{"title":"AI facial recognition and biometric detection: balancing consumer rights and corporate interests","authors":"Felipe Romero Moreno","doi":"10.1109/ICCST49569.2021.9717403","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717403","url":null,"abstract":"","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73231667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jimmy Anderson Florez Zuluaga, J. Vargas-Bonilla, José David Ortega Pabón, C. Rios
{"title":"Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools","authors":"Jimmy Anderson Florez Zuluaga, J. Vargas-Bonilla, José David Ortega Pabón, C. Rios","doi":"10.1109/CCST.2018.8585728","DOIUrl":"https://doi.org/10.1109/CCST.2018.8585728","url":null,"abstract":"With the growth of air transport, the air traffic control needs to enforce the Communication navigation surveillance air traffic management (CNS-ATM) because this is the back bone of the air operation in any country. This system has the responsibility of guaranteeing air safety and management of the national air space (NAS) that nowadays needs to increase the flight density to respond to the demand. To accomplish this, new technologies like air dependent surveillance broadcast (ADS-B) have been used to increase the accuracy and time response of data air surveillance sensor integration of sensor location and the reliability of ATM system. CNS-ATM system for surveillance and control of aircrafts have been mainly used in primary and secondary radars to calculate the aircraft position through signal delay or time difference between transponder pulses. The accuracy of each sensor depends on internal and external factors such as frequency, power, target distance, noise, maintenance, and others. When an aerodyne is detected by multiple sensors, it could create a multiple track in a geographic and temporal space where the aircraft will be possibly flying. This space depends of radar update time, aerodyne speed, and the accuracy of each sensor, and it is difficult to know where the aircraft really is. This work proposes a technique based on ADS-B for making an error calculation of each sensor in a fusion system, using business intelligence techniques for understanding the error condition of each sensor in a geographical area. Based on results, we propose a technique that could make an error correction to avoid phase shifts between sensors. The information of this data study was used for statistical calculation values such as variance and standard deviation. For fusion accuracy improvement, three steps have been proposed in this research. First, the use of the radar error by region and statistical values by calculating the Kalman filters for each sensor to reduce the internal error of the radar. Second, the bias measured against ADS-B signal, used like a parameter to calculate radar bias correction that could be applied as a feedback input in a homogenization signal process or tracking process to reduce sensor bias in a recurrent process. Third, the use of Kalman prediction characteristic to replace missing points in a trajectory calculation. This technique was implemented by Colombian system to reduce error and bias sensor and a user's quality perception in a radar tracking and fusion track system in a surveillance network. In this process, it was found that it is possible to use it by a repetitive error measured ADS-B track like a reference track to calculate the error and in this way, it could be possible to reduce the uncertainty about the aircraft position. On the other hand, the use of data analysis process based on business intelligent tools allows us to easier understand the radar error behavior. Both methodology and results will be described here.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74814441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIMO Cable Guided Radar","authors":"C. Harman","doi":"10.1109/CCST.2018.8585477","DOIUrl":"https://doi.org/10.1109/CCST.2018.8585477","url":null,"abstract":"Multiple Input Multiple Output (MIMO) cable guided radar presents a true paradigm shift in leaky coaxial cable sensing. Recent technology advancements in Software Defined Radio (SDR) allow this covert terrain following radar to provide reliable detection and pinpoint the location of intruders as they cross the perimeter. MIMO operation enables the use of end-to-end correlation (patents pending) using four times the data used by traditional leaky coaxial cable sensors. Utilizing contra-directionally coupled and co-directionally coupled responses from both ends of the cables, end-to-end correlation doubles the location accuracy for a given bandwidth and reduces sensitivity to RF interference (mutual and 3rd party) – a common problem with other leaky coaxial cable sensors. Since the noise created by nearby metallic fences is a form of multipath, end-to-end correlation suppresses this common source of nuisance alarms. In addition, end-to-end correlation eliminates the need for costly “graded” cables. The use of standard leaky coaxial cables like those made in large quantity for use in communications avoids much of the wasted cable associated with graded cables and it simplifies installation and repair of the cables. These cables are designed for direct burial in many types of mediums. A cable plough can be used in many types of soil as opposed to the traditional trench and backfill approach. The cost savings in using a plough can be dramatic. The co-directionally coupled responses are used to enhance the detection process as well as to communicate response data from one processor to the next. In addition to data, a novel “split-rail” power distribution over the sensor cables minimizes the need for costly infrastructure. Since the cables are in fact the sensor, the cable and processors creates a secure power and data network around the perimeter. Applications include; prisons, nuclear power plants, military sites, VIP residences and borders.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"135 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77068274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the common authorship of a set of questioned signature images","authors":"Moisís Díaz Cabrera, M. A. Ferrer-Ballester","doi":"10.1109/CCST.2017.8167822","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167822","url":null,"abstract":"","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"36 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76584273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle detection for traffic flow analysis","authors":"S. Ramalingam, V. Varsani","doi":"10.1109/CCST.2016.7815693","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815693","url":null,"abstract":"TYAs paper looks at some of the algorithms that can be used for effective detection and tracking of vehicles, in particular for statistical analysis. The main methods for tracking discussed and implemented are blob analysis, optical flow and foreground detection. A further analysis is also done testing two of the techniques using a number of video sequences that include different levels of difficulties.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83667480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fuzzy interval valued fusion technique for multi-modal 3D face recognition","authors":"S. Ramalingam, U. Maheswari","doi":"10.1109/CCST.2016.7815709","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815709","url":null,"abstract":"This paper proposes a fuzzy interval valued multicriteria decision making (MCDM) technique that aggregates information from multi-modal feature sets during decision making in a 3D face recognition system. In this paper, an interval valued fuzzy TOPSIS technique is applied to a 3D face recognition system that is benchmarked against a set of databases. Such a system is shown to be useful in decision making when the choice of alternatives of the feature sets is combinatorial and complex.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"3 5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76996144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rangaswamy, Shubham Ghosh, Srishti Jha, S. Ramalingam
{"title":"Metadata extraction and classification of YouTube videos using sentiment analysis","authors":"S. Rangaswamy, Shubham Ghosh, Srishti Jha, S. Ramalingam","doi":"10.1109/CCST.2016.7815692","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815692","url":null,"abstract":"MPEG media have been widely adopted and is very successful in promoting interoperable services that deliver video to consumers on a range of devices. However, media consumption is going beyond the mere playback of a media asset and is geared towards a richer user experience that relies on rich metadata and content description. This paper proposes a technique for extracting and analysing metadata from a video, followed by decision making related to the video content. The system uses sentiment analysis for such a classification. It is envisaged that the system when fully developed, is to be applied to determine the existence of illicit multimedia content on the Web.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87308152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of stress on biometric signature stability","authors":"V. Smejkal, L. Sieger, J. Kodl","doi":"10.1109/CCST.2016.7815680","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815680","url":null,"abstract":"This paper directly follows on from prior research into DBS, the properties of DBS, security, its resistance to forgery and its stability. Experiments under stress situations, conducted during a survival course at the University of Defence of the Czech Republic, are described herein. It was shown that a handwritten signature developed by way of long-term practice and the reinforcement of a dynamic stereotype, consisting of the physiological, anatomical and motoric properties of each and every individual, becomes automatic to such an extent that the subconscious appending of a signature protects it from outside influences to a similar degree as we proved in the past in relation to alcohol. The experiments also identified that shorter signatures (abbreviated signature, initials) show very high variability of conformity and non-conformity between individual signatures. It was proven that the quality of recognising a signature rises with the length of the information written down. It was also again confirmed that the use of a 1st signature as “practice”, not included in the results, reduced the variability of signatures among all participants.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78807625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia
{"title":"Dealing with occlusions in face recognition by region-based fusion","authors":"E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/CCST.2016.7815707","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815707","url":null,"abstract":"The last research efforts made in the face recognition community have been focusing in improving the robustness of systems under different variability conditions like change of pose, expression, illumination, low resolution and occlusions. Occlusions are also a manner of evading identification, which is commonly used when committing crimes or thefts. In this work we propose an approach based on the fusion of non occluded facial regions that is robust to occlusions in a simple and effective manner. We evaluate the region-based approach in three face recognition systems: Face++ (a commercial software based on CNN) and two advancements over LBP systems, one considering multiple scales and other considering a larger number of facial regions. We report experiments based on the ARFace database and prove the robustness of using only non-occluded facial regions, the effectiveness of a large number of regions and the limitations of the commercial system when dealing with occlusions.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"44 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76495018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion prevention system of automotive network CAN bus","authors":"Sam Abbott-McCune, Lisa A. Shay","doi":"10.1109/CCST.2016.7815711","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815711","url":null,"abstract":"Automotive networks based on the Controller Area Network (CAN) bus (ISO 11898) family of protocols have been shown to be vulnerable to exploits by hackers who are outside the vehicle. These networks can be compromised in a manner which could jeopardize vehicle occupants. One well-publicized exploit led to a costly automotive recall that affected more than a million vehicles. Other exploits can allow criminals to steal cars without physically breaking into them. While no fatalities have yet occurred, hackers could trigger an event that led to accident involving serious injury or even death. The CAN bus connects electronic control units (ECUs), some of which are required for safety and emissions systems such as the anti-lock braking and fuel injection systems. In addition to controlling required functions, other ECUs provide consumer-oriented features such as infotainment and lighting. Whether factory installed or aftermarket add-ons, each ECU introduces attack vectors into the overall automotive network. This research focuses on securing these vehicle networks, specifically the CAN bus. This paper will analyze the current vulnerabilities and describe our design for a real-time intrusion prevention system (IPS) that neutralizes attacks by actively monitoring the CAN bus and eliminating malicious messages.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83739537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}