Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Moving object surveillance and analysis for camera based security systems 基于摄像机的安全系统的运动物体监视和分析
J. Freer, B. J. Beggs, H. Fernandez-Canque, F. Chevrier, A. Goryashko
{"title":"Moving object surveillance and analysis for camera based security systems","authors":"J. Freer, B. J. Beggs, H. Fernandez-Canque, F. Chevrier, A. Goryashko","doi":"10.1109/CCST.1995.524735","DOIUrl":"https://doi.org/10.1109/CCST.1995.524735","url":null,"abstract":"In this article we present an image processing based approach for the automatic identification of moving objects (primarily people) within monochrome video images. Object motion is analysed by algorithms which are used to distinguish suspicious movement from non-suspicious movement. A human operator can be alerted on recognition of a suspicious event occurrence. The methods used are described along with the results obtained.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134469489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fuzzy feature selection for fingerprint identification 指纹识别中的模糊特征选择
V. Sagar, D.B.L. Ngo, K. Foo
{"title":"Fuzzy feature selection for fingerprint identification","authors":"V. Sagar, D.B.L. Ngo, K. Foo","doi":"10.1109/CCST.1995.524738","DOIUrl":"https://doi.org/10.1109/CCST.1995.524738","url":null,"abstract":"Fingerprint verification systems are expensive and complex, requiring sensing facilities, preprocessing algorithms for image quality enhancement and procedures for ridge and minutiae detection which can be used for classification, verification and recognition. To-date, the main published approaches to fingerprint recognition break down the process of ridge detection into smoothing or early pre-processing, edge detection, thresholding, binarization and subsequently thinning. This whole procedure can be very computationally expensive and hence requires more expensive hardware to meet the response-time requirements. The approach presented in this paper is based on fuzzy logic techniques. This has the advantage of being simple and less expensive.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114254366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Computer evidence analysis and recovery of magnetic storage media data 磁存储介质数据的计算机证据分析与恢复
H.-J. Leimkueller
{"title":"Computer evidence analysis and recovery of magnetic storage media data","authors":"H.-J. Leimkueller","doi":"10.1109/CCST.1995.524748","DOIUrl":"https://doi.org/10.1109/CCST.1995.524748","url":null,"abstract":"The recovery of data that were stored on magnetic media normally poses no problems if the same hardware is used to recover the data that was used to store it on the medium. This is not the case if the magnetic information or the storage media itself have been damaged. If the hardware or software system used to store the data on the media is unknown, then this must be determined by initial analysis. Once the storage format has been analysed and is known, the storage media can then be read using the appropriate equipment. If it is unknown or the storage media is damaged, one can try to recover the data using laboratory measures. The paper describes the possibilities for analysis and recovery. The main emphasis is laid on the technical problem of making the magnetically stored information available as digital data.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new invisible volumetric sensor for solid wall applications 固体墙应用的新型隐形体积传感器
A. Gagnon
{"title":"A new invisible volumetric sensor for solid wall applications","authors":"A. Gagnon","doi":"10.1109/CCST.1995.524749","DOIUrl":"https://doi.org/10.1109/CCST.1995.524749","url":null,"abstract":"Even though, chain link fences are popular in North America for property delimitation, most European countries use solid walls, i.e., brick, stone or concrete. Solid walls are also very common in detention centres, for court yard delimitation. Other applications include sensors mounted on the external wall of a stone building, where detection of intrusions by wall climbing is needed. Until recently, the sensors used had to be mounted on the facade or the top of the wall using stand offs to perform properly. The sensor discussed in the article presents interesting characteristics that allow it to address the need for an invisible solid wall sensor. Indeed, ENCLOSURE uses a single cable concept that can be mounted directly on the wail. Using a local FM broadcast tower, the field surrounding the cable is not dense and distributes uniformly along the wail to prevent problems associated with rain or ice which are a problem to other sensors. For covert applications, the single leaky coaxial cable, can be embedded directly in the mortar of the wall during its construction, or grooved into an existing wall. Recently, ENCLOSURE has been successfully installed on different wall constructions. The latest results which include brick walls for detention centres, brick walls of an archaeological site and stone wall fences for a private VIP property are very encouraging. We present results of longer term beta testing for new wall mounted and fast deployable applications. Emphasis is placed on site particularities and the treatment of site impairments for those applications.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multimedia technology and applications in security 多媒体技术及其在保安中的应用
O. D'Souza
{"title":"Multimedia technology and applications in security","authors":"O. D'Souza","doi":"10.1109/CCST.1995.524944","DOIUrl":"https://doi.org/10.1109/CCST.1995.524944","url":null,"abstract":"Security Systems deal with realtime or near realtime data to evaluate and prosecute crime. The data to date is predominantly text based interpretations of exception reports from an alarmed site. Where images or \"video\" is used the information is in the form of either \"frozen frames\" or a \"video feed\" often temporally unsynchronised with the event. Multimedia (MM) Presentation and Communications Technology are two distinctly different application streams of the very versatile Multimedia Technology that can be applied to security to satisfy most requirement via a common platform. The focus of this paper will be to present a view on why security technology must develop more interactivity and integration between technology groups used and then explore the relevant multimedia characteristics that could be used to make security systems more efficient. Examples of implementation show that this technology will develop to provide the security industry a very versatile platform to achieve highly efficient and information rich integration of functions.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of moving objects in natural scenes by a stochastic multi-feature analysis of video sequences 基于视频序列随机多特征分析的自然场景运动目标检测
M. Hotter, R. Mester, M. Meyer
{"title":"Detection of moving objects in natural scenes by a stochastic multi-feature analysis of video sequences","authors":"M. Hotter, R. Mester, M. Meyer","doi":"10.1109/CCST.1995.524732","DOIUrl":"https://doi.org/10.1109/CCST.1995.524732","url":null,"abstract":"A new technique for the detection and description of moving objects in natural scenes is presented which is based on an object-oriented, statistical multi-feature analysis of video sequences. In most conventional schemes for the detection of moving objects, temporal differences of subsequent images from a video sequence are evaluated in a block based manner by so called change detection algorithms. These methods are based on the assumption that significant temporal changes of an image signal are caused by moving objects in the scene. However, as temporal changes of an image signal can as well be caused by many other sources (camera noise, varying illumination, small camera motion, trees in motion), such systems are afflicted with the dilemma of either causing many false alarms or failing to detect relevant events. To scope with this problem, the additional features texture and motion beyond temporal signal differences are extracted and evaluated in the new algorithm. Furthermore, these features are evaluated in an object-oriented instead of a block oriented fashion to increase the reliability of detection. The adaption of this method to normal fluctuations of the observed scene is performed by a time-recursive space-variant estimation of the temporal probability distributions of the different features (signal difference, texture and motion). Feature data which differ significantly from the estimated distributions are interpreted to be caused by moving objects.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evaluation of automatic explosive detection systems 爆炸物自动探测系统的评价
N. C. Murray, K. Riordan
{"title":"Evaluation of automatic explosive detection systems","authors":"N. C. Murray, K. Riordan","doi":"10.1109/CCST.1995.524908","DOIUrl":"https://doi.org/10.1109/CCST.1995.524908","url":null,"abstract":"The implications of legislation, acts of terrorism directed at air transport, have led to the development of a number of pieces of equipment that are capable of automatically screening luggage items for explosive materials. These systems, known as explosive detection systems (EDSs) have the high throughput combined with realistic detection and false alarm rates that mass screening at busy airports requires. The paper describes the advances that have been made in baggage X-ray technology, with reference to systems implemented at airports, that have allowed this automated screening process. A programme for the objective testing of EDSs is described in detail. Because these systems are used to screen the luggage of foreign nationals, the acceptance criteria must be internationally agreed. This process is outlined.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The use of digital CCTV in an airport car-park application 数字闭路电视在机场停车场的应用
M.J. Cattle
{"title":"The use of digital CCTV in an airport car-park application","authors":"M.J. Cattle","doi":"10.1109/CCST.1995.524909","DOIUrl":"https://doi.org/10.1109/CCST.1995.524909","url":null,"abstract":"The paper examines the use of multimedia computing as the basis for modern security surveillance systems. Based on an existing product and application examples, the paper aims to illustrate the power which new technology can bring to surveillance, monitoring and control systems. Multimedia computing is a hot topic which is seen as a vital part of the drive towards wider home use of PCs. This means that the technology is developing rapidly and most importantly the prize of a truly mass market is driving prices lower, thus making \"spin off\" applications such as the one described much more economically feasible and attractive. We look at a set of small case studies, based on a system called PanSeer which is available from Joyce-Loebl Ltd. in the United Kingdom.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secure anonymous voting by employing Diffie-Hellman PKD concept 采用Diffie-Hellman PKD概念的安全匿名投票
J. Jan, R. Lin
{"title":"A secure anonymous voting by employing Diffie-Hellman PKD concept","authors":"J. Jan, R. Lin","doi":"10.1109/CCST.1995.524921","DOIUrl":"https://doi.org/10.1109/CCST.1995.524921","url":null,"abstract":"We propose a voting protocol that satisfies the requirements of secure voting in computer networks. By using the IC card, this protocol can be much more practical. Since the data is processed in advance by the CPU of the IC card, it reduces the loading of a voting system and the congestion of networks. We handle the voter's authentication with the Diffie-Hellman (1976) public key distribution (PKD) concept.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133225405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The development of 3-D (stereoscopic) imaging systems for security applications 开发用于安全应用的三维(立体)成像系统
Jorgen Evens, Max Robinson, S. Godber, Rs Petty
{"title":"The development of 3-D (stereoscopic) imaging systems for security applications","authors":"Jorgen Evens, Max Robinson, S. Godber, Rs Petty","doi":"10.1109/CCST.1995.524959","DOIUrl":"https://doi.org/10.1109/CCST.1995.524959","url":null,"abstract":"Stereoscopic or 3D imaging systems have been investigated by many research groups for a considerable number of years. Experimentation has shown that the use of such vision systems enables quite sophisticated manipulative tasks to be carried out remotely. Recent developments in materials science, electronics and video camera capabilities now make 3-D television systems for teleoperator applications a much more viable proposition than in the past. This paper describes the development of a range of 3-D systems which have been used for remote controlled vehicle and manipulator guidance in hazardous environments. Two particular scenarios are in dealing with improvised explosive devices (IEDs) and also in a nuclear industry application. The paper mentions the development of novel stereoscopic sensors based on line-scan cameras. One application of such packages may well be in wide area surveillance.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信