Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
A method for evaluating video motion detection 一种评价视频运动检测的方法
H. Devereux, N. Custance
{"title":"A method for evaluating video motion detection","authors":"H. Devereux, N. Custance","doi":"10.1109/CCST.1995.524742","DOIUrl":"https://doi.org/10.1109/CCST.1995.524742","url":null,"abstract":"Over the last three years there has been an expansion of equipment offered on the market with the capability of providing video motion detection or intelligent scene monitoring. There is currently no easy way to compare this type of equipment due to the many variables in the scenes and the differing algorithms and approaches used in equipment. The Security Equipment Assessment Laboratory has put together a methodology for the testing of video processing equipment. This technique utilises real imagery and provides a basic grounding for comparison. The problems presented by a large library of video sequences on tape are the time taken to run tests, and the relative degradation with time of the video signal from the tape. In particular the degradation in frame stability. The paper proposes formats for attack trials, the recording and playback process control and the logging equipment required. These images are then available for quick evaluation of other video processing systems for particular scenarios. This paper breaks down the key scenarios, and the basis for the selection of video sequences. It also presents the statistical selection process used to identify the more useful image sequences for transfer to optical media. The terms \"probability of detection\" and \"false alarm rate,\" can be misleading in the context of video processing systems where different scenarios and attack methods are used. This paper outlines an alternative method for comparing systems based on the content of the scenarios, allowing a prediction of the detection ability of the system and the likely false alarm rate in any situation.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124874508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An object-oriented expert system to reconstruct homicide scene 面向对象的凶杀现场重构专家系统
C. Kou, C. Tung, Chi-Ho Lin
{"title":"An object-oriented expert system to reconstruct homicide scene","authors":"C. Kou, C. Tung, Chi-Ho Lin","doi":"10.1109/CCST.1995.524923","DOIUrl":"https://doi.org/10.1109/CCST.1995.524923","url":null,"abstract":"We propose an object-oriented (O-O) method in an expert system (ES) to collect all the evidence in crime scene, to analyze them, and to support decisions for investigators to reconstruct crime scene. In this study, we focus on homicide scene reconstruction. Our previous research proposed Mark theory and non-Mark Theory evidences in crime scene. The former one is related to physical evidences in crime scene which belongs to static knowledge (post-criminal behavior: post-CB), the latter one is contributed to the analysis of pre-criminal behavior (pre-CB) and In-CB which fit the characteristics of dynamic knowledge. ES fits the characteristics of static knowledge, neural network (NW) approaches for the dynamic knowledge. In this research, we include O-O technology for building knowledge system for the investigator by using Level-5 ES shell. It is efficient for policemen to investigate the crime, instead of not jumping into a great bunch of evidences without any indication.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of systems and services in central monitoring stations (CMS) 整合中央监测站的系统和服务
Ulrich Urfer
{"title":"Integration of systems and services in central monitoring stations (CMS)","authors":"Ulrich Urfer","doi":"10.1109/CCST.1995.524934","DOIUrl":"https://doi.org/10.1109/CCST.1995.524934","url":null,"abstract":"Since time immemorial the protection of life and property has been an important part of our world. For thousands of years the job of keeping watch over valuable objects was carried out by specially trained people or animals. Today, with the advent of many new kinds of technologies, sophisticated systems are being increasingly used. Basically, little has changed and the procedure remains virtually the same. Someone notices that something is wrong, has to make a decision and then initiate and supervise the appropriate response. This paper presents a solution as to how a central monitoring station can handle incoming information from widely disparate telecommunications systems in a standardized way and how the intervention services (police, fire brigades, private services) can be integrated in the process of false alarm reduction. Information exchange with different partners in the security chain can be improved by using technologies such as remote terminals, interactive voice response systems (IVR) or fax on demand.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Developments in and applications of fibre optic intrusion detection sensors 光纤入侵检测传感器的发展与应用
B. Griffiths
{"title":"Developments in and applications of fibre optic intrusion detection sensors","authors":"B. Griffiths","doi":"10.1109/CCST.1995.524931","DOIUrl":"https://doi.org/10.1109/CCST.1995.524931","url":null,"abstract":"For many years optical fibre was the answer looking for the question. Now, after years of product applications and continued development, a range of fibre optic sensors are used in intrusion detection where the natural benefits of the material are matched by parallel developments in support technologies and applications experience. This paper describes some developments and applications in sensors and systems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Test methods and test equipment for thermal imagers 热成像仪的试验方法和试验设备
T. Williams
{"title":"Test methods and test equipment for thermal imagers","authors":"T. Williams","doi":"10.1109/CCST.1995.524740","DOIUrl":"https://doi.org/10.1109/CCST.1995.524740","url":null,"abstract":"Some of the test parameters which can be used for assessing the performance of thermal imagers which are used for surveillance purposes, are discussed. Techniques which can be used for measuring these parameters, both in the laboratory and in the field, are described.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure electronic voting protocol with IC cards 一个安全的电子投票协议与IC卡
J. Jan, Chih-Chang Tai
{"title":"A secure electronic voting protocol with IC cards","authors":"J. Jan, Chih-Chang Tai","doi":"10.1109/CCST.1995.524922","DOIUrl":"https://doi.org/10.1109/CCST.1995.524922","url":null,"abstract":"Computer networks have become more and more popular and important in our recent life. People can use the network system to do a variety of activities. Thus, we can expect that in the near future we will cast a ballot by using computer networks. In this paper, we propose a new electronic voting protocol with IC cards. Our scheme is so secure that it can meet all the security requirements. In our protocol, only legitimate voter can cast a valid ballot and only once. No one but the voter knows which voting strategy the voter adopts. Each voter can check whether or not his ballot has been counted correctly by the voting center. If any voter finds out that their ballot is miscounted, he can identify and recorrect this miscounting. Finally, no one can cheat or disrupt the entire election in our protocol.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Physical access to computers: can your computer be trusted? 对计算机的物理访问:您的计算机可信吗?
W. Fabian
{"title":"Physical access to computers: can your computer be trusted?","authors":"W. Fabian","doi":"10.1109/CCST.1995.524920","DOIUrl":"https://doi.org/10.1109/CCST.1995.524920","url":null,"abstract":"The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130007144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AMETHYST: an enhanced detection system intelligently combining video detection and non-video detection systems AMETHYST:视频检测与非视频检测智能结合的增强型检测系统
M. Horner
{"title":"AMETHYST: an enhanced detection system intelligently combining video detection and non-video detection systems","authors":"M. Horner","doi":"10.1109/CCST.1995.524734","DOIUrl":"https://doi.org/10.1109/CCST.1995.524734","url":null,"abstract":"The aim of the AMETHYST project (AutoMatic Event auTHentication SYSTems) is to encourage the development of a high performance perimeter intrusion detection system by combining Intelligent Scene Monitoring (ISM) or Video Motion Detection (VMD) technology with another detection system. The two systems would complement each other to produce a detection system with a high probability of detection and low false alarm rate. The performance of Perimeter Intrusion Detection Systems (PIDS) is often poor at sites with long perimeters, with extreme weather conditions and requiring a high probability of detection. Video based detection systems (ISM and VMD) are improving in sophistication and performance. Despite this there are still limitations with video based defection. Firstly, it may be several years before the video PIDS achieve the performance required for long perimeters. Secondly, when there is no video, for example in fog, there is no detection. There is potential for combining video detection with another sensor to reduce the disadvantages of video whilst retaining its advantages. A non-video SIDS would be used to detect intrusions. On alarm a sequence of CCTV images would be captured by a loop framestore system. A Targeted Automatic Verification Aid (TAVA) would then be used to decide if there was suspicious activity in the alarm sequence. Many false alarms have no visible cause, so a TAVA would filter these out. The false alarm rate would be lower than with a normal VMD as a TAVA would need to assess only alarm sequences. If there is no video or it is too foggy the TAVA would 'fail safe' by signalling the alarm from the non-video PIDS. A TAVA could use more sophisticated processing than a VMD and still be cheaper, because it could target the processing. PSDB is planning to collect alarm sequences from sites with a non-video PIDS and a loop framestore connected to the CCTV system. These sequences will be used to prove the concept and evaluate the performance of a TAVA.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attenuation of half-tone background detail from fingermark images using digital image processing techniques 利用数字图像处理技术衰减手印图像的半色调背景细节
P.M. Fabrizi, S. Bramble, G. Jackson
{"title":"Attenuation of half-tone background detail from fingermark images using digital image processing techniques","authors":"P.M. Fabrizi, S. Bramble, G. Jackson","doi":"10.1109/CCST.1995.524745","DOIUrl":"https://doi.org/10.1109/CCST.1995.524745","url":null,"abstract":"Frequency domain processing of fingermark images is valuable for reducing interfering periodic backgrounds. The success of the processing and the quality of the results depend upon a number of factors including structure and chosen processing method. This paper shows that in some circumstances it is possible to determine the most appropriate frequency domain filter for attenuation of interfering backgrounds using automatic computer based generation of frequency domain filters. Success has been achieved with half-tone printed backgrounds.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130956217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bodysearch technology uses X-ray imaging to remove hazards and humiliation from personnel searches 人体搜查技术使用x射线成像技术来消除人员搜查中的危险和羞辱
G.J. Smith
{"title":"Bodysearch technology uses X-ray imaging to remove hazards and humiliation from personnel searches","authors":"G.J. Smith","doi":"10.1109/CCST.1995.524958","DOIUrl":"https://doi.org/10.1109/CCST.1995.524958","url":null,"abstract":"Smuggling of weapons, drugs, and valuable materials on the body across international borders and through security-sensitive installations presents difficult social problems such as the safety of the officers and the privacy of the subjects. The Bodysearch system, which uses low-exposure X-rays to image a person's body, solves some of these problems by providing a safe, fast, and effective way to unobtrusively search a person's body. At the same time the implementation of Bodysearch challenges society to decide if it is ready to go the next step and use more widespread inspections of persons in order to reduce the opportunities for criminal acts against society.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信