Abstract: In the deep south of Thailand, checkpoints for people
verification are necessary for the security management of risk zones,
such as official buildings in the conflict area. In this paper, we
propose an automatic checkpoint system that verifies persons using
information from ID cards and facial features. The methods for a
person’s information abstraction and verification are introduced
based on useful information such as ID number and name, extracted
from official cards, and facial images from videos. The proposed
system shows promising results and has a real impact on the local
society.
Abstract: Test automation allows performing difficult and time
consuming manual software testing tasks efficiently, quickly and
repeatedly. However, development and maintenance of automated
tests is expensive, so it needs a proper prioritization what to automate
first. This paper describes a simple yet efficient approach for such
prioritization of test cases based on the effort needed for both manual
execution and software test automation. The suggested approach is
very flexible because it allows working with a variety of assessment
methods, and adding or removing new candidates at any time. The
theoretical ideas presented in this article have been successfully
applied in real world situations in several software companies by the
authors and their colleagues including testing of real estate websites,
cryptographic and authentication solutions, OSGi-based middleware
framework that has been applied in various systems for smart homes,
connected cars, production plants, sensors, home appliances, car head
units and engine control units (ECU), vending machines, medical
devices, industry equipment and other devices that either contain or
are connected to an embedded service gateway.
Abstract: Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.
Abstract: Polycyclic Aromatic Hydrocarbons (PAHs) are
formed mainly because of incomplete combustion of organic
materials during industrial, domestic activities or natural occurrence.
Their toxicity and contamination of terrestrial and aquatic ecosystem
have been established. However, with limited validity index, previous
research has focused on PAHs isomer pair ratios of variable
physicochemical properties in source identification. The objective of
this investigation was to determine the empirical validity of Pearson
Correlation Coefficient (PCC) and Cluster Analysis (CA) in PAHs
source identification along soil samples of different land uses.
Therefore, 16 PAHs grouped, as Endocrine Disruption Substances
(EDSs) were determined in 10 sample stations in top and sub soils
seasonally. PAHs was determined the use of Varian 300 gas
chromatograph interfaced with flame ionization detector. Instruments
and reagents used are of standard and chromatographic grades
respectively. PCC and CA results showed that the classification of
PAHs along pyrolitic and petrogenic organics used in source
signature is about the predominance PAHs in environmental matrix.
Therefore, the distribution of PAHs in the studied stations revealed
the presence of trace quantities of the vast majority of the sixteen
PAHs, which may ultimately inhabit the actual source signature
authentication. Therefore, factors to be considered when evaluating
possible sources of PAHs could be; type and extent of bacterial
metabolism, transformation products/substrates, and environmental
factors such as salinity, pH, oxygen concentration, nutrients, light
intensity, temperature, co-substrates, and environmental medium are
hereby recommended as factors to be considered when evaluating
possible sources of PAHs.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: The rapid growth of multimedia technology demands
the secure and efficient access to information. This fast growing lose
the confidence of unauthorized duplication. Henceforth the protection
of multimedia content is becoming more important. Watermarking
solves the issue of unlawful copy of advanced data. In this paper,
blind video watermarking technique has been proposed. A luminance
layer of selected frames is interlaced into two even and odd rows of
an image, further it is deinterlaced and equalizes the coefficients of
the two shares. Color watermark is split into different blocks, and the
pieces of block are concealed in one of the share under the wavelet
transform. Stack the two images into a single image by introducing
interlaced even and odd rows in the two shares. Finally, chrominance
bands are concatenated with the watermarked luminance band. The
safeguard level of the secret information is high, and it is
undetectable. Results show that the quality of the video is not
changed also yields the better PSNR values.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: A new steganographic method via the use of numeric
data on public websites with a self-authentication capability is
proposed. The proposed technique transforms a secret message into
partial shares by Shamir’s (k, n)-threshold secret sharing scheme with
n = k + 1. The generated k+1 partial shares then are embedded into the
numeric items to be disguised as part of the website’s numeric content,
yielding the stego numeric content. Afterward, a receiver links to the
website and extracts every k shares among the k+1 ones from the stego
numeric content to compute k+1 copies of the secret, and the
phenomenon of value consistency of the computed k+1 copies is taken
as an evidence to determine whether the extracted message is authentic
or not, attaining the goal of self-authentication of the extracted secret
message. Experimental results and discussions are provided to show
the feasibility and effectiveness of the proposed method.
Abstract: Durian is the flagship fruit of Mindanao and there is
an abundance of several cultivars with many confusing identities/
names.
The project was conducted to develop procedure for reliable and
rapid detection and sorting of durian planting materials. Moreover, it
is also aimed to establish specific genetic or DNA markers for routine
testing and authentication of durian cultivars in question.
The project developed molecular procedures for routine testing.
SSR primers were also screened and identified for their utility in
discriminating durian cultivars collected.
Results of the study showed the following accomplishments:
1. Twenty (29) SSR primers were selected and identified based on
their ability to discriminate durian cultivars,
2. Optimized and established standard procedure for identification
and authentication of Durian cultivars
3. Genetic profile of durian is now available at Biotech Unit
Our results demonstrate the relevance of using molecular
techniques in evaluating and identifying durian clones. The most
polymorphic primers tested in this study could be useful tools for
detecting variation even at the early stage of the plant especially for
commercial purposes. The process developed combines the efficiency
of the microsatellites development process with the optimization of
non-radioactive detection process resulting in a user-friendly protocol
that can be performed in two (2) weeks and easily incorporated into
laboratories about to start microsatellite development projects. This
can be of great importance to extend microsatellite analyses to other
crop species where minimal genetic information is currently
available. With this, the University can now be a service laboratory
for routine testing and authentication of durian clones.
Abstract: The inherent skin patterns created at the joints in the
finger exterior are referred as finger knuckle-print. It is exploited to
identify a person in a unique manner because the finger knuckle print
is greatly affluent in textures. In biometric system, the region of
interest is utilized for the feature extraction algorithm. In this paper,
local and global features are extracted separately. Fast Discrete
Orthonormal Stockwell Transform is exploited to extract the local
features. Global feature is attained by escalating the size of Fast
Discrete Orthonormal Stockwell Transform to infinity. Two features
are fused to increase the recognition accuracy. A matching distance is
calculated for both the features individually. Then two distances are
merged mutually to acquire the final matching distance. The
proposed scheme gives the better performance in terms of equal error
rate and correct recognition rate.
Abstract: Validity, integrity, and impacts of the IT systems of
the US federal courts have been studied as part of the Human Rights
Alert-NGO (HRA) submission for the 2015 Universal Periodic
Review (UPR) of human rights in the United States by the Human
Rights Council (HRC) of the United Nations (UN). The current
report includes overview of IT system analysis, data-mining and case
studies. System analysis and data-mining show: Development and
implementation with no lawful authority, servers of unverified
identity, invalidity in implementation of electronic signatures,
authentication instruments and procedures, authorities and
permissions; discrimination in access against the public and
unrepresented (pro se) parties and in favor of attorneys; widespread
publication of invalid judicial records and dockets, leading to their
false representation and false enforcement. A series of case studies
documents the impacts on individuals' human rights, on banking
regulation, and on international matters. Significance is discussed in
the context of various media and expert reports, which opine
unprecedented corruption of the US justice system today, and which
question, whether the US Constitution was in fact suspended. Similar
findings were previously reported in IT systems of the State of
California and the State of Israel, which were incorporated, subject to
professional HRC staff review, into the UN UPR reports (2010 and
2013). Solutions are proposed, based on the principles of publicity of
the law and the separation of power: Reliance on US IT and legal
experts under accountability to the legislative branch, enhancing
transparency, ongoing vigilance by human rights and internet
activists. IT experts should assume more prominent civic duties in the
safeguard of civil society in our era.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.
Abstract: As currently various portable devices were launched,
smart business conducted using them became common. Since smart
business can use company-internal resources in an exlternal remote
place, user authentication that can identify authentic users is an
important factor. Commonly used user authentication is a method of
using user ID and Password. In the user authentication using ID and
Password, the user should see and enter authentication information
him or her. In this user authentication system depending on the user’s
vision, there is the threat of password leaks through snooping in the
process which the user enters his or her authentication information.
This study designed and produced a user authentication module
using an actuator to respond to the snooping threat.
Abstract: Merchants are competing to offer the use of mobile payment to encourage shopping. many mobile payment systems were made available in various locations worldwide; however, they have various drawbacks. This paper proposes a new mobile payment system that discusses the main drawbacks of these systems, namely security and speed of transaction. The proposal is featured by being simple to use by customers and merchants. Furthermore, the proposed system depends on a new authentication factor that is introduced in this paper and called by Two-Factors Authentication Plus, (2FA+).
Abstract: Fragile watermarking has been proposed as a means
of adding additional security or functionality to biometric systems,
particularly for authentication and tamper detection. In this paper
we describe an experimental study on the effect of watermarking
iris images with a particular class of fragile algorithm, reversible
algorithms, and the ability to correctly perform iris recognition.
We investigate two scenarios, matching watermarked images
to unmodified images, and matching watermarked images to
watermarked images. We show that different watermarking schemes
give very different results for a given capacity, highlighting the
importance ofinvestigation. At high embedding rates most algorithms
cause significant reduction in recognition performance. However,
in many cases, for low embedding rates, recognition accuracy is
improved by the watermarking process.
Abstract: Information Security is the most describing problem in present times. To cop up with the security of the information, the passwords were introduced. The alphanumeric passwords are the most popular authentication method and still used up to now. However, text based passwords suffer from various drawbacks such as they are easy to crack through dictionary attacks, brute force attacks, keylogger, social engineering etc. Graphical Password is a good replacement for text password. Psychological studies say that human can remember pictures better than text. So this is the fact that graphical passwords are easy to remember. But at the same time due to this reason most of the graphical passwords are prone to shoulder surfing. In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. The system is a combination of recognition and pure recall based techniques. Proposed scheme can be useful for smart hand held devices (like smart phones i.e. PDAs, iPod, iPhone, etc) which are more handy and convenient to use than traditional desktop computer systems.
Abstract: An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature. Thus, n verification equations can be reduced to one. So the aggregate signature adapts to Mobile Ad hoc Network (MANET). In this paper, we propose an efficient ID-based aggregate signature scheme with constant pairing computations. Compared with the existing ID-based aggregate signature scheme, this scheme greatly improves the efficiency of signature communication and verification. In addition, in this work, we apply our ID-based aggregate sig- nature to authenticated routing protocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANET.
Abstract: This paper presents a weighted approach to unconstrained iris recognition. In nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.