2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety最新文献

筛选
英文 中文
Face Recognition with Multiscale Data Fusion of Visible and Thermal Images 基于可见光和热图像多尺度数据融合的人脸识别
Sangwoo Moon, Seong G. Kong, Jang-Hee Yoo, Kyoil Chung
{"title":"Face Recognition with Multiscale Data Fusion of Visible and Thermal Images","authors":"Sangwoo Moon, Seong G. Kong, Jang-Hee Yoo, Kyoil Chung","doi":"10.1109/CIHSPS.2006.313295","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313295","url":null,"abstract":"This paper presents face recognition with activity level fusion of visible and thermal image using multiscale decomposition. Image fusion combines images with different features to obtain a single composite image with extended information for better recognition performance. The proposed fusion technique adoptively controls the fusion ratio between visible and thermal information with multiscale analysis. Experimental results demonstrate that the proposed method effectively overcomes the weaknesses of visible and thermal images. The performance of the fusion is evaluated by classification rate with support vector machines","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Personal identification and verification using multimodal biometric data 使用多模态生物特征数据的个人识别和验证
S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
{"title":"Personal identification and verification using multimodal biometric data","authors":"S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti","doi":"10.1109/CIHSPS.2006.313309","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313309","url":null,"abstract":"Several proposals have been formulated to combine cryptography and biometrics in order to secure data and to strengthen the personal authentication process, making the falsification of personal ID, like passports, more challenging. In this work we describe a system for personal identification and verification, based on the combination of multiple biometric readings and other user inputs. In such way authentication control can be performed and only allowed persons can access the resources which must be protected. The method consists of two main phases: enrollment and verification. In the first phase the data extracted from user inputs are processed by the proposed system and stored the in a innovative non-reversible form. In the second phase, the stored data are combined with the biometric readings and other user inputs in order to identify and verify the identity of the person. The system does not rely on network access or databases to perform the verification/authentication phase","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"R-34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Iris Recognition: Measuring Feature's Quality for the Feature Selection in Unconstrained Image Capture Environments 虹膜识别:用于无约束图像捕获环境下特征选择的特征质量测量
Hugo Proença, L. Alexandre
{"title":"Iris Recognition: Measuring Feature's Quality for the Feature Selection in Unconstrained Image Capture Environments","authors":"Hugo Proença, L. Alexandre","doi":"10.1109/CIHSPS.2006.313298","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313298","url":null,"abstract":"Iris recognition has been used for several purposes. However, current iris recognition systems are unable to deal with noisy data and substantially increase their error rates, specially the false rejections, in these conditions. Several proposals have been made to access image quality and to identify noisy regions in iris images. In this paper we propose a method that measures the quality of each feature of the biometric signature and takes account into this information to constraint the comparable features and obtain the similarity between iris signatures. Experiments led us to conclude that this method significantly decreases the error rates in the recognition of noisy iris images, resultant from capturing in less constrained environments","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117320931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Face Recognition across Poses Utilizing Feature Transformation 利用特征变换的跨姿态人脸识别
Hongzhou Zhang, Yongping Li, Lin Wang, Chengbo Wang
{"title":"Face Recognition across Poses Utilizing Feature Transformation","authors":"Hongzhou Zhang, Yongping Li, Lin Wang, Chengbo Wang","doi":"10.1109/CIHSPS.2006.313297","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313297","url":null,"abstract":"Face recognition is an advanced identification solution which can meet the crying needs in security areas. Pose effect is a big challenge for robust applications of this technology. We proposed a feature transformation approach to cope with the head rotation roughly within half profile view. Comparing with algorithms based on computer vision technology, the proposed feature transformation method is not dependent on heavy computation and easily to apply in live conditions. Popular feature extractions, least square (LS) and total least square (TLS) solution in calculating as well as some properties of transformation were explored on the FERET database","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Framework for Biometric-Based Access Control Systems 基于生物特征的访问控制系统语义框架
S. Yanushkevich, A. Stoica, V. Shmerko
{"title":"Semantic Framework for Biometric-Based Access Control Systems","authors":"S. Yanushkevich, A. Stoica, V. Shmerko","doi":"10.1109/CIHSPS.2006.313292","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313292","url":null,"abstract":"The variability of biometric data is one of the most significant sources of errors in the application of biometric devices. In some specific-area applications, the problem of errors and the minimization of wrong decisions caused by these errors, can be alleviated by using friendly interfaces between biometric devices, as well as decision making procedure. These interfaces are based on the semantic representation of biometric data. This paper aims to contribute to the genesis of biometric technologies using semantic interpretations of biometric data. It provides the preliminaries of the theoretical concept, including examples for practitioners. This concept has been developed during the design and prototyping of the biometric-based early warning component for the next-generation security access control system. The research work is being conducted in the Biometric Technologies Laboratory of the University of Calgary, and in the Humanoid Robotics Laboratory, at the NASA's Jet Propulsion Laboratory, California Institute of Technology","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proposal for a New Home Security System in terms of User-friendliness and Prompt Intrusion Notification 以方便使用者及即时通知入侵为目的的新家居保安系统建议
M. Fujikawa, H. Doi, S. Tsujii
{"title":"Proposal for a New Home Security System in terms of User-friendliness and Prompt Intrusion Notification","authors":"M. Fujikawa, H. Doi, S. Tsujii","doi":"10.1109/CIHSPS.2006.313308","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313308","url":null,"abstract":"With the present home security system, a timer is incorporated in a terminal installed in the home. The purpose is to allow the user time to change the alarm mode of the terminal from disarmed to armed and close the door when leaving the residence; conversely, the user needs time to open the door and change the alarm mode from armed to disarmed when returning to the residence. However, we think the timer is stressful for the user and represents a problem that, should an intruder gain entry, the situation cannot be reported immediately. Therefore, we propose a system to solve these problems. Since the proposed system is capable of recognizing the principal user through the use of an RFID tag, the terminal can appropriately change the alarm modes and quickly provide notification of an intruder. We will also confirm that the proposed system functions effectively through experiments, describe the effectiveness of the proposed system, and consider feasibility studies","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software Supported Pattern Development in Intelligence Analysis 智能分析中软件支持的模式开发
M. Wolverto, I. Harrison, J. Lowrance, A. Rodriguez, J. Thoméré
{"title":"Software Supported Pattern Development in Intelligence Analysis","authors":"M. Wolverto, I. Harrison, J. Lowrance, A. Rodriguez, J. Thoméré","doi":"10.1109/CIHSPS.2006.313291","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313291","url":null,"abstract":"Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Autonomous Rail Track Inspection using Vision Based System 基于视觉系统的自主轨道检测
M. Singh, S. Singh, J. Jaiswal, J. Hempshall
{"title":"Autonomous Rail Track Inspection using Vision Based System","authors":"M. Singh, S. Singh, J. Jaiswal, J. Hempshall","doi":"10.1109/CIHSPS.2006.313313","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313313","url":null,"abstract":"This paper proposes a rail track inspection technique using automated video analysis. This system is aimed to replace manual visual checks performed by the railway engineers for track inspection. We suggest a combination of image processing and analysis methods to achieve high performance automated rail track inspection. This paper addresses the problem of finding missing clips and finding blue clips which have been recently replaced in place of damaged clips. The experimental results show high performance in machine vision based inspection on a large sample of real train video","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Multi-Camera Face Recognition by Reliability-Based Selection 基于可靠性选择的多摄像头人脸识别
B. Xie, T. Boult, Visvanathan Ramesh, Ying Zhu
{"title":"Multi-Camera Face Recognition by Reliability-Based Selection","authors":"B. Xie, T. Boult, Visvanathan Ramesh, Ying Zhu","doi":"10.1109/CIHSPS.2006.313294","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313294","url":null,"abstract":"Automatic face recognition has a lot of application areas and current single-camera face recognition has severe limitations when the subject is not cooperative, or there are pose changes and different illumination conditions. A face recognition system using multiple cameras overcomes these limitations. In each channel, real-time component-based face detection detects the face with moderate pose and illumination changes employing fusion of individual component detectors for eyes and mouth, and the normalized face is recognized using an LDA recognizer. A reliability measure is trained using the features extracted from both face detection and recognition processes, to evaluate the inherent quality of channel recognition. The recognition from the most reliable channel is selected as the final recognition results. The recognition rate is far better than that of either single channel, and consistently better than common classifier fusion rules","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Autonomous Spherical Robot for Security Tasks 用于安全任务的自主球形机器人
M. Seeman, M. Broxvall, A. Saffiotti, P. Wide
{"title":"An Autonomous Spherical Robot for Security Tasks","authors":"M. Seeman, M. Broxvall, A. Saffiotti, P. Wide","doi":"10.1109/CIHSPS.2006.313312","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313312","url":null,"abstract":"The use of remotely operated robotic systems in security related applications is becoming increasingly popular However, the direct teleoperation interfaces commonly used today put a large amount of cognitive burden on the operators, thus seriously reducing the efficiency and reliability of these systems. We present an approach to alleviate this problem by exploiting both software and hardware autonomy. At the software level, we propose a variable autonomy control architecture that dynamically adapts the degree of autonomy of the robot in terms of control, perception, and interaction. At the hardware level, we rely on the intrinsic autonomy and robustness provided by the spherical morphology of our Ground-Bot robot. We also present a prototype system for facilitating the interaction between human operators and robots using our control architecture. This work is specifically aimed at increasing the effectiveness of the GroundBot robot for remote inspection tasks","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"10 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信