{"title":"A method for evaluating video motion detection","authors":"H. Devereux, N. Custance","doi":"10.1109/CCST.1995.524742","DOIUrl":"https://doi.org/10.1109/CCST.1995.524742","url":null,"abstract":"Over the last three years there has been an expansion of equipment offered on the market with the capability of providing video motion detection or intelligent scene monitoring. There is currently no easy way to compare this type of equipment due to the many variables in the scenes and the differing algorithms and approaches used in equipment. The Security Equipment Assessment Laboratory has put together a methodology for the testing of video processing equipment. This technique utilises real imagery and provides a basic grounding for comparison. The problems presented by a large library of video sequences on tape are the time taken to run tests, and the relative degradation with time of the video signal from the tape. In particular the degradation in frame stability. The paper proposes formats for attack trials, the recording and playback process control and the logging equipment required. These images are then available for quick evaluation of other video processing systems for particular scenarios. This paper breaks down the key scenarios, and the basis for the selection of video sequences. It also presents the statistical selection process used to identify the more useful image sequences for transfer to optical media. The terms \"probability of detection\" and \"false alarm rate,\" can be misleading in the context of video processing systems where different scenarios and attack methods are used. This paper outlines an alternative method for comparing systems based on the content of the scenarios, allowing a prediction of the detection ability of the system and the likely false alarm rate in any situation.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124874508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An object-oriented expert system to reconstruct homicide scene","authors":"C. Kou, C. Tung, Chi-Ho Lin","doi":"10.1109/CCST.1995.524923","DOIUrl":"https://doi.org/10.1109/CCST.1995.524923","url":null,"abstract":"We propose an object-oriented (O-O) method in an expert system (ES) to collect all the evidence in crime scene, to analyze them, and to support decisions for investigators to reconstruct crime scene. In this study, we focus on homicide scene reconstruction. Our previous research proposed Mark theory and non-Mark Theory evidences in crime scene. The former one is related to physical evidences in crime scene which belongs to static knowledge (post-criminal behavior: post-CB), the latter one is contributed to the analysis of pre-criminal behavior (pre-CB) and In-CB which fit the characteristics of dynamic knowledge. ES fits the characteristics of static knowledge, neural network (NW) approaches for the dynamic knowledge. In this research, we include O-O technology for building knowledge system for the investigator by using Level-5 ES shell. It is efficient for policemen to investigate the crime, instead of not jumping into a great bunch of evidences without any indication.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of systems and services in central monitoring stations (CMS)","authors":"Ulrich Urfer","doi":"10.1109/CCST.1995.524934","DOIUrl":"https://doi.org/10.1109/CCST.1995.524934","url":null,"abstract":"Since time immemorial the protection of life and property has been an important part of our world. For thousands of years the job of keeping watch over valuable objects was carried out by specially trained people or animals. Today, with the advent of many new kinds of technologies, sophisticated systems are being increasingly used. Basically, little has changed and the procedure remains virtually the same. Someone notices that something is wrong, has to make a decision and then initiate and supervise the appropriate response. This paper presents a solution as to how a central monitoring station can handle incoming information from widely disparate telecommunications systems in a standardized way and how the intervention services (police, fire brigades, private services) can be integrated in the process of false alarm reduction. Information exchange with different partners in the security chain can be improved by using technologies such as remote terminals, interactive voice response systems (IVR) or fax on demand.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developments in and applications of fibre optic intrusion detection sensors","authors":"B. Griffiths","doi":"10.1109/CCST.1995.524931","DOIUrl":"https://doi.org/10.1109/CCST.1995.524931","url":null,"abstract":"For many years optical fibre was the answer looking for the question. Now, after years of product applications and continued development, a range of fibre optic sensors are used in intrusion detection where the natural benefits of the material are matched by parallel developments in support technologies and applications experience. This paper describes some developments and applications in sensors and systems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test methods and test equipment for thermal imagers","authors":"T. Williams","doi":"10.1109/CCST.1995.524740","DOIUrl":"https://doi.org/10.1109/CCST.1995.524740","url":null,"abstract":"Some of the test parameters which can be used for assessing the performance of thermal imagers which are used for surveillance purposes, are discussed. Techniques which can be used for measuring these parameters, both in the laboratory and in the field, are described.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure electronic voting protocol with IC cards","authors":"J. Jan, Chih-Chang Tai","doi":"10.1109/CCST.1995.524922","DOIUrl":"https://doi.org/10.1109/CCST.1995.524922","url":null,"abstract":"Computer networks have become more and more popular and important in our recent life. People can use the network system to do a variety of activities. Thus, we can expect that in the near future we will cast a ballot by using computer networks. In this paper, we propose a new electronic voting protocol with IC cards. Our scheme is so secure that it can meet all the security requirements. In our protocol, only legitimate voter can cast a valid ballot and only once. No one but the voter knows which voting strategy the voter adopts. Each voter can check whether or not his ballot has been counted correctly by the voting center. If any voter finds out that their ballot is miscounted, he can identify and recorrect this miscounting. Finally, no one can cheat or disrupt the entire election in our protocol.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical access to computers: can your computer be trusted?","authors":"W. Fabian","doi":"10.1109/CCST.1995.524920","DOIUrl":"https://doi.org/10.1109/CCST.1995.524920","url":null,"abstract":"The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130007144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AMETHYST: an enhanced detection system intelligently combining video detection and non-video detection systems","authors":"M. Horner","doi":"10.1109/CCST.1995.524734","DOIUrl":"https://doi.org/10.1109/CCST.1995.524734","url":null,"abstract":"The aim of the AMETHYST project (AutoMatic Event auTHentication SYSTems) is to encourage the development of a high performance perimeter intrusion detection system by combining Intelligent Scene Monitoring (ISM) or Video Motion Detection (VMD) technology with another detection system. The two systems would complement each other to produce a detection system with a high probability of detection and low false alarm rate. The performance of Perimeter Intrusion Detection Systems (PIDS) is often poor at sites with long perimeters, with extreme weather conditions and requiring a high probability of detection. Video based detection systems (ISM and VMD) are improving in sophistication and performance. Despite this there are still limitations with video based defection. Firstly, it may be several years before the video PIDS achieve the performance required for long perimeters. Secondly, when there is no video, for example in fog, there is no detection. There is potential for combining video detection with another sensor to reduce the disadvantages of video whilst retaining its advantages. A non-video SIDS would be used to detect intrusions. On alarm a sequence of CCTV images would be captured by a loop framestore system. A Targeted Automatic Verification Aid (TAVA) would then be used to decide if there was suspicious activity in the alarm sequence. Many false alarms have no visible cause, so a TAVA would filter these out. The false alarm rate would be lower than with a normal VMD as a TAVA would need to assess only alarm sequences. If there is no video or it is too foggy the TAVA would 'fail safe' by signalling the alarm from the non-video PIDS. A TAVA could use more sophisticated processing than a VMD and still be cheaper, because it could target the processing. PSDB is planning to collect alarm sequences from sites with a non-video PIDS and a loop framestore connected to the CCTV system. These sequences will be used to prove the concept and evaluate the performance of a TAVA.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attenuation of half-tone background detail from fingermark images using digital image processing techniques","authors":"P.M. Fabrizi, S. Bramble, G. Jackson","doi":"10.1109/CCST.1995.524745","DOIUrl":"https://doi.org/10.1109/CCST.1995.524745","url":null,"abstract":"Frequency domain processing of fingermark images is valuable for reducing interfering periodic backgrounds. The success of the processing and the quality of the results depend upon a number of factors including structure and chosen processing method. This paper shows that in some circumstances it is possible to determine the most appropriate frequency domain filter for attenuation of interfering backgrounds using automatic computer based generation of frequency domain filters. Success has been achieved with half-tone printed backgrounds.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130956217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bodysearch technology uses X-ray imaging to remove hazards and humiliation from personnel searches","authors":"G.J. Smith","doi":"10.1109/CCST.1995.524958","DOIUrl":"https://doi.org/10.1109/CCST.1995.524958","url":null,"abstract":"Smuggling of weapons, drugs, and valuable materials on the body across international borders and through security-sensitive installations presents difficult social problems such as the safety of the officers and the privacy of the subjects. The Bodysearch system, which uses low-exposure X-rays to image a person's body, solves some of these problems by providing a safe, fast, and effective way to unobtrusively search a person's body. At the same time the implementation of Bodysearch challenges society to decide if it is ready to go the next step and use more widespread inspections of persons in order to reduce the opportunities for criminal acts against society.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}