首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Hiding binary images behind noise with authentication capability: a new approach to covert communication 具有身份验证能力的噪声隐藏二值图像:一种隐蔽通信的新方法
Chih-Hsuan Tzeng, Wen-Hsiang Tsai
A new approach to hiding secret binary images behind noise images for covert communication with a capability of secret authentication is proposed. A secret image to be transmitted is transformed into a random noise image at a sender site with a given key, with the aim of both covering the secret and cheating illicit interceptors. Authentication bits are also embedded imperceptibly in the noise image. At the receiver site, the secret image is recovered from the noise image with the same key and verified by checking the existence of the authentication bits. Experimental results show the feasibility of the approach for real applications.
提出了一种将秘密二值图像隐藏在噪声图像后进行秘密通信的新方法,该方法具有秘密认证的能力。要传输的秘密图像在具有给定密钥的发送站点被转换为随机噪声图像,目的是既掩盖秘密又欺骗非法拦截者。认证位也被嵌入到噪声图像中。在接收端,使用相同的密钥从噪声图像中恢复秘密图像,并通过检查认证位的存在来验证。实验结果表明,该方法在实际应用中是可行的。
{"title":"Hiding binary images behind noise with authentication capability: a new approach to covert communication","authors":"Chih-Hsuan Tzeng, Wen-Hsiang Tsai","doi":"10.1109/CCST.2003.1297565","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297565","url":null,"abstract":"A new approach to hiding secret binary images behind noise images for covert communication with a capability of secret authentication is proposed. A secret image to be transmitted is transformed into a random noise image at a sender site with a given key, with the aim of both covering the secret and cheating illicit interceptors. Authentication bits are also embedded imperceptibly in the noise image. At the receiver site, the secret image is recovered from the noise image with the same key and verified by checking the existence of the authentication bits. Experimental results show the feasibility of the approach for real applications.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130626570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of SPS model using mobile agent system 基于移动代理系统的SPS模型设计
Jin-ho Park, Jin-Wook Chung
This research presents the development of a certain highly efficient model for group security policy negotiation using mobile agents in the IPSec environment. The conventional IP security systems have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.
本研究提出了一种在IPSec环境下使用移动代理进行组安全策略协商的高效模型。传统的IP安全系统存在一些问题。这些系统的一个缺点是每个安全区域之间所需的策略是不同的。另一个问题是,由于网络的拓扑结构,无法保证一个数据包在两个方向上是否通过相同的路径传输,并且受到相同策略的保护。与传统系统不同,本文开发的模型可以通过使用移动代理技术进行求解。当每个域都需要协商安全策略时,移动代理以护照的形式管理协商结果,并通过护照来保证彼此的认证和可靠性。
{"title":"Design of SPS model using mobile agent system","authors":"Jin-ho Park, Jin-Wook Chung","doi":"10.1109/CCST.2003.1297532","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297532","url":null,"abstract":"This research presents the development of a certain highly efficient model for group security policy negotiation using mobile agents in the IPSec environment. The conventional IP security systems have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133305252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient method for security image data compression 一种有效的安全图像数据压缩方法
P. Páta, M. Klima
We devote to the further development of our tests in the field of image compression for security purposes. This phase has been oriented to the application of Karhunen-Loeve Transform (KLT) for efficient coding of car plate images. The car plate is a special class of images and the KLT is well matched to this purpose. A set of car plates was recorded and the suboptimal coding base was generated. Applying this base some examples of car plate images have been compressed and the compression results are presented including the dependence of compression rate vs MSE. The compressed standard image test LENA is also shown for comparison. The suggested efficient compression is design to be applied in various car identification systems such as entrance gates, highway entries etc. Finally the results are discussed.
我们致力于进一步发展我们在图像压缩领域的安全测试。这一阶段的重点是应用Karhunen-Loeve变换(KLT)对车牌图像进行高效编码。汽车车牌是一类特殊的图像,KLT很好地匹配了这一目的。记录一组车牌,生成次优编码库。在此基础上对车牌图像进行了压缩,并给出了压缩结果,包括压缩率与MSE的关系。为了进行比较,还展示了压缩标准图像测试LENA。所提出的有效压缩设计可应用于各种汽车识别系统,如大门、高速公路入口等。最后对结果进行了讨论。
{"title":"Efficient method for security image data compression","authors":"P. Páta, M. Klima","doi":"10.1109/CCST.2003.1297603","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297603","url":null,"abstract":"We devote to the further development of our tests in the field of image compression for security purposes. This phase has been oriented to the application of Karhunen-Loeve Transform (KLT) for efficient coding of car plate images. The car plate is a special class of images and the KLT is well matched to this purpose. A set of car plates was recorded and the suboptimal coding base was generated. Applying this base some examples of car plate images have been compressed and the compression results are presented including the dependence of compression rate vs MSE. The compressed standard image test LENA is also shown for comparison. The suggested efficient compression is design to be applied in various car identification systems such as entrance gates, highway entries etc. Finally the results are discussed.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114038529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Progressive watermarking techniques with genetic algorithms 遗传算法的渐进式水印技术
H.-C. Huang, J. Pan, C. Shieh, Feng-Hsing Wang
An innovative watermarking scheme based on progressive transmission with genetic algorithms (GA) is proposed. We implement the watermarking embedding and extraction system in the discrete cosine transform (DCT) domain, and apply the JPEG spectral selection mode for progressive transmission. By employing GA with a proper fitness function into the watermarking system, both the watermark imperceptibility and watermark robustness requirements are considered and optimized. In addition, the embedded watermark can be partly extracted in the receiver side even when the watermarked image is being transmitted. Simulation results show both the robustness and the effectiveness of progressive transmission under different attacking schemes and different bandwidth variations.
提出了一种基于遗传算法渐进传输的新型水印方案。我们在离散余弦变换(DCT)域中实现了水印嵌入和提取系统,并采用JPEG频谱选择模式进行累进传输。将具有合适适应度函数的遗传算法应用到水印系统中,同时考虑并优化了水印的不可感知性和鲁棒性要求。此外,即使在传输水印图像时,也可以在接收端部分提取嵌入的水印。仿真结果表明,在不同的攻击方案和不同的带宽变化下,渐进式传输具有良好的鲁棒性和有效性。
{"title":"Progressive watermarking techniques with genetic algorithms","authors":"H.-C. Huang, J. Pan, C. Shieh, Feng-Hsing Wang","doi":"10.1109/CCST.2003.1297536","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297536","url":null,"abstract":"An innovative watermarking scheme based on progressive transmission with genetic algorithms (GA) is proposed. We implement the watermarking embedding and extraction system in the discrete cosine transform (DCT) domain, and apply the JPEG spectral selection mode for progressive transmission. By employing GA with a proper fitness function into the watermarking system, both the watermark imperceptibility and watermark robustness requirements are considered and optimized. In addition, the embedded watermark can be partly extracted in the receiver side even when the watermarked image is being transmitted. Simulation results show both the robustness and the effectiveness of progressive transmission under different attacking schemes and different bandwidth variations.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116181438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Constructing auditing rules from ERP system: a business process flow approach 从ERP系统构建审计规则:一种业务流程方法
Y. Hung
Fraudulence cases have happened all the time in business environments. The responsibilities of auditors are to prevent the swindling cases and to ensure that every operation conforms to regulations. In recent years, IT is adopted in business environments. Traditional approaches with paper operation using papers to be audit trails should be changed to EDP auditing. Typically, since auditors come from nonIT backgrounds, it's difficult for them to involve the area of EDP auditing. Furthermore, enterprise resource planning (ERP) is adopted competing with other opponents around the world. ERP makes the enterprise systems more complicate. Hence, auditors face an even big problem about how to audit in ERP environment. We propose a mechanism to structure rules of auditing information by mapping from business processes to data flow and data model. With our mechanism, auditors can directly obtain auditing information based on business process and containing data changing process.
在商业环境中,欺诈案件时有发生。审计人员的职责是防止欺诈案件,并确保每项操作都符合规定。近年来,IT在商业环境中被采用。传统的以纸张为审计线索的纸质操作方法应改为电子数据处理审计。通常,由于审核员来自非it背景,因此他们很难涉及EDP审核领域。此外,采用企业资源计划(ERP)与世界各地的其他对手竞争。ERP使企业系统更加复杂。因此,如何在ERP环境下进行审计是审计人员面临的一个更大的问题。通过将业务流程映射到数据流和数据模型,提出了一种构建审计信息规则的机制。通过我们的机制,审计人员可以直接获得基于业务流程和包含数据变化过程的审计信息。
{"title":"Constructing auditing rules from ERP system: a business process flow approach","authors":"Y. Hung","doi":"10.1109/CCST.2003.1297583","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297583","url":null,"abstract":"Fraudulence cases have happened all the time in business environments. The responsibilities of auditors are to prevent the swindling cases and to ensure that every operation conforms to regulations. In recent years, IT is adopted in business environments. Traditional approaches with paper operation using papers to be audit trails should be changed to EDP auditing. Typically, since auditors come from nonIT backgrounds, it's difficult for them to involve the area of EDP auditing. Furthermore, enterprise resource planning (ERP) is adopted competing with other opponents around the world. ERP makes the enterprise systems more complicate. Hence, auditors face an even big problem about how to audit in ERP environment. We propose a mechanism to structure rules of auditing information by mapping from business processes to data flow and data model. With our mechanism, auditors can directly obtain auditing information based on business process and containing data changing process.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new convertible group signature scheme on the basis of dual complexities 基于双重复杂性的可转换群签名方案
Jonathan Jen-Rong Chen, R. Lin, An-Pin Chen
The development of digital signature provides a new field for cryptology. Chaum and van Heyet apply digital signature to group signature. The research of group digital signature is booming because group digital signature fits e-commerce very well. Although some literature has strong theoretical rationale, criticism cannot be waived because a good digital signature has to pass some rigid thresholds as follows: anonymity, unlinkability, protection, and trace-ability. Lately, Chen and Liu make use of zero knowledge and focus on faster computation time than does Camenisch. However, the development of Chen and Liu is on the basis of the Lucas cryptosystem suffering from the questioning by Bleichenbacher because the Lucas cryptosystem has the Laih's fold problem. We advance a new group digital signature scheme that can be free from the problem implicit in the Lucas cryptosystem by improving the Chen and Liu scheme. The new crypto scheme we provide is not only protected by dual complexities which can be safer while under a situation of being invaded but also possessed with the advantage of faster computation.
数字签名的发展为密码学提供了一个新的研究领域。Chaum和van Heyet将数字签名应用于群签名。由于群数字签名非常适合电子商务,因此群数字签名的研究正在蓬勃发展。尽管一些文献有很强的理论基础,但批评不能放弃,因为一个好的数字签名必须通过以下一些严格的门槛:匿名性、不可链接性、保护和可追溯性。最近,Chen和Liu利用零知识,并专注于比Camenisch更快的计算时间。然而,Chen和Liu的发展是在Lucas密码系统受到Bleichenbacher质疑的基础上进行的,因为Lucas密码系统存在Laih’s fold问题。通过对Chen和Liu方案的改进,提出了一种新的群数字签名方案,该方案可以避免Lucas密码系统中隐含的问题。我们提供的新加密方案不仅具有双重复杂性的保护,在被入侵的情况下更安全,而且具有计算速度更快的优点。
{"title":"A new convertible group signature scheme on the basis of dual complexities","authors":"Jonathan Jen-Rong Chen, R. Lin, An-Pin Chen","doi":"10.1109/CCST.2003.1297546","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297546","url":null,"abstract":"The development of digital signature provides a new field for cryptology. Chaum and van Heyet apply digital signature to group signature. The research of group digital signature is booming because group digital signature fits e-commerce very well. Although some literature has strong theoretical rationale, criticism cannot be waived because a good digital signature has to pass some rigid thresholds as follows: anonymity, unlinkability, protection, and trace-ability. Lately, Chen and Liu make use of zero knowledge and focus on faster computation time than does Camenisch. However, the development of Chen and Liu is on the basis of the Lucas cryptosystem suffering from the questioning by Bleichenbacher because the Lucas cryptosystem has the Laih's fold problem. We advance a new group digital signature scheme that can be free from the problem implicit in the Lucas cryptosystem by improving the Chen and Liu scheme. The new crypto scheme we provide is not only protected by dual complexities which can be safer while under a situation of being invaded but also possessed with the advantage of faster computation.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel public digital watermarking for still images based on encryption algorithm 一种基于加密算法的静态图像公开数字水印
G. Tai, Long-Wen Chang
Digital watermarking has been proposed to solve the ownership problem and prevent various malicious attacks in the recent years. However, most proposed watermarking algorithms are kept secret. If the watermarking algorithm can be open, it is more convincing for authentication when there is an argument. In this paper, a novel robust digital watermarking scheme for still images with public watermarking algorithm is proposed. We find the significant frequency coefficients to locate the position for embedding the watermark. The watermark is a binary image logo that can represent its ownership. Its bitmap is reordered by random permutation. Then we employ a data encryption algorithm such as DES (data encryption standard) to encrypt the bitmap permutation index of the logo. Each image is processed to generate a unique ID. The original image and ID is promulgated in the Internet Web site or trust third party as DVCS. An error correction coding scheme is also used to protect the watermark. Simulation shows that our watermarked images are robust against various attacks. Our watermarking algorithm can be open to the public, but only the owner, who uses the encryption algorithm to encrypt the random permutation order of the logo bitmap with the secret key, can retrieve the embedded watermark exactly in the cover image and recover the logo. If there is an argument between the owner and the attacker the secret key and ID can be provided to the arbitrator to resolve the copyright issue more convincingly.
为了解决所有权问题和防止各种恶意攻击,近年来提出了数字水印技术。然而,大多数提出的水印算法都是保密的。如果水印算法是开放的,在存在参数的情况下更有说服力。本文提出了一种基于公共水印算法的静态图像鲁棒数字水印方案。我们找到显著的频率系数来定位水印的嵌入位置。水印是一种可以表示其所有权的二值图像标志。它的位图通过随机排列重新排序。然后采用DES(数据加密标准)等数据加密算法对标识的位图排列索引进行加密。每个图像都经过处理以生成唯一的ID。在互联网网站上公布的原始图像和ID或委托第三方作为DVCS。采用纠错编码方案对水印进行保护。仿真结果表明,我们的水印图像对各种攻击具有较强的鲁棒性。我们的水印算法可以向公众开放,但只有所有者使用加密算法用密钥对标识位图的随机排列顺序进行加密,才能准确地检索到封面图像中嵌入的水印并恢复标识。如果所有者和攻击者之间存在争议,则可以将密钥和ID提供给仲裁者,以更有说服力地解决版权问题。
{"title":"A novel public digital watermarking for still images based on encryption algorithm","authors":"G. Tai, Long-Wen Chang","doi":"10.1109/CCST.2003.1297570","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297570","url":null,"abstract":"Digital watermarking has been proposed to solve the ownership problem and prevent various malicious attacks in the recent years. However, most proposed watermarking algorithms are kept secret. If the watermarking algorithm can be open, it is more convincing for authentication when there is an argument. In this paper, a novel robust digital watermarking scheme for still images with public watermarking algorithm is proposed. We find the significant frequency coefficients to locate the position for embedding the watermark. The watermark is a binary image logo that can represent its ownership. Its bitmap is reordered by random permutation. Then we employ a data encryption algorithm such as DES (data encryption standard) to encrypt the bitmap permutation index of the logo. Each image is processed to generate a unique ID. The original image and ID is promulgated in the Internet Web site or trust third party as DVCS. An error correction coding scheme is also used to protect the watermark. Simulation shows that our watermarked images are robust against various attacks. Our watermarking algorithm can be open to the public, but only the owner, who uses the encryption algorithm to encrypt the random permutation order of the logo bitmap with the secret key, can retrieve the embedded watermark exactly in the cover image and recover the logo. If there is an argument between the owner and the attacker the secret key and ID can be provided to the arbitrator to resolve the copyright issue more convincingly.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New development in portable sensor allows low-cost components to be left behind (disposable) 便携式传感器的新发展允许低成本组件被抛弃(一次性)
A. Gagnon
Tactical deployment of out-of-doors intrusion detection system sensors can be hazardous to law-enforcement personnel. There is a growing demand for deployment to be done secretly. Personnel are obliged to minimize their exposure to hazards and maximize mission effectiveness. Sensor hardware must be exceptionally low-cost in order to be "left behind", or considered disposable. Recent developments in noncoherent synergistic radar (NCSR) allow the RF transmitter (sensor) and RF receiver (processing engine) to be deployed wirelessly up to three kilometers away from each other. A 'leaky cable' sensor (ported coax) provides a two-meter wide contour of detection, typically fifty to two hundred meters in length. A miniature antenna provides a two-meter, spherical point-of-detection. For the purpose of this paper, "sensing elements" include; nonmetallic baseball-sized artificial stones and tree branches, RF miniature antenna, battery circuit and logic. All of which priced to be "left behind". The processing engine includes a portable receiver connected to a tripod-mounted directional antenna, located in a safe-zone far away from its related sensing elements. The receiver multiplexes, facilitating the processing of up to sixteen different frequency-coded transmitters (artificial stones). An alarm, resulting from an intrusion into any one of the sixteen spherical point zones is reported to wireless hand-held equipment. Results of a series of tactical field trials are published. Sensors (artificial stone) were secretly deposited by hand, dropped from aircraft or simply distributed using military artillery.
户外入侵检测系统传感器的战术部署可能对执法人员造成危险。越来越多的人要求秘密部署。工作人员有义务尽量减少接触危险并最大限度地提高任务效率。传感器硬件必须非常低成本,才能被“抛在后面”,或者被认为是一次性的。非相干协同雷达(NCSR)的最新发展使射频发射器(传感器)和射频接收器(处理引擎)可以无线部署在距离彼此3公里远的地方。“泄漏电缆”传感器(端口同轴电缆)提供两米宽的检测轮廓,通常长度为50到200米。一个微型天线提供了一个两米的球形检测点。在本文中,“传感元件”包括;非金属棒球大小的人造石头和树枝,射频微型天线,电池电路和逻辑。所有这些定价都被“抛在后面”。该处理引擎包括一个便携式接收器,该接收器连接到安装在三脚架上的定向天线,该天线位于远离相关传感元件的安全区。接收机多路复用,方便处理多达16个不同的频率编码发射机(人造石)。如果有人侵入16个球形点区域中的任何一个,就会向无线手持设备发出警报。发表了一系列战术现场试验的结果。传感器(人造石头)被秘密地用手放置,从飞机上投下或简单地使用军事火炮分发。
{"title":"New development in portable sensor allows low-cost components to be left behind (disposable)","authors":"A. Gagnon","doi":"10.1109/CCST.2003.1297539","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297539","url":null,"abstract":"Tactical deployment of out-of-doors intrusion detection system sensors can be hazardous to law-enforcement personnel. There is a growing demand for deployment to be done secretly. Personnel are obliged to minimize their exposure to hazards and maximize mission effectiveness. Sensor hardware must be exceptionally low-cost in order to be \"left behind\", or considered disposable. Recent developments in noncoherent synergistic radar (NCSR) allow the RF transmitter (sensor) and RF receiver (processing engine) to be deployed wirelessly up to three kilometers away from each other. A 'leaky cable' sensor (ported coax) provides a two-meter wide contour of detection, typically fifty to two hundred meters in length. A miniature antenna provides a two-meter, spherical point-of-detection. For the purpose of this paper, \"sensing elements\" include; nonmetallic baseball-sized artificial stones and tree branches, RF miniature antenna, battery circuit and logic. All of which priced to be \"left behind\". The processing engine includes a portable receiver connected to a tripod-mounted directional antenna, located in a safe-zone far away from its related sensing elements. The receiver multiplexes, facilitating the processing of up to sixteen different frequency-coded transmitters (artificial stones). An alarm, resulting from an intrusion into any one of the sixteen spherical point zones is reported to wireless hand-held equipment. Results of a series of tactical field trials are published. Sensors (artificial stone) were secretly deposited by hand, dropped from aircraft or simply distributed using military artillery.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125818769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive digital watermarking using neural network technique 基于神经网络技术的自适应数字水印
D. Lou, Jiang-Lung Liu, Ming-Chiang Hu
A novel image watermarking approach based on the human visual system (HVS) model and neural network technique is proposed. The human visual system model is utilized to generate the suitable strength of embedded watermark and can be described in terms of four properties of HVS model: entropy, frequency, luminance, and texture sensitivity. The neural network technique has been employed to obtain the local characteristics of image. In our experiments for each different image the watermark can be adjusted to provide a maximum and suitable strength subject to the imperceptibility constraint.
提出了一种基于人类视觉系统模型和神经网络技术的图像水印方法。利用人类视觉系统模型生成合适的嵌入水印强度,用HVS模型的熵、频率、亮度和纹理灵敏度四个属性来描述。利用神经网络技术获取图像的局部特征。在我们的实验中,每个不同的图像都可以在不可感知性约束下调整水印以提供最大和合适的强度。
{"title":"Adaptive digital watermarking using neural network technique","authors":"D. Lou, Jiang-Lung Liu, Ming-Chiang Hu","doi":"10.1109/CCST.2003.1297580","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297580","url":null,"abstract":"A novel image watermarking approach based on the human visual system (HVS) model and neural network technique is proposed. The human visual system model is utilized to generate the suitable strength of embedded watermark and can be described in terms of four properties of HVS model: entropy, frequency, luminance, and texture sensitivity. The neural network technique has been employed to obtain the local characteristics of image. In our experiments for each different image the watermark can be adjusted to provide a maximum and suitable strength subject to the imperceptibility constraint.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
The safety helmet detection for ATM's surveillance system via the modified Hough transform 基于改进霍夫变换的ATM监控系统安全帽检测
C. Wen, Shih-hsuan Chiu, Jiun-Jian Liaw, Chuan-Pin Lu
The automatic teller machine (ATM) plays an important role in the modern economical activity. It provides a fast and convenient way to process economical transactions between banks and their customers. Unfortunately, it also provides a convenient way for criminals to get illegal money. For the safety reason, each ATM is with the surveillance system to record customer's face information. However, when criminals use the ATM to withdraw illegal money, they usually hide their faces with something (e.g. safety helmets) to avoid that the surveillance system records their face information. That will make the surveillance system decrease their efficiency. We propose a circle/circular arc detection method based upon the modified Hough transform, and apply it to the detection of safety helmet for the surveillance system of the ATM. Since the safety helmet location will be in the set of the obtained possible circles/circular arcs (if any exists). We use geometric features to verify if any safety helmet exists in the set. The proposed method can be applied to the surveillance systems of ATMs and banks, and it can provide the early warning to save-guards when any "customer" tries to avoid his/her face information from surveillance, such as withdrawing money with the safety helmet. That will make the surveillance system more useful. A real ATM image is used to see the performance of proposed method.
自动取款机(ATM)在现代经济活动中起着重要的作用。它为银行和客户之间的经济交易提供了一种快速方便的处理方式。不幸的是,它也为犯罪分子获得非法资金提供了方便的途径。为了安全起见,每台ATM机都配有监控系统,记录顾客的面部信息。然而,当犯罪分子使用自动取款机提取非法资金时,他们通常用某种东西(例如安全帽)隐藏自己的脸,以避免监控系统记录他们的面部信息。这将降低监控系统的效率。提出了一种基于改进霍夫变换的圆/圆弧检测方法,并将其应用于ATM监控系统中安全帽的检测。由于安全帽位置将在获得的可能圆/圆弧(如果存在)的集合中。我们使用几何特征来验证集合中是否存在安全帽。所提出的方法可以应用于自动取款机和银行的监控系统,当任何“客户”试图避开自己的面部信息时,例如戴安全帽取钱,它可以为储蓄人员提供早期预警。这将使监控系统更有用。用实际的ATM图像验证了所提方法的性能。
{"title":"The safety helmet detection for ATM's surveillance system via the modified Hough transform","authors":"C. Wen, Shih-hsuan Chiu, Jiun-Jian Liaw, Chuan-Pin Lu","doi":"10.1109/CCST.2003.1297588","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297588","url":null,"abstract":"The automatic teller machine (ATM) plays an important role in the modern economical activity. It provides a fast and convenient way to process economical transactions between banks and their customers. Unfortunately, it also provides a convenient way for criminals to get illegal money. For the safety reason, each ATM is with the surveillance system to record customer's face information. However, when criminals use the ATM to withdraw illegal money, they usually hide their faces with something (e.g. safety helmets) to avoid that the surveillance system records their face information. That will make the surveillance system decrease their efficiency. We propose a circle/circular arc detection method based upon the modified Hough transform, and apply it to the detection of safety helmet for the surveillance system of the ATM. Since the safety helmet location will be in the set of the obtained possible circles/circular arcs (if any exists). We use geometric features to verify if any safety helmet exists in the set. The proposed method can be applied to the surveillance systems of ATMs and banks, and it can provide the early warning to save-guards when any \"customer\" tries to avoid his/her face information from surveillance, such as withdrawing money with the safety helmet. That will make the surveillance system more useful. A real ATM image is used to see the performance of proposed method.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129249552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1