首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Proxy certificates-based digital fingerprinting scheme for mobile communication 基于代理证书的移动通信数字指纹方案
Jae-Gwi Choi, K. Sakurai, Ji-Hwan Park
Protection of intellectual property in digital contents has been a subject of research for many years and led to the development of various techniques. Digital fingerprinting scheme is an important class of these techniques. The goal of fingerprinting scheme is to deter people from illegally redistributing digital data. But, the problem of known anonymous fingerprinting schemes is that, being based on computationally unspecified black boxes: secure multiparty computation or minimum disclosure proofs of knowledge. Their complexity is much too high to be implemental in real application. Still less, buyer's memory and computation power is very small in mobile communication. We present an anonymous fingerprinting scheme for mobile communication using mobile agent, which is efficient and feasible from a practical view. The basic primitive used is a proxy certificates. Our proposal satisfies that (1) only the buyer can know the fingerprinted copy however the mobile agent executes its computations instead of him/her, and (2) it reduces amount of the buyer's computations to the minimum and risk about exposure of the buyer's private information which will be occurred owing to delegation.
数字内容中的知识产权保护是一个研究多年的课题,并导致了各种技术的发展。数字指纹方案是这类技术的重要组成部分。指纹识别计划的目的是阻止人们非法重新分发数字数据。但是,已知的匿名指纹方案的问题在于,基于计算上未指定的黑箱:安全的多方计算或最小的知识披露证明。它们的复杂性太高,无法在实际应用中实现。更重要的是,在移动通信中,买方的内存和计算能力非常小。提出了一种基于移动代理的移动通信匿名指纹识别方案,从实际应用的角度来看,该方案是高效可行的。使用的基本原语是代理证书。我们的建议满足(1)只有买方可以知道指纹副本,而移动代理代替他/她执行其计算;(2)它将买方的计算量减少到最小,并减少了由于委托而发生的买方私人信息暴露的风险。
{"title":"Proxy certificates-based digital fingerprinting scheme for mobile communication","authors":"Jae-Gwi Choi, K. Sakurai, Ji-Hwan Park","doi":"10.1109/CCST.2003.1297624","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297624","url":null,"abstract":"Protection of intellectual property in digital contents has been a subject of research for many years and led to the development of various techniques. Digital fingerprinting scheme is an important class of these techniques. The goal of fingerprinting scheme is to deter people from illegally redistributing digital data. But, the problem of known anonymous fingerprinting schemes is that, being based on computationally unspecified black boxes: secure multiparty computation or minimum disclosure proofs of knowledge. Their complexity is much too high to be implemental in real application. Still less, buyer's memory and computation power is very small in mobile communication. We present an anonymous fingerprinting scheme for mobile communication using mobile agent, which is efficient and feasible from a practical view. The basic primitive used is a proxy certificates. Our proposal satisfies that (1) only the buyer can know the fingerprinted copy however the mobile agent executes its computations instead of him/her, and (2) it reduces amount of the buyer's computations to the minimum and risk about exposure of the buyer's private information which will be occurred owing to delegation.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A detection algorithm for road feature extraction using EO-1 hyperspectral images 一种基于EO-1高光谱图像的道路特征提取检测算法
Tzu-Lung Sun
The proposed method takes advantage of spectral information content in the hyperspectral images, EO-1 hyperion, to find road candidates. The assumption of this approach assumes that each pixel in the hyperspectral images is composed of a linear mixing of the reflectance from various components of the Earth's surface. The algorithm derived from the statistical and linear model is used to highlight the targets - road features and to suppress the background features of a scene. After road detection, all potential road candidates have been presented in the detected image. The objective is to avoid predicting uncertain road points and setting complex criteria to form the road network. Finally, the detected road segments will be traced and connected to generate skeletonized results. This proposed approach could be used to detect other linear features, such as a drainage network, from the hyperspectral imagery as well. In this way, the vectorized image could be produced to provide additional thematic layers for further spatial analysis in GIS applications.
该方法利用EO-1 hyperion高光谱图像中的光谱信息含量来寻找候选道路。这种方法的假设是,高光谱图像中的每个像素都是由地球表面不同成分的反射率线性混合而成。利用统计模型和线性模型推导出的算法来突出目标道路特征和抑制场景背景特征。道路检测后,所有可能的候选道路都被呈现在检测图像中。目标是避免预测不确定的道路点和设置复杂的标准来形成道路网。最后,将检测到的路段进行跟踪和连接,以生成骨架化结果。该方法也可用于从高光谱图像中检测其他线性特征,如排水网络。通过这种方式,可以生成矢量化图像,为GIS应用中的进一步空间分析提供额外的主题层。
{"title":"A detection algorithm for road feature extraction using EO-1 hyperspectral images","authors":"Tzu-Lung Sun","doi":"10.1109/CCST.2003.1297541","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297541","url":null,"abstract":"The proposed method takes advantage of spectral information content in the hyperspectral images, EO-1 hyperion, to find road candidates. The assumption of this approach assumes that each pixel in the hyperspectral images is composed of a linear mixing of the reflectance from various components of the Earth's surface. The algorithm derived from the statistical and linear model is used to highlight the targets - road features and to suppress the background features of a scene. After road detection, all potential road candidates have been presented in the detected image. The objective is to avoid predicting uncertain road points and setting complex criteria to form the road network. Finally, the detected road segments will be traced and connected to generate skeletonized results. This proposed approach could be used to detect other linear features, such as a drainage network, from the hyperspectral imagery as well. In this way, the vectorized image could be produced to provide additional thematic layers for further spatial analysis in GIS applications.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Achieving database accountability and traceability using the bitemporal relation 使用双时态关系实现数据库问责制和可追溯性
Huifen. Chen, K. Farn, Dwen-Ren Tsai
Database systems have become the most crucial constructing components of data stores underlying modern application systems. Popular role-based access control model by Sandhu R.S. and E.J. Coyne proposed a way to manage users' access rights. However, employees playing several roles sometimes acquire access rights above their duties. These employees, for their own benefits, are capable of accessing data illegally, modifying or inserting data temporary then illegally outputting data, and finally changing data back to their original status that satisfy integrity of database contents. Usually databases are updated through record overwriting or deleting and are difficult to trace each user transaction. Hence, owners of these database systems, potentially, might become victims of data temporary misuse by criminals. Ooi, Goh, and Tan proposed a dimension space transformation concept based on indexing bitemporal databases1998, which states the concept of transforming one-dimensional time domain to two-dimensional x-y coordinates. We first study state-of-the-art of access control methods, then address role conflicts in access rights, and finally discuss the Bitemporal relation with valid and process time attributes. We further propose an approach, recording database usage trails and transparent to general users, to accomplish all record queries and changes, including insertion, deletion, modification, and retrieving, referenced Ooi, Goh, and Tan's work. Hopefully, this approach might facilitate achieving forensic objects of database traceability and accountability.
数据库系统已成为现代应用系统中最重要的数据存储构件。流行的基于角色的访问控制模型Sandhu R.S.和E.J. Coyne提出了一种管理用户访问权限的方法。然而,扮演多个角色的员工有时会获得超出其职责的访问权。这些员工为了自己的利益,可以非法访问数据,临时修改或插入数据,然后非法输出数据,最后将数据更改回满足数据库内容完整性的原始状态。通常数据库是通过覆盖或删除记录来更新的,很难跟踪每个用户事务。因此,这些数据库系统的所有者可能会成为犯罪分子临时滥用数据的受害者。Ooi, Goh, and Tan提出了一种基于索引双时数据库的维度空间转换概念(1998),该概念陈述了将一维时域转换为二维x-y坐标的概念。本文首先研究了访问控制方法的最新进展,然后讨论了访问权限中的角色冲突,最后讨论了有效时间属性和进程时间属性之间的双时间关系。我们进一步提出了一种方法,记录数据库使用轨迹并对一般用户透明,以完成所有记录的查询和更改,包括插入,删除,修改和检索,参考了Ooi, Goh和Tan的工作。希望这种方法能够促进实现数据库可跟踪性和问责制的取证对象。
{"title":"Achieving database accountability and traceability using the bitemporal relation","authors":"Huifen. Chen, K. Farn, Dwen-Ren Tsai","doi":"10.1109/CCST.2003.1297552","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297552","url":null,"abstract":"Database systems have become the most crucial constructing components of data stores underlying modern application systems. Popular role-based access control model by Sandhu R.S. and E.J. Coyne proposed a way to manage users' access rights. However, employees playing several roles sometimes acquire access rights above their duties. These employees, for their own benefits, are capable of accessing data illegally, modifying or inserting data temporary then illegally outputting data, and finally changing data back to their original status that satisfy integrity of database contents. Usually databases are updated through record overwriting or deleting and are difficult to trace each user transaction. Hence, owners of these database systems, potentially, might become victims of data temporary misuse by criminals. Ooi, Goh, and Tan proposed a dimension space transformation concept based on indexing bitemporal databases1998, which states the concept of transforming one-dimensional time domain to two-dimensional x-y coordinates. We first study state-of-the-art of access control methods, then address role conflicts in access rights, and finally discuss the Bitemporal relation with valid and process time attributes. We further propose an approach, recording database usage trails and transparent to general users, to accomplish all record queries and changes, including insertion, deletion, modification, and retrieving, referenced Ooi, Goh, and Tan's work. Hopefully, this approach might facilitate achieving forensic objects of database traceability and accountability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127088190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virus detection using data mining techinques 使用数据挖掘技术进行病毒检测
Jau-Hwang Wang, P. Deng, Yi-Shen Fan, L. Jaw, Yu-Ching Liu
Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the Web or reading e-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. An automatic heuristic method to detect unknown computer virus based on data mining techniques, namely decision tree and naive Bayesian network algorithms, is proposed and experiments are carried to evaluate the effectiveness the proposed approach.
恶意可执行程序是指在执行时可能对计算机用户造成损害或不便的计算机程序。病毒是恶意程序的主要类型之一,它附着在其他程序上,通常在宿主程序之前执行。它们很容易被黑客植入计算机系统,或者被天真的用户在浏览网页或阅读电子邮件时下载并执行。它们经常破坏主机系统,例如在执行时破坏数据和破坏系统软件。因此,在计算机病毒执行之前检测它们是一个非常重要的问题。目前的检测方法主要基于模式扫描算法。但是,它们无法检测未知的病毒。提出了一种基于数据挖掘技术即决策树和朴素贝叶斯网络算法的计算机未知病毒自动启发式检测方法,并通过实验验证了该方法的有效性。
{"title":"Virus detection using data mining techinques","authors":"Jau-Hwang Wang, P. Deng, Yi-Shen Fan, L. Jaw, Yu-Ching Liu","doi":"10.1109/CCST.2003.1297538","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297538","url":null,"abstract":"Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the Web or reading e-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. An automatic heuristic method to detect unknown computer virus based on data mining techniques, namely decision tree and naive Bayesian network algorithms, is proposed and experiments are carried to evaluate the effectiveness the proposed approach.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
A real-time security surveillance system for personal authentication 一种用于个人身份验证的实时安全监控系统
Y. Chien, Yea-Shuan Huang, S. Jeng, Yao-Hong Tasi, Hung-Xin Zhao
We introduce a human surveillance system, which integrated technologies of face tracking, face detection, and face recognition to authenticate personal identity in real time. The system located all of the faces in the view quickly and tracked them all the time even though people crossed. Facial features of a selected target were estimated, and the personal identity was justified. In our designation, spatial and temporal information over a number of continuous frames were accumulated and combined to make the system more stable and robust to unexpected human activities. More than 60 persons of an experiment were trained and recognized in the natural environment. Each of them was effectively authenticated by the system in terms of recognition accuracy and performance.
介绍了一种集人脸跟踪、人脸检测、人脸识别技术于一体的人体监控系统,实现了对个人身份的实时认证。该系统快速定位视野中的所有人脸,并一直跟踪他们,即使有人穿过。对选定目标的面部特征进行估计,并对其进行身份验证。在我们的设计中,空间和时间信息在许多连续的框架中被积累和组合,使系统对意外的人类活动更加稳定和健壮。一个实验的60多人在自然环境中接受了培训和认可。系统在识别精度和性能方面对每一种算法都进行了有效的验证。
{"title":"A real-time security surveillance system for personal authentication","authors":"Y. Chien, Yea-Shuan Huang, S. Jeng, Yao-Hong Tasi, Hung-Xin Zhao","doi":"10.1109/CCST.2003.1297558","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297558","url":null,"abstract":"We introduce a human surveillance system, which integrated technologies of face tracking, face detection, and face recognition to authenticate personal identity in real time. The system located all of the faces in the view quickly and tracked them all the time even though people crossed. Facial features of a selected target were estimated, and the personal identity was justified. In our designation, spatial and temporal information over a number of continuous frames were accumulated and combined to make the system more stable and robust to unexpected human activities. More than 60 persons of an experiment were trained and recognized in the natural environment. Each of them was effectively authenticated by the system in terms of recognition accuracy and performance.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementing the RSA algorithm on the TI TMS320C55x family RSA算法在TI TMS320C55x系列芯片上的实现
Ren-Junn Hwang, Feng-Fu Su, Loang-Shing Huang, Jen-Kang Peng
As the rapid progressing of mobile communication systems, personal communication systems have been brought new problems on the security aspects by the new communication technologies. Public-key cryptography technologies offer solutions to many of the existing security problems in communication system. The RSA algorithm is the most popular public-key cryptosystem. We consider how to effectively implement the RSA algorithm on assembler of Texas Instruments TMS320C55x family. Many wireless and mobile devices include the TMS320C55x chip. We propose an efficient method to implement modular exponentiation operation based on TMS320C55x. By the experiments, our implementation method can perform about 6 times of 1024 bits RSA encryption/decryption operations in one second.
随着移动通信系统的飞速发展,新的通信技术给个人通信系统带来了新的安全问题。公钥加密技术为通信系统中存在的许多安全问题提供了解决方案。RSA算法是最流行的公钥密码系统。本文研究了如何在德州仪器TMS320C55x系列汇编器上有效地实现RSA算法。许多无线和移动设备都包含TMS320C55x芯片。提出了一种基于TMS320C55x的模块化求幂运算的有效实现方法。通过实验,我们的实现方法可以在1秒内完成约6次1024位的RSA加解密操作。
{"title":"Implementing the RSA algorithm on the TI TMS320C55x family","authors":"Ren-Junn Hwang, Feng-Fu Su, Loang-Shing Huang, Jen-Kang Peng","doi":"10.1109/CCST.2003.1297621","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297621","url":null,"abstract":"As the rapid progressing of mobile communication systems, personal communication systems have been brought new problems on the security aspects by the new communication technologies. Public-key cryptography technologies offer solutions to many of the existing security problems in communication system. The RSA algorithm is the most popular public-key cryptosystem. We consider how to effectively implement the RSA algorithm on assembler of Texas Instruments TMS320C55x family. Many wireless and mobile devices include the TMS320C55x chip. We propose an efficient method to implement modular exponentiation operation based on TMS320C55x. By the experiments, our implementation method can perform about 6 times of 1024 bits RSA encryption/decryption operations in one second.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A robust watermarking and image authentication technique 一种鲁棒的水印和图像认证技术
C. Kung, T. Truong, J. Jeng
In the past several years, there has been an explosive growth in digital imaging technology and applications. Since digital images and video are now widely distributed via the Internet and various public channels, there is an urgent need for copyright protection against unauthorized data reproduction. Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information. Furthermore, it can also provide an alternative solution for image authentication. A robust watermarking and image authentication technique is proposed. The proposed scheme includes two parts. The first is a robust watermarking scheme performed in the frequency domain, which can be used to prove the ownership. The second is a standard signature process, which can be used to prove the integrity of the image. The input of the signature process is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression.
在过去的几年里,数字成像技术和应用有了爆炸式的增长。由于数字图像和视频现在通过互联网和各种公共渠道广泛传播,因此迫切需要保护版权,防止未经授权的数据复制。数字水印是防止非法复制和传播受版权保护的数字图像信息的一种有效和流行的技术。此外,它还可以为图像身份验证提供另一种解决方案。提出了一种鲁棒水印和图像认证技术。该方案包括两个部分。首先是在频域执行的鲁棒水印方案,该方案可用于证明所有权。二是标准的签名过程,可以用来证明图像的完整性。签名过程的输入是从图像中提取的边缘属性。当图像偶然损坏(如有损压缩)时,可以正确地验证签名。
{"title":"A robust watermarking and image authentication technique","authors":"C. Kung, T. Truong, J. Jeng","doi":"10.1109/CCST.2003.1297593","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297593","url":null,"abstract":"In the past several years, there has been an explosive growth in digital imaging technology and applications. Since digital images and video are now widely distributed via the Internet and various public channels, there is an urgent need for copyright protection against unauthorized data reproduction. Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information. Furthermore, it can also provide an alternative solution for image authentication. A robust watermarking and image authentication technique is proposed. The proposed scheme includes two parts. The first is a robust watermarking scheme performed in the frequency domain, which can be used to prove the ownership. The second is a standard signature process, which can be used to prove the integrity of the image. The input of the signature process is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Specification of a video test imagery library (VITAL) 视频测试图像库规范(VITAL)
D. Baker, N. Thomas
One function of the Police Scientific Development Branch (PSDB) is to improve the expertise of the UK Government when it purchases intelligent CCTV systems for security and policing applications. To meet this aim, PSDB evaluates and reports on the performance of such systems. To help PSDB to assess these systems rapidly, PSDB is creating a library of representative video footage to form the basis of a video test imagery library (VITAL). In the future, VITAL is used to help to establish baseline standards for performance. PSDB also intends that extracts of VITAL is published on the Internet to guide researchers on the types of footage that require automatic classification. PSDB expects VITAL footage to centre on four scenarios: parked vehicle detection; abandoned luggage detection; outdoor, sterile-zone intruder detection; and doorway surveillance. The contents of the standard video footage is taken from a larger collection set, and be weighted to contain examples of imagery that are on the boundaries of the processing capabilities of current machine-vision technology. PSDB is generating a comprehensive specification through wide consultation and plans to start collecting VITAL imagery in the autumn of 2003.
警察科学发展部门(PSDB)的一个职能是提高英国政府在购买用于安全和警务应用的智能闭路电视系统时的专业知识。为了实现这一目标,PSDB对这些系统的性能进行评估和报告。为了帮助PSDB快速评估这些系统,PSDB正在创建一个具有代表性的视频素材库,以形成视频测试图像库(VITAL)的基础。将来,VITAL将用于帮助建立性能基准标准。PSDB还打算在互联网上发布VITAL的摘录,以指导研究人员需要自动分类的镜头类型。PSDB希望VITAL视频集中在四个场景:停车车辆检测;弃置行李检测;室外、无菌区入侵者检测;还有门口监控。标准视频片段的内容取自一个更大的集合集,并经过加权以包含当前机器视觉技术处理能力边界上的图像示例。PSDB正在通过广泛咨询制定一份全面的规范,并计划在2003年秋季开始收集VITAL图像。
{"title":"Specification of a video test imagery library (VITAL)","authors":"D. Baker, N. Thomas","doi":"10.1109/CCST.2003.1297613","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297613","url":null,"abstract":"One function of the Police Scientific Development Branch (PSDB) is to improve the expertise of the UK Government when it purchases intelligent CCTV systems for security and policing applications. To meet this aim, PSDB evaluates and reports on the performance of such systems. To help PSDB to assess these systems rapidly, PSDB is creating a library of representative video footage to form the basis of a video test imagery library (VITAL). In the future, VITAL is used to help to establish baseline standards for performance. PSDB also intends that extracts of VITAL is published on the Internet to guide researchers on the types of footage that require automatic classification. PSDB expects VITAL footage to centre on four scenarios: parked vehicle detection; abandoned luggage detection; outdoor, sterile-zone intruder detection; and doorway surveillance. The contents of the standard video footage is taken from a larger collection set, and be weighted to contain examples of imagery that are on the boundaries of the processing capabilities of current machine-vision technology. PSDB is generating a comprehensive specification through wide consultation and plans to start collecting VITAL imagery in the autumn of 2003.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security of ZLYH-key authentication scheme ZLYH-key认证方案的安全性
Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo
In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.
在公钥密码系统中,对用户公钥的保护和认证是非常重要的。在过去,已经提出了许多方案。然而,大多数方案需要一个或多个权威机构来验证公钥。在基于权威的方案中,由于权威机构可以知道用户的私钥或生成虚假证书,因此我们可以在任何时候冒充任何用户。因此,需要这样的方案,因为权威机构不能知道用户的秘密信息,系统的安全性并不完全依赖于权威机构。近年来,Zhan等人提出了一种新的密钥认证方案,称为zlyh方案,该方案不需要授权机构对用户的公钥进行认证。然而,它仍然有一个弱点,可以猜测密码。我们证明了zlyh方案存在一些缺陷。为了克服这一缺点,我们提出了一种改进的密钥认证方案。在我们的方案中,它不需要秘密密码表,攻击者无法猜测密码。
{"title":"Security of ZLYH-key authentication scheme","authors":"Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo","doi":"10.1109/CCST.2003.1297545","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297545","url":null,"abstract":"In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motion tracking of multi-objects for access surveillance based on the panoramic imaging system 基于全景成像系统的门禁监控多目标运动跟踪
Min-Cheng Pan, Yau-Liang Tsai, Yingping Huang
Panoramic images, especially focused images, have many applications in surveillance, robot navigation, art, etc. Described here is a CCD camera with a hyperboloidal mirror for acquiring panoramic focused images. This optical imaging system can greatly simplify the process of acquiring an omni-directional view in real time, thereby presenting panoramic still images or offering a panoramic full motion video. With this panoramic imaging system, we propose a novel approach for motion tracking of multiobjects mainly based on the idea of tracking windows. Experimental results are presented with a sequence of frames to demonstrate the superior performance of the proposed algorithm.
全景图像,尤其是聚焦图像,在监控、机器人导航、艺术等领域有着广泛的应用。这里描述的是一个带有双曲面反射镜的CCD相机,用于获取全景聚焦图像。该光学成像系统可以大大简化实时获取全方位视图的过程,从而呈现全景静止图像或提供全景全动态视频。在此全景成像系统中,我们提出了一种基于跟踪窗口思想的多目标运动跟踪新方法。实验结果表明,该算法具有良好的性能。
{"title":"Motion tracking of multi-objects for access surveillance based on the panoramic imaging system","authors":"Min-Cheng Pan, Yau-Liang Tsai, Yingping Huang","doi":"10.1109/CCST.2003.1297561","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297561","url":null,"abstract":"Panoramic images, especially focused images, have many applications in surveillance, robot navigation, art, etc. Described here is a CCD camera with a hyperboloidal mirror for acquiring panoramic focused images. This optical imaging system can greatly simplify the process of acquiring an omni-directional view in real time, thereby presenting panoramic still images or offering a panoramic full motion video. With this panoramic imaging system, we propose a novel approach for motion tracking of multiobjects mainly based on the idea of tracking windows. Experimental results are presented with a sequence of frames to demonstrate the superior performance of the proposed algorithm.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1