首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone 改进了使用射频识别的移动电话交易证书机制
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335567
Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.
由于RFID系统的快速发展,现在已经有足够的计算能力来实现交易过程中认证所需的加解密。此外,RFID标签有足够的容量来存储相应的信息。因此,启用RFID的信用卡可以改善传统信用卡在使用过程中出现的潜在安全问题,但是,受RFID标签生产成本的限制,其计算能力和存储容量有限。因此,它无法进行认证机制所需的复杂计算,即传统无线网络中采用的安全技术无法直接移植到非接触式RFID传输中。针对研究中提出的RFID安全问题,提出了许多解决方案。这些研究大多假设RFID读写器与后端数据库之间的通信基础设施是基于有线企业网络环境的,通常将其定义为安全通信通道。然而,在许多应用中,用户需要使用支持RFID的手持设备,如移动电话或pda,通过GSM、GPRS或wi-fi等无线通信协议与后端数据库连接。这些通信通道暴露在不安全的环境中,必须考虑安全问题。本文构建了一个基于移动通信设备(如手机)的RFID系统。我们提出了一个有效和安全的证书机制,使用移动设备作为RFID阅读器与包含RFID标签的信用卡。结果表明,在保证EPC网络的安全性、高效性和兼容性的前提下,可以改善现有的RFID安全问题。
{"title":"An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone","authors":"Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin","doi":"10.1109/CCST.2009.5335567","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335567","url":null,"abstract":"Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Quantum signature mechanism with GHZ states 具有GHZ态的量子签名机制
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335542
Tien-Sheng Lin, Chu-Chuan Lee, S. Kuo
On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally secure communication in the quantum channel. The security of quantum signature schemes is unconditional security. In this paper, a concept, quantum secret sharing which can be used to reconstruct a special relation among sharing party, is proposed. Based on the property of quantum secret sharing, the proposed mechanism uses multiple pairs of four-particle Greenberger-Horne-Zielinger (GHZ) state to reconstruct a special relation among sharing party. By using this relation, we can support the security of quantum signature under an unsafe routing path to provide the message recovery. From the view of a reusing key, the proposed mechanism is key efficiency.
在Internet上,发送方和接收方不能拥有安全的通信通道。窃听可以攻击不安全通道,破坏签名方案的执行过程。在不安全的路由路径下,将会发生来自Eve的多次攻击。在量子密码学中,不可克隆定理、不确定性原理和量子隐形传态等物理特性可以在量子信道中提供无条件的安全通信。量子签名方案的安全性是无条件安全性。本文提出了量子秘密共享的概念,用于重构共享方之间的特殊关系。该机制基于量子秘密共享的特性,利用多对四粒子格林伯格-霍恩-齐林格(GHZ)态重构共享方之间的特殊关系。利用这种关系,我们可以在不安全的路由路径下支持量子签名的安全性,从而提供消息恢复。从密钥重用的角度来看,所提出的机制是密钥效率。
{"title":"Quantum signature mechanism with GHZ states","authors":"Tien-Sheng Lin, Chu-Chuan Lee, S. Kuo","doi":"10.1109/CCST.2009.5335542","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335542","url":null,"abstract":"On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally secure communication in the quantum channel. The security of quantum signature schemes is unconditional security. In this paper, a concept, quantum secret sharing which can be used to reconstruct a special relation among sharing party, is proposed. Based on the property of quantum secret sharing, the proposed mechanism uses multiple pairs of four-particle Greenberger-Horne-Zielinger (GHZ) state to reconstruct a special relation among sharing party. By using this relation, we can support the security of quantum signature under an unsafe routing path to provide the message recovery. From the view of a reusing key, the proposed mechanism is key efficiency.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face tracking and recognition in low quality video sequences with the use of particle filtering 基于粒子滤波的低质量视频序列人脸跟踪与识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335554
L. Stasiak, A. Pacut, Raul Vincente-Garcia
A system for parallel face detection, tracking and recognition in real-time video sequences is being developed. The paper describes its particle filtering based face recognition module, which operates on low quality video sequences and utilizes the results of the preceding phases of face detection and tracking. The temporal information from video sequence is utilized for the purpose of object tracking and identity recognition through knowledge cumulation. The performance of the solution is presented in closed-set and open-set identification scenarios.
一种用于实时视频序列的并行人脸检测、跟踪和识别系统正在开发中。本文介绍了基于粒子滤波的人脸识别模块,该模块在低质量视频序列上运行,并利用了人脸检测和跟踪的前几个阶段的结果。通过知识积累,利用视频序列中的时间信息进行目标跟踪和身份识别。给出了该方法在闭集和开集识别场景下的性能。
{"title":"Face tracking and recognition in low quality video sequences with the use of particle filtering","authors":"L. Stasiak, A. Pacut, Raul Vincente-Garcia","doi":"10.1109/CCST.2009.5335554","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335554","url":null,"abstract":"A system for parallel face detection, tracking and recognition in real-time video sequences is being developed. The paper describes its particle filtering based face recognition module, which operates on low quality video sequences and utilizes the results of the preceding phases of face detection and tracking. The temporal information from video sequence is utilized for the purpose of object tracking and identity recognition through knowledge cumulation. The performance of the solution is presented in closed-set and open-set identification scenarios.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Iris segmentation based on Fuzzy Mathematical Morphology, Neural Networks and ontologies 基于模糊数学形态学、神经网络和本体的虹膜分割
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335510
A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera
Segmentation is one of the most time-consuming steps within the whole process of Iris Recognition. By means of Fuzzy Mathematical Morphology and Neural Networks, this new algorithm can fulfill the task of isolating the Iris, not only with an acceptable accuracy, but also with a very high improvement in terms of time. Furthermore, this innovative scheme presents an ontology able to decide whether the features can be extracted, based on previous segmentation. This paper provides a detailed explanation of both the problem to be solved and how this new approach meets the required goals. Current Iris Recognition algorithms may benefit from this new approach, and what is more, the essence of the algorithm can be extended to other biometric segmentation procedures.
分割是整个虹膜识别过程中最耗时的步骤之一。该算法利用模糊数学形态学和神经网络技术完成虹膜分离的任务,不仅具有可接受的精度,而且在时间上有很高的改进。此外,该创新方案提出了一个本体,能够根据先前的分割来决定是否可以提取特征。本文详细解释了要解决的问题以及这种新方法如何满足所需的目标。现有的虹膜识别算法可能会受益于这种新的方法,更重要的是,该算法的本质可以扩展到其他生物特征分割程序。
{"title":"Iris segmentation based on Fuzzy Mathematical Morphology, Neural Networks and ontologies","authors":"A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera","doi":"10.1109/CCST.2009.5335510","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335510","url":null,"abstract":"Segmentation is one of the most time-consuming steps within the whole process of Iris Recognition. By means of Fuzzy Mathematical Morphology and Neural Networks, this new algorithm can fulfill the task of isolating the Iris, not only with an acceptable accuracy, but also with a very high improvement in terms of time. Furthermore, this innovative scheme presents an ontology able to decide whether the features can be extracted, based on previous segmentation. This paper provides a detailed explanation of both the problem to be solved and how this new approach meets the required goals. Current Iris Recognition algorithms may benefit from this new approach, and what is more, the essence of the algorithm can be extended to other biometric segmentation procedures.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Risk assessment on Instrumentation and Control Network Security Management System for nuclear power plants 核电站仪表与控制网络安全管理系统的风险评估
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335526
Yu-Jen Chen, Gen-Yih Liao, T. Cheng
Modern nuclear power plants have been adopting open standards in their digital networks to enhance extensibility and interoperability. This also opens another possibility for an attacker to intrude into the networks. To prevent digital networks from being attacked, the U.S. Nuclear Regulatory Commission provides guidelines regarding achieving high reliability and design quality requirements. However, quality assurance in hardware/software components is not sufficient to ensure the security of the overall network system. Security policies and sound system administration are also indispensable factors to rigid security. To enhance the level of security protection in the Taiwan nuclear power plants, this investigation aims at the scope of digital instrumentation and control networks in one of the nuclear power plants in Taiwan, takes advantages of the guidelines of RG 1.152, follows the network security standard of NUREG-0800 Appendix 7.1-D and attempts to plan and design an ISMS based on the methodology of BS7799. The result of this investigation will be able to help nuclear power plants to organize and establish the first phase of Instrumentation and Control Network Security Management System (ICNSMS), which thinks over information and network security issues in a comprehensive perspective.
现代核电站在其数字网络中采用开放标准,以增强可扩展性和互操作性。这也为攻击者侵入网络提供了另一种可能性。为了防止数字网络受到攻击,美国核管理委员会提供了关于实现高可靠性和设计质量要求的指导方针。但是,硬件/软件组件的质量保证不足以保证整个网络系统的安全性。安全策略和完善的系统管理也是刚性安全不可缺少的因素。为了提高台湾核电厂的安全防护水平,本研究以台湾某核电厂的数字仪表与控制网络范围为研究对象,利用RG 1.152的指导原则,遵循NUREG-0800附录7.1-D的网络安全标准,并尝试基于BS7799的方法来规划和设计ISMS。本次调查的结果将有助于核电站组织和建立仪表与控制网络安全管理系统(ICNSMS)的第一阶段,该系统从综合的角度考虑信息和网络安全问题。
{"title":"Risk assessment on Instrumentation and Control Network Security Management System for nuclear power plants","authors":"Yu-Jen Chen, Gen-Yih Liao, T. Cheng","doi":"10.1109/CCST.2009.5335526","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335526","url":null,"abstract":"Modern nuclear power plants have been adopting open standards in their digital networks to enhance extensibility and interoperability. This also opens another possibility for an attacker to intrude into the networks. To prevent digital networks from being attacked, the U.S. Nuclear Regulatory Commission provides guidelines regarding achieving high reliability and design quality requirements. However, quality assurance in hardware/software components is not sufficient to ensure the security of the overall network system. Security policies and sound system administration are also indispensable factors to rigid security. To enhance the level of security protection in the Taiwan nuclear power plants, this investigation aims at the scope of digital instrumentation and control networks in one of the nuclear power plants in Taiwan, takes advantages of the guidelines of RG 1.152, follows the network security standard of NUREG-0800 Appendix 7.1-D and attempts to plan and design an ISMS based on the methodology of BS7799. The result of this investigation will be able to help nuclear power plants to organize and establish the first phase of Instrumentation and Control Network Security Management System (ICNSMS), which thinks over information and network security issues in a comprehensive perspective.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human-machine interaction in x-ray screening x射线筛查中的人机交互
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335572
S. Michel, A. Schwaninger
This article discusses different ways to enhance human-machine interaction in x-ray screening, especially regarding x-ray image display technology. It represents a summary of the studies conducted as work package 4 of the EU funded VIA project (www.viaproject.eu). First, important theoretical issues regarding the interpretation of x-ray images are discussed. We then explain how to measure x-ray image interpretation competency using tests built into CBT. This is followed by a summary of studies on how to increase the efficiency in x-ray screening using computer-based training (CBT). We then discuss the relevance of so-called image enhancement functions (IEFs) and the value of multi-view x-ray technology. Finally, we present the results of statistical modeling which allowed us to predict x-ray image difficulty and human performance.
本文讨论了增强x射线筛查中人机交互的不同方法,特别是关于x射线图像显示技术。它是作为欧盟资助的VIA项目(www.viaproject.eu)工作包4进行的研究摘要。首先,讨论了有关x射线图像解释的重要理论问题。然后,我们解释了如何使用CBT内置的测试来测量x射线图像解释能力。接下来是关于如何使用计算机培训(CBT)提高x射线筛查效率的研究总结。然后,我们讨论了所谓的图像增强函数(IEFs)和多视图x射线技术的价值的相关性。最后,我们提出了统计建模的结果,使我们能够预测x射线图像的难度和人的表现。
{"title":"Human-machine interaction in x-ray screening","authors":"S. Michel, A. Schwaninger","doi":"10.1109/CCST.2009.5335572","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335572","url":null,"abstract":"This article discusses different ways to enhance human-machine interaction in x-ray screening, especially regarding x-ray image display technology. It represents a summary of the studies conducted as work package 4 of the EU funded VIA project (www.viaproject.eu). First, important theoretical issues regarding the interpretation of x-ray images are discussed. We then explain how to measure x-ray image interpretation competency using tests built into CBT. This is followed by a summary of studies on how to increase the efficiency in x-ray screening using computer-based training (CBT). We then discuss the relevance of so-called image enhancement functions (IEFs) and the value of multi-view x-ray technology. Finally, we present the results of statistical modeling which allowed us to predict x-ray image difficulty and human performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134246251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Hand geometry identification system performance 手部几何识别系统性能
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335545
Miguel A. Ferrer, Joan Fabregas, M. Faúndez, J. B. Alonso, C. Travieso
The effect of changing the image resolution over a biometric system based on hand geometry is analyzed in this paper. Image resolution is progressively diminished from an initial 120dpi resolution up to 24dpi. The robustness of the examined system is analyzed with 2 databases and two identifiers. The first database acquires the images of the hand underneath whereas the second database acquires the images over the hand. The first classifier identifies with a multiclass support vector machine whereas the second classifier identifies with a neural network with error correction output codes. The four experiments show that an image resolution of 72dpi offers a good trade-off between performance and image resolution for the 15 geometric features used.
本文分析了改变图像分辨率对基于手几何的生物识别系统的影响。图像分辨率从最初的120dpi分辨率逐渐降低到24dpi。用2个数据库和2个标识符对被检测系统的鲁棒性进行了分析。第一数据库获取下面的手的图像,而第二数据库获取上面的手的图像。第一分类器使用多类支持向量机进行识别,第二分类器使用带有纠错输出码的神经网络进行识别。四个实验表明,72dpi的图像分辨率为所使用的15个几何特征提供了良好的性能和图像分辨率之间的权衡。
{"title":"Hand geometry identification system performance","authors":"Miguel A. Ferrer, Joan Fabregas, M. Faúndez, J. B. Alonso, C. Travieso","doi":"10.1109/CCST.2009.5335545","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335545","url":null,"abstract":"The effect of changing the image resolution over a biometric system based on hand geometry is analyzed in this paper. Image resolution is progressively diminished from an initial 120dpi resolution up to 24dpi. The robustness of the examined system is analyzed with 2 databases and two identifiers. The first database acquires the images of the hand underneath whereas the second database acquires the images over the hand. The first classifier identifies with a multiclass support vector machine whereas the second classifier identifies with a neural network with error correction output codes. The four experiments show that an image resolution of 72dpi offers a good trade-off between performance and image resolution for the 15 geometric features used.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124075428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
The interpolation of face/license-plate images using pyramid-based hallucination 基于金字塔幻觉的人脸/车牌图像插值
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335533
Chin-Chuan Han, Yan-Shin Tasi, Chen-Ta Hsieh, Chih-Hsun Chou
Human faces and license plates are the most important targets for many digital surveillance systems. The image quality is too poor to recognize the targets due to the uncontrollable effects such as poor light conditions or far distances from the concerned objects. The cameras are zoomed in to make the targets to be discernible. Image interpolation and super-resolution are two popular techniques for removing the blurry effects of the zoomed images. In this paper, the super-resolution approach is applied on the reconstructions of facial and license plate images. Training samples are collected and their pyramidal edge images are built. The intuition idea for enhancing image quality is to preserve the edge data of the high resolutional images. Face and license plate hallucination are constructed. Some experimental results are conducted to show the effectiveness of the proposed approach. Some conclusions and future works are given.
人脸和车牌是许多数字监控系统最重要的目标。由于光线条件差或距离目标较远等不可控的影响,图像质量差,无法识别目标。摄像机被放大以使目标清晰可辨。图像插值和超分辨率是消除放大图像模糊效果的两种常用技术。本文将超分辨率方法应用于人脸图像和车牌图像的重建。采集训练样本,建立训练样本的金字塔形边缘图像。提高图像质量的直观思路是保留高分辨率图像的边缘数据。人脸和车牌幻觉被构建。实验结果表明了该方法的有效性。最后给出了结论和今后的工作。
{"title":"The interpolation of face/license-plate images using pyramid-based hallucination","authors":"Chin-Chuan Han, Yan-Shin Tasi, Chen-Ta Hsieh, Chih-Hsun Chou","doi":"10.1109/CCST.2009.5335533","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335533","url":null,"abstract":"Human faces and license plates are the most important targets for many digital surveillance systems. The image quality is too poor to recognize the targets due to the uncontrollable effects such as poor light conditions or far distances from the concerned objects. The cameras are zoomed in to make the targets to be discernible. Image interpolation and super-resolution are two popular techniques for removing the blurry effects of the zoomed images. In this paper, the super-resolution approach is applied on the reconstructions of facial and license plate images. Training samples are collected and their pyramidal edge images are built. The intuition idea for enhancing image quality is to preserve the edge data of the high resolutional images. Face and license plate hallucination are constructed. Some experimental results are conducted to show the effectiveness of the proposed approach. Some conclusions and future works are given.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125996950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of open framework for Policy-Based Network Access Control 基于策略的开放式网络访问控制框架的设计与实现
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335564
Surachai Chitpinityon, S. Sanguanpong, K. Koht-Arsa, Jatuporn Chuchuay
currently, the number of users accessing to the network is significantly increasing which requires a tightly control based on the organization policy. Network access control (NAC) is an essential tool focuses on checking and granting permission. In general, NAC requires specific network devices which may not work with the existing devices. In this paper, a Policy-Based Network Access Control framework has been proposed. The framework defines a set of communication between distinctive devices, regardless of brands, in the system. Moreover, the proposed NAC offers more control to the existing generic network equipments.
当前,访问网络的用户数量急剧增加,需要基于组织策略进行严格的控制。网络访问控制(Network access control, NAC)是一种重要的检查和授予权限的工具。一般来说,NAC需要特定的网络设备,这些设备可能与现有设备不兼容。本文提出了一种基于策略的网络访问控制框架。该框架定义了系统中不同设备之间的一组通信,而不考虑品牌。此外,所提出的NAC对现有的通用网络设备提供了更多的控制。
{"title":"Design and implementation of open framework for Policy-Based Network Access Control","authors":"Surachai Chitpinityon, S. Sanguanpong, K. Koht-Arsa, Jatuporn Chuchuay","doi":"10.1109/CCST.2009.5335564","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335564","url":null,"abstract":"currently, the number of users accessing to the network is significantly increasing which requires a tightly control based on the organization policy. Network access control (NAC) is an essential tool focuses on checking and granting permission. In general, NAC requires specific network devices which may not work with the existing devices. In this paper, a Policy-Based Network Access Control framework has been proposed. The framework defines a set of communication between distinctive devices, regardless of brands, in the system. Moreover, the proposed NAC offers more control to the existing generic network equipments.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of threat image projection (TIP) to enhance security performance 利用威胁图像投影(TIP)提高保安性能
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335565
Victoria Cutler, S. Paddock
Threat Image Projection (TIP) is a software system that is used at airports to project images of threat items amongst the passenger baggage being screened by X-ray. The use of TIP is becoming more widespread and is increasingly being included as part of security regulation. This is due to its purported benefits of improved attention and vigilance, and increased exposure to threat items that are linked to improvements in threat detection performance. Further, the data collected by the TIP system can be used to assess individual performance, provide feedback to screeners, and tailor training to specific performance weaknesses; which can generate further performance improvements. However, TIP will only be successful in enhancing security performance if it is used and managed effectively.
威胁图像投影(TIP)是机场使用的一种软件系统,用于在旅客行李中投射x射线扫描的威胁物品图像。TIP的使用正变得越来越广泛,并且越来越多地被纳入安全管理的一部分。这是由于其声称的提高注意力和警惕性的好处,以及增加对威胁项目的暴露,这与威胁检测性能的改进有关。此外,TIP系统收集的数据可用于评估个人绩效,向筛选人员提供反馈,并针对具体绩效弱点进行量身定制培训;这可以产生进一步的性能改进。但是,TIP只有在得到有效使用和管理的情况下,才能成功地增强安全性能。
{"title":"Use of threat image projection (TIP) to enhance security performance","authors":"Victoria Cutler, S. Paddock","doi":"10.1109/CCST.2009.5335565","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335565","url":null,"abstract":"Threat Image Projection (TIP) is a software system that is used at airports to project images of threat items amongst the passenger baggage being screened by X-ray. The use of TIP is becoming more widespread and is increasingly being included as part of security regulation. This is due to its purported benefits of improved attention and vigilance, and increased exposure to threat items that are linked to improvements in threat detection performance. Further, the data collected by the TIP system can be used to assess individual performance, provide feedback to screeners, and tailor training to specific performance weaknesses; which can generate further performance improvements. However, TIP will only be successful in enhancing security performance if it is used and managed effectively.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1