2012 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Towards making HCS ear detection robust against rotation 实现HCS耳检测抗旋转鲁棒性
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393542
A. Pflug, P. Back, C. Busch
{"title":"Towards making HCS ear detection robust against rotation","authors":"A. Pflug, P. Back, C. Busch","doi":"10.1109/CCST.2012.6393542","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393542","url":null,"abstract":"In identity retrieval from crime scene images, the outer ear (auricle) has ever since been regarded as a valuable characteristic. Because of its unique and permanent shape, the auricle also attracted the attention of researches in the field of biometrics over the last years. Since then, numerous pattern recognition techniques have been applied to ear images but similarly to face recognition, rotation and pose still pose problems to ear recognition systems. One solution for this is 3D ear imaging. the segmentation of the ear, prior to the actual feature extraction step, however, remains an unsolved problem. In 2010 Zhou at al. have proposed a solution for ear detection in 3D images, which incorporates a nave classifier using Shape Index Histogram. Histograms of Categorized Shapes (HCS) is reported to be efficient and accurate, but has difficulties with rotations. In our work, we extend the performance measures provided by Zhou et al. by evaluating the detection rate of the HCS detector under more realistic conditions. This includes performance measures with ear images under pose variations. Secondly, we propose to modify the ear detection approach by Zhou et al. towards making it invariant to rotation by using a rotation symmetric, circular detection window. Shape index histograms are extracted at different radii in order to get overlapping subsets within the circle. The detection performance of the modified HCS detector is evaluated on two different datasets, one of them containing images n various poses.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128617071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic credit card fraud detection based on non-linear signal processing 基于非线性信号处理的信用卡欺诈自动检测
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393560
A. Salazar, G. Safont, A. Soriano, L. Vergara
{"title":"Automatic credit card fraud detection based on non-linear signal processing","authors":"A. Salazar, G. Safont, A. Soriano, L. Vergara","doi":"10.1109/CCST.2012.6393560","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393560","url":null,"abstract":"Fraud detection is a critical problem affecting large financial companies that has increased due to the growth in credit card transactions. This paper presents a new method for automatic detection of frauds in credit card transactions based on non-linear signal processing. The proposed method consists of the following stages: feature extraction, training and classification, decision fusion, and result presentation. Discriminant-based classifiers and an advanced non-Gaussian mixture classification method are employed to distinguish between legitimate and fraudulent transactions. The posterior probabilities produced by classifiers are fused by means of order statistical digital filters. Results from data mining of a large database of real transactions are presented. The feasibility of the proposed method is demonstrated for several datasets using parameters derived from receiver characteristic operating analysis and key performance indicators of the business.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131387053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Multisampling approach applied to contactless hand biometrics 多采样方法在非接触式手部生物识别中的应用
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393563
A. Morales, M. A. Ferrer-Ballester, C. Travieso-González, J. B. Alonso
{"title":"Multisampling approach applied to contactless hand biometrics","authors":"A. Morales, M. A. Ferrer-Ballester, C. Travieso-González, J. B. Alonso","doi":"10.1109/CCST.2012.6393563","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393563","url":null,"abstract":"This paper proposes a novel contactless biometrie system for multisampling hand recognition. We include a novel acquisition device for contactless hand recognition and a study about the multi-sample acquisition as a way to improve the performance. Popular features extraction methods for hand geometry and palmprint are studied and a database of 100 people with more than 2000 hand is employed for the experimentation. The results suggest how a multi-sample approach outperforms the traditional single sample approach with improvements around 47% and EER of 0.21%.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124431226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE) 用于多模态信号建模和最佳传感器放置的通用软件:传感器和发射器使用的环境意识(EASEE)
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393539
Kenneth K. Yamamoto, S. Vecherin, D. K. Wilson, C. T. Borden, Elizabeth Bettencourt, C. Pettit
{"title":"General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE)","authors":"Kenneth K. Yamamoto, S. Vecherin, D. K. Wilson, C. T. Borden, Elizabeth Bettencourt, C. Pettit","doi":"10.1109/CCST.2012.6393539","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393539","url":null,"abstract":"The Environmental Awareness for Sensor and Emitter Employment (EASEE) software is designed to help in surveillance planning by predicting detection performance of sensors and optimizing sensor selection and placement for intrusion detection around any controlled area, including power plants, dams, borders, prisons, military bases, combat outposts, etc. By its flexible, object-oriented software architecture, EASEE can simulate the performance of a wide variety of sensor modalities-including optical, acoustic, seismic, magnetic, radio-frequency, chemical, and biological-in the realistic terrain and weather conditions of the surveillance environment. EASEE characterizes complex terrain and weather effects on target signatures, signal propagation, and sensor systems, using an expansive library of realistic physics models. Statistical methodologies are also used to account for uncertainties from random signal-generation and propagation mechanisms. A built-in sensor placement algorithm optimizes sensor selections and placements based on sensor supply limitations, coverage priorities, overlapping sensor coverage preferences, and wireless sensor communication requirements.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"56 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic lip identification applied under soft facial emotion conditions 软面部情绪条件下的自动唇型识别
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393562
Antonio M. Rojas, C. Travieso-González, J. B. Alonso, M. A. Ferrer-Ballester
{"title":"Automatic lip identification applied under soft facial emotion conditions","authors":"Antonio M. Rojas, C. Travieso-González, J. B. Alonso, M. A. Ferrer-Ballester","doi":"10.1109/CCST.2012.6393562","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393562","url":null,"abstract":"This work shows an identification approach based on lip characteristics. For this proposal, the subject has to be without movement, with frontal face, without moving the lips by a neutral expression, angry or indifferent, therefore, not changing significantly the shape of the lips. After a preprocessing stage, global information from lips are extracted, reaching up to 9979%, using 5 training samples for the public RaFD database.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A radio frequency measurement technique utilizing audio distortion to access the instantaneous sensitivity of a security systems receiver 一种利用音频失真来获取安全系统接收机的瞬时灵敏度的射频测量技术
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393569
P. C. Haddock
{"title":"A radio frequency measurement technique utilizing audio distortion to access the instantaneous sensitivity of a security systems receiver","authors":"P. C. Haddock","doi":"10.1109/CCST.2012.6393569","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393569","url":null,"abstract":"A receiver measurement technique has been demonstrated to assess the instantaneous sensitivity of a security system's radio frequency (RF) receiver. Application of this measurement technique to a security systems wireless link can be used as warning to a system attack, identification of an interference source(s), changes in propagation conditions, or equipment failure. The interference sources may be unintentional or intentional, both of which can affect the performance of the receiver. An RF receiver used in a security system may be used to receive voice, video, telemetry, etc., which most likely is of high importance and/or consequence since it is used to gather information as part of a security system. In most cases, the receivers used in security systems have no indication of instantaneous receiver sensitivity. The measurement technique utilizes an RF audio distortion measurement to characterize the degradation to the communications receiver by providing a quantitative measure to the quality of the receiver's audio signal. This technique provides a way to quantify the performance of an RF receiver under a variety of conditions. The distortion to the audio signal can be the result of conducted, radiated, and/or coupled interference from active components that are within the receiver's passband.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126949307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for analysis of quotidian exposure in an instrumented world 分析仪器化世界中日常暴露的框架
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393547
Lisa A. Shay, G. Conti, Dominic M. Larkin, John Nelson
{"title":"A framework for analysis of quotidian exposure in an instrumented world","authors":"Lisa A. Shay, G. Conti, Dominic M. Larkin, John Nelson","doi":"10.1109/CCST.2012.6393547","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393547","url":null,"abstract":"For a variety of often reasonable motives such as increased security or increased profit, individuals and organizations fill our world with sensors and data collection systems that sample and track our day-to-day activities. Some people freely invite tracking into their lives. Others are enticed by offers of discounts or even free products and services. But frequently our lives are quietly sampled, unbeknownst to us, by those with the power to do so. As a result, individuals face a rapidly declining freedom to lead a private life. While significant sampling and tracking occur online, this study focuses on the convergence of sensor systems in the physical world. It explores the privacy implications of sensors found on our person, in our home, in our communities, and while travelling. This paper provides the following contributions: a model of human-targeted sensor systems and a framework for sensor categorization, privacy threat analysis, and countermeasure development. It concludes with a detailed case study that employs the framework to analyze the quotidian exposure encountered in an ordinary citizen's life.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126661401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-morphological image data hiding based on the application of Rubik's cubic algorithm 基于魔方三次算法的多形态图像数据隐藏
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393548
Chang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu
{"title":"Multi-morphological image data hiding based on the application of Rubik's cubic algorithm","authors":"Chang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu","doi":"10.1109/CCST.2012.6393548","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393548","url":null,"abstract":"Due to the emerging of digital right managements, digital libraries and fast development of multimedia, data hiding techniques are popularly utilized to hide annotations or confidential information in multimedia. In this paper, a novel data hiding mechanism based on the application of Rubik's cubic algorithm is proposed. The rationale of adopting Rubik's cubic is due to it possesses 6 faces and can be divided into 54 (6 faces*3*3) elements for scrambling process. In the beginning, the embedded image will be partitioned into different unit block sizes such pixel based, 3*3 pixels based, or other m*n pixels based. After then, 54 units will be selected sequentially and transformed into 6 faces according to the six faces of a Rubik's cubic by designated an index number. Therefore, an image can be partitioned into a lot of different 54 units based block and formed a lot of different Rubik's cubic. Each Rubik's cubic will be assigned a different random number for performing rotation to scramble the sequence of original 54 units. The proposed data hiding mechanism can achieve the benefits of reversible and lossless reconstruction of hidden data and host image without utilizing any information from the original host image. It is not only obtaining good visual quality for the stego-image, but also possesses high hiding capacity. Moreover, the proposed data hiding mechanism can be performed in spatial domain, frequency domain, and hybrid domains. It is also can be combined with encipher system to strengthen data security.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualification 用于偷渡者检测的航空货物检查:二氧化碳监测器和心跳监测器的评估和鉴定
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393570
E. Rao
{"title":"Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualification","authors":"E. Rao","doi":"10.1109/CCST.2012.6393570","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393570","url":null,"abstract":"Developing technologies to enhance air cargo transportation security is of paramount importance to the Transportation Security Administration (TSA) and the air cargo transportation industry. The ability of terrorists to breach air cargo or conveyances to plant weapons of mass destruction or seek stowaway for entry into the United States illegally is a risk that TSA and industry must mitigate. Department of Homeland Security's Science and Technology directorate, TSA sister organization demonstrated the feasibility of using Carbon-dioxide monitor (CO2) and Heartbeat Monitor to detect stowaways in the air cargo industry during an air cargo pilot study. This paper details the results of the follow-on air cargo pilot activities conducted to determine the effectiveness of the CO2 technology for detecting stowaways and its qualification efforts. The paper also discusses the qualification process used that entailed development of performance based specifications and associated information for placement of the technology on a Qualified Technology List. Heartbeat Monitor was assessed and future plans to qualify this technology for stowaway detection will be detailed. Comprehensive pilot testing at various airports resulted in successful application of the technology for screening. A pilot study was conducted to determine the feasibility of applying the two technologies for air cargo stowaway detection. Based on the promising results of this study, a follow-on CO2 Monitor was field tested to qualify this technology for operational use, resulting in two vendors being qualified. Heartbeat Monitor was assessed for its feasibility in a pilot study both in the laboratory and operational environment with promising results. A comprehensive assessment and qualification of this type of technology is underway and is expected to be completed by end of 2013 fiscal year. The paper will also detail the current use of qualified CO2 monitor and lessons learned for screening for stowaway in the air cargo industry world-wide operations. Life Cycle costs for this technology application, as determined in the congressionally mandated Air Cargo Cost Estimated study, will also be addressed in the paper to demonstrate its cost effectiveness for the intended application.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132710860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security example 基本遗传-算法-神经网络(GANN)模式及其自组织安全实例
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393578
David Streisand, R. Dove
{"title":"Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security example","authors":"David Streisand, R. Dove","doi":"10.1109/CCST.2012.6393578","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393578","url":null,"abstract":"The anti-system adversarial community is characterized as a self-organizing system-of-systems, noted collectively for its leadership in rapid evolution and innovative advancement; widening the gap between security cost and security losses. It appears that system security strategy cannot hope to even achieve parity without a comparable self-organizing strategy. Toward that end a project is underway to catalog re-usable patterns of self-organizing security of many kinds, principally found in natural systems, but also seen in recent computational approaches. One class of pattern of special interest involves discovery of previously unseen threats and attacks. In general this class of pattern has aspects of learning, innovation, and evolution as capability objectives. The genetic algorithm is one such pattern. Another such pattern is seen in artificial neural networks. Combining the two into a Genetic Algorithm augmented Neural Network, often called GANN, has considerable recent history in the literature. Not many of these are directly related to security applications. Some security-application work shows GANNs employed for feature selection provide enhanced learning performance and accuracy, and avoidance of local minimum traps. This paper adds the GANN pattern to the self-organizing security pattern catalog, and applies the pattern to a self-organizing security application under development.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130395790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信