Search results for "Authentic"

showing 10 items of 203 documents

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

2021

Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…

AuthenticationComputer sciencebusiness.industrymedia_common.quotation_subjectFace (sociological concept)UsabilityContext (language use)Computer securitycomputer.software_genreDisadvantagedbusinessDigital divideFunction (engineering)computerQuestionnaire studymedia_common
researchProduct

A Comparative Study on Fuzzy-Clustering-Based Lip Region Segmentation Methods

2011

As the first step of many lip-reading or visual speaker authentication systems, lip region segmentation is of vital importance. And fuzzy clustering based methods have been widely used in lip segmentation. In this paper, four fuzzy clustering based lip segmentation methods have been elaborated with their underlying rationale. Experiments have been carried out evaluate their performance comparatively. From the experimental results, SFCM has the best efficiency and FCMST has the best segmentation accuracy.

AuthenticationFuzzy clusteringComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionstomatognathic diseasesComputingMethodologies_PATTERNRECOGNITIONstomatognathic systemSegmentationArtificial intelligencebusinessSpatial analysisTemporal information
researchProduct

Tracing, authenticating and dating archaeological metal using the voltammetry of microparticles

2011

Electrochemical techniques provide information of archaeometric interest. An overview on the application and future developments of the voltammetry of microparticles to the study of archaeological metals and their alteration products is presented. A report on the state of the art and future developments of this technique with regard to identification and origin studies of materials, authentication, chronology and dating of archaeological metal is provided.

AuthenticationGeneral Chemical EngineeringGeneral EngineeringTracingArchaeologyVoltammetryGeologyAnalytical ChemistryAnalytical Methods
researchProduct

Optical security and encryption with totally incoherent light

2001

We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.

AuthenticationHigh securitybusiness.industryComputer scienceMultispectral imageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical securityEncryptionAtomic and Molecular Physics and OpticsOptical encryptionDiffractive lensOpticsComputer Science::MultimediabusinessOptical processorComputer Science::DatabasesComputer Science::Cryptography and SecurityOptics Letters
researchProduct

Blockchain based Device identification and authentication in a Smart Grid

2020

The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…

AuthenticationIdentification (information)Smart gridComputer scienceCryptographic hash functionComputer securitycomputer.software_genreGridElectrical gridcomputerCritical infrastructureVulnerability (computing)2020 5th International Conference on Smart and Sustainable Technologies (SpliTech)
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Influence of regionality and maturation time on the chemical fingerprint of whisky.

2020

International audience; Understanding the chemical composition of whisky and the impact of each step in the manufacturing process provides a basis for responding to the challenges of producing high quality spirits. In this study, the objective was to discriminate whiskies according to their geographical origin and authenticate the maturation time in cask based on the non-volatile profiles. The combination of FT-ICR-MS and chemometrics allowed the distinction of whiskies from four geographical origins in Scotland (Highlands, Lowlands, Speyside and Islay). Statistical modeling was also used to discriminate whiskies according to the maturation time in cask and reveal chemical markers associate…

AuthenticationManufacturing processWhisky010401 analytical chemistry04 agricultural and veterinary sciencesGeneral MedicineBiologyBarrel (unit)040401 food science01 natural sciences0104 chemical sciencesAnalytical Chemistry0404 agricultural biotechnologyChemical markerHomogeneousWhisky ; Metabolomics ; Chemometrics ; Authentication ; Geographical Origin ; Maturation TimeGeographical originMetabolomicsFood scienceChemometrics[SDV.AEN]Life Sciences [q-bio]/Food and NutritionFood ScienceMaturation timeFood chemistry
researchProduct

Sequential Lip Region Segmentation Using Fuzzy Clustering with Spatial and Temporal Information

2012

For many visual speech recognition and visual speaker authentication systems, lip region extraction is of vital important. In order to segment the lip region accurately and robustly from a lip sequence, a new fuzzy-clustering based algorithm is proposed. In the proposed method, a new dissimilarity measure is introduced to take all the color, spatial and temporal information into consideration. An iterative optimization method is employed to derive the optimal lip region membership map and the final segmentation result. From the experimental results, it is observed that the proposed algorithm can provide superior results compared with other traditional methods.

AuthenticationSequenceFuzzy clusteringComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentationPattern recognitionMeasure (mathematics)ComputingMethodologies_PATTERNRECOGNITIONSegmentationArtificial intelligencebusinessTemporal information
researchProduct

Video preprocessing for audiovisual indexing

2003

We address the problem of detecting shots of subjects that are interviewed in news sequences. This is useful since usually these kinds of scenes contain important and reusable information that can be used for other news programs. In a previous paper, we presented a technique based on a priori knowledge of the editing techniques used in news sequences which allowed a fast search of news stories (see Albiol, A. et al., 3rd Int. Conf. on Audio and Video-based Biometric Person Authentication, p.366-71, 2001). We now present a new shot descriptor technique which improves the previous search results by using a simple, yet efficient, algorithm, based on the information contained in consecutive fra…

AuthenticationSequenceInformation retrievalContextual image classificationBiometricsComputer scienceSpeech recognitionSearch engine indexingcomputer.software_genreObject detectionReduction (complexity)Face (geometry)PreprocessorAudio signal processingcomputerImage retrievalIEEE International Conference on Acoustics Speech and Signal Processing
researchProduct

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

2019

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…

AuthenticationSmart gridComputer sciencebusiness.industryMutual authenticationSession (computer science)Routing (electronic design automation)GridKey managementbusinessProtocol (object-oriented programming)Computer network
researchProduct