38th Annual 2004 International Carnahan Conference on Security Technology, 2004.最新文献

筛选
英文 中文
A typical noisy covert channel in the IP protocol IP协议中典型的噪声隐蔽信道
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405390
Haipeng Qu, Purui Su, D. Feng
{"title":"A typical noisy covert channel in the IP protocol","authors":"Haipeng Qu, Purui Su, D. Feng","doi":"10.1109/CCST.2004.1405390","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405390","url":null,"abstract":"Previous studies have exploited a number of noiseless covert channels in the IPv4 protocol by using some fields in the IP header including the identification, the header checksum and the padding fields. These channels can transmit covert information correctly between two Internet nodes, but will be eliminated after the adoption of the IPv6 protocol. To construct a covert channel which can survive in the IPv6 protocol, a noisy covert channel is designed by using the TTL field in the IPv4 header. The channel can be exploited in the IPv6 protocol because the TTL field will be substituted by the Hop Limit field with a similar function. Two methods are presented including one-bit-per-packet method and TTL partition method. The maximal attainable bandwidth of the channel is discussed and a formula is given to calculate the maximal attainable bandwidth. The maximal attainable bandwidth is inversely proportional to the expectation and variance of the distribution of the average hop number between two communication nodes. The correlation between the maximal attainable bandwidth and the selection of the code error rate is also analyzed. Some statistics data from real networks are collected to estimate the bandwidth of the channel in practice. The result shows that the covert channel is effective in most situations.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Face detection from a video camera image sequence 人脸检测从一个视频摄像机图像序列
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405411
V. Espinosa-Duro, M. Faúndez-Zanuy, J. A. Ortega
{"title":"Face detection from a video camera image sequence","authors":"V. Espinosa-Duro, M. Faúndez-Zanuy, J. A. Ortega","doi":"10.1109/CCST.2004.1405411","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405411","url":null,"abstract":"Face detection is a key problem in building automated systems that perform face recognition. In this sense, a very attractive approach for face detection based on motion detection is presented. Motivated by the simplicity of this approach, a rule-based face detection algorithm in frontal views is developed. The proposed algorithm has been applied to frontal views extracted from our own database that contains the video sequences of 30 different persons, (at this time) taken by a digital camera. The image is obtained, by the reflecting light of the human face, when illuminated with a weak light source.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Image compression techniques in the field of security technology: examples and discussion 图像压缩技术在安全技术领域:例子和讨论
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405405
M. Klima, K. Fliegel
{"title":"Image compression techniques in the field of security technology: examples and discussion","authors":"M. Klima, K. Fliegel","doi":"10.1109/CCST.2004.1405405","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405405","url":null,"abstract":"The image compression techniques are widely applied in the field of security technology (perimeter supervision, CCTV in facilities, faces, fingerprints, car plates etc.). The extensive and dramatically expanding use of image information requires increasing capacity of either transmission channels or retrieving devices. The image compression techniques offer a partial solution of this problem but there are some shortcomings to be avoided. During last years, we have tested and evaluated a set of different image compression techniques from the security point of view in a relation to a standard visual quality evaluation. The results have been part-by-part presented at several previous Carnahan conferences (Lucas and Kanade, 2001; Swain and Ballard,1991; Comanaciu, 2003). The paper presents summarized information about these results and based upon them a comprehensive discussion and conclusions are derived. Moreover some new results related to the VQ (vector quantization) and video coding are presented too.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116193576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Applying the psychoacoustic audio watermarking technique in Internet digital traditional music museum in Vietnam 心理声学音频水印技术在越南网络数字传统音乐博物馆中的应用
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405406
Tran Minh Triet, Duong Anh Due
{"title":"Applying the psychoacoustic audio watermarking technique in Internet digital traditional music museum in Vietnam","authors":"Tran Minh Triet, Duong Anh Due","doi":"10.1109/CCST.2004.1405406","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405406","url":null,"abstract":"In this paper we present the application of the psychoacoustic audio watermarking technique in our proposed Internet digital traditional music museum in Vietnam.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126794228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electrified security fences - towards a security standard 电气化安全围栏——迈向安全标准
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405386
S. Tarr, D. Condon
{"title":"Electrified security fences - towards a security standard","authors":"S. Tarr, D. Condon","doi":"10.1109/CCST.2004.1405386","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405386","url":null,"abstract":"The Police Scientific Development Branch (PSDB) is developing standards to enable the specification of Perimeter Intrusion Detection Systems (PIDS) for particular security levels. The objective is to encourage perimeter security solutions to be developed to an appropriate and consistent quality. Electrified security fencing, the topic of this paper, is one perimeter security solution to be addressed by this work. This paper aims to highlight and discuss factors of importance in maintaining a consistent level of security for electrified fence installations. It outlines areas (these are underlined in the following text) that need to be considered by a performance standard or code of practice. The paper studies the vulnerabilities of corners and other, weaker parts of a perimeter. It discusses the fence topping applications and penetration-related issues and finally raise operational issues which affect the security of a system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-field technology update 电场技术更新
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405370
K. Harman, J. Weese
{"title":"E-field technology update","authors":"K. Harman, J. Weese","doi":"10.1109/CCST.2004.1405370","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405370","url":null,"abstract":"Electric field (E-field) sensors were introduced by Stellar Incorporated in 1975 and approved for DOE use by Sandia in 1977. Since then there have been numerous product changes and adaptations to utilize this technology to address a wide range of applications. All such products and product variants rely on the basic concept of measuring changes in capacitance between a \"field\" wire and a \"sense\" wire due to the motion of an intruder in the electric field of the wires. In all cases the biggest challenge is to differentiate between changes due to intruders and those due to environmental effects. This has lead to a number of insulator designs to try to minimize the effects of rain, snow, fog, salt spray etc. and various transformer-based balancing schemes to minimize the effects of the environment of the ground plane beneath the array of wires. Recently Senstar-Stellar engineers have embarked upon a complete rework of this technology taking advantage of field programmable gate array (FPGA) devices with high speed sigma delta analog to digital converters to extract more information from the array of wires and thereby optimize the detection process. Several features of this next generation of E-field technology described in this paper include: the ability to discern between capacitive and resistive changes, simultaneous independent measurement of the capacitance between each field and sense wire (for 4 and 8 wire arrays), notch filters to remove 50 and 60 Hz power grid noise, digital signal processing (DSP) to minimize the environmental effects on the ground plane and to differentiate between intruders approaching the sensor and those penetrating between the wires. Along with these electronically generated features the next generation product has a new insulator and support hardware design to further reduce the environmental effects and insect issues. The paper concludes with a discussion of how this technology can be utilized to address the post 9/11 threat at high security sites. While all perimeter security sensors have for years been designed to detect and delay intruders more and more emphasis is now being placed on the delay function. The stacked 8-wire barrier produced by this new design can go as high as 18 feet (5.5 meters) which certainly creates a significant intruder delay if the intruder is to penetrate the sensor undetected.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"427 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122800799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Field tests of a buried cable sensor with intruder location 具有入侵者位置的埋地电缆传感器的现场测试
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405388
J. Cheal, S. O'Brien, M. Tutor
{"title":"Field tests of a buried cable sensor with intruder location","authors":"J. Cheal, S. O'Brien, M. Tutor","doi":"10.1109/CCST.2004.1405388","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405388","url":null,"abstract":"A new buried cable sensor developed at Southwest Microwave, Inc. has been added to the Intrepid family of outdoor perimeter intrusion sensors. The sensor with the trademarked name \"MICROTRACK\" is similar to the \"MICROPOINT\" fence sensor with precise detection location, sensitivity leveling and free format zoning. Intruder location is accomplished with low-power ultra wideband frequency stepped radar driving the sensor cables. Target range resolution also allows the use of sensitivity leveling for each individual range bin. This will compensate for differences in soil conductivity along the length of the cable and for metal objects, which may be located in the near field radiation. The design of the MICROTRACK sensor was presented at the 2002 Carnahan Conference in Atlantic City. It has been described as an FM-CW radar, however it differs from the generic form in that the frequency is stepped rather than continuously swept and phase code modulation is added to discriminate against interference. The wide bandwidth of the MICROTRACK sensor fills in the nulls typical of a single frequency radar and provides a more uniform field profile along the entire length of the sensor cables. This paper describes the testing that has been performed to characterize the system for different environmental conditions. Southwest Microwave, Inc. has procured an open field site of 31 acres of tlat desert land for testing the buried cable. Another site in Canada is used for testing with an additional set of weather and soil conditions. Detection patterns, proximity to stationary objects, and various environmental factors will be discussed. Extensive measurements of both electric and magnetic fields along the length and perpendicular to the sensor cables show a detailed map of the multiple frequency surface wave. When the cables are buried, the uniformity of the field is degraded slightly but no deep nulls are observed. Site testing has confirmed major benefits of the MICROTRACK sensor: uniform detection zone; elimination of deep nulls; precise target location and sensitivity leveling.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security technology decision tree tool 安全技术决策树工具
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405375
L. Peck, G. Trachier
{"title":"Security technology decision tree tool","authors":"L. Peck, G. Trachier","doi":"10.1109/CCST.2004.1405375","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405375","url":null,"abstract":"The U.S. Army Engineer Research and Development Center has developed a decision tree tool, to help users implement security measures based on intrusion detection and automated video surveillance technology. The security technology decision tree tool (STDTT) is a computer application that leads the user through specification of security objectives, identification of constraints attributable to noninterference with mission, and consideration of possible security scenarios, with guidance in equipment selection as the outcome. Even if contractors perform the actual security design and implementation, STDTT will prepare in-house personnel to effectively assess whether proposed security designs are compatible with local activity, with personnel resources for assessment, response, and maintenance, and with year-round weather and terrain conditions.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115523575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fusion of visual, thermal, and range as a solution to illumination and pose restrictions in face recognition 融合视觉,热,距离作为解决照明和姿态限制在人脸识别
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405413
B. Abidi, S. Huq, M. Abidi
{"title":"Fusion of visual, thermal, and range as a solution to illumination and pose restrictions in face recognition","authors":"B. Abidi, S. Huq, M. Abidi","doi":"10.1109/CCST.2004.1405413","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405413","url":null,"abstract":"This paper summarizes the various components of face recognition research conducted at the IRIS Lab. First, fusion of visual and thermal infrared (IR) images for robust face recognition is discussed. Two techniques are implemented: data fusion and decision fusion. With the knowledge that eyeglasses block the emission of thermal energy, an algorithm is designed to detect and replace eyeglasses with an eye template in thermal images. A commercial face recognition software (FaceIt/spl reg/) is used in the evaluation of the various fusion algorithms. Comparison results show that fusion-based face recognition outperforms individual visual or thermal face recognizers under illumination variations and facial expressions. Efforts in the 3D arena are also described. Results of high resolution stereo-based 3D reconstruction of faces are shown and analyzed, in a first approach, then in a second approach, a warping technique is applied to overlay color and thermal textures on 3D mannequin head models, obtained using a laser range scanner.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
3-dimensional video motion detection and assessment 三维视频运动检测与评估
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405408
C. L. Nelson
{"title":"3-dimensional video motion detection and assessment","authors":"C. L. Nelson","doi":"10.1109/CCST.2004.1405408","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405408","url":null,"abstract":"The 3-dimensional video motion detection system (3DVMD) is a stand-alone sensor system developed at Sandia National Laboratories. It operates on a single PC platform and uses multiple cameras to monitor activity in predefined, 3-dimensional volumes of space. Detected activity is displayed on the PC monitor as an overlay to real-time video imagery. The basic sensor can provide switch closures for an interface to an Alarm Communications and Display (AC&D) system. High-level detection information relating to the size, location, and direction of motion of moving objects can be provided for assessment purposes. Using this high-level information, 3DVMD can be used to monitor individual items as well as track people within the monitored area. It can be used for two-man rule verification, process control, and the detection of anomalies during evacuation procedures. The 3DVMD system can be set up as an interior or exterior sensor. There are several benefits to the 3DVMD technology. 3DVMD is a passive security sensor. It provides high-level information (e.g., location, size, direction of motion) that can be used as an assessment aid in CCTV video, where it is often difficult to even see an intruder. Its detection volume is user-definable and remains static until changed by the user. This reduces vulnerabilities introduced by the variable detection envelope of other sensors. It has a reduced nuisance alarm rate as compared to traditional 2-dimensional video motion detection sensors. The technology also has built-in redundancy. If a camera fails, the system can adjust to operate without that camera, down to a minimum of two cameras. 3DVMD also has a self-assessment capability. Because CCTV sensors are an integral component of the 3DVMD system, the failure or tampering of any CCTV sensor is immediately identified. 3DVMD technology is ready to be fielded either as a stand-alone security system or as an integrated security system that provides switch closures to an existing AC&D system. Minimal software development is required to customize the technology for specific applications. Sandia is currently in the technology transfer process for the baseline 3DVMD technology.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信