Skip to main content

FARTHEST: FormAl distRibuTed scHema to dEtect Suspicious arTefacts

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9621))

Included in the following conference series:

  • 2288 Accesses

Abstract

Security breaches are a major concern by both governmental and corporative organisations. This is the case, among others, of airports and official buildings, where X-ray security scanners are deployed to detect elements representing a threat to the human life. In this paper we propose a formal distributed schema, formally specified and analysed, to detect suspicious artefacts. Our approach consists in the integration of several image detection algorithms in order to detect a wide spectrum of weapons, such as guns, knifes and bombs. Also, we present a case of study, where some performance experiments are carried out for analysing the scalability of this schema when it is deployed in current systems.

Research partially supported by the Spanish MEC projects ESTuDIo and DArDOS (TIN2012-36812-C02-01 and TIN2015-65845-C3-1-R) and the Comunidad de Madrid project SICOMORo-CM (S2013/ICE-3006).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. US PUBLIC LAW 107–71. Aviation and transportation security act. (2001)

    Google Scholar 

  2. Andrés, C., Merayo, M.G., Núñez, M.: Formal passive testing of timed systems: Theory and tools. Softw. Test. Verification Reliab. 22(6), 365–405 (2012)

    Article  Google Scholar 

  3. Cavalli, A.R., Higashino, T., Núñez, M.: A survey on formal active and passive testing with applications to the cloud. Ann. Telecommun. 70(3–4), 85–93 (2015)

    Article  Google Scholar 

  4. Castañé, G., Núñez, A., Llopis, P., Carretero, J.: E-mc\(^2\): A formal framework for energy modelling in cloud computing. Simul. Model. Pract. Theor. 39, 56–75 (2013)

    Article  Google Scholar 

  5. Cañizares, P.C., Núñez, A., Núñez, M., Pardo, J.J.: A methodology for designing energy-aware systems for computational science. In: 15th International Conference on Computational Science, ICCS 2015, Procedia Computer Science 51, pp. 2804–2808. Elsevier (2015)

    Google Scholar 

  6. Hierons, R.M., Merayo, M.G.: Mutation testing from probabilistic and stochastic finite state machines. J. Syst. Softw. 82(11), 1804–1818 (2009)

    Article  Google Scholar 

  7. Hierons, R.M., Merayo, M.G., Núñez, M.: Testing from a stochastic timed system with a fault model. J. Logic Algebraic Program. 78(2), 98–115 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  8. López, N., Núñez, M., Rodríguez, I., Rubio, F.: Including malicious agents into a collaborative learning environment. In: Cerri, S.A., Gouardéres, G., Paraguaçu, F. (eds.) ITS 2002. LNCS, vol. 2363, pp. 51–60. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Liu, D., Wang, Z.: A united classification system of x-ray image based on fuzzy rule and neural networks. In: 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, vol. 1, pp. 717–722. IEEE Computer Society (2008)

    Google Scholar 

  10. Mery, D.: Applications in X-ray testing. In: Computer Vision for X-Ray Testing, pp. 267–325. Springer, Heidelberg (2015)

    Google Scholar 

  11. Mery, D.: Inspection of complex objects using multiple-X-ray views. IEEE/ASME Trans. Mechatron. 20(1), 338–347 (2015)

    Article  MathSciNet  Google Scholar 

  12. Merayo, M.G., Núñez, A.: Passive testing of communicating systems with timeouts. Inf. Softw. Technol. 64, 19–35 (2015)

    Article  Google Scholar 

  13. Murray, N.C., Riordan, K.: Evaluation of automatic explosive detection systems. In: 29th Annual International Carnahan Conference on Security Technology, pp. 175–179. Institute of Electrical and Electronics Engineers (1995)

    Google Scholar 

  14. Núñez, A., Filgueira, R., Merayo, M.G.: SANComSim: A scalable, adaptive and non-intrusive framework to optimize performance in computational science applications. In: 13th International Conference on Computational Science, ICCS 2013, Procedia Computer Science 18, pp. 230–239. Elsevier (2013)

    Google Scholar 

  15. Núñez, A., Merayo, M.G.: A formal framework to analyze cost and performance in Map-Reduce based applications. J. Comput. Sci. 5(2), 106–118 (2014)

    Article  Google Scholar 

  16. Nercessian, S., Panetta, K., Agaian, S.: Automatic detection of potential threat objects in x-ray luggage scan images. In: IEEE Conference on Technologies for Homeland Security, pp. 504–509. IEEE Computer Society (2008)

    Google Scholar 

  17. Núñez, A., Vázquez-Poletti, J.L., Caminero, A.C., Castañé, G.G., Carretero, J., Llorente, I.M.: iCanCloud: A flexible and scalable cloud infrastructure simulator. J. Grid Comput. 10(1), 185–209 (2012)

    Article  Google Scholar 

  18. Uroukov, I., Speller, R.: A preliminary approach to intelligent X-ray imaging for baggage inspection at airports. Signal Process. Res. 4, 1–11 (2015)

    Article  Google Scholar 

  19. Wells, K., Bradley, D.A.: A review of X-ray explosives detection techniques for checked baggage. Appl. Radiat. Isot. 70(8), 1729–1746 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pablo C. Cañizares .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cañizares, P.C., Merayo, M.G., Núñez, A. (2016). FARTHEST: FormAl distRibuTed scHema to dEtect Suspicious arTefacts. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, TP. (eds) Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science(), vol 9621. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49381-6_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49381-6_74

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49380-9

  • Online ISBN: 978-3-662-49381-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics