2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
AI facial recognition and biometric detection: balancing consumer rights and corporate interests 人工智能面部识别与生物特征检测:平衡消费者权益与企业利益
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-01-01 DOI: 10.1109/ICCST49569.2021.9717403
Felipe Romero Moreno
{"title":"AI facial recognition and biometric detection: balancing consumer rights and corporate interests","authors":"Felipe Romero Moreno","doi":"10.1109/ICCST49569.2021.9717403","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717403","url":null,"abstract":"","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73231667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools 基于ADS-B和商业智能工具的雷达误差计算与校正系统
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2018-10-01 DOI: 10.1109/CCST.2018.8585728
Jimmy Anderson Florez Zuluaga, J. Vargas-Bonilla, José David Ortega Pabón, C. Rios
{"title":"Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools","authors":"Jimmy Anderson Florez Zuluaga, J. Vargas-Bonilla, José David Ortega Pabón, C. Rios","doi":"10.1109/CCST.2018.8585728","DOIUrl":"https://doi.org/10.1109/CCST.2018.8585728","url":null,"abstract":"With the growth of air transport, the air traffic control needs to enforce the Communication navigation surveillance air traffic management (CNS-ATM) because this is the back bone of the air operation in any country. This system has the responsibility of guaranteeing air safety and management of the national air space (NAS) that nowadays needs to increase the flight density to respond to the demand. To accomplish this, new technologies like air dependent surveillance broadcast (ADS-B) have been used to increase the accuracy and time response of data air surveillance sensor integration of sensor location and the reliability of ATM system. CNS-ATM system for surveillance and control of aircrafts have been mainly used in primary and secondary radars to calculate the aircraft position through signal delay or time difference between transponder pulses. The accuracy of each sensor depends on internal and external factors such as frequency, power, target distance, noise, maintenance, and others. When an aerodyne is detected by multiple sensors, it could create a multiple track in a geographic and temporal space where the aircraft will be possibly flying. This space depends of radar update time, aerodyne speed, and the accuracy of each sensor, and it is difficult to know where the aircraft really is. This work proposes a technique based on ADS-B for making an error calculation of each sensor in a fusion system, using business intelligence techniques for understanding the error condition of each sensor in a geographical area. Based on results, we propose a technique that could make an error correction to avoid phase shifts between sensors. The information of this data study was used for statistical calculation values such as variance and standard deviation. For fusion accuracy improvement, three steps have been proposed in this research. First, the use of the radar error by region and statistical values by calculating the Kalman filters for each sensor to reduce the internal error of the radar. Second, the bias measured against ADS-B signal, used like a parameter to calculate radar bias correction that could be applied as a feedback input in a homogenization signal process or tracking process to reduce sensor bias in a recurrent process. Third, the use of Kalman prediction characteristic to replace missing points in a trajectory calculation. This technique was implemented by Colombian system to reduce error and bias sensor and a user's quality perception in a radar tracking and fusion track system in a surveillance network. In this process, it was found that it is possible to use it by a repetitive error measured ADS-B track like a reference track to calculate the error and in this way, it could be possible to reduce the uncertainty about the aircraft position. On the other hand, the use of data analysis process based on business intelligent tools allows us to easier understand the radar error behavior. Both methodology and results will be described here.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74814441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MIMO Cable Guided Radar MIMO电缆制导雷达
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2018-10-01 DOI: 10.1109/CCST.2018.8585477
C. Harman
{"title":"MIMO Cable Guided Radar","authors":"C. Harman","doi":"10.1109/CCST.2018.8585477","DOIUrl":"https://doi.org/10.1109/CCST.2018.8585477","url":null,"abstract":"Multiple Input Multiple Output (MIMO) cable guided radar presents a true paradigm shift in leaky coaxial cable sensing. Recent technology advancements in Software Defined Radio (SDR) allow this covert terrain following radar to provide reliable detection and pinpoint the location of intruders as they cross the perimeter. MIMO operation enables the use of end-to-end correlation (patents pending) using four times the data used by traditional leaky coaxial cable sensors. Utilizing contra-directionally coupled and co-directionally coupled responses from both ends of the cables, end-to-end correlation doubles the location accuracy for a given bandwidth and reduces sensitivity to RF interference (mutual and 3rd party) – a common problem with other leaky coaxial cable sensors. Since the noise created by nearby metallic fences is a form of multipath, end-to-end correlation suppresses this common source of nuisance alarms. In addition, end-to-end correlation eliminates the need for costly “graded” cables. The use of standard leaky coaxial cables like those made in large quantity for use in communications avoids much of the wasted cable associated with graded cables and it simplifies installation and repair of the cables. These cables are designed for direct burial in many types of mediums. A cable plough can be used in many types of soil as opposed to the traditional trench and backfill approach. The cost savings in using a plough can be dramatic. The co-directionally coupled responses are used to enhance the detection process as well as to communicate response data from one processor to the next. In addition to data, a novel “split-rail” power distribution over the sensor cables minimizes the need for costly infrastructure. Since the cables are in fact the sensor, the cable and processors creates a secure power and data network around the perimeter. Applications include; prisons, nuclear power plants, military sites, VIP residences and borders.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"135 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77068274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the common authorship of a set of questioned signature images 评估一组可疑签名图像的共同作者身份
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-01-01 DOI: 10.1109/CCST.2017.8167822
Moisís Díaz Cabrera, M. A. Ferrer-Ballester
{"title":"Assessing the common authorship of a set of questioned signature images","authors":"Moisís Díaz Cabrera, M. A. Ferrer-Ballester","doi":"10.1109/CCST.2017.8167822","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167822","url":null,"abstract":"","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"36 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76584273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle detection for traffic flow analysis 车辆检测用于交通流分析
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2016-10-24 DOI: 10.1109/CCST.2016.7815693
S. Ramalingam, V. Varsani
{"title":"Vehicle detection for traffic flow analysis","authors":"S. Ramalingam, V. Varsani","doi":"10.1109/CCST.2016.7815693","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815693","url":null,"abstract":"TYAs paper looks at some of the algorithms that can be used for effective detection and tracking of vehicles, in particular for statistical analysis. The main methods for tracking discussed and implemented are blob analysis, optical flow and foreground detection. A further analysis is also done testing two of the techniques using a number of video sequences that include different levels of difficulties.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83667480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fuzzy interval valued fusion technique for multi-modal 3D face recognition 多模态三维人脸识别的模糊区间值融合技术
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2016-10-24 DOI: 10.1109/CCST.2016.7815709
S. Ramalingam, U. Maheswari
{"title":"A fuzzy interval valued fusion technique for multi-modal 3D face recognition","authors":"S. Ramalingam, U. Maheswari","doi":"10.1109/CCST.2016.7815709","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815709","url":null,"abstract":"This paper proposes a fuzzy interval valued multicriteria decision making (MCDM) technique that aggregates information from multi-modal feature sets during decision making in a 3D face recognition system. In this paper, an interval valued fuzzy TOPSIS technique is applied to a 3D face recognition system that is benchmarked against a set of databases. Such a system is shown to be useful in decision making when the choice of alternatives of the feature sets is combinatorial and complex.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"3 5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76996144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Metadata extraction and classification of YouTube videos using sentiment analysis 基于情感分析的YouTube视频元数据提取与分类
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2016-10-24 DOI: 10.1109/CCST.2016.7815692
S. Rangaswamy, Shubham Ghosh, Srishti Jha, S. Ramalingam
{"title":"Metadata extraction and classification of YouTube videos using sentiment analysis","authors":"S. Rangaswamy, Shubham Ghosh, Srishti Jha, S. Ramalingam","doi":"10.1109/CCST.2016.7815692","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815692","url":null,"abstract":"MPEG media have been widely adopted and is very successful in promoting interoperable services that deliver video to consumers on a range of devices. However, media consumption is going beyond the mere playback of a media asset and is geared towards a richer user experience that relies on rich metadata and content description. This paper proposes a technique for extracting and analysing metadata from a video, followed by decision making related to the video content. The system uses sentiment analysis for such a classification. It is envisaged that the system when fully developed, is to be applied to determine the existence of illicit multimedia content on the Web.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87308152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The influence of stress on biometric signature stability 应力对生物特征稳定性的影响
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815680
V. Smejkal, L. Sieger, J. Kodl
{"title":"The influence of stress on biometric signature stability","authors":"V. Smejkal, L. Sieger, J. Kodl","doi":"10.1109/CCST.2016.7815680","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815680","url":null,"abstract":"This paper directly follows on from prior research into DBS, the properties of DBS, security, its resistance to forgery and its stability. Experiments under stress situations, conducted during a survival course at the University of Defence of the Czech Republic, are described herein. It was shown that a handwritten signature developed by way of long-term practice and the reinforcement of a dynamic stereotype, consisting of the physiological, anatomical and motoric properties of each and every individual, becomes automatic to such an extent that the subconscious appending of a signature protects it from outside influences to a similar degree as we proved in the past in relation to alcohol. The experiments also identified that shorter signatures (abbreviated signature, initials) show very high variability of conformity and non-conformity between individual signatures. It was proven that the quality of recognising a signature rises with the length of the information written down. It was also again confirmed that the use of a 1st signature as “practice”, not included in the results, reduced the variability of signatures among all participants.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78807625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dealing with occlusions in face recognition by region-based fusion 基于区域融合处理人脸识别中的遮挡
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815707
E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia
{"title":"Dealing with occlusions in face recognition by region-based fusion","authors":"E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/CCST.2016.7815707","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815707","url":null,"abstract":"The last research efforts made in the face recognition community have been focusing in improving the robustness of systems under different variability conditions like change of pose, expression, illumination, low resolution and occlusions. Occlusions are also a manner of evading identification, which is commonly used when committing crimes or thefts. In this work we propose an approach based on the fusion of non occluded facial regions that is robust to occlusions in a simple and effective manner. We evaluate the region-based approach in three face recognition systems: Face++ (a commercial software based on CNN) and two advancements over LBP systems, one considering multiple scales and other considering a larger number of facial regions. We report experiments based on the ARFace database and prove the robustness of using only non-occluded facial regions, the effectiveness of a large number of regions and the limitations of the commercial system when dealing with occlusions.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"44 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76495018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrusion prevention system of automotive network CAN bus 汽车网络CAN总线入侵防御系统
2016 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815711
Sam Abbott-McCune, Lisa A. Shay
{"title":"Intrusion prevention system of automotive network CAN bus","authors":"Sam Abbott-McCune, Lisa A. Shay","doi":"10.1109/CCST.2016.7815711","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815711","url":null,"abstract":"Automotive networks based on the Controller Area Network (CAN) bus (ISO 11898) family of protocols have been shown to be vulnerable to exploits by hackers who are outside the vehicle. These networks can be compromised in a manner which could jeopardize vehicle occupants. One well-publicized exploit led to a costly automotive recall that affected more than a million vehicles. Other exploits can allow criminals to steal cars without physically breaking into them. While no fatalities have yet occurred, hackers could trigger an event that led to accident involving serious injury or even death. The CAN bus connects electronic control units (ECUs), some of which are required for safety and emissions systems such as the anti-lock braking and fuel injection systems. In addition to controlling required functions, other ECUs provide consumer-oriented features such as infotainment and lighting. Whether factory installed or aftermarket add-ons, each ECU introduces attack vectors into the overall automotive network. This research focuses on securing these vehicle networks, specifically the CAN bus. This paper will analyze the current vulnerabilities and describe our design for a real-time intrusion prevention system (IPS) that neutralizes attacks by actively monitoring the CAN bus and eliminating malicious messages.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83739537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信