The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In traditional cryptosystems, user authentication is based on the possession of secret keys/tokens. Such keys can be forgotten, lost, stolen, or may be illegally shared, but an ability to relate a cryptographic key to biometric data can enhance the trustworthiness of a system. In this paper, we demonstrate how biometric keys can be generated directly from live biometrics, under certain conditions,...
An agent based technique for controlling the transmission times and power of a wireless sensor network node is presented. The technique optimises the agent's action in a non deterministic environment as is the case of a network node transmitting in the presence of interference from nearby nodes and obstacles in the environment. The formulated analysis is treated as discrete time and guarantees optimal...
This paper is concerned with adapting the IEEE 802.11 protocol for inter-satellite links in distributed satellite formations for rapid response and disaster monitoring from low Earth orbit. Key optimisation approaches such as tuning of the IEEE 802.11 physical layer parameters and enhancing the data link layer are described. Integration of smart antennas with the medium access control protocol is...
Unmanned systems are becoming widely utilised in dirty, dull, and dangerous missions and they are seen as key enablers in gathering data and acquire information that are then relayed back to the control station. Their utilisation is essential to increase the command centre situation awareness and provide the information superiority required not only in military, but also in civil and commercial applications...
Organic electronic materials are proposed to be used as a tamper protection grid for hardware security modules. Methods of designing a protection grid likely to be damaged in currently published depackaging techniques are derived. Organic protection layers are shown to be a feasible method of protecting hardware security modules against tampering.
The need for unmanned air vehicles (UAVs) to operate autonomously and to manage their operation with minimal intervention from the ground control station, in order to reduce the datalink utilization and maximize their exploitation in beyond line of sight (BLOS) operations, has been long recognized within industry and research institutes. Many artificial intelligence (AI) techniques try to address...
This paper reports the preliminary experiments on the cow identification via gait recognition of motion images. The eight cows walking under two different situations have been precisely identified by Cubic Higher-order Local Auto-Correlation (CHLAC). The cow gait recognition using CHLAC is expected to be a landmark achievement for realizing cost-effective dairy cattle breeding management systems which...
Counting (identical) objects in images is a simple yet fundamental recognition task that requires exhaustive human effort. Automation of this task would reduce the human load significantly. In this paper, we propose a statistical method to automatically count objects in an image sequence by using higher-order local auto-correlation (HLAC) based image features and multiple regression analysis (MRA)...
Higher order local autocorrelation (HLAC) proposed by Otsu [5] is often used in the recent computer vision application such as gate recognition, object tracking, or video surveillance. The feature value of HLAC is the integral of the product of local pixels' value, and usually the integrals are calculated in entire images. However, in the image recognition, feature selection is often effective for...
We developed software that automatically detects unusual motions in a video sequence in real-time by using an efficient implementation of CHLAC and a visual software framework called Lavatube. Video monitoring systems that can automatically detect unusual motions are currently in great demand. CHLAC has been shown to work effectively and favorably for this task. A newly developed parallel processing...
Conventional side-channel attacks which exploit the dynamic power consumption of CMOS devices to extract secret information from cryptographic devices are well established. The presence of an additional side channel utilising scattered electromagnetic emissions has previously been suggested, though a practical demonstration of the effect on cryptographic hardware has not been published. This paper...
One essential reason for a large class of security gaps in modern systems is the missing secure identity and thus the inherent easier cloning and replacement attacks on the system. Physical Unclonable Functions PUF have been proposed to make electronic devices physically unique through the born fabrication differences such that even the manufacturer would not be able to produce two equal entities...
The topic of fuzzy information granulation was first proposed by Zadeh in 1979. There has been a fast increasing interest in this topic and its applications since in many situations, when a problem involves incomplete, vague or uncertain information, it is difficult to come to a crisp solution and requires a granular solution which has a very significant impact on the design and implementation of...
A generalised modelling system for handling multimedia documents is introduced capable of allowing documents authored in differing formats to be efficiently manipulated, compared and analysed. The model represents a document as a secure autonomous object possessing the ability to represent and modify its own meta data whilst not compromising the ideals of maintaining the autonomy of individual document...
This paper proposes the use of shadows and shadow dynamics for the recognition of humans and human behavior. ldquoShadow biometricsrdquo may be a useful addition to the biometrics arsenal; shadows can be used in isolation, or in addition to the dasiadirectpsila (body) observation. Shadows may offer significantly more information could be obtained (larger image areas and more behavioral dynamics details)...
The stable reproduction of an encryption key under potentially varying operating conditions is a fundamental requirement of any encryption key generation system. This paper examines aspects of the generation of encryption keys based on measurable features derived from characteristics of investigated electronic system with a view to determining whether such encryption key generation is sufficiently...
With the increasing employment of biometric authentication systems worldwide, there has been significant concern over the security of stored biometric templates. In this paper, a solution to this problem employing a fuzzy vault fingerprint smartcard implementation, unlocked via an orientation-based feature vector, is presented. The fuzzy vault contains an unknown key which can be used either for identification...
This paper proposes new features for motion recognition. Higher order local autocorrelation (HLAC) features are extracted from the motion history images (MHI). Since MHI calculated from the video images include important motion information, it is expected that HLAC features extracted from MHI have good properties for motion recognition. The proposed features were tested using image sequences of pitching...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.