Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition 图像质量退化对基于细节和脊线的自动指纹识别的影响
Julian Fierrez, L.M. Munoz-Serrano, F. Alonso-Fernandez, J. Ortega-Garcia
{"title":"On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition","authors":"Julian Fierrez, L.M. Munoz-Serrano, F. Alonso-Fernandez, J. Ortega-Garcia","doi":"10.1109/CCST.2005.1594877","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594877","url":null,"abstract":"The effect of image quality degradation on the verification performance of automatic fingerprint recognition is investigated. We study the performance of two fingerprint matchers based on minutiae and ridge information under varying fingerprint image quality. The ridge-based system is found to be more robust to image quality degradation than the minutiae-based system for a number of different image quality criteria.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Face recognition with small and large size databases 人脸识别与小型和大型数据库
J. Alcobé, M. Faúndez-Zanuy
{"title":"Face recognition with small and large size databases","authors":"J. Alcobé, M. Faúndez-Zanuy","doi":"10.1109/CCST.2005.1594843","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594843","url":null,"abstract":"This paper presents experimental results using the ORL (40 people) and FERET (994 people) databases. The ORL database can be useful for securing applications where few users attempting to access are expected. This is the case, for instance, of a PDA or PC where the password is the face of the user. On the other hand, the FERET database is useful for studying those situations where the number of authorized users is around a thousand people.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Biometric verification of humans by means of hand geometry 通过手部几何图形对人体进行生物特征验证
M. Faúndez-Zanuy
{"title":"Biometric verification of humans by means of hand geometry","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2005.1594816","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594816","url":null,"abstract":"This paper describes a hand geometry biometric identification system. We have acquired a database of 22 people, 10 acquisitions per person, using a conventional document scanner. We propose a feature extraction and classifier. The experimental results reveal a maximum identification rate equal to 93.64%, and a minimum value of the detection cost function equal to 2.92% using a multi layer perceptron classifier.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security, Internet connectivity and aircraft data networks 安全,互联网连接和飞机数据网络
N. Thanthry, M. S. Ali, R. Pendse
{"title":"Security, Internet connectivity and aircraft data networks","authors":"N. Thanthry, M. S. Ali, R. Pendse","doi":"10.1109/MAES.2006.284351","DOIUrl":"https://doi.org/10.1109/MAES.2006.284351","url":null,"abstract":"Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to corporate networks. Several researchers are looking at the possibility of the existence of a total three networks: passenger network (PN), crew network (CRN), and the control network (CON). Researchers envision an architecture where these three networks co-exist in an airplane. The available Internet connectivity can be utilized for transporting flight critical information like cockpit flight data recorder (CFDR) data, digital flight data recorder (DFDR) data, cockpit voice recorder (CVR) data and controller pilot data link communication. In addition, the Internet connectivity could also be used for other safety mechanisms like video surveillance and remote control of the flight. Security is one of the major concerns that affect the successful deployment of aircraft data networks (ADN) and other safety features. Several studies have been carried out to secure the network using firewalls and intrusion detection system but so far no study has focused on securing the communication channel (between the aircraft and the ground station) and its impact on the ADN. The scope of this research is to determine the viability and need of a security mechanism. The research also focuses on the performance of different security architectures and determine their usability in the framework of an ADN","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening x射线目标识别测试(x射线ORT)——一种可靠有效的测量x射线筛查所需视觉能力的仪器
D. Hardmeier, F. Hofer, A. Schwaninger
{"title":"The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening","authors":"D. Hardmeier, F. Hofer, A. Schwaninger","doi":"10.1109/CCST.2005.1594876","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594876","url":null,"abstract":"Aviation security screening has become very important in recent years. It was shown by Schwaninger et al. (2004) that certain image-based factors influence detection when visually inspecting X-ray images of passenger bags. Threat items are more difficult to recognize when placed in close-packed bags (effect of bag complexity), when superimposed by other objects (effect of superposition), and when rotated (effect of viewpoint). The X-ray object recognition rest (X-ray ORT) was developed to measure the abilities needed to cope with these factors. In this study, we examined the reliability and validity of the X-ray ORT based on a sample of 453 aviation security screeners and 453 novices. Cronbach Alpha and split-half analysis revealed high reliability. Validity was examined using internal, convergent, discriminant and criterion-related validity estimates. The results show that the X-ray ORT is a reliable and valid instrument for measuring visual abilities needed in X-ray screening. This makes the X-ray ORT an interesting tool for competency and pre-employment assessment purposes.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Voice over IP security and law enforcement 知识产权安全和执法的声音
N. Thanthry, R. Pendse, K. Namuduri
{"title":"Voice over IP security and law enforcement","authors":"N. Thanthry, R. Pendse, K. Namuduri","doi":"10.1109/CCST.2005.1594888","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594888","url":null,"abstract":"Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcement","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SecurIST: co-ordinating the development of a strategic research agenda for security and dependability R&D 安全专家:协调安全和可靠性研发的战略研究议程的发展
J. Clarke, W. M. Fitzgerald
{"title":"SecurIST: co-ordinating the development of a strategic research agenda for security and dependability R&D","authors":"J. Clarke, W. M. Fitzgerald","doi":"10.1109/CCST.2005.1594887","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594887","url":null,"abstract":"There has been much discussion about the emergence of the knowledge society. The engine driving the creation of this society is an ICT framework based on the convergence of media, processes and communications networks delivering ubiquitous access to knowledge irrespective of location. Much of the ICT research agenda is focused on the specification of this framework. The proposed systems are highly complex requiring the interconnection of highly complex infrastructures and systems. The pervasiveness of ICT in this new society creates challenges in terms of privacy, access control, trust and reliability. The development of an effective secure and dependable environment is crucial for the effective delivery of the knowledge society. The creation of a knowledge society within Europe requires that Europe position itself at the forefront of research in this area. The key challenges for Europe are to develop security solutions, which can guarantee dependability and resilience of ICT infrastructures and well as provide management and control capabilities for these networks. The IST FP6 project SecurIST is addressing the challenge of developing a European strategic security research agenda for post FP6, designed to drive the development of the security research program for FP7. The project acts as a catalyst bringing together the key research scientists and industry decision makers to develop this agenda. Participation in the development of this agenda is open to all organisations interested in making a contribution to developing a European security and dependability research agenda. The project has ensured uptake of its outputs by creating a security advisory board composed of key industrial experts and decision makers charged with providing guidance to the project in the development of the security research agenda and in promoting the projects outputs to industry. This paper provides a brief overview of SecurIST and an introduction to the security task force initiatives that have been formed. Companies and projects wishing to join these initiatives can still register their interests at www.securitytaskforce.org","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a model for estimating image difficulty in X-ray screening x射线筛选中图像难度估计模型的研究
A. Schwaninger, S. Michel, A. Bolfing
{"title":"Towards a model for estimating image difficulty in X-ray screening","authors":"A. Schwaninger, S. Michel, A. Bolfing","doi":"10.1109/CCST.2005.1594875","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594875","url":null,"abstract":"In this study, we developed a first computational model for estimating image difficulty of X-ray images of passenger bags. Based on Schwaninger (2003) three image-based factors are proposed as predictors of image difficulty; view difficulty of the threat item, superposition by other objects, and bag complexity (i.e. clutter and transparency of the bag). First, these factors were validated using detection experiments. We then developed computer-based algorithms to estimate the image-based factors automatically. Finally, we could show that our computational model can better explain human performance than human ratings of the image-based factors","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Protection of distributed internetworked computers 保护分布式联网计算机
L. Pierson, P. Robertson, J. Van Randwyk, T. Toole
{"title":"Protection of distributed internetworked computers","authors":"L. Pierson, P. Robertson, J. Van Randwyk, T. Toole","doi":"10.1109/CCST.2005.1594882","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594882","url":null,"abstract":"Current methods of enforcing security policy depend on security patches, anti-virus protections, and configuration control, all updated in the end user's computer at ever decreasing intervals. This research is producing a method of hardening the corporate computer infrastructure by prototyping a mixed hardware and software architecture that enforces policies by pushing distributed security functions closer to the end user's computer, but without modifying, relying on or reconfiguring the end user's computer itself. Previous research has developed highly secure network components. Because it is impractical to replace our entire infrastructure with secure, trusted components, this paper investigates how to improve the security of a heterogeneous infrastructure composed of both trusted and untrusted components.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126722669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Between detection and neutralization 在检测和中和之间
D. G. Adams, M. Snell, M.W. Green, D. Pritchard
{"title":"Between detection and neutralization","authors":"D. G. Adams, M. Snell, M.W. Green, D. Pritchard","doi":"10.1109/CCST.2005.1594846","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594846","url":null,"abstract":"Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信