Julian Fierrez, L.M. Munoz-Serrano, F. Alonso-Fernandez, J. Ortega-Garcia
{"title":"On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition","authors":"Julian Fierrez, L.M. Munoz-Serrano, F. Alonso-Fernandez, J. Ortega-Garcia","doi":"10.1109/CCST.2005.1594877","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594877","url":null,"abstract":"The effect of image quality degradation on the verification performance of automatic fingerprint recognition is investigated. We study the performance of two fingerprint matchers based on minutiae and ridge information under varying fingerprint image quality. The ridge-based system is found to be more robust to image quality degradation than the minutiae-based system for a number of different image quality criteria.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition with small and large size databases","authors":"J. Alcobé, M. Faúndez-Zanuy","doi":"10.1109/CCST.2005.1594843","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594843","url":null,"abstract":"This paper presents experimental results using the ORL (40 people) and FERET (994 people) databases. The ORL database can be useful for securing applications where few users attempting to access are expected. This is the case, for instance, of a PDA or PC where the password is the face of the user. On the other hand, the FERET database is useful for studying those situations where the number of authorized users is around a thousand people.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric verification of humans by means of hand geometry","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2005.1594816","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594816","url":null,"abstract":"This paper describes a hand geometry biometric identification system. We have acquired a database of 22 people, 10 acquisitions per person, using a conventional document scanner. We propose a feature extraction and classifier. The experimental results reveal a maximum identification rate equal to 93.64%, and a minimum value of the detection cost function equal to 2.92% using a multi layer perceptron classifier.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security, Internet connectivity and aircraft data networks","authors":"N. Thanthry, M. S. Ali, R. Pendse","doi":"10.1109/MAES.2006.284351","DOIUrl":"https://doi.org/10.1109/MAES.2006.284351","url":null,"abstract":"Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to corporate networks. Several researchers are looking at the possibility of the existence of a total three networks: passenger network (PN), crew network (CRN), and the control network (CON). Researchers envision an architecture where these three networks co-exist in an airplane. The available Internet connectivity can be utilized for transporting flight critical information like cockpit flight data recorder (CFDR) data, digital flight data recorder (DFDR) data, cockpit voice recorder (CVR) data and controller pilot data link communication. In addition, the Internet connectivity could also be used for other safety mechanisms like video surveillance and remote control of the flight. Security is one of the major concerns that affect the successful deployment of aircraft data networks (ADN) and other safety features. Several studies have been carried out to secure the network using firewalls and intrusion detection system but so far no study has focused on securing the communication channel (between the aircraft and the ground station) and its impact on the ADN. The scope of this research is to determine the viability and need of a security mechanism. The research also focuses on the performance of different security architectures and determine their usability in the framework of an ADN","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening","authors":"D. Hardmeier, F. Hofer, A. Schwaninger","doi":"10.1109/CCST.2005.1594876","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594876","url":null,"abstract":"Aviation security screening has become very important in recent years. It was shown by Schwaninger et al. (2004) that certain image-based factors influence detection when visually inspecting X-ray images of passenger bags. Threat items are more difficult to recognize when placed in close-packed bags (effect of bag complexity), when superimposed by other objects (effect of superposition), and when rotated (effect of viewpoint). The X-ray object recognition rest (X-ray ORT) was developed to measure the abilities needed to cope with these factors. In this study, we examined the reliability and validity of the X-ray ORT based on a sample of 453 aviation security screeners and 453 novices. Cronbach Alpha and split-half analysis revealed high reliability. Validity was examined using internal, convergent, discriminant and criterion-related validity estimates. The results show that the X-ray ORT is a reliable and valid instrument for measuring visual abilities needed in X-ray screening. This makes the X-ray ORT an interesting tool for competency and pre-employment assessment purposes.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice over IP security and law enforcement","authors":"N. Thanthry, R. Pendse, K. Namuduri","doi":"10.1109/CCST.2005.1594888","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594888","url":null,"abstract":"Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcement","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SecurIST: co-ordinating the development of a strategic research agenda for security and dependability R&D","authors":"J. Clarke, W. M. Fitzgerald","doi":"10.1109/CCST.2005.1594887","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594887","url":null,"abstract":"There has been much discussion about the emergence of the knowledge society. The engine driving the creation of this society is an ICT framework based on the convergence of media, processes and communications networks delivering ubiquitous access to knowledge irrespective of location. Much of the ICT research agenda is focused on the specification of this framework. The proposed systems are highly complex requiring the interconnection of highly complex infrastructures and systems. The pervasiveness of ICT in this new society creates challenges in terms of privacy, access control, trust and reliability. The development of an effective secure and dependable environment is crucial for the effective delivery of the knowledge society. The creation of a knowledge society within Europe requires that Europe position itself at the forefront of research in this area. The key challenges for Europe are to develop security solutions, which can guarantee dependability and resilience of ICT infrastructures and well as provide management and control capabilities for these networks. The IST FP6 project SecurIST is addressing the challenge of developing a European strategic security research agenda for post FP6, designed to drive the development of the security research program for FP7. The project acts as a catalyst bringing together the key research scientists and industry decision makers to develop this agenda. Participation in the development of this agenda is open to all organisations interested in making a contribution to developing a European security and dependability research agenda. The project has ensured uptake of its outputs by creating a security advisory board composed of key industrial experts and decision makers charged with providing guidance to the project in the development of the security research agenda and in promoting the projects outputs to industry. This paper provides a brief overview of SecurIST and an introduction to the security task force initiatives that have been formed. Companies and projects wishing to join these initiatives can still register their interests at www.securitytaskforce.org","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a model for estimating image difficulty in X-ray screening","authors":"A. Schwaninger, S. Michel, A. Bolfing","doi":"10.1109/CCST.2005.1594875","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594875","url":null,"abstract":"In this study, we developed a first computational model for estimating image difficulty of X-ray images of passenger bags. Based on Schwaninger (2003) three image-based factors are proposed as predictors of image difficulty; view difficulty of the threat item, superposition by other objects, and bag complexity (i.e. clutter and transparency of the bag). First, these factors were validated using detection experiments. We then developed computer-based algorithms to estimate the image-based factors automatically. Finally, we could show that our computational model can better explain human performance than human ratings of the image-based factors","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Pierson, P. Robertson, J. Van Randwyk, T. Toole
{"title":"Protection of distributed internetworked computers","authors":"L. Pierson, P. Robertson, J. Van Randwyk, T. Toole","doi":"10.1109/CCST.2005.1594882","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594882","url":null,"abstract":"Current methods of enforcing security policy depend on security patches, anti-virus protections, and configuration control, all updated in the end user's computer at ever decreasing intervals. This research is producing a method of hardening the corporate computer infrastructure by prototyping a mixed hardware and software architecture that enforces policies by pushing distributed security functions closer to the end user's computer, but without modifying, relying on or reconfiguring the end user's computer itself. Previous research has developed highly secure network components. Because it is impractical to replace our entire infrastructure with secure, trusted components, this paper investigates how to improve the security of a heterogeneous infrastructure composed of both trusted and untrusted components.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126722669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Between detection and neutralization","authors":"D. G. Adams, M. Snell, M.W. Green, D. Pritchard","doi":"10.1109/CCST.2005.1594846","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594846","url":null,"abstract":"Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}