IEEE ICCST2021: 54TH IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY - ONLINE
PROGRAM FOR TUESDAY, OCTOBER 12TH, 2021
Days:
previous day
next day
all days

View: session overviewtalk overview

12:05-14:05 Session 2: Day 2 online
  • Introduction to the day: S Ramalingam: 12.00 - 12.05

 

  • Keynote Speech 12.05 - 12.35
  1. Ian Johnston, University of Hertfordshire, UK, Biosensing for Security and Resilience (s8)

 

  • 12.35 - 14.05  9 papers

 

  • Topic: Traffic
  1. Robert Gurney, Mike Rhead and William Martin. Assessment Of Foreign Trailer Plates On UK Roads, Implications for ANPR (1)
  2. Fabio Garzia, Francesco Borghini, Mara Lombardi, Antonio Moretti and Soodamani Ramalingam. Emotional analysis of safeness and risk perception of transports and travels by car and motorcycles in London and Rome during the COVID-19 pandemic (31)
  3. Michael Rhead, Robert Gurney and William Martin. Assessment of the impact of displaying two rear registration plates on ANPR (2)
  4. Krystyna Ljubymenko, Dora Kotkova and Tereza Sternova. Use of detection of suspicious behavior in ensuring the security of persons in transport (41)
  5. Mike Rhead, Rob Gurney and William Martin. The Variable Reflective Properties of UK Number Plates and Impact on ANPR (7)
  6. Manonmani S, Akshita L, Annette Shajan L, Aneesh Sidharth L and Shanta R. Underwater Mine Detection Using Histogram of  Oriented Gradients and Canny Edge Detector (11)
  • Topic: Biometrics  ​​​​​​
  1. Felipe Romero-Moreno. AI facial recognition and biometric detection: balancing consumer rights and corporate interests (3)
  2. Ryan Carvalho and Norbert Tihanyi. Creating effective fingerprint artefacts: cooperative and a non-cooperative methods for bypassing capacitive and optical sensors with high success rate (8)
  3. Vladimír Smejkal and Jindrich Kodl. Comparative Study of Cryptographic and Biometric Signatures (4)
12:05
Biosensing for Security and Resilience

ABSTRACT. Ian will discuss the topic of biosensing and how it can usefully be applied to a range of systems. He will focus on the topics of resilience and security

12:35
Assessment Of Foreign Trailer Plates On UK Roads, Implications for ANPR

ABSTRACT. The Vienna Convention (VC) on Road Traffic [1] is an international treaty that was concluded in 1968 and became operational in May 1977. The primary aim of the treaty was to establish internationally agreed standard traffic rules that would increase road safety and facilitate cross border traffic flow amongst contracting parties. Part of the treatment relates to the requirement for a trailer to be registered and display a unique registration number.

The United Kingdom signed the treaty in 1968 but did not formally ratify the trailer registration element of the agreement until July 2018. This new legislation was introduced in preparation for the UK leaving Europe and introduces regulations that enable the introduction of a new trailer registration system intended to permit compliance with the registration standards outlined in the Vienna Convention. This guidance has since been updated.

This investigation provides a real-world insight into compliance with the convention of commercial trailers travelling internationally whilst being hauled in the UK. The paper discusses UK legislative compliance with international law and the differing display requirements for UK hauliers towing international trailers. This paper outlines implications for Automatic Number Plate Recognition resulting from the new UK legislation.

12:45
Emotional analysis of safeness and risk perception of transports and travels by car and motorcycles in London and Rome during the COVID-19 pandemic

ABSTRACT. The estimation of perceived safeness and risk by people is especially invaluable for safety and security managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public safety and security. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.

12:55
Assessment of the impact of displaying two rear registration plates on ANPR

ABSTRACT. This paper considers the implications of displaying two rear registration plates on trailers following the UK’s ratification of the Vienna Convention of Road Traffic.

The UK’s application of the Vienna Convention is at variance with that of EU members that have ratified the Vienna Convention.

Furthermore, it considers how the variability of UK registration plates can have an adverse impact on Automatic Number Plate Recognition (ANPR) and capture rate.

13:05
Use of detection of suspicious behavior in ensuring the security of persons in transport

ABSTRACT. The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack

13:15
The Variable Reflective Properties of UK Number Plates and Impact on ANPR

ABSTRACT. This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.

13:25
Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector

ABSTRACT. For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods- Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing- resizing and converting to grayscale images- after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.

13:35
AI facial recognition and biometric detection: balancing consumer rights and corporate interests

ABSTRACT. The purpose of this study is two-fold. Firstly, to critically assess the extent to which corporate actors can lawfully use artificial intelligence (AI) technology for real-time facial recognition biometric detection. Secondly, to suggest and appraise some procedural safeguards to make the use of these systems by private actors compatible with consumers’ right to protection of their personal data under the General Data Protection Regulation (GDPR). This study seeks to fill an existing gap in the literature. It concludes that unless, the three variables suggested in the study are considered, that is, ‘whether’, ‘when’ and ‘how’ corporate actors can legally use AI for real-time facial recognition biometric detection, the use of this technology will violate consumers’ data protection rights.

13:45
Creating effective fingerprint artefacts: cooperative and a non-cooperative methods for bypassing capacitive and optical sensors with high success rate

ABSTRACT. Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate --(C2H4)n(C4H6O2)m-- commonly known as "hot glue" and Polyvinyl Acetate --(C4H6O2)n-- commonly known as "white glue" or "school glue". The cooperative method takes 5-10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.

13:55
Comparative Study of Cryptographic and Biometric Signatures

ABSTRACT. The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.