15 research outputs found

    Review on local binary patterns variants as texture descriptors for copy-move forgery detection

    Get PDF
    Past decades had seen the concerned by researchers in authenticating the originality of an image as the result of advancement in computer technology. Many methods have been developed to detect image forgeries such as copy-move, splicing, resampling and et cetera. The most common type of image forgery is copy-move where the copied region is pasted on the same image. The existence of high similarity in colour and textures of both copied and pasted images caused the detection of the tampered region to be very difficult. Additionally, the existence of post-processing methods makes it more challenging. In this paper, Local Binary Pattern (LBP) variants as texture descriptors for copy-move forgery detection have been reviewed. These methods are discussed in terms of introduction and methodology in copy-move forgery detection. These methods are also compared in the discussion section. Finally, their strengths and weaknesses are summarised, and some future research directions were pointed out

    Performance comparison of intrusion detection systems and application of machine learning to Snort system

    Get PDF
    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results

    Activity Report: Automatic Control 2012

    Get PDF

    Safe Intelligent Driver Assistance System in V2X Communication Environments based on IoT

    Get PDF
    In the modern world, power and speed of cars have increased steadily, as traffic continued to increase. At the same time highway-related fatalities and injuries due to road incidents are constantly growing and safety problems come first. Therefore, the development of Driver Assistance Systems (DAS) has become a major issue. Numerous innovations, systems and technologies have been developed in order to improve road transportation and safety. Modern computer vision algorithms enable cars to understand the road environment with low miss rates. A number of Intelligent Transportation Systems (ITSs), Vehicle Ad-Hoc Networks (VANETs) have been applied in the different cities over the world. Recently, a new global paradigm, known as the Internet of Things (IoT) brings new idea to update the existing solutions. Vehicle-to-Infrastructure communication based on IoT technologies would be a next step in intelligent transportation for the future Internet-of-Vehicles (IoV). The overall purpose of this research was to come up with a scalable IoT solution for driver assistance, which allows to combine safety relevant information for a driver from different types of in-vehicle sensors, in-vehicle DAS, vehicle networks and driver`s gadgets. This study brushed up on the evolution and state-of-the-art of Vehicle Systems. Existing ITSs, VANETs and DASs were evaluated in the research. The study proposed a design approach for the future development of transport systems applying IoT paradigm to the transport safety applications in order to enable driver assistance become part of Internet of Vehicles (IoV). The research proposed the architecture of the Safe Intelligent DAS (SiDAS) based on IoT V2X communications in order to combine different types of data from different available devices and vehicle systems. The research proposed IoT ARM structure for SiDAS, data flow diagrams, protocols. The study proposes several IoT system structures for the vehicle-pedestrian and vehicle-vehicle collision prediction as case studies for the flexible SiDAS framework architecture. The research has demonstrated the significant increase in driver situation awareness by using IoT SiDAS, especially in NLOS conditions. Moreover, the time analysis, taking into account IoT, Cloud, LTE and DSRS latency, has been provided for different collision scenarios, in order to evaluate the overall system latency and ensure applicability for real-time driver emergency notification. Experimental results demonstrate that the proposed SiDAS improves traffic safety

    5G Multi-access Edge Computing: Security, Dependability, and Performance

    Full text link
    The main innovation of the Fifth Generation (5G) of mobile networks is the ability to provide novel services with new and stricter requirements. One of the technologies that enable the new 5G services is the Multi-access Edge Computing (MEC). MEC is a system composed of multiple devices with computing and storage capabilities that are deployed at the edge of the network, i.e., close to the end users. MEC reduces latency and enables contextual information and real-time awareness of the local environment. MEC also allows cloud offloading and the reduction of traffic congestion. Performance is not the only requirement that the new 5G services have. New mission-critical applications also require high security and dependability. These three aspects (security, dependability, and performance) are rarely addressed together. This survey fills this gap and presents 5G MEC by addressing all these three aspects. First, we overview the background knowledge on MEC by referring to the current standardization efforts. Second, we individually present each aspect by introducing the related taxonomy (important for the not expert on the aspect), the state of the art, and the challenges on 5G MEC. Finally, we discuss the challenges of jointly addressing the three aspects.Comment: 33 pages, 11 figures, 15 tables. This paper is under review at IEEE Communications Surveys & Tutorials. Copyright IEEE 202

    Indoor localisation by using wireless sensor nodes

    Get PDF
    This study is devoted to investigating and developing WSN based localisation approaches with high position accuracies indoors. The study initially summarises the design and implementation of localisation systems and WSN architecture together with the characteristics of LQI and RSSI values. A fingerprint localisation approach is utilised for indoor positioning applications. A k-nearest neighbourhood algorithm (k-NN) is deployed, using Euclidean distances between the fingerprint database and the object fingerprints, to estimate unknown object positions. Weighted LQI and RSSI values are calculated and the k-NN algorithm with different weights is utilised to improve the position detection accuracy. Different weight functions are investigated with the fingerprint localisation technique. A novel weight function which produced the maximum position accuracy is determined and employed in calculations. The study covered designing and developing the centroid localisation (CL) and weighted centroid localisation (WCL) approaches by using LQI values. A reference node localisation approach is proposed. A star topology of reference nodes are to be utilized and a 3-NN algorithm is employed to determine the nearest reference nodes to the object location. The closest reference nodes are employed to each nearest reference nodes and the object locations are calculated by using the differences between the closest and nearest reference nodes. A neighbourhood weighted localisation approach is proposed between the nearest reference nodes in star topology. Weights between nearest reference nodes are calculated by using Euclidean and physical distances. The physical distances between the object and the nearest reference nodes are calculated and the trigonometric techniques are employed to derive the object coordinates. An environmentally adaptive centroid localisation approach is proposed.Weighted standard deviation (STD) techniques are employed adaptively to estimate the unknown object positions. WSNs with minimum RSSI mean values are considered as reference nodes across the sensing area. The object localisation is carried out in two phases with respect to these reference nodes. Calculated object coordinates are later translated into the universal coordinate system to determine the actual object coordinates. Virtual fingerprint localisation technique is introduced to determine the object locations by using virtual fingerprint database. A physical fingerprint database is organised in the form of virtual database by using LQI distribution functions. Virtual database elements are generated among the physical database elements with linear and exponential distribution functions between the fingerprint points. Localisation procedures are repeated with virtual database and localisation accuracies are improved compared to the basic fingerprint approach. In order to reduce the computation time and effort, segmentation of the sensing area is introduced. Static and dynamic segmentation techniques are deployed. Segments are defined by RSS ranges and the unknown object is localised in one of these segments. Fingerprint techniques are applied only in the relevant segment to find the object location. Finally, graphical user interfaces (GUI) are utilised with application program interfaces (API), in all calculations to visualise unknown object locations indoors
    corecore