Search results for: AUTHENTICATION
-
Chemical composition analysis and authentication of whisky
PublicationW pracy przedstawiono informacje dotyczące porównania różnych rodzajów whisky i innych napojów alkoholowych, identyfikacji różnych rodzajów whisky, oceny jakości i potwierdzania autentyczności whisky. Ponadto w pracy omówiono różne techniki stosowane w analizie whisky, takie jak gazową i cieczową chromatografię z różnymi detektorami (FID, AED, UV-vis), nos elektroniczny, spektrometrię absorpcji atomowej i spektrometrię mas. Ponadto...
-
A model-based approach to analysis of authentication protocols.
PublicationW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
User authentication based on keystroke dynamics analysis
PublicationW pracy przedstawiono kilka metod, które można wykorzystać do uwierzytelniania użytkowników na podstawie rytmu pisania na klawiaturze. Dwie z opisanych metod wykorzystują miarę odległości zdefiniowaną do porównywania wpisywanych tekstów, natomiast trzecia analizuje parametry rozkładów cech wydobytych z wpisywanych tekstów. Algorytmy te zostały przetestowane na dwóch zbiorach danych. Ponadto oceniona została efektywność metody powstałej...
-
Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition
PublicationThe study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...
-
Liveness measurements using optical flow for biometric person authentication
PublicationAutomatyczne rozpoznawanie twarzy jest jedną z najpopularniejszych technik biometrycznych, jednak nawet najdokładniejsze algorytmy identyfikacji okażą się bezużyteczne, jeśli będzie można je oszukać, np. używając zdjęcia zamiast rzeczywistej osoby. Dlatego też odpowiedni pomiar żywotności jest niezwykle istotny. W pracy zaprezentowano metodę, która jest w stanie rozróżnić pomiędzy sekwencjami wideo pokazującymi żywe osoby oraz...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublicationHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
User Authentication by Eye Movement Features Employing SVM and XGBoost Classifiers
PublicationDevices capable of tracking the user’s gaze have become significantly more affordable over the past few years, thus broadening their application, including in-home and office computers and various customer service equipment. Although such devices have comparatively low operating frequencies and limited resolution, they are sufficient to supplement or replace classic input interfaces, such as the keyboard and mouse. The biometric...
-
Concept of Multicriteria Aid of Choice of Threshold Value IN Biometrical Authentication System
Publication -
Eye Blink Based Detection of Liveness in Biometric Authentication Systems Using Conditional Random Fields
PublicationThe goal of this paper was to verify whether the conditional random fields are suitable and enough efficient for eye blink detection in user authentication systems based on face recognition with a standard web camera. To evaluate this approach several experiments were carried on using a specially developed test application and video database.
-
Authentication of whisky due to its botanical origin and way of production by instrumental analysis and multivariate classification methods
PublicationHeadspacemass-spectrometry (HS-MS), mid infrared (MIR) and UV–vis spectroscopywere used to authenticate whisky samples from different origins and ways of production ((Irish, Spanish, Bourbon, TennesseeWhisky and Scotch). The collected spectra were processed with partial least-squares discriminant analysis (PLS-DA) to build the classification models. In all cases the five groups ofwhiskieswere distinguished, but the best resultswere...
-
Newly marketed seed oils. What we can learn from the current status of authentication of edible oils
Publication -
MRM–MS of marker peptides and their abundance as a tool for authentication of meat species and meat cuts in single-cut meat products
PublicationThe abundance of protein markers in different types of meat cuts was explored in the context of authentication of raw meat (pork, beef and chicken) and processed meat products. Peptides originating from myoglobin (Mb) and myosin (My) were analyzed using multiple reaction monitoring mass spectrometry (MRM–MS). Analytical protocol was optimized for good repeatability (CV < 10%) and high sensitivity. The MS signal intensity of Mb...
-
Relative quantification of pork and beef in meat products using global and species-specific peptide markers for the authentication of meat composition
PublicationWe used global and species-specific peptide markers for a relative quantitative determination of pork and beef in raw and processed meat products made of the two meat species. Four groups of products were prepared (i.e., minced raw meats, sausages, raw and fried burgers) in order to represent products with different extents of food processing. In each group, the products varied in the pork/beef proportions. All products were analysed...
-
Differential scanning calorimetry for authentication of edible fats and oils - What can we learn from the past to face the current challenges?
Publication -
Edge-Computing based Secure E-learning Platforms
PublicationImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Biometryczna kontrola dostępu
PublicationOpisano szczegółowo algorytm detekcji oraz identyfikacji człowieka na podstawie punktów nodalnych twarzy. Zdefiniowano pojęcia: biometria, proces pomiaru biometrycznego, metody biometrycznej identyfikacji oraz kontrola dostępu. Przedstawiono opis opracowanego systemu biometrycznej identyfikacji wykorzystującego sztuczne sieci neuronowe. Podano wyniki badań oraz przeprowadzono ich wnikliwą dyskusję.Biometrics is the study of automated...
-
Uwierzytelnienie i autoryzacja w systemie STRADAR
PublicationPrzedstawiono rozwiązanie serwera uwierzytelnienia i autoryzacji (AA) w rozproszonym systemie STRADAR, udostępniającym funkcjonalności dla prowadzenia działań operacyjnych Morskiego Oddziału Straży Granicznej. System umożliwia prezentację na stanowisku wizualizacji zdarzeń (SWZ) bieżącej i archiwalnej sytuacji na mapie (AIS, radary), obrazu z kamer, zdjęć, notatek, rozmów telefonicznych oraz plików i wiadomości tekstowych (SMS)...
-
Facial data registration facility for biometric protection of electronic documents
PublicationIn modern world, information is crucial, and its leakage may lead to serious losses. Documents as the main medium of information must be therefore highly protected. Nowadays, the most common way of protecting data is using passwords, however it seems inconvenient to type complex passwords, when it is needed many times a day. For that reason a significant research has been conducted on biometric authentication...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Analysis of human behavioral patterns
PublicationWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Multimedia industrial and medical applications supported by machine learning
PublicationThis article outlines a keynote paper presented at the Intelligent DecisionTechnologies conference providing a part of the KES Multi-theme Conference “Smart Digital Futures” organized in Rome on June 14–16, 2023. It briefly discusses projects related to traffic control using developed intelligent traffic signs and diagnosing the health of wind turbine mechanisms and multimodal biometric authentication for banking branches to provide...
-
Generalized access control in hierarchical computer network
PublicationThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
PublicationArtykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...
-
Detection of apple in orange juice using ultra-fast gas chromatography
PublicationThe determination of authenticity is an increasingly important issue for food quality and safety. The use of an electronic nose based on ultra-fast gas chromatography technique ensures rapid analysis of the volatile compounds from food products. Due to the fact that this technique enables chemical profiling of agricultural products, it can be an effective tool for authentication when combined with chemometrics. In this article...
-
Characterization of herbal teas containing lime flowers – Tiliae flos by HPTLC method with chemometric analysis
PublicationLinden trees are a source of food products called lime flowers (Tiliae flos), traditionally used in the form of infusion for the treatment of feverish colds and coughs. Lime flowers should include flowers of Tilia cordata Mill, T.x europaea L., and T. platyphyllos Scop. or a mixture of these. The aim of current research was to establish a fast, sensitive HPTLC (high-performance thin-layer chromatography) method that would allow...
-
Novel analytical method for detection of orange juice adulteration based on ultra-fast gas chromatography
PublicationThe food authenticity assessment is an increasingly important issue in food quality and safety. The application of an electronic nose based on ultra-fast gas chromatography technique enables rapid analysis of the volatile compounds from food samples. Due to the fact that this technique provides chemical profiling of natural products, it can be a powerful tool for authentication in combination with chemometrics. In this article,...
-
Non-volatile molecular composition and discrimination of single grape white of chardonnay, riesling, sauvignon blanc and silvaner using untargeted GC–MS analysis
PublicationThis study developed and applied a GC–MS method aiming at molecular fingerprinting of 120 commercial single grape white wines (Chardonnay, Riesling, Sauvignon Blanc and Silvaner) for possible authentication according to grape variety. The method allowed detection of 372 peaks and tentative identification of 146 metabolites including alcohols, organic acids, esters, amino acids and sugars. The grape variety effect explained 8.3%...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Next generation automatic IP configuration deployment issues
PublicationAlthough Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol was defined in 2003, it was designed as a framework rather than a complete solution to the automatic configuration in IPv6 networks. There are still some unsolved problems and new options yet to be defined. One example of such case is Fully Qualified Domain Name (FQDN) option, which final version has been published in late 2007. It describes DHCPv6 client...
-
Digital Public Service Innovation: Framework Proposal
PublicationThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
Comparison of an Electronic Nose Based on Ultrafast Gas Chromatography, Comprehensive Two-Dimensional Gas Chromatography, and Sensory Evaluation for an Analysis of Type of Whisky
PublicationWhisky is one of the most popular alcoholic beverages. There are many types of whisky, for example, Scotch, Irish, and American whisky (called bourbon). The whisky market is highly diversified, and, because of this, it is important to have a method which would enable rapid quality evaluation and authentication of the type of whisky. The aim of this work was to compare 3 methods: an electronic nose based on the technology of ultrafast...
-
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublicationW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublicationW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublicationPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
Characterization of Bioactivity of Selective Molecules in Fruit Wines by FTIR and NMR Spectroscopies, Fluorescence and Docking Calculations
PublicationFourier transform infrared (FTIR) and proton nuclear magnetic resonance (1H NMR) spectroscopies were applied to characterize and compare the chemical shifts in the polyphenols’ regions of some fruit wines. The obtained results showed that FTIR spectra (1800–900 cm−1) and 1H NMR (δ 6.5–9.3 ppm) of different fruit wines can be used as main indices of the year of vintage and quality of fruit wines. In addition to the classical determination...
-
Application of Electronic Nose Based on Fast GC for Authenticity Assessment of Polish Homemade Liqueurs Called Nalewka
PublicationThe possibility of application of electronic nose based on fast GC for differentiation of three types of cherry liqueurs, namely Polish homemade liqueurs called nalewka, commercially available liqueurs labeled as nalewka, and commercial liqueurs, was investigated. This device was equipped with two parallel connected columns with different stationary phases coupled to two ultrasensitive flame ionization detectors (μ-FIDs). Four...
-
Evaluation of the suitability of electronic nose based on fast GC for distinguishing between the plum spirits of different geographical origins
PublicationPlum spirits are obtained exclusively via the alcoholic fermentation and distillation of meaty plums or must composed of plums, with or without stones. The European countries such as Poland, the Slovak Republic, the Czech Republic, Bulgaria and Romania are the leading producers of this alcoholic beverage. Information about the authentication of plum spirits produced in different countries can be found in the published literature....
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublicationPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Metabolomic and antioxidant properties of different varieties and origins of Dragon fruit
PublicationDragon fruit has appealed much concern from consumers as a novelty fruit with potent nutritional and medicinal benefits. Dragon fruit quality warrants comprehensive evaluation, based on the contents of pigments and health- promoting natural compounds in different varieties. This study was aimed to evaluate the differences among dragon fruit varieties extracted with methanol–water (CD3OD-D2O) and methanol (CD3OD) by proton nuclear magnetic...
-
Implementation of failover and load balancing algorithms in SIP PBX High Availability system
PublicationGoal of the project was to design a High Availability SIP VoIP system that guarantees access to additional services like auto-attendent and automatic call distribution. The realization of the project required system to have load balancing and failover algorithms implemented. From the end users’ point of view the whole system had to figure as a single element. After taking under consideration the known methods of implementations...