Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335553
Marcos del Pozo-Baños, C. Travieso, J. B. Alonso, Miguel A. Ferrer
Face recognition has been a main object of study, producing robust systems with high reliability. However, these systems face the inconvenience of long processing times which are, in many cases, unwanted. This paper presents a simple face recognition approach from TV video files based on the redundancy of information and a face recognition system used in regular face pictures. More precisely, the model relies on the Wavelet Transform for parameterize faces and Support Vector Machines in order to classify them. After some experiments, the model has shown perfect accuracy in subject detection and recognition, with maximum delay of around 2 seconds.
{"title":"Face Identification based on TV videos","authors":"Marcos del Pozo-Baños, C. Travieso, J. B. Alonso, Miguel A. Ferrer","doi":"10.1109/CCST.2009.5335553","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335553","url":null,"abstract":"Face recognition has been a main object of study, producing robust systems with high reliability. However, these systems face the inconvenience of long processing times which are, in many cases, unwanted. This paper presents a simple face recognition approach from TV video files based on the redundancy of information and a face recognition system used in regular face pictures. More precisely, the model relies on the Wavelet Transform for parameterize faces and Support Vector Machines in order to classify them. After some experiments, the model has shown perfect accuracy in subject detection and recognition, with maximum delay of around 2 seconds.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335544
M. A. El-Iskandarani, S. Darwish, S. Abuguba
Robust and secure transmission strategy for high-quality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission scheme that combines chaotic encryption and turbo coding technique into one processing step is proposed. In the proposed scheme, selective encryption algorithm based on two-dimensional chaotic map is utilized for data security. Furthermore, error correction technique based on turbo coding is employed as channel coding for data communication in order to solve the problem of limited bandwidth and throughput. Simulation results show that the proposed scheme achieves high degree of robustness against channel impairments and improve image quality with acceptable data rates.
{"title":"Reliable wireless error correction technique for secure image transmission","authors":"M. A. El-Iskandarani, S. Darwish, S. Abuguba","doi":"10.1109/CCST.2009.5335544","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335544","url":null,"abstract":"Robust and secure transmission strategy for high-quality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission scheme that combines chaotic encryption and turbo coding technique into one processing step is proposed. In the proposed scheme, selective encryption algorithm based on two-dimensional chaotic map is utilized for data security. Furthermore, error correction technique based on turbo coding is employed as channel coding for data communication in order to solve the problem of limited bandwidth and throughput. Simulation results show that the proposed scheme achieves high degree of robustness against channel impairments and improve image quality with acceptable data rates.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"2 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335534
J. Fortuny-Guasch, P. F. Sammartino, J. Petit
In this paper we extend the investigation on the use of Doppler signatures for human motion detection. As it is well known, human movements generate additional Doppler frequencies on top of the main Doppler carrier. In recent times research has been trying to exploit this effect for dynamic feature extraction and, consequently, automatic target recognition. Here a simulation tool is developed and measurements are presented as a term of comparison. Several scenarios that model arbitrary trajectories and multiple targets are analyzed. Finally we provide an insight into the potential using more than one sensor. This may improve dramatically the performance of the system as it does in many other radar applications.
{"title":"Radar techniques for human gait automatic recognition","authors":"J. Fortuny-Guasch, P. F. Sammartino, J. Petit","doi":"10.1109/CCST.2009.5335534","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335534","url":null,"abstract":"In this paper we extend the investigation on the use of Doppler signatures for human motion detection. As it is well known, human movements generate additional Doppler frequencies on top of the main Doppler carrier. In recent times research has been trying to exploit this effect for dynamic feature extraction and, consequently, automatic target recognition. Here a simulation tool is developed and measurements are presented as a term of comparison. Several scenarios that model arbitrary trajectories and multiple targets are analyzed. Finally we provide an insight into the potential using more than one sensor. This may improve dramatically the performance of the system as it does in many other radar applications.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335560
Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.
{"title":"Optimum tuning of defense settings for common attacks on the web applications","authors":"Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen","doi":"10.1109/CCST.2009.5335560","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335560","url":null,"abstract":"Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335518
Petr Dostálek, V. Vasek, V. Kresálek, M. Navrátil
Paper deals with utilization of audio source localization in security systems especially dedicated for additional securing of larger objects like squares or military basis for instance. Proposed detection system supposes that intruder makes uniquely determinable noise which can be picked up by microphone array. On the basis of real-time signal analysis from each microphone unit direction to acoustic source can be determined. In this paper is presented time-delay estimation method of the direction of arrival of the sound wave which is used in many other practical applications. Experimental part proposes design of the evaluation system consisting of microphone sensory system and standard personal computer equipped with Advantech PCI-1716 multifunction data acquisition card.
{"title":"Utilization of audio source localization in security systems","authors":"Petr Dostálek, V. Vasek, V. Kresálek, M. Navrátil","doi":"10.1109/CCST.2009.5335518","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335518","url":null,"abstract":"Paper deals with utilization of audio source localization in security systems especially dedicated for additional securing of larger objects like squares or military basis for instance. Proposed detection system supposes that intruder makes uniquely determinable noise which can be picked up by microphone array. On the basis of real-time signal analysis from each microphone unit direction to acoustic source can be determined. In this paper is presented time-delay estimation method of the direction of arrival of the sound wave which is used in many other practical applications. Experimental part proposes design of the evaluation system consisting of microphone sensory system and standard personal computer equipped with Advantech PCI-1716 multifunction data acquisition card.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335519
Han Lin, D. Burnett, D. Sheaffer, E. Arnold
Developing and evaluating exterior physical security system alternatives can be a daunting task. Once alternatives are identified, they must be evaluated not to only the set of threats they provide against, but also to other factors such as cost, performance, schedule and environmental impact. This article describes a systematic approach of applying decision analysis tools and techniques to develop, and quantitatively evaluate a set of design alternatives and its associated security technologies. The intent is to provide an annotated checklist to guide security system designers when dealing with uncertainties in exterior physical security system design.
{"title":"Applying decision analysis process to exterior physical security system technology design and selection","authors":"Han Lin, D. Burnett, D. Sheaffer, E. Arnold","doi":"10.1109/CCST.2009.5335519","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335519","url":null,"abstract":"Developing and evaluating exterior physical security system alternatives can be a daunting task. Once alternatives are identified, they must be evaluated not to only the set of threats they provide against, but also to other factors such as cost, performance, schedule and environmental impact. This article describes a systematic approach of applying decision analysis tools and techniques to develop, and quantitatively evaluate a set of design alternatives and its associated security technologies. The intent is to provide an annotated checklist to guide security system designers when dealing with uncertainties in exterior physical security system design.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335521
M. Klima, Petr Dostál
The color TV security cameras are mostly based upon a single-sensor configuration with on-chip CFA (color filter array, Bayer configuration). The impact of different spatial sampling rasters in R G B channels causes an additional image distortion. In the field of security technology the identification task is among very frequent and above-mentioned sampling effect can affect it significantly. There are numerous interpolation algorithms suitable for the demosaicing - recalculation of full resolution R G B rasters. The paper is devoted to the comparison of several selected demosaicing algorithms usually applied in image enhancement of natural images where the subjective image quality is crucial. Our approach is oriented to the evaluation of identification limits in presence of noise and we are studying the noise resistivity of various demosaicing algorithms. We have chosen following demosaicing algorithms: Adaptive Homogeneity-Directed Demosaicing Algorithm and Demosaicing With Directional Filtering and a posteriori Decision and three different types of noise: Photon noise, Thermal noise and salt pepper. In order to evaluate the subjective image quality two approaches are used. The first approach is a standard subjective quality assessment we have applied the identification threshold evaluation. As the second one the objective quality metric of noisy image subjective quality SSIM, Structural SIMilarity index [1] is used. Both identification threshold and subjective quality dependencies are compared in order to evaluate a correlation degree. As test images we have chosen the car registration plate as an example of identification task esp. when the camera is recording images under low-light-level conditions. To keep the noise level precisely defined the test pictures were recorded almost noise-free and the noise was added consequently. The NEF (Nikon Electronic Format) picture format was applied to eliminate in-built image processing in camera.
{"title":"Selected problems of color image demosaicing in security imaging","authors":"M. Klima, Petr Dostál","doi":"10.1109/CCST.2009.5335521","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335521","url":null,"abstract":"The color TV security cameras are mostly based upon a single-sensor configuration with on-chip CFA (color filter array, Bayer configuration). The impact of different spatial sampling rasters in R G B channels causes an additional image distortion. In the field of security technology the identification task is among very frequent and above-mentioned sampling effect can affect it significantly. There are numerous interpolation algorithms suitable for the demosaicing - recalculation of full resolution R G B rasters. The paper is devoted to the comparison of several selected demosaicing algorithms usually applied in image enhancement of natural images where the subjective image quality is crucial. Our approach is oriented to the evaluation of identification limits in presence of noise and we are studying the noise resistivity of various demosaicing algorithms. We have chosen following demosaicing algorithms: Adaptive Homogeneity-Directed Demosaicing Algorithm and Demosaicing With Directional Filtering and a posteriori Decision and three different types of noise: Photon noise, Thermal noise and salt pepper. In order to evaluate the subjective image quality two approaches are used. The first approach is a standard subjective quality assessment we have applied the identification threshold evaluation. As the second one the objective quality metric of noisy image subjective quality SSIM, Structural SIMilarity index [1] is used. Both identification threshold and subjective quality dependencies are compared in order to evaluate a correlation degree. As test images we have chosen the car registration plate as an example of identification task esp. when the camera is recording images under low-light-level conditions. To keep the noise level precisely defined the test pictures were recorded almost noise-free and the noise was added consequently. The NEF (Nikon Electronic Format) picture format was applied to eliminate in-built image processing in camera.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335543
N. Thanthry, G. Gopalakrishnan, R. Pendse
Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing security solutions for VoIP such as IPSec, Secure Real Time Protocol (SRTP) and ZRTP use the standard symmetric encryption algorithms for encrypting voice traffic. In this paper, the authors propose an alternate encryption scheme that uses PKI architecture for the initial authentication and key exchange, and encrypts the real-time traffic with a symmetric algorithm using a unique key for each packet. The proposed algorithm expected to be less complex compared to the traditional encryption schemes in addition to enhancing the security of the communication. Initial analysis carried out by the authors indicates that the proposed scheme helps in improving the voice quality to a certain extent while maintaining the security of the communication.
IP语音正迅速成为传统电路交换PSTN网络的有力竞争者。与需要专用线路的PSTN网络不同,VoIP可以共享为承载数据流量和其他流量类别而布置的网络。考虑到网络通信很容易被黑客入侵,保护VoIP和其他实时通信是必要的。现有的VoIP安全解决方案,如IPSec、SRTP (Secure Real Time Protocol)、ZRTP等,大多采用标准的对称加密算法对语音流量进行加密。在本文中,作者提出了一种替代加密方案,该方案使用PKI体系结构进行初始认证和密钥交换,并使用对称算法对每个数据包使用唯一密钥进行实时流量加密。与传统的加密方案相比,该算法在提高通信安全性的同时,简化了加密方案的复杂度。初步分析表明,该方案在保证通信安全性的同时,在一定程度上提高了语音质量。
{"title":"Alternate encryption scheme for VoIP traffic","authors":"N. Thanthry, G. Gopalakrishnan, R. Pendse","doi":"10.1109/CCST.2009.5335543","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335543","url":null,"abstract":"Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing security solutions for VoIP such as IPSec, Secure Real Time Protocol (SRTP) and ZRTP use the standard symmetric encryption algorithms for encrypting voice traffic. In this paper, the authors propose an alternate encryption scheme that uses PKI architecture for the initial authentication and key exchange, and encrypts the real-time traffic with a symmetric algorithm using a unique key for each packet. The proposed algorithm expected to be less complex compared to the traditional encryption schemes in addition to enhancing the security of the communication. Initial analysis carried out by the authors indicates that the proposed scheme helps in improving the voice quality to a certain extent while maintaining the security of the communication.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124035605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335555
L. Cano, Daniel A. Pritchard1, D. E. Ellis
To design today's complex networks and computerbased physical protection systems require the application of sound Systems Engineering principles and discipline. This paper provides an introduction to using several Systems Engineering tools to design advanced security systems. Examples are given for specific design tasks, and concepts from the US Department of Defense Architecture Framework are introduced.
{"title":"The role of systems engineering in security systems design","authors":"L. Cano, Daniel A. Pritchard1, D. E. Ellis","doi":"10.1109/CCST.2009.5335555","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335555","url":null,"abstract":"To design today's complex networks and computerbased physical protection systems require the application of sound Systems Engineering principles and discipline. This paper provides an introduction to using several Systems Engineering tools to design advanced security systems. Examples are given for specific design tasks, and concepts from the US Department of Defense Architecture Framework are introduced.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335548
A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera
Hand Biometric Recognition not only gathers a good performance in identifying individuals but also it is known to be a non-invasive biometric technique. Furthermore, there exist new trends towards mobile implementation developments, focusing on embedding current biometric systems in mobile devices. This paper aims to implement hand biometric recognition with mobile devices.
{"title":"Silhouette-based hand recognition on mobile devices","authors":"A. de Santos Sierra, J. Casanova, C. S. Ávila, V. J. Vera","doi":"10.1109/CCST.2009.5335548","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335548","url":null,"abstract":"Hand Biometric Recognition not only gathers a good performance in identifying individuals but also it is known to be a non-invasive biometric technique. Furthermore, there exist new trends towards mobile implementation developments, focusing on embedding current biometric systems in mobile devices. This paper aims to implement hand biometric recognition with mobile devices.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134264393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}