Cybersecurity Considerations for Image Pattern Recognition Applications

被引:0
作者
Straub, Jeremy [1 ]
机构
[1] North Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
来源
2018 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR) | 2018年
关键词
pattern recognition; image analysis; law enforcement; warfighting; transportation security; agriculture; security; cybersecurity; manufacturing; NEURAL-NETWORK; IDENTIFICATION; SECURITY; ATTACKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pattern recognition and image analysis find application in numerous areas. They support law enforcement, transportation security and warfighting. They also have numerous commercial purposes, ranging from agriculture to manufacturing to facility security. This paper discusses the security needs of image recognition systems and the particular concerns that the algorithms and methods used for these activities pose. It also discusses how to secure these analysis systems and the future work required in these areas.
引用
收藏
页数:6
相关论文
共 46 条
  • [41] Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain
    Wang, Yulin
    Pearmain, Alan
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (06) : 1536 - 1543
  • [42] Waterman, 1986, A guide to expert systems
  • [43] Breaking visual CAPTCHAs with naive pattern recognition algorithms
    Yan, Jeff
    El Ahmad, Ahmad Salah
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 279 - 291
  • [44] Yang C. -C., APPL ARTIFICIAL NEUR
  • [45] Security of additive manufacturing: Attack taxonomy and survey
    Yarnpolskiy, Mark
    King, Wayne E.
    Gatlin, Jacob
    Belikovetsky, Sofia
    Brown, Adam
    Skjellum, Anthony
    Elovici, Yuval
    [J]. ADDITIVE MANUFACTURING, 2018, 21 : 431 - 457
  • [46] Attacks and Design of Image Recognition CAPTCHAs
    Zhu, Bin B.
    Yan, Jeff
    Li, Qiujie
    Yang, Chao
    Liu, Jia
    Xu, Ning
    Yi, Meng
    Cai, Kaiwei
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 187 - 200