Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where W. Gareth J. Howells is active.

Publication


Featured researches published by W. Gareth J. Howells.


2008 Bio-inspired, Learning and Intelligent Systems for Security | 2008

Evaluating Biometric Encryption Key Generation Using Handwritten Signatures

Sanaul Hoque; Michael C. Fairhurst; W. Gareth J. Howells

In traditional cryptosystems, user authentication is based on the possession of secret keys/tokens. Such keys can be forgotten, lost, stolen, or may be illegally shared, but an ability to relate a cryptographic key to biometric data can enhance the trustworthiness of a system. In this paper, we demonstrate how biometric keys can be generated directly from live biometrics, under certain conditions, by partitioning feature space into subspaces and partitioning these into cells, where each cell subspace contributes to the overall key generated. We evaluate the proposed scheme on real biometric data, representing both genuine samples and attempted imitations. Experimental results then demonstrate the extent to which the proposed technique can be implemented reliably in possible practical scenarios.


Software and Systems Modeling | 2007

Implementing associations: UML 2.0 to Java 5

David H. Akehurst; W. Gareth J. Howells; Klaus D. McDonald-Maier

A significant current software engineering problem is the conceptual mismatch between the abstract concept of an association as found in modelling languages such as UML and the lower level expressive facilities available in object-oriented languages such as Java. This paper introduces some code generation patterns that aid the production of Java based implementations from UML models. The work is motivated by a project to construct model driven development tools in support of the construction of embedded systems. This involves the specification and implementation of a number of meta-models (or models of languages). Many current UML oriented tools provide code generation facilities, in particular the generation of object-oriented code from class diagrams. However, many of the more complex aspects of class diagrams, such as qualified associations are not supported. In addition, several concepts introduced in UML version 2.0 are also not supported.The aim of the work presented in this paper is to develop a number of code generation patterns that allow us to support the automatic generation of Java code from UML class diagrams that support these new and complex association concepts. These patterns significantly improve the code generation abilities of UML tools, providing a useful automation facility that bridges the gap between the concept of an association and lower level object-oriented programming languages.


adaptive hardware and systems | 2009

Integrating Feature Values for Key Generation in an ICmetric System

Evangelos Papoutsis; W. Gareth J. Howells; Andrew B. T. Hopkins; Klaus D. McDonald-Maier

This paper investigates the practicalities of combining values derived from measurable features of given integrated electronic circuits in order to derive a robust encryption key, a technique termed ICmetrics. Specifically the paper explores options for the precise techniques required to combine the derived feature values in order to ensure key stability. Key stability is an essential component of any encryption system but this must be combined with a guarantee of key diversity between devices.


Electronic Communication of The European Association of Software Science and Technology | 2008

OCL: Modularising the Language.

David H. Akehurst; Steffen Zschaler; W. Gareth J. Howells

ion / Binding


IEEE Transactions on Information Forensics and Security | 2015

A Method for Detecting Abnormal Program Behavior on Embedded Devices

Xiaojun Zhai; Kofi Appiah; Shoaib Ehsan; W. Gareth J. Howells; Huosheng Hu; Dongbing Gu; Klaus D. McDonald-Maier

A potential threat to embedded systems is the execution of unknown or malicious software capable of triggering harmful system behavior, aimed at theft of sensitive data or causing damage to the system. Commercial off-the-shelf embedded devices, such as embedded medical equipment, are more vulnerable as these type of products cannot be amended conventionally or have limited resources to implement protection mechanisms. In this paper, we present a self-organizing map (SOM)-based approach to enhance embedded system security by detecting abnormal program behavior. The proposed method extracts features derived from processors program counter and cycles per instruction, and then utilises the features to identify abnormal behavior using the SOM. Results achieved in our experiment show that the proposed method can identify unknown program behaviors not included in the training set with over 98.4% accuracy.


Information Management & Computer Security | 2012

Reliable and secure encryption key generation from fingerprints

Weiguo Sheng; W. Gareth J. Howells; Michael C. Fairhurst; Farzin Deravi; Shengyong Chen

Purpose – Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys.Design/methodology/approach – This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.Findings – The evaluation demonstrates that the propo...


2008 Bio-inspired, Learning and Intelligent Systems for Security | 2008

Fuzzy Vault Fingerprint Smartcard Implementation Using an Orientation-Based Feature Vector

Karl Harmer; Weiguo Sheng; W. Gareth J. Howells; Michael C. Fairhurst; Farzin Deravi

With the increasing employment of biometric authentication systems worldwide, there has been significant concern over the security of stored biometric templates. In this paper, a solution to this problem employing a fuzzy vault fingerprint smartcard implementation, unlocked via an orientation-based feature vector, is presented. The fuzzy vault contains an unknown key which can be used either for identification or for file encryption/decryption.


2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007) | 2007

MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System

W. Gareth J. Howells; Klaus D. McDonald-Maier; T. Binzegger; M. P. Young

Constructive type theory (CTT) is both a formal logic and a programming language which contains inherent benefits both in terms of formality and program correctness and in the potential for efficient concurrent execution. In contrast, the mammalian visual cortex represents a naturally occurring visual processing system capable of the rapid concurrent evaluation of complex data domains. The efficient exploitation of a merger between these two systems would represent major advantages in such diverse fields as machine reading, automated guidance, navigation and, significantly, biometrically based security identification systems. The current paper explores the possibilities of achieving such a merger and the technological challenges and opportunities it would represent in constructing a practical remote biometric based identification system.


ieee/sice international symposium on system integration | 2016

Embedded hardware for closing the gap between research and industry in the assistive powered wheelchair market

V. Canoz; Michael Gillham; Paul Oprea; P. Chaumont; A. Bodin; P. Laux; M. Lebigre; W. Gareth J. Howells; Konstantinos Sirlantzis

Literature is abound with smart wheelchair platforms of various developments, yet to date there has been little technology to find its way to the market place. Many trials and much research has taken place over the last few decades however the end user has benefited precious little. There exists two fundamental difficulties when developing a smart powered wheelchair assistive system, the first is need for the system to be fully compatible with all of the manufacturers, and the second is to produce a technology and business model which is marketable and therefore desirable to the manufacturers. However this requires the researchers to have access to hardware which can be used to develop practical systems which will seamlessly integrate and communicate with existing manufacturers wheelchair systems. We have developed a low-cost embedded system which integrates with 95% of the powered wheelchair controller market; our system allows researchers to access the low level embedded system with more powerful computational devices running sophisticated software enabling rapid development of algorithms and techniques. When they have been evaluated they can be easily ported to the embedded processor for real-time evaluation and clinical trial.


european conference on model driven architecture foundations and applications | 2008

Array OL Descriptions of Repetitive Structures in VHDL

Stephen K. Wood; David H. Akehurst; W. Gareth J. Howells; Klaus D. McDonald-Maier

With the continuing advances in semiconductor technology driving the rise in complexity of electronic embedded systems, there is a demand for the development of high level modelling environments for computer-aided design. The modelling of highly repetitive structures in graphical form poses a particular challenge if a hierarchical approach is not adopted. This paper proposes a mechanism for describing such component structures in a compact form based upon extensions of the Array Oriented Language (Array-OL). An example is given as to how the structure described is subsequently mapped into VHDL code.

Collaboration


Dive into the W. Gareth J. Howells's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Behzad Bordbar

University of Birmingham

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge