首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Facial image database for law enforcement application: an implementation 面部图像数据库执法应用程序:一个实现
P. Lai, Jau-Hwang Wang
This paper described an automatic facial feature extraction method from mug shots. Since most facial features locate at specific regions on a facial image, the region detection and partitioning techniques were used to segment and extract facial features. Heuristics were developed to detect the top, bottom, left and right margins of each feature region from the histograms of the vertical and horizontal projections of a facial image. Each facial feature region was then segmented according to its margins. Furthermore, each facial image was transformed to a facial feature vector, of which each element is the angle between two facial feature regions. The Euclidean distance was used to measure the similarities between facial feature vectors. A facial image database consists of three hundred mug shots was used for the experiment. The results show that the proposed scheme is computational efficient and performs well in facial image retrieval.
本文描述了一种人脸特征自动提取方法。由于大多数面部特征位于人脸图像的特定区域,因此采用区域检测和分割技术对面部特征进行分割和提取。开发了启发式方法,从面部图像的垂直和水平投影直方图中检测每个特征区域的上、下、左和右边缘。然后根据其边缘对每个面部特征区域进行分割。然后,将每张人脸图像转换成一个人脸特征向量,其中每个元素是两个人脸特征区域之间的夹角。欧几里得距离用于测量面部特征向量之间的相似度。实验使用了一个由300张嫌疑犯照片组成的面部图像数据库。结果表明,该方法计算效率高,在人脸图像检索中有较好的效果。
{"title":"Facial image database for law enforcement application: an implementation","authors":"P. Lai, Jau-Hwang Wang","doi":"10.1109/CCST.2003.1297574","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297574","url":null,"abstract":"This paper described an automatic facial feature extraction method from mug shots. Since most facial features locate at specific regions on a facial image, the region detection and partitioning techniques were used to segment and extract facial features. Heuristics were developed to detect the top, bottom, left and right margins of each feature region from the histograms of the vertical and horizontal projections of a facial image. Each facial feature region was then segmented according to its margins. Furthermore, each facial image was transformed to a facial feature vector, of which each element is the angle between two facial feature regions. The Euclidean distance was used to measure the similarities between facial feature vectors. A facial image database consists of three hundred mug shots was used for the experiment. The results show that the proposed scheme is computational efficient and performs well in facial image retrieval.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129011858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vessel identification and monitoring systems for maritime security 海上安全船舶识别和监视系统
Shwu-Jing Chang
Maritime security has become major concerns of all coastal states, and the fundamental requirement is "maritime domain awareness" via identification, tracking and monitoring of vessels within their waters. We first identify candidate technologies and systems for different types of vessels. These systems have been designed and provided with regulatory framework for other reasons such as sustainable fishery, search and rescue, environmental protection, navigational safety, etc. We then present the results of a feasibility study on the application and integration of the technologies and facilities of these systems for maritime security. The technologies such as automatic identification systems (AIS), Inmarsat-C, and digital selective calling (DSC) and GSM are investigated with regard to the propagation/coverage, cost, reliability, etc. based on sea trials and field tests of prototype subsystems. Finally, we propose an integrated vessel identification and monitoring system and present a prototype system to demonstrate the display and fusion of targets from various sources including radar surveillance.
海上安全已成为各沿岸国关注的重大问题,实现海上安全的根本要求是实现“海域意识”,对在其水域内航行的船舶进行识别、跟踪和监测。我们首先为不同类型的船舶确定候选技术和系统。这些系统的设计和提供监管框架是出于其他原因,如可持续渔业、搜救、环境保护、航行安全等。然后,我们介绍了这些系统的技术和设施在海上安全方面的应用和集成的可行性研究结果。在原型子系统海上试验和现场试验的基础上,对自动识别系统(AIS)、Inmarsat-C、数字选择性呼叫(DSC)和GSM等技术进行了传播/覆盖、成本、可靠性等方面的研究。最后,我们提出了一个集成的船舶识别和监测系统,并给出了一个原型系统来演示来自包括雷达监视在内的各种来源的目标的显示和融合。
{"title":"Vessel identification and monitoring systems for maritime security","authors":"Shwu-Jing Chang","doi":"10.1109/CCST.2003.1297537","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297537","url":null,"abstract":"Maritime security has become major concerns of all coastal states, and the fundamental requirement is \"maritime domain awareness\" via identification, tracking and monitoring of vessels within their waters. We first identify candidate technologies and systems for different types of vessels. These systems have been designed and provided with regulatory framework for other reasons such as sustainable fishery, search and rescue, environmental protection, navigational safety, etc. We then present the results of a feasibility study on the application and integration of the technologies and facilities of these systems for maritime security. The technologies such as automatic identification systems (AIS), Inmarsat-C, and digital selective calling (DSC) and GSM are investigated with regard to the propagation/coverage, cost, reliability, etc. based on sea trials and field tests of prototype subsystems. Finally, we propose an integrated vessel identification and monitoring system and present a prototype system to demonstrate the display and fusion of targets from various sources including radar surveillance.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131434876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Testing and evaluating counterterrorism technology 测试和评估反恐技术
S.G. King, J. Stewart, T.M. Wood
We detail the Operational Test and Evaluation Program (OTEP) at the U.S. National Guard Bureau's (NGB) Center for National Response (CNR). OTEP's mission is to evaluate the utility of equipment, technology, and apparatus to materially aid emergency responders in a weapons of mass destruction (WMD) environment. The goal is twofold. First, to allow emergency responders to operationally test equipment in a realistic WMD environment, prior to purchase, so that they are able to resourcefully identify equipment that meets their needs and enables them to complete their mission. Second, to provide the manufacturers with test results and feedback from the testing organization, which presents them with product strengths, as well as ways in which they can improve their product.
我们在美国国民警卫队(NGB)国家反应中心(CNR)详细介绍了作战测试和评估计划(OTEP)。OTEP的任务是评估在大规模杀伤性武器(WMD)环境中为紧急救援人员提供物质援助的设备、技术和仪器的效用。目标是双重的。首先,允许应急人员在购买之前在实际的大规模杀伤性武器环境中对设备进行操作测试,以便他们能够足智多能地确定满足其需求并使其能够完成任务的设备。第二,向制造商提供测试结果和测试机构的反馈,向他们展示产品的优势,以及他们可以改进产品的方法。
{"title":"Testing and evaluating counterterrorism technology","authors":"S.G. King, J. Stewart, T.M. Wood","doi":"10.1109/CCST.2003.1297527","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297527","url":null,"abstract":"We detail the Operational Test and Evaluation Program (OTEP) at the U.S. National Guard Bureau's (NGB) Center for National Response (CNR). OTEP's mission is to evaluate the utility of equipment, technology, and apparatus to materially aid emergency responders in a weapons of mass destruction (WMD) environment. The goal is twofold. First, to allow emergency responders to operationally test equipment in a realistic WMD environment, prior to purchase, so that they are able to resourcefully identify equipment that meets their needs and enables them to complete their mission. Second, to provide the manufacturers with test results and feedback from the testing organization, which presents them with product strengths, as well as ways in which they can improve their product.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new proxy signature scheme based on dual complexities 一种基于双重复杂度的代理签名方案
J.J.-R. Chen, P. Sun, Chih-Lin Lin
The vogue of Internet, makes the changes of the people' s style. Security is one of the key elements of the development of Internet. Digital certification can take the place of identification and verification in virtual world constructed by computer network. MAMBO, USUDA, and OKAMOTO are the pioneers in the research of proxy signature and brings digital signature into a new direction. The original signer can authorize the proxy signers to act as agent via proxy signature scheme without leaking his/her private key. Most of the proposed scheme usually emphasize on the factuality of proxy signature. Some researchers take warrants to enhance the security of proxy signature scheme. The agent may sign many times after one legal authorization until the origin signer changed his/her password or grant periods. The others may need a secure channel to transmit parameters and it decrease practicability. This paper proposes a new proxy signature scheme that can set the grant period without using a warrant or a secure channel. Our scheme is based on the complexity of the discrete logarithm. We also make use of Denning's time stamp technology to solve the problem of the illegal using of proxy signature by illegal user.
互联网的流行,使人们的生活方式发生了变化。安全是互联网发展的关键因素之一。在计算机网络构建的虚拟世界中,数字认证可以代替身份识别和验证。MAMBO、USUDA和OKAMOTO是代理签名研究的先驱,将数字签名带入了一个新的方向。原始签名者可以通过代理签名方案授权代理签名者作为代理,而不会泄露其私钥。大多数提出的方案通常强调代理签名的真实性。一些研究者采用权证来提高代理签名方案的安全性。一次合法授权后,代理人可多次签名,直至原签名者更改密码或授权期限为止。其他的可能需要一个安全的通道来传输参数,这降低了实用性。本文提出了一种新的代理签名方案,该方案可以在不使用授权令或安全通道的情况下设置授权期限。我们的方案是基于离散对数的复杂性。我们还利用Denning时间戳技术解决了非法用户非法使用代理签名的问题。
{"title":"A new proxy signature scheme based on dual complexities","authors":"J.J.-R. Chen, P. Sun, Chih-Lin Lin","doi":"10.1109/CCST.2003.1297571","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297571","url":null,"abstract":"The vogue of Internet, makes the changes of the people' s style. Security is one of the key elements of the development of Internet. Digital certification can take the place of identification and verification in virtual world constructed by computer network. MAMBO, USUDA, and OKAMOTO are the pioneers in the research of proxy signature and brings digital signature into a new direction. The original signer can authorize the proxy signers to act as agent via proxy signature scheme without leaking his/her private key. Most of the proposed scheme usually emphasize on the factuality of proxy signature. Some researchers take warrants to enhance the security of proxy signature scheme. The agent may sign many times after one legal authorization until the origin signer changed his/her password or grant periods. The others may need a secure channel to transmit parameters and it decrease practicability. This paper proposes a new proxy signature scheme that can set the grant period without using a warrant or a secure channel. Our scheme is based on the complexity of the discrete logarithm. We also make use of Denning's time stamp technology to solve the problem of the illegal using of proxy signature by illegal user.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Millimeter wave control switch for secure giga-scale system 用于安全千兆级系统的毫米波控制开关
J. Fu, C. Cai, Y. Lu, Z. Shen
A driver-enhanced single pole double-throw (SPDT) switch was designed and implemented for secured giga-scale system. The design were simulated on advanced design system (ADS) package and implemented on RT-duriod 5880 with 10 mils thick dielectric substrate in a 3-port WR28 waveguide, to validate the design for broadband application in Ka-band of digital millimeter waves.
针对安全的千兆级系统,设计并实现了一种驱动增强型单极双掷(SPDT)开关。该设计在先进设计系统(ADS)封装上进行了仿真,并在rt -周期5880上实现,采用3端口WR28波导,10 mil厚介质衬底,验证了该设计在数字毫米波ka波段的宽带应用。
{"title":"Millimeter wave control switch for secure giga-scale system","authors":"J. Fu, C. Cai, Y. Lu, Z. Shen","doi":"10.1109/CCST.2003.1297542","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297542","url":null,"abstract":"A driver-enhanced single pole double-throw (SPDT) switch was designed and implemented for secured giga-scale system. The design were simulated on advanced design system (ADS) package and implemented on RT-duriod 5880 with 10 mils thick dielectric substrate in a 3-port WR28 waveguide, to validate the design for broadband application in Ka-band of digital millimeter waves.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114707376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Airport access control standards 机场出入管制标准
C. Wilkinson, E. Rao
This paper cover a major airport security focus since the tragic events of 9/11; namely employee access to secure areas, and the application of new technologies (biometrics and smart cards) to enhance airport security. The significance of access controls systems to airport security is apparent by several recent studies made by US federal oversight entities, which identified "unauthorized access" to secure areas as one of the highest potential vulnerability. As a consequence, deployment of biometrics and other new technologies were emphasized by US legislation shortly after 9-11. Although the new legislation for creating the US Transportation Security Administration focused on passengers and their baggage screening, equal importance was placed on airport access controls with potential new multipurpose applications such as a transportation worker identity card and trusted traveler card. Existing access control systems at US airports were based on a series of regulatory requirements and guidelines, which did not reflect this increased security requirement. Accordingly, a federal advisory committee under the RTCA (Radio and Technical Commission for Aeronautics) was established to set an appropriate set of guidelines and minimum standards to meet the new requirements. This paper discusses the process used to establish new guidelines and minimum standards, and the results of the process, and its importance to airports. The guidance provided various airport security stakeholders, namely airport operators, consultants and federal regulating agencies, on the areas of operational requirements, system and subsystem performance, system verification and validation are described. Critical technical issues such as nature of the credential, nature of the biometrics, and interoperability requirements within the USA and elsewhere, are elaborated. Finally, lessons learned from the previous generation of access control systems implementation difficulties: including poor specifications, environmental susceptibility, system verification, system phasing and limited planning for future technology, are discussed.
本文涵盖了自9/11悲剧事件以来主要的机场安全焦点;即允许员工进入安全区域,以及应用新技术(生物识别技术和智能卡)来加强机场的保安。美国联邦监管机构最近进行的几项研究表明,访问控制系统对机场安全的重要性显而易见,这些研究将“未经授权访问”安全区域确定为最高的潜在漏洞之一。因此,9-11事件后不久,美国立法强调了生物识别技术和其他新技术的部署。尽管建立美国运输安全管理局的新立法侧重于乘客及其行李检查,但同样重要的是机场访问控制,它具有潜在的新的多用途应用,如运输工人身份证和可信旅行者卡。美国机场现有的访问控制系统是基于一系列监管要求和指导方针,没有反映出这种增加的安全要求。因此,在航空无线电和技术委员会下成立了一个联邦咨询委员会,以制定一套适当的准则和最低标准,以满足新的要求。本文讨论了建立新的指导方针和最低标准的过程,以及该过程的结果,以及它对机场的重要性。该指南提供了各种机场安全利益相关者,即机场运营商、顾问和联邦监管机构,涉及运营要求、系统和子系统性能、系统验证和验证等领域。关键的技术问题,如凭证的性质,生物识别的性质,以及在美国和其他地方的互操作性要求,都进行了阐述。最后,讨论了从上一代访问控制系统实施困难中吸取的教训:包括差的规格,环境敏感性,系统验证,系统分阶段和对未来技术的有限规划。
{"title":"Airport access control standards","authors":"C. Wilkinson, E. Rao","doi":"10.1109/CCST.2003.1297577","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297577","url":null,"abstract":"This paper cover a major airport security focus since the tragic events of 9/11; namely employee access to secure areas, and the application of new technologies (biometrics and smart cards) to enhance airport security. The significance of access controls systems to airport security is apparent by several recent studies made by US federal oversight entities, which identified \"unauthorized access\" to secure areas as one of the highest potential vulnerability. As a consequence, deployment of biometrics and other new technologies were emphasized by US legislation shortly after 9-11. Although the new legislation for creating the US Transportation Security Administration focused on passengers and their baggage screening, equal importance was placed on airport access controls with potential new multipurpose applications such as a transportation worker identity card and trusted traveler card. Existing access control systems at US airports were based on a series of regulatory requirements and guidelines, which did not reflect this increased security requirement. Accordingly, a federal advisory committee under the RTCA (Radio and Technical Commission for Aeronautics) was established to set an appropriate set of guidelines and minimum standards to meet the new requirements. This paper discusses the process used to establish new guidelines and minimum standards, and the results of the process, and its importance to airports. The guidance provided various airport security stakeholders, namely airport operators, consultants and federal regulating agencies, on the areas of operational requirements, system and subsystem performance, system verification and validation are described. Critical technical issues such as nature of the credential, nature of the biometrics, and interoperability requirements within the USA and elsewhere, are elaborated. Finally, lessons learned from the previous generation of access control systems implementation difficulties: including poor specifications, environmental susceptibility, system verification, system phasing and limited planning for future technology, are discussed.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
And-CFAR and Or-CFAR detectors design in Weibull background 威布尔背景下的and - cfar和Or-CFAR检测器设计
W. Liu, X. Liu
The mathematical model of two novel constant false alarm rate (CFAR) detectors, the And-CFAR and Or-CFAR, are derived. The two new CFAR detectors improve the conventional cell averaging CFAR (CA-CFAR) and order statistics CFAR (OS-CFAR) by making full use of the cell information. The mathematical model has been validated.
推导了两种新型恒虚警率检测器(and -CFAR和Or-CFAR)的数学模型。这两种新的CFAR检测器通过充分利用单元信息,对传统的单元平均CFAR (CA-CFAR)和阶数统计CFAR (OS-CFAR)进行了改进。数学模型得到了验证。
{"title":"And-CFAR and Or-CFAR detectors design in Weibull background","authors":"W. Liu, X. Liu","doi":"10.1109/CCST.2003.1297540","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297540","url":null,"abstract":"The mathematical model of two novel constant false alarm rate (CFAR) detectors, the And-CFAR and Or-CFAR, are derived. The two new CFAR detectors improve the conventional cell averaging CFAR (CA-CFAR) and order statistics CFAR (OS-CFAR) by making full use of the cell information. The mathematical model has been validated.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A risk assessment system for multi-facility organizations 多设施组织的风险评估系统
T.M. Wood, S.G. King, J. Kennon
We describe a concept for a formalized system of analysis tools intended for use in evaluating risk of terrorist attacks on a facility, based upon a proven vulnerability assessment methodology and traditional approach. It describes a three-phase approach, including: 1) focusing policy, procedures, budgeting, research and development, and further assessment activities on those scenarios, which are most likely to be high-risk scenarios; 2) evaluating facilities across an organization in order to prioritize them for detailed facility evaluations; and 3) conducting a detailed facility assessment.
我们描述了一个形式化分析工具系统的概念,该系统旨在用于评估设施遭受恐怖袭击的风险,该系统基于一种经过验证的脆弱性评估方法和传统方法。它描述了一个三阶段的方法,包括:1)将政策、程序、预算、研究和开发以及进一步的评估活动集中在那些最有可能是高风险情景的情景上;2)评估整个组织的设施,以便对其进行详细的设施评估;3)进行详细的设施评估。
{"title":"A risk assessment system for multi-facility organizations","authors":"T.M. Wood, S.G. King, J. Kennon","doi":"10.1109/CCST.2003.1297559","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297559","url":null,"abstract":"We describe a concept for a formalized system of analysis tools intended for use in evaluating risk of terrorist attacks on a facility, based upon a proven vulnerability assessment methodology and traditional approach. It describes a three-phase approach, including: 1) focusing policy, procedures, budgeting, research and development, and further assessment activities on those scenarios, which are most likely to be high-risk scenarios; 2) evaluating facilities across an organization in order to prioritize them for detailed facility evaluations; and 3) conducting a detailed facility assessment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"392 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124651235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trace copy forgery detection for handwritten signature verification 用于手写签名验证的跟踪副本伪造检测
P. Deng, L. Jaw, Jau-Hwang Wang, C. Tung
Handwritten signature verification has been extensively studied in past decades. Its many applications include banking, credit card validation, security systems etc. We mainly deal with the trace copy forgery detection problem in a handwritten signature verification system. Based on one of our previously study [P. S. Deng et al. (1999)], we have proposed an efficient approach, called Deng's approach to build-up an offline handwritten signature verification system by using wavelet transformation technique. From the experimental results, the accuracy rate of the Deng's approach [P. S. Deng et al. (1999)] is 92.57% and 93.68% for English and Chinese respectively. The approach we proposed not only got a good accuracy result, i.e. 87%, but also has many other advantages as follows: (1) it can be applied in many languages including English and Chinese, (2) it can be adopted to both on-line and off-line applications, and (3) it uses all the strokes information rather than only the vertical strokes information in a Chinese signature.
在过去的几十年里,手写签名的验证得到了广泛的研究。它的许多应用包括银行、信用卡验证、安全系统等。本文主要研究手写签名验证系统中的跟踪副本伪造检测问题。基于我们之前的一项研究[P。S. Deng等人(1999)],我们提出了一种有效的方法,称为Deng的方法,通过小波变换技术建立离线手写签名验证系统。从实验结果来看,邓氏方法的准确率[P。S. Deng et al.(1999)]为92.57%,中文为93.68%。本文提出的方法不仅获得了87%的准确率,而且具有以下优点:(1)可应用于包括英语和汉语在内的多种语言;(2)在线和离线应用均可采用;(3)利用中文签名中的所有笔画信息而不仅仅是竖笔画信息。
{"title":"Trace copy forgery detection for handwritten signature verification","authors":"P. Deng, L. Jaw, Jau-Hwang Wang, C. Tung","doi":"10.1109/CCST.2003.1297602","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297602","url":null,"abstract":"Handwritten signature verification has been extensively studied in past decades. Its many applications include banking, credit card validation, security systems etc. We mainly deal with the trace copy forgery detection problem in a handwritten signature verification system. Based on one of our previously study [P. S. Deng et al. (1999)], we have proposed an efficient approach, called Deng's approach to build-up an offline handwritten signature verification system by using wavelet transformation technique. From the experimental results, the accuracy rate of the Deng's approach [P. S. Deng et al. (1999)] is 92.57% and 93.68% for English and Chinese respectively. The approach we proposed not only got a good accuracy result, i.e. 87%, but also has many other advantages as follows: (1) it can be applied in many languages including English and Chinese, (2) it can be adopted to both on-line and off-line applications, and (3) it uses all the strokes information rather than only the vertical strokes information in a Chinese signature.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An integrated user authentication and access control scheme without public key cryptography 一种不使用公钥加密的集成用户认证和访问控制方案
H. Chien, J. Jan
Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. We discuss the pros and cons of the separate approach and the integrated approach, and then propose a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.
通常,在许多分布式系统中,用户身份验证和访问控制是两个独立的安全机制。用户认证和访问控制的集成设计可以在安全性和计算复杂度方面提供更好的性能。在此基础上,讨论了独立方案和集成方案的优缺点,提出了一种不使用公钥加密的集成方案。该方案具有以下几个实际优点:服务器上不存储用户敏感数据,服务器上不存储访问列表或功能列表,计算成本极低,可以自由选择用户密码,并且可以相互认证。
{"title":"An integrated user authentication and access control scheme without public key cryptography","authors":"H. Chien, J. Jan","doi":"10.1109/CCST.2003.1297550","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297550","url":null,"abstract":"Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. We discuss the pros and cons of the separate approach and the integrated approach, and then propose a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130295920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1