{"title":"Track Fusion in a New Security System for Airports","authors":"R. Cardinali, Enrico Anniballi","doi":"10.1109/EST.2012.37","DOIUrl":"https://doi.org/10.1109/EST.2012.37","url":null,"abstract":"This paper proposes a new concept for increasing airport security. The key point of this innovative system is the definition of a new airport security system architecture that covers not only the access to the sterile area, but also to the public area (currently monitored mainly through CCTV). The proposed architecture achieves such by increasing the security capability by using innovative sensors able to detect metallic and non-metallic objects without the passengers collaboration. The fusion of the information obtained from sensors with different physical characteristics enhances the understanding of the monitored surroundings and provides the basis for planning and decision-making. The core of the new system is therefore the means through which it executes data management and data fusion. In this paper a feasible track fusion strategy is proposed and its performance analyzed.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126925476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systems Biology Meets Systemic Medicine: The Old, the New and the Blue","authors":"K. Mashayekhi, L. Lăbușcă","doi":"10.1109/EST.2012.14","DOIUrl":"https://doi.org/10.1109/EST.2012.14","url":null,"abstract":"Breakthroughs in technology that deliver fast and accurate molecular biology data, together with the use of advanced software, and analytical methods made possible quantitative accumulation of biological information leading to a qualitative evolution. Sequencing of human genome was of the first door to the era of systemic understanding in life sciences. The paper reviews the emerging concepts of systems biology, systems medicine and their potential benefits in science and practice.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Daniel Newman, Stephen Kelly, G. Howells
{"title":"Investigation of Properties of ICmetrics Features","authors":"Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Daniel Newman, Stephen Kelly, G. Howells","doi":"10.1109/EST.2012.22","DOIUrl":"https://doi.org/10.1109/EST.2012.22","url":null,"abstract":"The ICmetrics technology is concerned with identifying acceptable features in an electronic system's operation for encryption purposes. Ideally, the nature of the features should be identical for all of the systems considered, while the values of these features should allow for unique identification of each of the systems. This paper looks at the properties of the Program Counter of a processor core as a potential ICmetrics feature, and explores how the number of its samples being inputted into the ICmetrics system affects stability of the system's performance.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Radu, K. Sirlantzis, G. Howells, Sanaul Hoque, F. Deravi
{"title":"Image Enhancement vs Feature Fusion in Colour Iris Recognition","authors":"P. Radu, K. Sirlantzis, G. Howells, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2012.33","DOIUrl":"https://doi.org/10.1109/EST.2012.33","url":null,"abstract":"In iris recognition, most of the research was conducted on operation under near infrared illumination. For an iris recognition system to be deployed on common hardware devices, such as laptops or mobile phones, its ability of working with visible spectrum iris images is necessary. Two of the main possible approaches to cope with noisy images in a colour iris recognition system are either to apply image enhancement techniques or to extract multiple types of features and subsequently to employ an efficient fusion mechanism. The contribution of the present paper consists of comparing which of the two above mentioned approaches is best in both identification and verification scenarios of a colour iris recognition system. The efficiency of the two approaches is demonstrated on UBIRISv1 dataset.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boris Dadachev, A. Balinsky, H. Balinsky, S. Simske
{"title":"On the Helmholtz Principle for Data Mining","authors":"Boris Dadachev, A. Balinsky, H. Balinsky, S. Simske","doi":"10.1109/EST.2012.11","DOIUrl":"https://doi.org/10.1109/EST.2012.11","url":null,"abstract":"Unusual behaviour detection and information extraction in streams of short documents and files (emails, news, tweets, log files, messages, etc.) are important problems in security applications. In [1], [2], a new approach to rapid change detection and automatic summarization of large documents was introduced. This approach is based on a theory of social networks and ideas from image processing and especially on the Helmholtz Principle from the Gestalt Theory of human perception. In this article we modify, optimize and verify the approach from [1], [2] to unusual behaviour detection and information extraction from small documents.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130432453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. C. Afonso, J. Papa, A. Marana, A. Poursaberi, S. Yanushkevich, M. Gavrilova
{"title":"Optimum-Path Forest Classifier for Large Scale Biometric Applications","authors":"L. C. Afonso, J. Papa, A. Marana, A. Poursaberi, S. Yanushkevich, M. Gavrilova","doi":"10.1109/EST.2012.31","DOIUrl":"https://doi.org/10.1109/EST.2012.31","url":null,"abstract":"This paper addresses biometric identification using large databases, in particular, iris databases. In such applications, it is critical to have low response time, while maintaining an acceptable recognition rate. Thus, the trade-off between speed and accuracy must be evaluated for processing and recognition parts of an identification system. In this paper, a graph-based framework for pattern recognition, called Optimum-Path Forest (OPF), is utilized as a classifier in a pre-developed iris recognition system. The aim of this paper is to verify the effectiveness of OPF in the field of iris recognition, and its performance for various scale iris databases. The existing Gauss-Laguerre Wavelet based coding scheme is used for iris encoding. The performance of the OPF and two other - Hamming and Bayesian - classifiers, is compared using small, medium, and large-scale databases. Such a comparison shows that the OPF has faster response for large-scale databases, thus performing better than the more accurate, but slower, classifiers.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115446808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Macro-Prosodic Indications for a Romanian TtS System Based on the Functional Intonational Model","authors":"V. Apopei, D. Jitca, Otilia Paduraru","doi":"10.1109/EST.2012.48","DOIUrl":"https://doi.org/10.1109/EST.2012.48","url":null,"abstract":"This paper presents how macro-prosodic indications can be used within our TtS system in order to drive the prosody prediction module (PPM) in generating a target intonational contour for the synthesized utterance. The previous variant of the PPM generates melodic contour descriptions only using the implicit prosodic indications deduced from the text analysis. The explicit indications are edited in the input text window and refer to the group markers applied to a text to which can be assigned a focus attribute with an indication on its strength. It can be also assigned to a group an attribute of tonal prominence (related to the tonal level of the highest peak in the group). We called these indications the macro-prosodic indications. We also defined a microprosodic indication that refers to the pitch accent type attribute at the accentual unit level that is related to F0 contour pattern. The values of this attribute are taken from the Ro-ToBI label set. Both macro and microprosodic indications lead to elicit certain intonational variants at the speech synthesis output and also can improve the Romanian intonation contour understanding.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"98 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maykel Pérez, L. Salgado, J. Arróspide, Javier Marinas, M. Nieto
{"title":"Multi-camera Very Wide Baseline Feature Matching Based on View-Adaptive Junction Detection","authors":"Maykel Pérez, L. Salgado, J. Arróspide, Javier Marinas, M. Nieto","doi":"10.1109/EST.2012.34","DOIUrl":"https://doi.org/10.1109/EST.2012.34","url":null,"abstract":"This paper presents a strategy for solving the feature matching problem in calibrated very wide-baseline camera settings. In this kind of settings, perspective distortion, depth discontinuities and occlusion represent enormous challenges. The proposed strategy addresses them by using geometrical information, specifically by exploiting epipolar-constraints. As a result it provides a sparse number of reliable feature points for which 3D position is accurately recovered. Special features known as junctions are used for robust matching. In particular, a strategy for refinement of junction end-point matching is proposed which enhances usual junction-based approaches. This allows to compute cross-correlation between perfectly aligned plane patches in both images, thus yielding better matching results. Evaluation of experimental results proves the effectiveness of the proposed algorithm in very wide-baseline environments.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm","authors":"Saad Aldosary, G. Howells","doi":"10.1109/EST.2012.9","DOIUrl":"https://doi.org/10.1109/EST.2012.9","url":null,"abstract":"This paper investigates the application of secret sharing technology to allow an encryption key to be derived from multimodal biometric samples. Within the proposed scheme, individual points on a parabolic curve are indirectly derived from individual biometric samples taken from an individual, and Shamir's Secret Sharing algorithm is applied in order to derive the required key. The proposal is robust, in that a pre-defined subset of modalities is required in order to derive the key, rendering the system able to accommodate exception handling for given modalities. The current paper reports preliminary work on how secret sharing techniques may be employed to integrate arbitrary points that may be derived from the actual biometric data.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spontaneous Perception of Whole Persons According the Distance","authors":"S. Demarchi, Anais Taddei, C. Frowd","doi":"10.1109/EST.2012.28","DOIUrl":"https://doi.org/10.1109/EST.2012.28","url":null,"abstract":"In the field of automated facial identification, relevant facial information are not always available (disguises, poor spatial orientation, distance, etc.). As a consequence, human perception performance decreases. However, the \"whole person\" can provide useful information. In the present study, we determine the way by which a person is visually explored, in order to identify a potential chronology in visual exploration. We also investigate the consequence of increasing the distance between the observer and the target person, since in this situation identification becomes more 'global' due to less processing possible for the individual features of the face. Results showed that the spontaneous perceptual strategy evolves with distance: the more distance increases, the more the interest in the person decreases, which is observed both for the body and face. Our data provide knowledge that will help to guide conception of effective automated systems.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}