Filters








416 Hits in 5.8 sec

Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection

Johann Gebhardt, Markus Goldstein, Faisal Shafait, Andreas Dengel
2013 2013 12th International Conference on Document Analysis and Recognition  
In contrast to previous work, this system uses unsupervised anomaly detection to detect documents printed by a different printing technique than the majority of the documents among a set.  ...  Furthermore, we created a dataset featuring 1200 document images from different domains (invoices, contracts, scientific papers) printed by 7 different inkjet and 13 laser printers.  ...  CONCLUSION AND FUTURE WORK A new document authentication approach using printing technique features with unsupervised anomaly detection is presented in this paper.  ... 
doi:10.1109/icdar.2013.102 dblp:conf/icdar/GebhardtGSD13 fatcat:lgjskjqp2jb3vetavja6cd3j3y

Identity Document and banknote security forensics: a survey [article]

Albert Berenguel Centeno, Oriol Ramos Terrades, Josep Lladós Canet, Cristina Cañero Morales
2019 arXiv   pre-print
Aiming to detect these counterfeits, the present survey covers a wide range of anti-counterfeiting security features, categorizing them into three components: security substrate, security inks and security  ...  printing. respectively.  ...  In [138] they use k-NN for unsupervised anomaly detection to detect documents printed with a different printing technique than the majority of the documents.  ... 
arXiv:1910.08993v1 fatcat:6onl6iprozbm3m7r3rea6xlnfq

An approach to detect user behaviour anomalies within identity federations

Alejandro G. Martín, Marta Beltrán, Alberto Fernández-Isabel, Isaac Martín de Diego
2021 Computers & security  
This process enables detecting essential features missing in the fingerprint or possible weaknesses in the selected anomaly detection techniques.  ...  Modelling ML techniques focused on anomaly detection allow RPs to handle unlabelled data (unsupervised learning) and imbalanced data, the main challenges in this research.  ... 
doi:10.1016/j.cose.2021.102356 fatcat:lkvhk46w4vh3dcdaehgqbpkaoy

A big data analytics based approach to anomaly detection

Abdul Razaq, Huaglory Tianfield, Peter Barrie
2016 Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies - BDCAT '16  
We demonstrate a comprehensive cyber security monitoring system to construct cyber security correlated events with feature selection to anticipate behaviour based on various sensors.  ...  [15] conducted a study to review supervised and unsupervised methods in intrusion detection techniques.  ...  [10] summarized anomaly based systems that can be implemented via various machine learning techniques such as: 1) Fuzzy Logic (FL) -uses true or false to detect anomaly, 2) Artificial Neural Networks  ... 
doi:10.1145/3006299.3006317 dblp:conf/bdc/RazaqTB16 fatcat:6p42fxfejzgf7phtw4wsak266i

Cyber Anomaly Detection Using Graph-node Role-dynamics [article]

Anthony Palladino, Christopher J. Thissen
2018 arXiv   pre-print
To detect the anomalies, we apply the role-dynamics approach, which has successfully identified anomalies in social media, email, and IP communication graphs.  ...  A cyber attack should trigger IDS alerts and cause changes in the node features, but rather than track every feature for every alert-field node individually, roles provide a succinct, integrated summary  ...  W31P4Q-15-C-0069, and this paper has been approved with Distribution Statement "A" (Approved for Public Release, Distribution Unlimited). e views, opinions, and/or ndings contained in this document are  ... 
arXiv:1812.02848v1 fatcat:fmipe3o3ovcrhngwdijboxp2cq

A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection [article]

Niloofar Yousefi, Marie Alaghband, Ivan Garibay
2019 arXiv   pre-print
In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting  ...  and scalable models of credit card fraud detection.  ...  They compared voice print authentication types in an experiment consisting of 204 telephone banking customers, and found that using voice print authentication based on digits is more convenient and makes  ... 
arXiv:1912.02629v1 fatcat:cnedguwpkveydnlbmdljm65t24

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

2015 KSII Transactions on Internet and Information Systems  
We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.  ...  These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc.  ...  Our idea of applying emotional recognition was inspired by the polygraph technique and an authentication system using biometrics.  ... 
doi:10.3837/tiis.2015.11.023 fatcat:swrvghdn3veizmqyrl7mohookm

Fourier Transform Hyperspectral Visible Imaging and the Nondestructive Analysis of Potentially Fraudulent Documents

Eric B. Brauns, R. Brian Dyer
2006 Applied Spectroscopy  
One potentially powerful application of this new technology is the nondestructive analysis and authentication of written and printed documents.  ...  Document samples were prepared using red, blue, and black inks. The samples were later altered using a different ink of the same color.  ...  This method involves visually inspecting a questionable document using a series of colored filters to detect anomalies in inks, paper composition, or some other feature. 4 For example, a legal document  ... 
doi:10.1366/000370206778062093 pmid:16925917 fatcat:w6e6tpkoxrfgzahyrnudyrt4la

SoK: A Systematic Review of Insider Threat Detection

Aram Kim, Junhyoung Oh, Jinho Ryu, Jemin Lee, Kookheui Kwon, Kyungho Lee
2019 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Finally, the detection approaches used in related studies are examined from the perspective of technology, learning, input category, detection target, and interpretability.  ...  Second, we explore the sensors which make possible detecting insider threats in an automated way, and the public datasets available for research.  ...  They insisted that each problem formulation has a different definition of anomalies and use different anomaly detection techniques.  ... 
doi:10.22667/jowua.2019.12.31.046 dblp:journals/jowua/KimORLKL19 fatcat:qdw2eruvijhdjc3qsiit6yblda

Deep Learning for Anomaly Detection in Log Data: A Survey [article]

Max Landauer, Sebastian Onder, Florian Skopik, Markus Wurzenberger
2022 arXiv   pre-print
We therefore carry out a systematic literature review that provides an overview of deployed models, data pre-processing mechanisms, anomaly detection techniques, and evaluations.  ...  In particular, self-learning anomaly detection techniques capture patterns in log data and subsequently report unexpected log event occurrences to system operators without the need to provide or manually  ...  ACKNOWLEDGMENTS This work was partly funded by the FFG project DECEPT (873980) and the EU project PANDORA (SI2.835928).  ... 
arXiv:2207.03820v1 fatcat:kd37v52ijzhdvgcderrdhxvrwm

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
Conclusion: This review has revealed that (a) most of the state of the art is focussed on preventive and detective countermeasures and significant research is required on developing investigative countermeasures  ...  Results: We have developed a classification of (1) data exfiltration attack vectors used by external attackers and (2) the countermeasures in the face of external attacks.  ...  Similar to Network-based anomaly detection techniques, Host-Based Anomaly (HBA) detection techniques also operate in three modes; supervised, semi-supervised, unsupervised.  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions [article]

Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar
2022 arXiv   pre-print
We develop an NLP-based HIDS taxonomy for comparing the features, techniques, attacks, datasets, and metrics found from the reviewed papers.  ...  The Host-Based Intrusion Detection Systems (HIDS) are widely used for defending against cybersecurity attacks.  ...  To detect low and high foot-print attacks KNN based on zero-watermarking algorithm [S33] outperformed SVM in terms of DR and FAR, which was extended by study [S32] using normalization-based feature  ... 
arXiv:2201.08066v1 fatcat:t6nsqoj5hnhnhcv4hsugsnau6m

DeepMoney: counterfeit money detection using generative adversarial networks

Toqeer Ali, Salman Jan, Ahmad Alkhodre, Mohammad Nauman, Muhammad Amin, Muhammad Shoaib Siddiqui
2019 PeerJ Computer Science  
This technique was applied to Pakistani banknotes. State-of-the-art image processing and feature recognition techniques were used to design the overall approach of a valid input.  ...  GANs use unsupervised learning to train a model that can then be used to perform supervised predictions.  ...  This technique is applied to Pakistani banknotes. State-of-the-art image processing and feature recognition techniques were used to design the overall approach of a valid input.  ... 
doi:10.7717/peerj-cs.216 pmid:33816869 pmcid:PMC7924467 fatcat:i6mqyc5nxnhyvo2q7r2ruxgtii

Table of Contents

2018 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)  
176 Multi-modal Biometric Recognition of Face and Palm-print using Matching score level Fusion 177 Multimodal Biometric Recognition system using Feature level Fusion 178 FACIAL FEATURES AND ITS  ...  India Using Data Mining Techniques 126 System and Method for Early Detection of Mild Cognitive Impairment 127 Emotion Recognition Using Multimodal Approach 128 Traffic Light Detection and Recognition  ... 
doi:10.1109/iccubea.2018.8697655 fatcat:jvjgmcrh3fhxtkf4kyydawnkiq

Insight Into Insiders and IT

Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa
2019 ACM Computing Surveys  
and disambiguation of insider threat incidents and the defense solutions used against them.  ...  the scope of defense solutions employed against them, b) an updated overview on publicly available datasets that can be used to test new detection solutions against other works, c) references of existing  ...  Finally, in the third line of defense, anomaly-based and unsupervised outlier detection should be deployed.  ... 
doi:10.1145/3303771 fatcat:t63cyqbofbaxjjk2e2aiuivtm4
« Previous Showing results 1 — 15 out of 416 results