43 research outputs found

    Microphone smart device fingerprinting from video recordings

    Get PDF
    This report aims at summarizing the on-going research activity carried out by DG-JRC in the framework of the institutional project Authors and Victims Identification of Child Abuse on-line, concerning the use of microphone fingerprinting for source device classification. Starting from an exhaustive study of the State of Art regarding the matter, this report describes a feasibility study about the adoption of microphone fingerprinting for source identification of video recordings. A set of operational scenarios have been established in collaboration with EUROPOL law enforcers, according to investigators needs. A critical analysis of the obtained results has demonstrated the feasibility of microphone fingerprinting and it has suggested a set of recommendations, both in terms of usability and future researches in the field.JRC.E.3-Cyber and Digital Citizens' Securit

    FaceQnet: Quality Assessment for Face Recognition based on Deep Learning

    Full text link
    In this paper we develop a Quality Assessment approach for face recognition based on deep learning. The method consists of a Convolutional Neural Network, FaceQnet, that is used to predict the suitability of a specific input image for face recognition purposes. The training of FaceQnet is done using the VGGFace2 database. We employ the BioLab-ICAO framework for labeling the VGGFace2 images with quality information related to their ICAO compliance level. The groundtruth quality labels are obtained using FaceNet to generate comparison scores. We employ the groundtruth data to fine-tune a ResNet-based CNN, making it capable of returning a numerical quality measure for each input image. Finally, we verify if the FaceQnet scores are suitable to predict the expected performance when employing a specific image for face recognition with a COTS face recognition system. Several conclusions can be drawn from this work, most notably: 1) we managed to employ an existing ICAO compliance framework and a pretrained CNN to automatically label data with quality information, 2) we trained FaceQnet for quality estimation by fine-tuning a pre-trained face recognition network (ResNet-50), and 3) we have shown that the predictions from FaceQnet are highly correlated with the face recognition accuracy of a state-of-the-art commercial system not used during development. FaceQnet is publicly available in GitHub.Comment: Preprint version of a paper accepted at ICB 201

    Fighting child sexual abuse: prevention policies for offenders.

    Get PDF
    Sexual abuse and sexual exploitation of children constitute major violation of fundamental rights and in particular of children rights to protection and care necessary for their well-being, as it is stated in the UNHCR Convention on the Rights of the Child. A series of Union initiatives and in particular Directive 2011/93/EU on combating the sexual abuse and sexual exploitation of children and child pornography aim at supporting actively and on a coordinated way the implementation of prevention and repression policies. The aim of this research is to first map existing prevention programmes in the European Union and at International level, focusing on interventions and treatments for (potential) offenders before any abuse occurs, for convicted offenders in prisons, and for convicted offenders after they leave the prison to fights against recidivism. Preventing campaigns and programs, helplines, circles of aids in the International and European landscape are listed and referenced. The effectiveness of those approaches have not yet be fully demonstrated and presented. Nevertheless, the report also offers preliminary evaluations of the reported initiatives and highlights on the possible best practices. In addition, criteria for more thorough assessment are suggested. Those prevention programmes shall be considered as an important contribution for a resilient and effective approach to fight against child sexual exploitation both in the cyberspace and offline, and to raise main stakeholders’ awareness to the issueJRC.E.3-Cyber and Digital Citizens' Securit

    Biometric Spoofing: A JRC Case Study in 3D Face Recognition

    Get PDF
    Based on newly available and affordable off-the-shelf 3D sensing, processing and printing technologies, the JRC has conducted a comprehensive study on the feasibility of spoofing 3D and 2.5D face recognition systems with low-cost self-manufactured models and presents in this report a systematic and rigorous evaluation of the real risk posed by such attacking approach which has been complemented by a test campaign. The work accomplished and presented in this report, covers theories, methodologies, state of the art techniques, evaluation databases and also aims at providing an outlook into the future of this extremely active field of research.JRC.G.6-Digital Citizen Securit

    Automatic fingerprint recognition: from children to elderly Ageing and age effects

    Get PDF
    By courtesy of the Portuguese Government, DG JRC has received a comprehensive set of fingerprint data from individuals aged 0-25 and 65-98. The main purpose of the proposed experiments is to deepen the understanding regarding the physiological development of the fingertip ridge structure over time and its impact on automated fingerprint recognition. The experiments explore three biometric processes in the light of age, ageing and growth effects. These effects are demonstrated and validated. A growth model is also developed and validated. The report concludes with a series of recommendations for enhanced implementation of automated fingerprint recognition system and suggestions for further researches.JRC.E.3-Cyber and Digital Citizens' Securit

    Building a hybrid experimental platform for mobile botnet research

    No full text
    Mobile botnets are an emerging security threat that aims at exploiting the wide penetration of mobile devices and systems and their vulnerabilities in the same spirit of traditional botnets. Mobile botmasters take advantage of infected mobile devices and issue command and control operations on them to extract personal information, cause denial of service or gain financially. To date, research on countering such attacks or studying their effects has been conducted in a sporadic manner that hinders the repetition of experiments and thus limits their validity. We present here our work on a hybrid experimental platform for mobile botnets that supports the execution and monitoring of related scenarios concerning their infection, attack vectors, propagation, etc. The platform is based on principles of flexibility, extensibility and facilitates the setup of scalable experiments utilising both real and emulated mobile systems. We also discuss a novel method of estimating the active bot population in a botnet and illustrate its deployment on the experimental platform.JRC.G.6-Digital Citizen Securit

    Camera fingerprinting based on Sensor Pattern Noise as a tool for combating Child Abuse on-line. Project AVICAO - Authors and Victims Identification of Child Abuse On-line

    No full text
    This document presents findings and outcomes of the JRC research activity on camera fingerprinting techniques, as a possible aid to enhance European Law Enforcement bodies’ capability to fight against Child Abuse on-line. The activity has been conducted in the framework of the institutional project Authors and Victims Identification of Child Abuse On-Line (560-AVICAO), started in 2014, and has been carried out in close and fruitful cooperation with EUROPOL’s European Cyber-Crime Centre (EC3).JRC.G.6-Digital Citizen Securit

    Privacy, tomorrow's Information Bottleneck?

    No full text
    Abstract not availableJRC.J-Institute for Prospective Technological Studies (Seville

    A generic framework to support participatory surveillance through crowdsensing

    No full text
    Harnessing the power and popularity of participatory or opportunistic sensing for the purpose of providing added value security and surveillance services is a promising research direction. However, challenges such as increased privacy concerns, as well as technological issues related to the reliable processing and meaningful analysis of the collected data, hinder the widespread deployment of participatory surveillance applications. We present here our work on addressing some of the aforementioned concerns through our related participatory application that focuses on crisis management and in particular buildings' evacuation. We discuss the technical aspects of our work, the viability and practicality of which is validated by means of a real experiment comprising 14 users in the context of an emergency evacuation exercise.JRC.G.6-Digital Citizen Securit
    corecore