Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
The CLICK (CSIRO Laboratory for Imaging by Content and Knowledge) Security Demonstrator CLICK (CSIRO内容与知识成像实验室)安全演示
D. Rees, G. Poulton, C. Jacka
{"title":"The CLICK (CSIRO Laboratory for Imaging by Content and Knowledge) Security Demonstrator","authors":"D. Rees, G. Poulton, C. Jacka","doi":"10.1109/CCST.1997.626550","DOIUrl":"https://doi.org/10.1109/CCST.1997.626550","url":null,"abstract":"CSIRO Telecommunications and Industrial Physics is developing digital image processing tools using object oriented technology on a PC platform, with an emphasis on the study of image content and the application of domain knowledge. This paper summarises progress made in the following areas: (a) image database browsing, (b) real-time face recognition and verification, and (c) still image and video compression. The focus of the paper is on security applications of these technologies which have been integrated into the CLICK (CSIRO Laboratory for Imaging by Content and Knowledge) Security Demonstrator.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131987906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Overview of authentication protocols 认证协议概述
M. Vandenwauver, R. Govaerts, J. Vandewalle
{"title":"Overview of authentication protocols","authors":"M. Vandenwauver, R. Govaerts, J. Vandewalle","doi":"10.1109/CCST.1997.626248","DOIUrl":"https://doi.org/10.1109/CCST.1997.626248","url":null,"abstract":"In recent years, many organizations have shifted their computing facilities from central mainframes (accessed from simple terminals via serial lines) to servers accessed from personal computers via a local area network (LAN). The switch to LANs removed some old problems and introduced some new problems. Although many of the new problems are not particularly to do with security, this paper only considers security problems.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An integrated solution for effective video alarm verification 有效的视频报警验证集成解决方案
A.L. Davis
{"title":"An integrated solution for effective video alarm verification","authors":"A.L. Davis","doi":"10.1109/CCST.1997.626260","DOIUrl":"https://doi.org/10.1109/CCST.1997.626260","url":null,"abstract":"The growing application of video to the remote verification of alarms has highlighted a number of deficiencies in adding video transmission products to conventional alarm systems. The ideal result would be no false alarms and accurate verification of each real alarm. However many installed systems offer no improvement in the false alarm rate and pose a substantial risk of the incorrect classification of real alarms. An alarm panel with fully integrated local and remote video functions is described. It combines both the alarm generation and verification processes in order to improve the false alarm rates and the accuracy of verification. A unique BiSensor is a key to the systems success. Data fusion concepts are applied to passive infra red and video movement sensors to ensure a low false alarm rate and to provide reliable images of the alarm cause. The BiSensor also incorporates a strobed infra red illuminator to provide for correct detection and verification under all lighting conditions. Particular attention has been paid to obtaining even scene illumination for high quality verification images. By incorporating the illuminator in the sensor it has also been possible to automatically control the infra red output to suit a wide variety of installations. In addition to the remote video-functions, the system provides for site control and full duplex audio communications. Local site management is catered for with a comprehensively featured alarm panel while a full duplex video multiplexer provides continuous recording of all site activity. The multiplexer uses direct to tape recording for the highest possible picture quality and each image is time stamped to match the images sent off site. One of the key requirements of the product has been to ensure that the verification system fits well with existing central monitoring station facilities. The receiver has been designed to support both stand-alone operation or full scale integration into the conventional alarm monitoring environment.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124222177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic car registration plate recognition using fast Hough transform 基于快速霍夫变换的汽车车牌自动识别
S. Gendy, C. Smith, S. Lachowicz
{"title":"Automatic car registration plate recognition using fast Hough transform","authors":"S. Gendy, C. Smith, S. Lachowicz","doi":"10.1109/CCST.1997.626271","DOIUrl":"https://doi.org/10.1109/CCST.1997.626271","url":null,"abstract":"The development of automatic car registration plate recognition will provide greater efficiency for vehicle monitoring in automatic zone access control. Plate recognition will avoid the need to equip vehicles with special RF tags, since all vehicles possess a unique registration number plate. Also the proposed recognition system can be used in conjunction with a tag system for higher security. There are a number of techniques which have been used for car registration plate characters recognition. These systems include BAM (Bi-directional Associative Memories) neural network character recognition and pattern matching of characters as two character recognition techniques which will be discussed in this paper. The object of this paper is to explore the potential of using Fast Hough Transform (FHT) in vehicle registration plate recognition. Image processing techniques have been used to extract plate characters, then FHT algorithm is applied to every character in the image for recognition and identification. The FHT used in the paper is an efficient, fast and simple algorithm to identify characters, without requiring a relatively large memory.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128825550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Personnel identification system utilizing low probability-of-intercept techniques: prototype development and testing 利用低拦截概率技术的人员识别系统:原型开发和测试
M. C. Zari, A.F. Zwilling, J. W. Fikes, D. Hess, R. N. Ward, C. Anderson, D. Chiang
{"title":"Personnel identification system utilizing low probability-of-intercept techniques: prototype development and testing","authors":"M. C. Zari, A.F. Zwilling, J. W. Fikes, D. Hess, R. N. Ward, C. Anderson, D. Chiang","doi":"10.1109/CCST.1997.626274","DOIUrl":"https://doi.org/10.1109/CCST.1997.626274","url":null,"abstract":"This paper documents the design and testing of a prototype laser/radio frequency (RF) Personnel Identification (ID) System developed by Dynetics, Inc., Harris, Corp., and the U.S. Army Communications and Electronics Command (CECOM). The system consists of an interrogation Unit, a Responder Unit, and a Programming Unit. The Interrogation Unit consists of a directive, eyesafe laser and a spread-spectrum RF transceiver. This allows for a low probability of intercept (LPI) interrogation, which is of interest during covert operations. A responder unit is worn, for example, by a soldier, and transmits an LPI spread-spectrum RF response, only after receiving the proper interrogation codes. The operating principles for the subsystem are reviewed, and key design issues are presented. In addition, both breadboard and prototype test results are presented.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126385565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Outdoor security systems technologies for the year 2000 and beyond 2000年及以后的户外安全系统技术
R. Clifton
{"title":"Outdoor security systems technologies for the year 2000 and beyond","authors":"R. Clifton","doi":"10.1109/CCST.1997.626233","DOIUrl":"https://doi.org/10.1109/CCST.1997.626233","url":null,"abstract":"The field of outdoor security systems has undergone considerable change since it first emerged as an identifiable discipline over two decades ago and it is currently on the brink of further significant change. This paper provides a unique industry perspective on upcoming changes, the major trends that are driving these changes and the likely impact on technology developments needed. Modern outdoor security systems had their genesis in military and other special government applications. At first, this was primarily for cost reasons as only high end users could afford the technologies capable of working reliably in the harsh outdoor environment. However there were other reasons as well. Developing these new technologies was a formidable challenge that not only required government resources, but also the development of comprehensive installation and test and evaluation procedures. This initial government investment resulted in an industry that focused on this specialized niche but which has subsequently opened other applications including VIP residential, commercial/industrial, airports and correctional facilities. To achieve this, costs have come down significantly, the experience from the military and governmental applications have migrated to the commercial sector and the industry has started to invest in its own Research and Development (R&D).","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A virtual tower 虚拟塔
R. A. Wayne
{"title":"A virtual tower","authors":"R. A. Wayne","doi":"10.1109/CCST.1997.626246","DOIUrl":"https://doi.org/10.1109/CCST.1997.626246","url":null,"abstract":"The Virtual Tower is an operator interface assembled from low-cost commercial-off-the-shelf hardware and software; it enables large amounts of data to be displayed in a virtual manner that provides instant recognition for the operator and increases assessment accuracy in alarm annunciator and control systems. This is accomplished by correlating and fusing the data into a 360-degree visual representation that employs color, auxiliary attributes, video, and directional audio to prompt the operator. The Virtual Tower would be a valuable low-cost enhancement to existing systems.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Technical access control systems. Turning policy into practice 技术访问控制系统。将政策付诸实践
N. Custance
{"title":"Technical access control systems. Turning policy into practice","authors":"N. Custance","doi":"10.1109/CCST.1997.626239","DOIUrl":"https://doi.org/10.1109/CCST.1997.626239","url":null,"abstract":"The paper discusses how the outline requirements for a Technical Access Control System produced by the MOD with assistance from the author were first analysed and a more detailed operational requirements produced. The operational requirements spans the strategic interests of the main sponsor. i.e. the Armed Forces as well as those of other Government Departments. The paper describes the technical specifications which included the need for image capture storage and recall of visitors and contractors. It looks at the recognition of car number plates and their alignment with 'approved' visitors. The role of such systems as part of an entry/access control system is also discussed.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fireball: a forensic ballistics imaging system 火球:法医弹道成像系统
Clifton L. Smith
{"title":"Fireball: a forensic ballistics imaging system","authors":"Clifton L. Smith","doi":"10.1109/CCST.1997.626240","DOIUrl":"https://doi.org/10.1109/CCST.1997.626240","url":null,"abstract":"Characteristic markings on the cartridge and projectile of a bullet are produced when a gun is fired. Over thirty different features within these markings can be distinguished, which in combination produce a \"fingerprint\" for identification of a firearm. This paper will describe an investigation into the development of an imaging system for Police Services which can store, analyse, retrieve, and match high resolution digital images of cartridge cases. A computerised imaging system for ballistics identification will produce efficiencies in time and personnel, and permit a more precise audit of firearms within a country. The project has produced good quality high resolution digitised images of cartridge cases for the identification function. The development of the optical system to optimise image quality has been crucial for the image identification phase. By classifying cartridge image attributes, it is possible to store the unique \"signatures\" of cartridge cases for identification. Appropriate image processing provides the signatures for the image library. The Fireball forensic ballistics interactive database incorporates a Graphics User Interface (GUI) to obtain precise ballistics metrics of cartridge case class characteristics. Features of the Fireball forensic ballistics database will be presented, together with a description of the major applications of this ballistics imaging system.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116288196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
The use of closed circuit television to support the police at a political conference 在政治会议上使用闭路电视支持警察
R. McKee Rodger, G. Ball
{"title":"The use of closed circuit television to support the police at a political conference","authors":"R. McKee Rodger, G. Ball","doi":"10.1109/CCST.1997.626245","DOIUrl":"https://doi.org/10.1109/CCST.1997.626245","url":null,"abstract":"The planning, implementation and use of closed circuit television (CCTV) to reduce crime in town centres and shopping malls are well documented. The deployment and use of covert television systems by law enforcement agencies has also been successful. Where commercial CCTV systems, installed for one purpose, are used by the police to support the security at a political conference the following requires careful planning and execution: the operation of the equipment; the requirements of the operation command; and the training of the operators. The Dorset Police, a UK provincial force, have learnt many lessons from their past experiences of securing political conferences. Those experiences strongly influenced the way in which they used CCTV for the political conference held in October 1996 in a town in their force area. This paper will share some of the lessons and methods that ensured that the best performance was obtained from the commercially available CCTV systems.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132900393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信