{"title":"Towards microscope-video-based fire-detection","authors":"T. Schultze, I. Willms","doi":"10.1109/CCST.2005.1594868","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594868","url":null,"abstract":"Nowadays, video-based fire-detection is a nearly common application, as the number of installed surveillance video-systems is growing and the related processing units getting more powerful. The fire-detection-feature is usually only an add-on feature of 'intelligent' surveillance video-systems. The detection-criteria are therefore based on macroscopic characteristics observable in the surveillance video, like particular smoke dynamics, flame flickering or loss of image contrast due to obscuration by the smoke. In a new approach not the macroscopic, but the microscopic characteristics of aerosols are analysed with view to a more reliable discrimination between fire and non-fire aerosols. By monitoring an illuminated sheet of air some centimeters under the ceiling of a room, it is possible to get information about a limited range of the particle size distribution, density and flow characteristics of the suspended aerosol. A prototype of the scanning system has been developed and a series of test-fires (according to the EN54) and non-fire tests has been carried out in the Duisburg-Fire-Detection-Laboratory. The comparison between the test-fires and the non-fire scenarios shows that the discrimination between fire and non-fire aerosols is cogitable. The analyses of the aerosol characteristics are based on adapted pattern recognition techniques applied in the image processing. Some differences between different aerosol types are even visible to the naked eye. This paper presents the developed prototype specifying important features. Afterwards the most interesting results are shown and commented. Finally, the possibilities and limitations of an automatic fire-detection system based on the microscope-video analysis are discussed.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scenario based threat detection and attack analysis","authors":"P. Hsiu, Chin-Fu Kuo, Tei-Wei Kuo, E.Y.T. Juan","doi":"10.1109/CCST.2005.1594819","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594819","url":null,"abstract":"This paper targets two essential issues in intrusion detection system designs: the optimization of rule selection and the attack discovery in attack analysis. A scenario-based approach is proposed to correlate malicious packets and to intelligently select intrusion detection rules to fire. We propose algorithms for rule selection and attack scenario identification. Potential threats and their relationship for a gateway and Web-server applications are explored as an example in the study. The proposed algorithms are implemented over Snort, a signature-based intrusion detection system, for which we have some encouraging performance evaluation results.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of security inspection networking system development in China airports and its trend in the future","authors":"D. Li, Huimin Chen","doi":"10.1109/CCST.2005.1594825","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594825","url":null,"abstract":"A new security inspection networking system, meeting objectives and functions required by the scheme of flow renovation of security inspection (FRSI) from Civil Aviation Administration of China (CAAC), was first developed and quickly deployed in many airports in China in the 1990's for 100% checked bag screening. During these years, the system was modified and retrofitted to integrate data from different inspection equipment, together packed with data of passenger and screener. This guarantees the consistency of the images and relevant passengers and keep screeners highly alert on duty. A broad marketing demand is still existed nowadays due to its special advantages. Although newly developed screening equipment such as advanced technology (AT) equipment and explosive detection system (EDS) have been widely used today, we still face the challenge of building a networked security inspection management system for all enforcement departments in airport. More work should be done to meet the needs and the forward steps never stop.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured key exchange protocol in wireless mobile ad hoc networks","authors":"S. Liaw, Pin-Chang Su, H. Chang, E. Lu, S. Pon","doi":"10.1109/CCST.2005.1594839","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594839","url":null,"abstract":"Wireless mobile ad hoc networks (MANET) are an emerging area of mobile computing. Security issues concerning MANET are attracting increasing attention nowadays. MANET is a new wireless networking paradigm without a fixed infrastructure, and includes base stations or mobile switching centers. Mobile nodes rely on each other to maintain the network connection. In this paper, a secured identity-based key exchange protocol is proposed for networks in environments without any public key infrastructure. This investigation proposes a secured key exchange protocol without the auxiliary of certification authority for application to wireless mobile ad hoc networks. This protocol solved the security problem in the MANET and is suitable for application to other wired network structures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New detection algorithm of extended targets for radar and electro optical sensors","authors":"J.C. Gallego, F.P. Martinez, A. Asensio-López","doi":"10.1109/CCST.2005.1594851","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594851","url":null,"abstract":"This paper presents a new technique able to detect extended targets (small ones and big ones) (Ostrovityanov and Basalov, 1985), under very low signal to noise ratios (SNR) and signal to clutter ratios (SCR) with a high probability of detection and a low probability of false alarm. The method is based on the calculation of some modified statistical descriptors (Gonzalez and Woods, 2002), and the peak plots (Rihaczek and Hershkowitz, 2000) from raw sensor image. The peak plots are extracted by means of the shift-and-convolution technique (Perez Martinez et al., 2001). Experimental results are also presented demonstrating the quality of this technique. Experimental results have been obtained with ARIES radar (Perez et al., 2002), a surface marine and coast surveillance LFM-CW high resolution radar (HRR) (Wehner, 1995) developed by INDRA SISTEMAS S.A. in collaboration with the Technical University of Madrid. The Spanish Ministry of Defence has founded this research.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent video systems for perimeter and secured entry access control","authors":"D.L. Wilson","doi":"10.1109/CCST.2005.1594822","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594822","url":null,"abstract":"The continued threat of terrorism has spurred the development of sophisticated systems that enhance transportation security and monitoring. Much emphasis has been placed on systems that facilitate threat identification and responder intervention and enable the tracking and identification of people inside, outside or along perimeters of transportation facilities (airports, railways, ports, etc.). The most unpredictable element in any transportation facility is the sheer number of people having access. Identifying a suspicious individual or a threatening activity and then monitoring a person or threat through a crowded and unpredictable path present a most challenging task for even the most experienced of security personnel. Automated intelligent video systems are gaining in popularity and capitalize on advances in computer, camera and networking hardware, as well as the maturation of computer imaging and vision algorithms. These systems are designed to integrate with legacy systems and enhance existing infrastructure protection to facilitate an effective and risk favorable apprehension of security violators/intruders.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Navarro, J. A. Ortega-Ruiz, J. Garcia, S. Robles
{"title":"Secure agent-based management for pervasive environments","authors":"G. Navarro, J. A. Ortega-Ruiz, J. Garcia, S. Robles","doi":"10.1109/CCST.2005.1594864","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594864","url":null,"abstract":"A typical pervasive computing scenario may consist of a wide range of devices interconnected through ad-hoc networks. One of the problems that pervasive computing introduces is the management and interaction between these devices, as well as the security implications of this management. We present in this paper an architecture, which provides initial mechanisms to solve these problems. Inspired by trust management systems, our architecture is built on top of a multi-agent system. However, our proposal is sufficiently open to allow the integration with other technologies. Results of our work can be easily applied to existing pervasive computing software and associated technologies.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perimeter intruder detection systems performance standard","authors":"D. Armstrong, C. Peile","doi":"10.1109/CCST.2005.1594845","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594845","url":null,"abstract":"This paper includes discussion of the main high level principles upon which the development of the standards is based. These are: impartiality; objectivity; reproducibility (precision by other organisations); repeatability (precision by the same tester); validity and, of course, accuracy. A comparison is made between application and technology specific based testing in order to demonstrate why the former is most suited to the PIDS performance standard. The paper then addresses the key characteristics of a PIDS (false alarm rate, detection rate, and vulnerability to defeat) and suggest how these could be assessed as part of a general evaluation methodology in order to give the end user the required level of information. Finally, an update on the progress of the drafting of the standard is given","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital text watermarking: secure content delivery and data hiding in digital documents","authors":"M. Qadir, I. Ahmad","doi":"10.1109/MAES.2006.284353","DOIUrl":"https://doi.org/10.1109/MAES.2006.284353","url":null,"abstract":"Secure communication of data over public channel is one of the most important challenges. Both the activities to secure contents and to break security are very hot. In order to reduce the chances of attack, security need to be made invisible. Need to preserve originality, ownership information and integrity of text documents in a way that cannot be identified by every one is being felt badly. Watermarking of the documents is a step towards achieving these objectives. However to watermark a plain text document (ASCII) in a way that original text is not changed and it would be very difficult to break it, is a great challenge. We have developed a novel encoding scheme, which can be used to insert information in a plain text without changing the text. A system has been developed based upon this encoding scheme. This paper describes the system and demonstrates its working.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security evaluation methodology for smart cards against electromagnetic analysis","authors":"Huiyun Li, A. T. Markettos, S. Moore","doi":"10.1109/CCST.2005.1594857","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594857","url":null,"abstract":"Cryptographic processors can be vulnerable in electromagnetic analysis (EMA) attacks due to their EM side-channel leakage. A design-time security evaluation methodology has been proposed to assess the security level of cryptographic processors against EMA attacks. This EM simulation methodology involves current flow simulation, chip layout parasitics extraction then data processing to simulate direct EM emissions or modulated emissions. The proposed simulation methodology can be easily employed in the framework of an integrated circuit (IC) design flow to perform a systematic EM characteristics analysis","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}