most of the country area. This could become a problem, because different RADAR can detect and locate the same object at different position on the map, this is a multiple sensor data fusion problem. In this paper we present a technique that combines conventional Kalman filter techniques with an ARMA filter to provide a solution to the problem. Multiple objects tracking examples are presented.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A network challenge identification strategy based on firewall performance analysis","authors":"Andrés F. Ocampo, N. Gaviria","doi":"10.1109/CCST.2013.6922069","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922069","url":null,"abstract":"In this papper, we study a resource starvation challenge caused by low rate DoS (Denial of Service)-DDoS (Distributed DoS) attacks targeting the last-matching rules of the firewall's security policy. Our onset challenge detection mechanisms considers a CPU utilization threshold to keep track of firewall processing performance. In this way, when this threshold is reached, an initial alarm of the occurrence of an attack is triggered. Such a methodology enable to deploy an strategy of impact mitigation. Initial remediation actions against challenges are then considered once the detection part is performed, it includes the temporary swap of the most likely last-rule matched, in order to improve the system performance. We evaluate our strategy through simulations performed in Network Simulator 2, results show the performance of this scheme when subjected to normal traffic flows as well as DoS and DDoS attack flows.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Morales, Miguel A. Ferrer, Moises Diaz-Cabrera, E. González
{"title":"Analysis of local descriptors features and its robustness applied to ear recognition","authors":"A. Morales, Miguel A. Ferrer, Moises Diaz-Cabrera, E. González","doi":"10.1109/CCST.2013.6922040","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922040","url":null,"abstract":"In last ten years, ear recognition has attracted the interest of scientific community. The advantages of this biometric technology include the remote acquisition, permanence in shape and appearance along time and relatively uniqueness for each individual. This paper focuses on the robustness of local descriptors features for ear recognition and includes the evaluation of two promising techniques: SIFT and Dense-SIFT. The experiments include two public available databases as well as synthetic and real occlusion. The obtained results suggest the promising performance of the proposed local descriptors under controlled conditions. Nevertheless, the distortions and the quality of the sample are strongly determined by the level of collaboration of the subjects. In security applications related to surveillance or forensics such collaboration could be null. The results under hard conditions highlight the difficulties of such features in presence of elevate real distortion and the necessity of further improve the traditional approaches.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}