{"title":"The law and video","authors":"T. Ainsworth","doi":"10.1109/CCST.1997.626247","DOIUrl":"https://doi.org/10.1109/CCST.1997.626247","url":null,"abstract":"The purpose of this paper is not to supply a barrage of technical specifications or industry jargon. Its purpose is to clarify the issues surrounding \"Reasonable Doubt\" when video evidence is produced. Reasonable Doubt with reference to the systems currently used, and reasonable doubt as to the admissibility of the video evidence acquired. Psychologists tell us that a perpetrator of crime requires a perceived privacy within which to commit the crime. Close and Open circuit television removes this privacy, thus preventing the crime.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121937372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The security mechanism in the World Wide Web (WWW) and the Common Gateway Interface (CGI). Example of Central Police University entrance examination system","authors":"C. Kou, F. Springsteel","doi":"10.1109/CCST.1997.626249","DOIUrl":"https://doi.org/10.1109/CCST.1997.626249","url":null,"abstract":"Information is widely spread on the Internet. The World Wide Web (WWW) is currently exploding and developing into many applications around the world. The WWW provides interactive texts, images, sounds, and motion pictures by communication via computer network. It makes integration of databases to produce a more fancy and more friendly network media. As we know, most of the business applications focus on the Internet transmission. The customer may order the product directly on the Internet. In this research, we offer the Common Gateway Interface (CGI) mechanism to combine WWW with conventional databases to provide a good user interface. We discuss not only the theories of WWW with CGI mechanisms, but offer server security issues and the efficiency of program execution. We also illustrate our Central Police University Entrance Examination System as an example.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANDing alarm systems","authors":"S. Peaty","doi":"10.1109/CCST.1997.626259","DOIUrl":"https://doi.org/10.1109/CCST.1997.626259","url":null,"abstract":"Summary form only given. This paper discusses a means by which perimeter alarm systems can be combined to reduce the Nuisance Alarm Rate or False Alarm Rate (FAR) without compromising the Detection Rate (DR). Alarm systems operate on different principles and so have different strengths and weaknesses. Here we report work the Police Scientific Development Branch (PSDB) has conducted on combining complementary systems to reduce the FAR that would result from using either system on its own. We have ANDed a Video Motion Detection (VMD) System and a fence mounted microphonic Perimeter Intrusion Detection System. If each simultaneously goes into alarm, an operator is alerted. ANDing is not a new concept and has been used before, but not as far as we know to combine a Video Motion Detector (VMD) with a Fence Mounted System (FMS) at a real problem site. This paper reports and discusses the results from several operational trials of this combination of detectors. It gives a view on the practical value of ANDing such systems.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116667880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active fence structures and toppings","authors":"I. Wassell","doi":"10.1109/CCST.1997.626236","DOIUrl":"https://doi.org/10.1109/CCST.1997.626236","url":null,"abstract":"Fences have traditionally been of rigid and stable structure. The resulting rigidity gives Perimeter Intrusion Detection Systems (PIDS) a stable background energy to work against. Such a structure can be used for mounting enhancements designed to impede escapes or intrusions. There are, however, advantages in making a fence less rigid. A fence that in some way reacts to an attack (an active fence) absorbs a proportion of the energy from an impact from an imparted blow, making it more difficult to penetrate. A swaying fence should also be more difficult to climb. PSDB has tested a range of active fences in non-rigid or 'floppy' form ranging from those made of glass reinforced plastic (GRP) tubes to composite fences made of chain link and mesh. These have been tested for cutting, climbing and impact attacks. Collapsing toppings have been made using shear brackets and floppy toppings made using rubber mountings. More recently, PSDB has experimented with a variety of springy toppings using the natural spring in coils of barbed wire and the inherent spring in steel bars. These have been designed with substantial overhangs to impede climbing. This paper reports the findings of tests on both floppy fences and on toppings and discusses the merits and drawbacks of this type of approach. It suggests directions in which active fence technology may be moving.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chi-Shi Liu, D. H. Liu, So-Lin Yen, Jung-Hsiang Liao, Chun-Hsi Shih, Bor-Shenn Jeng
{"title":"Some study results of speaker verification from Chung-Hwa TL and MJIB of ROC","authors":"Chi-Shi Liu, D. H. Liu, So-Lin Yen, Jung-Hsiang Liao, Chun-Hsi Shih, Bor-Shenn Jeng","doi":"10.1109/CCST.1997.626237","DOIUrl":"https://doi.org/10.1109/CCST.1997.626237","url":null,"abstract":"In this paper, we will present some study results from the cooperation of these two units and propose several useful methods to improve the performance of speaker verification. These methods are the discriminative training algorithm, the scoring function and the acoustic segment based probabilistic model. A 100-speaker digit database collected through the public switching telephone network is used for a series of experiments. Besides mentioning the advantages of each proposed method, a series of experiments and analytic steps are also given.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint transform correlation in security applications","authors":"M. Klima, J. Rott, T. Naughton, J. Keating","doi":"10.1109/CCST.1997.626242","DOIUrl":"https://doi.org/10.1109/CCST.1997.626242","url":null,"abstract":"The Joint Transform Correlation (JTC) technique is the one of the most frequently applied methods in the field of optical classification and identification systems. Nowadays there are a lot of different modifications that have been tested and verified. Because of extremely high computational throughput the JTC has been implemented in many special purpose (security) applications. This paper deals with an implementation of the JTC for two basic classes of objects-fingerprints and faces. In the first part the sensitivity to rotation and zooming is studied. Consequently in the second part two types of thresholding in the spectral domain are tested in order to improve performance of the system. All procedures are simulated on a computer first and then the real optical FT setup is employed. The results are compared and discussed.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115210199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concepts and applications of wireless security systems for tactical, portable, and fixed sites","authors":"J. Harrington, D. Pritchard","doi":"10.1109/CCST.1997.626256","DOIUrl":"https://doi.org/10.1109/CCST.1997.626256","url":null,"abstract":"Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented herein along with details of its development. These techniques and lessons learned can be applied, in many cases, to other radio-based security systems. Realizing certain limitations, wireless communications can be utilized in a wide variety of security applications.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114454898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure official document mail systems for office automation","authors":"Chung-Huang Yang, So-Lin Yen, Hwang David Liu, K. Liu, Bor-Shenn Jeng, Kung-Yao Chan, Min-Shin Chang, Yu-Ling Cheng, Jo-Ling Liang, Don-Min Shien","doi":"10.1109/CCST.1997.626262","DOIUrl":"https://doi.org/10.1109/CCST.1997.626262","url":null,"abstract":"Electronic mail or email system is by far one of the most widely used applications in the office automation systems. However, due to the lack of communication security services and the impose of export controls, sensitive official document of government organizations could not be transited securely over open networks using off-the-shell email systems. In this paper, we present the result of a joint effort between the Chunghwa Telecom and the Ministry of Justice Investigation Bureau of Taiwan to integrate security services into existing official document mail systems.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130511814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Obstacle avoidance of autonomous mobile robots","authors":"C. Wu","doi":"10.1109/CCST.1997.626261","DOIUrl":"https://doi.org/10.1109/CCST.1997.626261","url":null,"abstract":"Robots have been widely used in industry to replace human being for repeated and dangerous works. Typically, the robot is used to pick and place workpieces or to transport material in a way of unmanned vehicle. This gives rise to the issue of obstacle avoidance. There are model-based and sensor-based methods for this purpose. In a model-based system, one uses artificial intelligence search algorithms to find free path in the working environment. In a sensor-based system, the sensed data is recorded in a grid map. Obstacles are represented by cells in the map. The value in the cell determines whether there exists an obstacle or not. We use the ultrasonic sensors to detect obstacles. The sensors are installed every thirty degrees at the center of robot. The surrounding information can be obtained at once. However, the poor range capability of the sensor and the shape of the obstacle may influence the performance of obstacle avoidance, we also use two CCD cameras to identify and locate target, obstacles. The pattern recognition is essentially done by the calculation. Of the first and second moment of the image. The obstacle is located by the comparison of the above calculations from two cameras. The detailed methods and experimental results will be presented with video tape.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Today's thermal imaging systems: background and applications for civilian law enforcement and military force protection","authors":"T.L. Bisbee, D. Pritchard","doi":"10.1109/CCST.1997.626270","DOIUrl":"https://doi.org/10.1109/CCST.1997.626270","url":null,"abstract":"Thermal (infrared) imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, or commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. In the past, thermal imagers required cryogenic cooling to operate. The high cost and maintenance requirements restricted their use. However, recent developments in reliable, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced the maintenance requirements and are leading to reduced system cost. These technology developments are resulting in greater accessibility and practicality for military as well as civilian security and force protection applications, This paper discusses recent advances in thermal imaging technology including uncooled and cryocooled. Applications of Forward Looking InfraRed (FLIR) systems are also discussed, including integration with a high-speed pan/tilt mount and remote control, video frame storage and recall, low-cost vehicle-mounted systems, and hand-held devices. Other facility installation topics are discussed, such as site layout, assessment ranges, imager positioning, fields-of-view, sensor and alarm reporting systems, and communications links.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121455179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}