Search results for "Authentication"
showing 10 items of 108 documents
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Machine Learning VS Transfer Learning - Smart Camera Implementation for Face Authentication
2018
The aim of this paper is to highlight differences between classical machine learning and transfer learning applied to low cost real-time face authentication. Furthermore, in an access control context, the size of biometric data should be minimized so it can be stored on a remote personal media. These constraints have led us to compare only lightest versions of these algorithms. Transfer learning applied on Mobilenet v1 raises to 85% of accuracy, for a 457Ko model, with 3680s and 1.43s for training and prediction tasks. In comparison, the fastest integrated method (Random Forest) shows accuracy up to 90% for a 7,9Ko model, with a fifth of a second to be trained and a hundred of microseconds …
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
2021
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…
A Comparative Study on Fuzzy-Clustering-Based Lip Region Segmentation Methods
2011
As the first step of many lip-reading or visual speaker authentication systems, lip region segmentation is of vital importance. And fuzzy clustering based methods have been widely used in lip segmentation. In this paper, four fuzzy clustering based lip segmentation methods have been elaborated with their underlying rationale. Experiments have been carried out evaluate their performance comparatively. From the experimental results, SFCM has the best efficiency and FCMST has the best segmentation accuracy.
Tracing, authenticating and dating archaeological metal using the voltammetry of microparticles
2011
Electrochemical techniques provide information of archaeometric interest. An overview on the application and future developments of the voltammetry of microparticles to the study of archaeological metals and their alteration products is presented. A report on the state of the art and future developments of this technique with regard to identification and origin studies of materials, authentication, chronology and dating of archaeological metal is provided.
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Blockchain based Device identification and authentication in a Smart Grid
2020
The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
Influence of regionality and maturation time on the chemical fingerprint of whisky.
2020
International audience; Understanding the chemical composition of whisky and the impact of each step in the manufacturing process provides a basis for responding to the challenges of producing high quality spirits. In this study, the objective was to discriminate whiskies according to their geographical origin and authenticate the maturation time in cask based on the non-volatile profiles. The combination of FT-ICR-MS and chemometrics allowed the distinction of whiskies from four geographical origins in Scotland (Highlands, Lowlands, Speyside and Islay). Statistical modeling was also used to discriminate whiskies according to the maturation time in cask and reveal chemical markers associate…
Sequential Lip Region Segmentation Using Fuzzy Clustering with Spatial and Temporal Information
2012
For many visual speech recognition and visual speaker authentication systems, lip region extraction is of vital important. In order to segment the lip region accurately and robustly from a lip sequence, a new fuzzy-clustering based algorithm is proposed. In the proposed method, a new dissimilarity measure is introduced to take all the color, spatial and temporal information into consideration. An iterative optimization method is employed to derive the optimal lip region membership map and the final segmentation result. From the experimental results, it is observed that the proposed algorithm can provide superior results compared with other traditional methods.