{"title":"A fast and accurate tracking approach for automated visual surveillance","authors":"E. Sánchez-Nielsen, M. Hernández-Tejera","doi":"10.1109/CCST.2005.1594873","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594873","url":null,"abstract":"Currently, object detection and tracking as well as behavior analysis represent one of the main problems to be solved in automated visual surveillance. In this paper, a fast and accurate computer vision module that can track objects in unrestricted environments is described. The proposed approach is aimed at tracking arbitrary shapes on dynamic changing environments without any assumption on the nature and speed of the objects. The tracker approach exploits shape and motion information through a predicting-matching-updating paradigm. The described approach does not need a priori 2D model of the target object to be tracked.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124345618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Rabadán, S. Perez, R. Perez, F. Delgado, M. A. Bacallado
{"title":"Wireless optical spread spectrum communications. Data security improvement in wireless links","authors":"J. Rabadán, S. Perez, R. Perez, F. Delgado, M. A. Bacallado","doi":"10.1109/CCST.2005.1594831","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594831","url":null,"abstract":"This paper introduces new techniques for improving the security level of the wireless optical systems. In this way, we are going to use modulation schemes based on spread spectrum theory. These techniques had been developed for military applications in order to obtain reliable and secure communications, so they seem to be a good candidate for our systems. Spread spectrum systems perform a data encryption in the modulation process, and they are able to work in presence of high level interference and intentional jamming signals. On the other hand, these schemes can be also applied to optical barriers and perimeter control systems, because the spread spectrum signal improves the robustness and invulnerability of the security barriers","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125986059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multibiometric techniques and standards activities","authors":"R. Lazarick","doi":"10.1109/CCST.2005.1594883","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594883","url":null,"abstract":"The concepts of applying multiple biometric techniques or devices to solve the practical problems that plague biometric deployments have been under development, and analysis for some time. The benefits promised include reduced error rates, better enrollment and higher levels of user acceptance. However, these benefits come at a cost, not necessarily the initial implementation costs, but also the investment in accumulating historical data for sensor characterization, development and tuning of computationally complex systems, and possibly in terms of user inconvenience and/or satisfaction. This paper provides a basis for the discussion and analysis of multibiometric systems. Clear and precise terminology is offered to promote efficient communication within the technical community. A framework is proposed that supports the development, of international standards that will promote the deployment and interoperability of these advanced biometric systems. Hypothetical examples of multibiometric system designs are used to illustrate the concepts and to explore the benefits and costs. And lastly, this paper formulates a challenge to the multibiometric analysis community to recognize and understand the tradeoff between system complexity and achieved benefits.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Server-aided digital signature protocol based on password","authors":"Yong-Zhong He, Chuankun Wu, Deng-guo Feng","doi":"10.1109/CCST.2005.1594836","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594836","url":null,"abstract":"Digital signature is a cryptographic mechanism widely used in secure communications. Although there are many digital signature schemes with firm mathematical foundations, one of the biggest concerns is how to protect the private keys from disclosure in applications. To counter this problem, we suggest splitting the signature private key into two parts and storing in two well-protected servers, and the client may get signatures through the protocol SADS proposed in this paper. With SADS, the client only needs to provide a password to get a message to be signed with the help of the two severs. The private key is not exposed if only one of the servers is compromised or misused by the server administrator, which greatly decreases the possibility of the corruption of a signature private key and facilitates the mobility of the signing services. Furthermore, various signing policies can be enforced in the servers, such as revocation of the private key, delegation of signature rights, signature with tune constraints, content-sensitive signatures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127772877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An alert communication infrastructure for a decentralized attack prevention framework","authors":"J. Garcia, J. Borrell, M. Jaeger, G. Muhl","doi":"10.1109/CCST.2005.1594878","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594878","url":null,"abstract":"The cooperation between the different entities of a decentralized prevention system can be solved efficiently using the publish/subscribe communication model. Here, clients can share and correlate alert information about the systems they monitor. In this paper, we present the advantages and convenience in using this communication model for a general decentralized prevention framework. Additionally, we outline the design for a specific architecture, and evaluate our design using a freely available publish/subscribe message oriented middleware","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"49 39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security management metrics development","authors":"S. Herrera","doi":"10.1109/CCST.2005.1594818","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594818","url":null,"abstract":"It is commonly accepted that you cannot improve what you can not measure. This concept is applicable to almost all the departments of an organization (financial, production, human resources, quality, etc.). However, in a lot of organizations the information system area, and more concretely the information security area, does not base its decisions on quantifiable, measurable, comparable and contrastable data, but on the experience of its managers. It is essential for an organization to place indicators for obtaining information on the information security control's effectiveness, so that problems can be detected as soon as possible.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donald Witters, V. Buzduga, S. Seidman, Wolfgang Kainz, Jon P. Casamento, P. Ruggera
{"title":"Hand-held metal detectors and medical devices: measurements and testing for electromagnetic compatibility","authors":"Donald Witters, V. Buzduga, S. Seidman, Wolfgang Kainz, Jon P. Casamento, P. Ruggera","doi":"10.1109/CCST.2005.1594830","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594830","url":null,"abstract":"This work examines the electromagnetic compatibility (EMC) of several priority medical devices, such as implanted cardiac pacemakers and implanted nerve stimulators, with the emissions from 28 different hand-held metal detectors (HHMDs). The HHMD emissions were measured and mapped to assess the waveforms, magnitude, and distribution of emission field strengths. Testing with the sample medical devices was performed using a saline filled torso simulator for the implantable type devices. Emissions from the HHMDs were observed to disrupt the function of some of the sample medical devices. One HHMD exhibited significantly higher emissions than the other metal detectors, and caused significant disruptions on several of the sample medical device. The findings and data from this work are being used to help develop standards for characterizing the performance of medical devices","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cross-site patch management model and architecture design for large scale heterogeneous environment","authors":"Chuan-Wen Chang, Dwen-Ren Tsai, J. Tsai","doi":"10.1109/CCST.2005.1594837","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594837","url":null,"abstract":"Many reports indicated that most damages caused by computer viruses and hackers' attacks are due to management problems. Computing environments implementing well managed patch management processes with quick response mechanisms survive from most of serious attacks, such as My Doom and Sasser Warm attacks in 2004. Medium or large enterprises usually have heterogeneous computing environments. For example, a company may use an Apache server in a Linux-base PC as its Internet Web server, use an IBM AIX running IBM DB2 database system as a database server, and equip all employees with Windows-based PCs running Microsoft Office for their daily work. Also, employees might work at many different locations. In the enterprise patch management (PM) market today, there are very few complete off-the-shelf solutions. A systematic efficient PM process model with complete patch management activity process cycle and patching strategies was proposed. We also propose an automatic five-layer PM system application architecture supporting heterogeneous environment. The model, hopefully, makes enterprise patch process more efficient, and reduces the risks suffer from patch management challenges.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of hand geometry at Purdue University's Recreational Center: an analysis of user perspectives and system performance","authors":"E. Kukula, S. Elliott","doi":"10.1109/CCST.2005.1594879","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594879","url":null,"abstract":"This paper discusses the implementation issues of installing a commercially available hand geometry system in the current infrastructure of Purdue University's Recreational Sports Center. In addition to a performance analysis of the system, a pre- and post- data collection survey was distributed to the 129 test subjects gathering information on perceptions of biometrics, in particular hand geometry, as well as participants' thoughts and feelings during their interaction with the hand geometry device. The results of the survey suggest that participants were accepting of hand geometry. Additionally, analyses of the participants' survey responses revealed that 93% liked using hand geometry, 98% thought it was easy to use, and 87% preferred it to the existing card-based system, while nobody thought the device invaded their personal privacy. System performance achieved a 3-try match rate of 99.02% (FRR 0.98%) when \"gaming\"/potential impostor attempts were removed from analysis. The failure to enroll rate was zero. Statistical analyses exposed a significant difference in the scores of attempts made by users with prior hand geometry usage, and subjects that could not straighten out their hand on the device. However, there were no statistical difference in the effects of rings/no rings, improper hand placements/proper hand placements, or gender on hand geometry' score.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the manufacturing environment using biometrics","authors":"S. Modi, S. Elliott","doi":"10.1109/CCST.2005.1594880","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594880","url":null,"abstract":"Over the past decade, there has been substantial growth in global business, of which the manufacturing industry plays a large part. This, accompanied by an increase in intelligent manufacturing equipment, increased connectivity of equipment and software both internally within a company, and with external partners has led to an increase in the probability of attacks and threats to these systems. Combine this with the current events and the additional requirements of governmental regulation, and several businesses in advanced manufacturing have to increase both physical and logical security. This paper outlines a unique application of biometrics and computer integrated manufacturing systems as part of providing an applied solution to solving security problems for manufacturing and control systems, and adhering to government regulations related to the manufacturing industry.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}