首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
Threat modeling for virtual directory services 虚拟目录服务的威胁建模
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335550
W. Claycomb, Dongwan Shin
Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual directories remain largely unstudied. In this paper, we present an analysis of four types of attacks on virtual directory services. In doing so, we describe how each is performed, and discuss how to detect and prevent each type of attack. This first step towards protecting virtual directory services is critical to protecting the information contained in the source directories - information which could potentially contain sensitive data and be used for authentication and/or access control decisions.
目录服务是负责提供有关用户帐户、计算机帐户、联系人等信息的公司计算对象。虚拟目录是整合这些数据的强大工具,可以在必要时对其进行修改,并以高度自定义的方式将其呈现给最终用户。虽然针对目录服务的攻击已经被识别出来,但针对虚拟目录的攻击和漏洞在很大程度上仍未被研究。在本文中,我们对虚拟目录服务的四种类型的攻击进行了分析。在此过程中,我们将描述每种攻击是如何执行的,并讨论如何检测和预防每种类型的攻击。保护虚拟目录服务的第一步对于保护源目录中包含的信息至关重要——这些信息可能包含敏感数据,并用于身份验证和/或访问控制决策。
{"title":"Threat modeling for virtual directory services","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/CCST.2009.5335550","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335550","url":null,"abstract":"Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual directories remain largely unstudied. In this paper, we present an analysis of four types of attacks on virtual directory services. In doing so, we describe how each is performed, and discuss how to detect and prevent each type of attack. This first step towards protecting virtual directory services is critical to protecting the information contained in the source directories - information which could potentially contain sensitive data and be used for authentication and/or access control decisions.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Home system and personal health information management 家庭系统和个人健康信息管理
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335525
R. Volner, V. Smrž, P. Bores
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other.
安防网络智能一词被广泛应用于通信安防网络领域。基于安全网络智能的概念,智能流、智能路由、智能web交换等一系列新的、潜在的概念和产品已经被引入。许多智能系统专注于特定的安全服务、功能或设备,并没有提供真正的端到端服务网络智能。真正的安全网络智能需要的不仅仅是一组不相连的元素,它需要一个相互连接和功能耦合的架构,使各个功能层能够相互交互和通信。
{"title":"Home system and personal health information management","authors":"R. Volner, V. Smrž, P. Bores","doi":"10.1109/CCST.2009.5335525","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335525","url":null,"abstract":"The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129634570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining hand biometric traits for personal identification 结合手部生物特征进行个人识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335547
Miguel A. Ferrer, A. Morales, C. Travieso, J. B. Alonso
The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture and vein pattern of hand dorsum is presented.
自2003年以来,手部生物特征融合一直是一个非常活跃的研究课题。本文第一部分简要介绍了结合手部生物特征的技术。总结表明,为了提高基于手的生物识别方案的性能,增加新的基于手的特征有明显的趋势,因此,本文提出了一种结合手几何、掌纹、手指纹理和手背静脉模式的实验。
{"title":"Combining hand biometric traits for personal identification","authors":"Miguel A. Ferrer, A. Morales, C. Travieso, J. B. Alonso","doi":"10.1109/CCST.2009.5335547","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335547","url":null,"abstract":"The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture and vein pattern of hand dorsum is presented.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Automated Facial Expression Recognition System 自动面部表情识别系统
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335546
Andrew H. Ryan, J. F. Cohn, S. Lucey, Jason M. Saragih, P. Lucey, F. de la Torre, Adam Rossi
Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop “non-intrusive” technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve investigative capabilities. Facial expressions have the ability to communicate emotion and regulate interpersonal behavior. Over the past 30 years, scientists have developed human-observer based methods that can be used to classify and correlate facial expressions with human emotion. However, these methods have proven to be labor intensive, qualitative, and difficult to standardize. The Facial Action Coding System (FACS) developed by Paul Ekman and Wallace V. Friesen is the most widely used and validated method for measuring and describing facial behaviors. The Automated Facial Expression Recognition System (AFERS) automates the manual practice of FACS, leveraging the research and technology behind the CMU/PITT Automated Facial Image Analysis System (AFA) system developed by Dr. Jeffery Cohn and his colleagues at the Robotics Institute of Carnegie Mellon University. This portable, near real-time system will detect the seven universal expressions of emotion (figure 1), providing investigators with indicators of the presence of deception during the interview process. In addition, the system will include features such as full video support, snapshot generation, and case management utilities, enabling users to re-evaluate interviews in detail at a later date.
对个人在面谈和审讯期间所受待遇的高度关注,促使人们努力发展“非侵入性”技术,以便在各种敏感环境中迅速评估个人陈述的可信度。有可能精确集中调查资源的方法或流程将推进卓越的行动并提高调查能力。面部表情具有交流情绪和调节人际行为的能力。在过去的30年里,科学家们开发了基于人类观察者的方法,可以用来对面部表情与人类情绪进行分类和关联。然而,这些方法已被证明是劳动密集型的,定性的,难以标准化。由Paul Ekman和Wallace V. Friesen开发的面部动作编码系统(FACS)是测量和描述面部行为的最广泛使用和验证的方法。自动面部表情识别系统(AFERS)利用卡内基梅隆大学机器人研究所Jeffery Cohn博士及其同事开发的CMU/PITT自动面部图像分析系统(AFA)系统背后的研究和技术,使FACS的手动操作自动化。这种便携式、接近实时的系统将检测七种普遍的情绪表达(图1),为调查人员提供在采访过程中是否存在欺骗的指标。此外,该系统还将包括完整视频支持、快照生成和案例管理实用程序等功能,使用户能够在以后详细地重新评估面试。
{"title":"Automated Facial Expression Recognition System","authors":"Andrew H. Ryan, J. F. Cohn, S. Lucey, Jason M. Saragih, P. Lucey, F. de la Torre, Adam Rossi","doi":"10.1109/CCST.2009.5335546","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335546","url":null,"abstract":"Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop “non-intrusive” technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve investigative capabilities. Facial expressions have the ability to communicate emotion and regulate interpersonal behavior. Over the past 30 years, scientists have developed human-observer based methods that can be used to classify and correlate facial expressions with human emotion. However, these methods have proven to be labor intensive, qualitative, and difficult to standardize. The Facial Action Coding System (FACS) developed by Paul Ekman and Wallace V. Friesen is the most widely used and validated method for measuring and describing facial behaviors. The Automated Facial Expression Recognition System (AFERS) automates the manual practice of FACS, leveraging the research and technology behind the CMU/PITT Automated Facial Image Analysis System (AFA) system developed by Dr. Jeffery Cohn and his colleagues at the Robotics Institute of Carnegie Mellon University. This portable, near real-time system will detect the seven universal expressions of emotion (figure 1), providing investigators with indicators of the presence of deception during the interview process. In addition, the system will include features such as full video support, snapshot generation, and case management utilities, enabling users to re-evaluate interviews in detail at a later date.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
The application research of airport security information management system on the field of civil aviation security 机场安全信息管理系统在民航安全领域的应用研究
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335522
Wu Wei
The airport security information management system (ASIMS) has been playing very important role i preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database in order to supply proper information to the airport. With the development of aviation security technology, many advance security device are emerged and increase the security level significantly. But at the same time, mass data is poured into the existing ASIMS. The system raise higher requirement to data transmission and data-mining technologies. Based on the investigation and research on the existing ASIMS, the paper concludes the functions and configuration of the system used in airport and presents some problems of the system for further modifying when system is constructed and related standards are established. All the efforts are to make the system serve for the aviation security more efficient, safe and effective.
机场安全信息管理系统(ASIMS)在防止飞机被劫持、恐怖袭击和其他非法干扰行为方面发挥着非常重要的作用。该系统通过对安检点采集的数据进行分析和挖掘,并存储在中央服务器数据库中,将机场的各种安检信息整合为一个有机整体,为机场提供合适的信息。随着航空安检技术的发展,出现了许多先进的安检装置,大大提高了安检水平。但与此同时,大量数据被注入到现有的ASIMS中。该系统对数据传输和数据挖掘技术提出了更高的要求。本文在对现有ASIMS系统进行调查研究的基础上,总结了该系统在机场应用的功能和配置,并提出了该系统存在的问题,以便在系统建设和制定相关标准时进行进一步修改。所有这些努力都是为了使该系统更加高效、安全、有效地为航空安全服务。
{"title":"The application research of airport security information management system on the field of civil aviation security","authors":"Wu Wei","doi":"10.1109/CCST.2009.5335522","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335522","url":null,"abstract":"The airport security information management system (ASIMS) has been playing very important role i preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database in order to supply proper information to the airport. With the development of aviation security technology, many advance security device are emerged and increase the security level significantly. But at the same time, mass data is poured into the existing ASIMS. The system raise higher requirement to data transmission and data-mining technologies. Based on the investigation and research on the existing ASIMS, the paper concludes the functions and configuration of the system used in airport and presents some problems of the system for further modifying when system is constructed and related standards are established. All the efforts are to make the system serve for the aviation security more efficient, safe and effective.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure device pairing using audio 使用音频保护设备配对
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335562
W. Claycomb, Dongwan Shin
Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using locationlimited channels to transmit secure pairing information that can be verified as originating from the intended device, enabling users to establish secure channels over insecure mediums. Of particular interest is using audio as a location-limited channel, due to the widespread deployment of audio capabilities on mobile devices. We describe a solution for secure device pairing using audio, called UbiSound, which only requires a single audio transmission to authenticate both devices. We describe our communication protocol, implementation details and results, and discuss how our solution is resistant to a number of attacks. Additionally, we emphasize how our solution is usable for visually impaired users.
移动设备之间的安全设备配对是一项具有挑战性的任务。缺乏可信的权威和较低的计算能力使得移动设备难以在泛在计算环境中建立安全的通信通道。已经提出了使用位置限制通道来传输安全配对信息的解决方案,这些信息可以被验证为来自预期设备,从而使用户能够在不安全的介质上建立安全通道。由于音频功能在移动设备上的广泛部署,我们特别感兴趣的是将音频用作位置受限的信道。我们描述了一种使用音频的安全设备配对解决方案,称为UbiSound,它只需要一个音频传输来验证两个设备。我们描述了我们的通信协议、实现细节和结果,并讨论了我们的解决方案如何抵抗多种攻击。此外,我们强调我们的解决方案如何对视障用户可用。
{"title":"Secure device pairing using audio","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/CCST.2009.5335562","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335562","url":null,"abstract":"Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using locationlimited channels to transmit secure pairing information that can be verified as originating from the intended device, enabling users to establish secure channels over insecure mediums. Of particular interest is using audio as a location-limited channel, due to the widespread deployment of audio capabilities on mobile devices. We describe a solution for secure device pairing using audio, called UbiSound, which only requires a single audio transmission to authenticate both devices. We describe our communication protocol, implementation details and results, and discuss how our solution is resistant to a number of attacks. Additionally, we emphasize how our solution is usable for visually impaired users.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Standardised procedures for evaluating PIDS — An update 评估PIDS的标准化程序-更新
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335535
J. Thompson, Craig Devine, Carinna Brown, S. Tarr
The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development of these standards and subsequent evaluations is discussed. Particular emphasis is given to the new standard for rapidly deployable PIDS and the current ongoing trial of several free-standing PIDS, using a purpose-built evaluation area. The evaluation area is comprised of 100m long, 7m wide tarmac and gravel strips, which run parallel to each other and allow a comparison of the performance of the same PIDS technology types over different surfaces. This will be the first free-standing PIDS evaluation conducted against the newly developed evaluation standard. It is expected to yield results on the effects that different surfaces may have on the performance of free-standing PIDS.
英国内政部科学发展部门与国家基础设施保护中心合作,一直在开发一套测试屏障安装、地面、独立和快速部署的周边入侵者检测系统(PIDS)的标准。这些标准允许在性能基础上比较不同的技术。讨论了这些标准的制定进展和随后的评价。特别强调了快速部署PIDS的新标准和目前正在使用专门建造的评价区试验几个独立的PIDS。评估区域由100米长、7米宽的柏油路和砾石条组成,它们彼此平行,可以比较相同的pid技术类型在不同表面上的性能。这将是根据新制定的评价标准进行的第一次独立的pid评价。期望得到不同表面对独立式pid性能影响的结果。
{"title":"Standardised procedures for evaluating PIDS — An update","authors":"J. Thompson, Craig Devine, Carinna Brown, S. Tarr","doi":"10.1109/CCST.2009.5335535","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335535","url":null,"abstract":"The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development of these standards and subsequent evaluations is discussed. Particular emphasis is given to the new standard for rapidly deployable PIDS and the current ongoing trial of several free-standing PIDS, using a purpose-built evaluation area. The evaluation area is comprised of 100m long, 7m wide tarmac and gravel strips, which run parallel to each other and allow a comparison of the performance of the same PIDS technology types over different surfaces. This will be the first free-standing PIDS evaluation conducted against the newly developed evaluation standard. It is expected to yield results on the effects that different surfaces may have on the performance of free-standing PIDS.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Selection and pre-employment assessment in aviation security x-ray screening 航空安检x光检查的甄选及职前评估
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335571
A. Bolfing, A. Schwaninger
This document concentrates on how aviation security can be largely improved by selecting the right people for the x-ray screening task. X-ray images dispose of a different colour range, single objects superimpose each other independently of whether they are in front or behind of each other, and the single objects look very different from what they look like under natural light. Therefore, individual visual abilities such as mental rotation, figure-ground segregation, or visual search of specific patterns are very important for the correct interpretation of x-ray images. In this paper we briefly discuss job and task analysis, as well as cognitive task analysis in x-ray screening. We then discuss tests used in pre-employment assessment, including a more detailed presentation of the X-Ray Object Recognition Test (X-Ray ORT). Finally, a new project is presented in which a cognitive test battery is developed to measure important visual abilities needed in x-ray screening and related tasks.
本文件的重点是如何通过选择合适的人员进行x射线检查任务来大大提高航空安全。x射线图像处理不同的颜色范围,单个物体相互叠加,无论它们是在彼此的前面还是后面,单个物体看起来与自然光下的样子大不相同。因此,个体心理旋转等视觉能力,图形-背景分离,或视觉搜索特定的模式是非常重要的x射线图像的正确解释。本文简要讨论了x射线筛查中的工作和任务分析,以及认知任务分析。然后,我们讨论了就业前评估中使用的测试,包括更详细的x射线物体识别测试(x射线ORT)。最后,提出了一个新的项目,其中开发了一个认知测试电池,以测量x射线筛查和相关任务所需的重要视觉能力。
{"title":"Selection and pre-employment assessment in aviation security x-ray screening","authors":"A. Bolfing, A. Schwaninger","doi":"10.1109/CCST.2009.5335571","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335571","url":null,"abstract":"This document concentrates on how aviation security can be largely improved by selecting the right people for the x-ray screening task. X-ray images dispose of a different colour range, single objects superimpose each other independently of whether they are in front or behind of each other, and the single objects look very different from what they look like under natural light. Therefore, individual visual abilities such as mental rotation, figure-ground segregation, or visual search of specific patterns are very important for the correct interpretation of x-ray images. In this paper we briefly discuss job and task analysis, as well as cognitive task analysis in x-ray screening. We then discuss tests used in pre-employment assessment, including a more detailed presentation of the X-Ray Object Recognition Test (X-Ray ORT). Finally, a new project is presented in which a cognitive test battery is developed to measure important visual abilities needed in x-ray screening and related tasks.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Capacity and quality improvement in blind second generation watermarking 盲二代水印的容量和质量改进
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335552
M. A. El-Iskandarani, S. Darwish, A. Abubahia
For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes the consideration of good image quality. In the proposed scheme, the host image is normalized by fast technique to resist geometric attacks and reduce the computational time. The normalized image is then transformed using parametric bi-orthogonal integer lifting wavelet transform (LWT) to increase security. The high-capacity watermark is embedded carefully into the salient features by utilizing least significant bits (LSBs) method to maximize the robustness and quality. Experimental results show the reliability of the proposed scheme against variety kinds of attacks including image processing attacks and geometric attacks.
数字图像水印方案要成为有效的知识产权保护工具,必须满足图像质量、水印鲁棒性和容量、嵌入安全性和提取灵活性的要求。针对这些要求,本文提出了一种考虑图像质量的高容量第二代知识产权盲水印方案。在该方案中,采用快速归一化技术对主机图像进行归一化,以抵抗几何攻击,减少计算时间。然后使用参数双正交整数提升小波变换(LWT)对归一化后的图像进行变换以提高安全性。利用最小有效位(least significant bits, LSBs)方法将高容量水印小心地嵌入到显著特征中,使水印的鲁棒性和质量达到最大。实验结果表明,该方案能够有效抵御各种攻击,包括图像处理攻击和几何攻击。
{"title":"Capacity and quality improvement in blind second generation watermarking","authors":"M. A. El-Iskandarani, S. Darwish, A. Abubahia","doi":"10.1109/CCST.2009.5335552","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335552","url":null,"abstract":"For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes the consideration of good image quality. In the proposed scheme, the host image is normalized by fast technique to resist geometric attacks and reduce the computational time. The normalized image is then transformed using parametric bi-orthogonal integer lifting wavelet transform (LWT) to increase security. The high-capacity watermark is embedded carefully into the salient features by utilizing least significant bits (LSBs) method to maximize the robustness and quality. Experimental results show the reliability of the proposed scheme against variety kinds of attacks including image processing attacks and geometric attacks.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125233010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trusted security information sharing mechanism 一个可信的安全信息共享机制
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335529
Dwen-Ren Tsai, Wen-Chi Chen, Yin-Chia Lu, Chi-Wen Wu
Security Operations Center (SOC) is a unit inside or outside an organization that monitors and deals with information security incidents, on a technical level. In this paper, a trusted security incident information sharing mechanism among SOCs is proposed. The information needed to share among SOCs to prevent incident dispersions usually were just the time of occurrence, origin of attack, consequence, severity and path of attack. In the proposed mechanism, we aim to share the minimum information required. Secure data transferred paths can be used. We hope the adopting of the mechanism may increase the willing of sharing security information among SOCs.
安全运营中心(SOC)是组织内部或外部的一个单位,在技术层面上监视和处理信息安全事件。本文提出了一种可信任的soc安全事件信息共享机制。为了防止事件扩散,soc之间需要共享的信息通常只是发生时间、攻击来源、后果、严重程度和攻击路径。在提议的机制中,我们的目标是共享所需的最少信息。可以使用安全的数据传输路径。我们希望这一机制的采用能够增加soc之间共享安全信息的意愿。
{"title":"A trusted security information sharing mechanism","authors":"Dwen-Ren Tsai, Wen-Chi Chen, Yin-Chia Lu, Chi-Wen Wu","doi":"10.1109/CCST.2009.5335529","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335529","url":null,"abstract":"Security Operations Center (SOC) is a unit inside or outside an organization that monitors and deals with information security incidents, on a technical level. In this paper, a trusted security incident information sharing mechanism among SOCs is proposed. The information needed to share among SOCs to prevent incident dispersions usually were just the time of occurrence, origin of attack, consequence, severity and path of attack. In the proposed mechanism, we aim to share the minimum information required. Secure data transferred paths can be used. We hope the adopting of the mechanism may increase the willing of sharing security information among SOCs.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117289964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1