Search results for "Authentic"
showing 10 items of 203 documents
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
2021
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…
A Comparative Study on Fuzzy-Clustering-Based Lip Region Segmentation Methods
2011
As the first step of many lip-reading or visual speaker authentication systems, lip region segmentation is of vital importance. And fuzzy clustering based methods have been widely used in lip segmentation. In this paper, four fuzzy clustering based lip segmentation methods have been elaborated with their underlying rationale. Experiments have been carried out evaluate their performance comparatively. From the experimental results, SFCM has the best efficiency and FCMST has the best segmentation accuracy.
Tracing, authenticating and dating archaeological metal using the voltammetry of microparticles
2011
Electrochemical techniques provide information of archaeometric interest. An overview on the application and future developments of the voltammetry of microparticles to the study of archaeological metals and their alteration products is presented. A report on the state of the art and future developments of this technique with regard to identification and origin studies of materials, authentication, chronology and dating of archaeological metal is provided.
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Blockchain based Device identification and authentication in a Smart Grid
2020
The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
Influence of regionality and maturation time on the chemical fingerprint of whisky.
2020
International audience; Understanding the chemical composition of whisky and the impact of each step in the manufacturing process provides a basis for responding to the challenges of producing high quality spirits. In this study, the objective was to discriminate whiskies according to their geographical origin and authenticate the maturation time in cask based on the non-volatile profiles. The combination of FT-ICR-MS and chemometrics allowed the distinction of whiskies from four geographical origins in Scotland (Highlands, Lowlands, Speyside and Islay). Statistical modeling was also used to discriminate whiskies according to the maturation time in cask and reveal chemical markers associate…
Sequential Lip Region Segmentation Using Fuzzy Clustering with Spatial and Temporal Information
2012
For many visual speech recognition and visual speaker authentication systems, lip region extraction is of vital important. In order to segment the lip region accurately and robustly from a lip sequence, a new fuzzy-clustering based algorithm is proposed. In the proposed method, a new dissimilarity measure is introduced to take all the color, spatial and temporal information into consideration. An iterative optimization method is employed to derive the optimal lip region membership map and the final segmentation result. From the experimental results, it is observed that the proposed algorithm can provide superior results compared with other traditional methods.
Video preprocessing for audiovisual indexing
2003
We address the problem of detecting shots of subjects that are interviewed in news sequences. This is useful since usually these kinds of scenes contain important and reusable information that can be used for other news programs. In a previous paper, we presented a technique based on a priori knowledge of the editing techniques used in news sequences which allowed a fast search of news stories (see Albiol, A. et al., 3rd Int. Conf. on Audio and Video-based Biometric Person Authentication, p.366-71, 2001). We now present a new shot descriptor technique which improves the previous search results by using a simple, yet efficient, algorithm, based on the information contained in consecutive fra…
Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development
2019
The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…