2012 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
HLFSIM: Objective image quality metric based on ROI analysis HLFSIM:基于ROI分析的客观图像质量度量
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393587
Petr Dostál, Lukáš Krasula, M. Klima
{"title":"HLFSIM: Objective image quality metric based on ROI analysis","authors":"Petr Dostál, Lukáš Krasula, M. Klima","doi":"10.1109/CCST.2012.6393587","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393587","url":null,"abstract":"The image/video quality is a key issue in security video systems. Therefore the objective image/video quality criteria are extensively studied. In this paper, the novel full reference objective metric for image quality assessment is proposed. This metric is based on FSIM. The ROI detection is embedded in order to improve the performance. For ROI estimation, the ground truth data together with two different algorithms were used and compared - The security and multimedia images from LIVE database were used for performance evaluation. The correlation between the objective and subjective tests of multimedia images was calculated using Pearson's and Spearman Rank Order Correlation Coefficient. For performance comparison the state-of-the-art full reference objective image quality metrics were used; PSNR, SSIM, MS-SSIM, VIF and FSIM. In our previous paper, the importance of demosaicing technique and ROI has been shown. This paper continues in this topic and implements new full reference objective metrics for the reconstructed image quality evaluation. The results reveal that the ROI controlled by bottom-up mechanism can be used for performance improvement.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Methods for the prevention of the use of mobile phones in Correctional institutions 预防在惩教机构使用流动电话的方法
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393565
Sylvio Bisson, Pushkar E. Godbole, M. McKee, Marc St-Amand
{"title":"Methods for the prevention of the use of mobile phones in Correctional institutions","authors":"Sylvio Bisson, Pushkar E. Godbole, M. McKee, Marc St-Amand","doi":"10.1109/CCST.2012.6393565","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393565","url":null,"abstract":"Recognizing that the use of mobile phones in Correctional institutions continues to be an issue, the Correctional Service of Canada (CSC) has initiated an investigation into the various methods available for the prevention of the use of mobile phones in Institutions. The broad groups of “Institutional”, “Detection”, and “Interdiction” technologies reveal a wide range of methods to prevent unauthorized mobile phone use in correctional facilities; however, each has significant drawbacks that limit its efficacy in meeting CSC's goals. The development of a new concept in the interdiction of mobile phone use, the Access Denial Service (ADS), provides an encouraging solution while mitigating most, if not all, of the issues present in the current offerings.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems 自动车牌识别(ANPR)的准确性和现实世界的英国车牌问题
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393574
Mike Rhead, Robert Gurney, S. Ramalingam, N. Cohen
{"title":"Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems","authors":"Mike Rhead, Robert Gurney, S. Ramalingam, N. Cohen","doi":"10.1109/CCST.2012.6393574","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393574","url":null,"abstract":"This paper considers real world UK number plates and relates these to ANPR. It considers aspects of the relevant legislation and standards when applying them to real world number plates. The varied manufacturing techniques and varied specifications of component parts are also noted. The varied fixing methodologies and fixing locations are discussed as well as the impact on image capture.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131635458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Improved surface swimmer detection through multimodal data fusion 通过多模态数据融合改进水面游泳者检测
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393575
D. Sheaffer, D. Burnett
{"title":"Improved surface swimmer detection through multimodal data fusion","authors":"D. Sheaffer, D. Burnett","doi":"10.1109/CCST.2012.6393575","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393575","url":null,"abstract":"Waterborne intruder detection includes many new challenges not seen in land environments. One area of these challenges is the detection of surface swimmers. Swimmers, whose bodies are partially in air and partially submerged, have significantly reduced target strength (TS) for radar and sonar systems compared to intruders fully in air or fully submerged. This reduced TS results in more frequent missed detections or, if detection threshold is widened, increased nuisance alarms. Depending on sea state, a swimmer is also able to blend in with wave noise, making detection even more difficult. We present a method for improved surface swimmer detection in marine environments by fusing data from several sensor systems in both air and water domains to isolate a swimmer's signature from uncorrelated events. This system, tested in Dec 2011 in St. Petersburg FL, produced data indicating significantly improved detection over using any single system. By widening detection threshold of each sensor's detection algorithm but fusing data of each system together, more potential targets can be processed without the risk of increasing nuisance alarms. This work holds the potential to improve the security of several types of water-dependent assets, like commercial harbors, Navy or Coast Guard bases, and nuclear and other water-cooled power plans, and offshore oil platforms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131144813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and evaluation of image quality in wireless surveillance networks 无线监控网络中图像质量的建模与评价
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393583
Matthew Ibekwe, S. Vítek, M. Klima, Petr Dostál
{"title":"Modeling and evaluation of image quality in wireless surveillance networks","authors":"Matthew Ibekwe, S. Vítek, M. Klima, Petr Dostál","doi":"10.1109/CCST.2012.6393583","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393583","url":null,"abstract":"This paper studies the security image quality attained in streaming video over wireless networks under different packet error models. Wireless video sensor networks are becoming common place due to increasing crime rates and growing terrorist activities. A crucial requirement for video surveillance technology especially for real-time monitoring is that the video quality must not fall below a certain threshold so that objects and events in these videos could be identified and properly interpreted by viewers. However, the time varying transmission characteristics of the wireless channel and limited throughput can lead to poor performance of multimedia traffic over wireless networks. As a result, the end user may perceive jerky motions, frame freezes, and missing segments which may affect their ability to recognize objects and effectively analyze the scenes. An experimental set-up required for wireless network surveillance using IEEE 802. is described. The authors adopt subjective user tests to study the degree of identification of objects and events in security videos generated from camera security systems and subjected to wireless channel packet loss conditions to benchmark identification in the degraded sequences. Packet loss conditions were introduced into the sequences using NS-2 network simulator.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and performance testing of an integrated detection and assessment perimeter system 综合检测与评估周界系统的设计与性能测试
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393535
J. Dabling, James O. McLaughlin, Jason J. Andersen
{"title":"Design and performance testing of an integrated detection and assessment perimeter system","authors":"J. Dabling, James O. McLaughlin, Jason J. Andersen","doi":"10.1109/CCST.2012.6393535","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393535","url":null,"abstract":"Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia National Laboratories (Albuquerque, NM) to jointly develop and evaluate an integrated perimeter security solution, one that couples access delay with detection and assessment. This novel perimeter solution is designed to be sufficiently flexible for implementation at a wide range of facility types, from high security military or government installations to commercial power plants, to industrial facilities of various kinds. A prototype section of barrier has been produced and installed at the Sandia Exterior Intrusion Sensor Testing Facility in Albuquerque, NM. The prototype was implemented with a robust vehicle barrier and coupled with a variety of detection and assessment solutions to demonstrate both the effectiveness of such a solution, as well as the flexibility of the system. In this implementation, infrared sensors and fence disturbance sensors are coupled with a video motion detection sensor and ground sensors. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system will be characterized, as well as the Nuisance Alarm Rate.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring privacy and security of iris fuzzy commitment 虹膜模糊承诺的隐私性和安全性度量
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393553
Xuebing Zhou, C. Busch
{"title":"Measuring privacy and security of iris fuzzy commitment","authors":"Xuebing Zhou, C. Busch","doi":"10.1109/CCST.2012.6393553","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393553","url":null,"abstract":"Template protection techniques are important supplements to biometrics, which aim to improve system security and safeguard privacy of users. Their development brings a new challenge of privacy and security assessment especially for real systems. In the paper, we take a close look at fuzzy commitment, which is an efficient and widely used template protection algorithm and demonstrates rigorous assessment of an iris fuzzy commitment scheme using the information-theoretical metrics. For instance, a 56 bit long secret can be derived from iris codes. Instead of iris codes, its hash value is stored. However, due to the dependency of iris codes, the uncertainty of secrets reduces to 11.82 bits given protected templates. It confirms the empirical results that an adversary is able to retrieve the iris features from the protected templates with average number of attempts equal to 210.56 as shown in [1]. The poor security and privacy performance is caused by strong correlation of iris feature and unsuitable coding methods used in the algorithm. The quantitative measurement shown in this paper provides a reference guidance on evaluation of template protection in practice. It helps algorithm developers to show the security and privacy of template protection to end-users and to detect the weaknesses of the algorithms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Advanced access control system for ports 先进的港口访问控制系统
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393551
F. Garzia, R. Cusani, E. Sammarco
{"title":"Advanced access control system for ports","authors":"F. Garzia, R. Cusani, E. Sammarco","doi":"10.1109/CCST.2012.6393551","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393551","url":null,"abstract":"The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is necessary to design and realize highly integrated, efficient and reliable access control systems. The authors illustrate the work made to design and realize the integrated access control system of the most important commercial and tourist ports of Italy.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Basic Genetic Algorithm pattern for use in self-organizing agile security 用于自组织敏捷安全的基本遗传算法模式
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393577
Rich Messenger, R. Dove
{"title":"Basic Genetic Algorithm pattern for use in self-organizing agile security","authors":"Rich Messenger, R. Dove","doi":"10.1109/CCST.2012.6393577","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393577","url":null,"abstract":"Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a \"fitness function\" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems 特殊核材料和关键基础设施安全建模和物理保护系统仿真
2012 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393531
Dean Dominguez, M. Parks, Adam D. Williams, S. Washburn
{"title":"Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems","authors":"Dean Dominguez, M. Parks, Adam D. Williams, S. Washburn","doi":"10.1109/CCST.2012.6393531","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393531","url":null,"abstract":"Over the last decade, the world has faced a rapidly expanding and dynamic threat environment. As demonstrated by the 9/11 and 26/11 terrorist attacks, adversary capabilities have evolved to include advanced tactics and increased militancy. For the Department of Energy's National Nuclear Security Administration (DOE/NNSA), and other organizations responsible for protecting facilities housing special nuclear materials, this fragile mix of global uncertainty makes nuclear weapon security an important challenge. Sandia, using scientific and mathematic methodologies, is considered one of the world leaders in the design and implementation of physical protection systems (PPS) and VA methodology, in order to reduce the risk to both domestic and international high consequence facilities. Using the Presagis commercial software suite - primarily Scenario Toolkit and Generation Environment (STAGE), a complex simulation engine - the authors have developed a single analyst, Monte Carlo derived, agent decision-based, and event-driven interactive tool to help meet this need. Evaluating risk reduction for critical infrastructure against increasingly complex adversaries requires high fidelity VA modeling tools. Advanced adversary capabilities require modeling complex scenario variables, including multiple attack vectors and dynamically selected targets of opportunity. Large threat profiles with complex character behavior are needed for increasing adversary militancy. Coupled with Sandia methodology, the strength of the tool stems from the decision logic structure and built-in artificial intelligence components. STAGE allows for an inclusive command and control VA model that uses all traditional elements of a PPS (detection, communication, assessment, delay, command and control, response, interdiction, attrition, and neutralization). This paper will briefly describe the effect that the current threat environment has had on the VA process and then outline the role of STAGE in VA modeling and new threat reduction methodology. This paper also provides an update to the development of the STAGE tool, as well as a description of future plans to advance VA methodology and integrate STAGE simulation analysis with an existing physical site (the Integrated Security Facility at Sandia - a former Category I facility).","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信