首页 > 最新文献

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

英文 中文
A method for evaluating video motion detection 一种评价视频运动检测的方法
H. Devereux, N. Custance
Over the last three years there has been an expansion of equipment offered on the market with the capability of providing video motion detection or intelligent scene monitoring. There is currently no easy way to compare this type of equipment due to the many variables in the scenes and the differing algorithms and approaches used in equipment. The Security Equipment Assessment Laboratory has put together a methodology for the testing of video processing equipment. This technique utilises real imagery and provides a basic grounding for comparison. The problems presented by a large library of video sequences on tape are the time taken to run tests, and the relative degradation with time of the video signal from the tape. In particular the degradation in frame stability. The paper proposes formats for attack trials, the recording and playback process control and the logging equipment required. These images are then available for quick evaluation of other video processing systems for particular scenarios. This paper breaks down the key scenarios, and the basis for the selection of video sequences. It also presents the statistical selection process used to identify the more useful image sequences for transfer to optical media. The terms "probability of detection" and "false alarm rate," can be misleading in the context of video processing systems where different scenarios and attack methods are used. This paper outlines an alternative method for comparing systems based on the content of the scenarios, allowing a prediction of the detection ability of the system and the likely false alarm rate in any situation.
在过去的三年里,市场上提供视频运动检测或智能场景监控功能的设备不断扩大。由于场景中的许多变量以及设备中使用的不同算法和方法,目前没有简单的方法来比较这类设备。安全设备评估实验室为视频处理设备的测试制定了一套方法。这种技术利用真实的图像,为比较提供了一个基本的基础。磁带上的大型视频序列库所面临的问题是运行测试所需的时间,以及来自磁带的视频信号随时间的相对退化。特别是帧稳定性的退化。提出了攻击试验的格式、录音和回放过程控制以及所需的测井设备。然后,这些图像可用于针对特定场景的其他视频处理系统的快速评估。本文对关键场景进行了分解,并给出了视频序列选择的依据。它还提出了用于识别更有用的图像序列传输到光学介质的统计选择过程。在使用不同场景和攻击方法的视频处理系统中,术语“检测概率”和“误报率”可能会产生误导。本文概述了一种基于场景内容比较系统的替代方法,允许预测系统的检测能力和任何情况下可能的虚警率。
{"title":"A method for evaluating video motion detection","authors":"H. Devereux, N. Custance","doi":"10.1109/CCST.1995.524742","DOIUrl":"https://doi.org/10.1109/CCST.1995.524742","url":null,"abstract":"Over the last three years there has been an expansion of equipment offered on the market with the capability of providing video motion detection or intelligent scene monitoring. There is currently no easy way to compare this type of equipment due to the many variables in the scenes and the differing algorithms and approaches used in equipment. The Security Equipment Assessment Laboratory has put together a methodology for the testing of video processing equipment. This technique utilises real imagery and provides a basic grounding for comparison. The problems presented by a large library of video sequences on tape are the time taken to run tests, and the relative degradation with time of the video signal from the tape. In particular the degradation in frame stability. The paper proposes formats for attack trials, the recording and playback process control and the logging equipment required. These images are then available for quick evaluation of other video processing systems for particular scenarios. This paper breaks down the key scenarios, and the basis for the selection of video sequences. It also presents the statistical selection process used to identify the more useful image sequences for transfer to optical media. The terms \"probability of detection\" and \"false alarm rate,\" can be misleading in the context of video processing systems where different scenarios and attack methods are used. This paper outlines an alternative method for comparing systems based on the content of the scenarios, allowing a prediction of the detection ability of the system and the likely false alarm rate in any situation.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124874508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An object-oriented expert system to reconstruct homicide scene 面向对象的凶杀现场重构专家系统
C. Kou, C. Tung, Chi-Ho Lin
We propose an object-oriented (O-O) method in an expert system (ES) to collect all the evidence in crime scene, to analyze them, and to support decisions for investigators to reconstruct crime scene. In this study, we focus on homicide scene reconstruction. Our previous research proposed Mark theory and non-Mark Theory evidences in crime scene. The former one is related to physical evidences in crime scene which belongs to static knowledge (post-criminal behavior: post-CB), the latter one is contributed to the analysis of pre-criminal behavior (pre-CB) and In-CB which fit the characteristics of dynamic knowledge. ES fits the characteristics of static knowledge, neural network (NW) approaches for the dynamic knowledge. In this research, we include O-O technology for building knowledge system for the investigator by using Level-5 ES shell. It is efficient for policemen to investigate the crime, instead of not jumping into a great bunch of evidences without any indication.
提出了一种面向对象(O-O)的专家系统(ES)方法来收集犯罪现场的所有证据,并对其进行分析,为调查人员重建犯罪现场提供决策支持。在本研究中,我们将重点放在凶杀现场重建上。我们以往的研究提出了犯罪现场的痕迹理论和非痕迹理论证据。前者涉及犯罪现场物证,属于静态知识(后犯罪行为:post-CB),后者致力于分析犯罪前行为(pre-CB)和中犯罪行为(in - cb),符合动态知识的特点。ES适合静态知识的特点,神经网络(NW)方法适合动态知识。在本研究中,我们采用O-O技术,利用Level-5 ES外壳为调查员构建知识系统。对警察来说,调查犯罪是有效的,而不是没有任何迹象就扑向一大堆证据。
{"title":"An object-oriented expert system to reconstruct homicide scene","authors":"C. Kou, C. Tung, Chi-Ho Lin","doi":"10.1109/CCST.1995.524923","DOIUrl":"https://doi.org/10.1109/CCST.1995.524923","url":null,"abstract":"We propose an object-oriented (O-O) method in an expert system (ES) to collect all the evidence in crime scene, to analyze them, and to support decisions for investigators to reconstruct crime scene. In this study, we focus on homicide scene reconstruction. Our previous research proposed Mark theory and non-Mark Theory evidences in crime scene. The former one is related to physical evidences in crime scene which belongs to static knowledge (post-criminal behavior: post-CB), the latter one is contributed to the analysis of pre-criminal behavior (pre-CB) and In-CB which fit the characteristics of dynamic knowledge. ES fits the characteristics of static knowledge, neural network (NW) approaches for the dynamic knowledge. In this research, we include O-O technology for building knowledge system for the investigator by using Level-5 ES shell. It is efficient for policemen to investigate the crime, instead of not jumping into a great bunch of evidences without any indication.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of systems and services in central monitoring stations (CMS) 整合中央监测站的系统和服务
Ulrich Urfer
Since time immemorial the protection of life and property has been an important part of our world. For thousands of years the job of keeping watch over valuable objects was carried out by specially trained people or animals. Today, with the advent of many new kinds of technologies, sophisticated systems are being increasingly used. Basically, little has changed and the procedure remains virtually the same. Someone notices that something is wrong, has to make a decision and then initiate and supervise the appropriate response. This paper presents a solution as to how a central monitoring station can handle incoming information from widely disparate telecommunications systems in a standardized way and how the intervention services (police, fire brigades, private services) can be integrated in the process of false alarm reduction. Information exchange with different partners in the security chain can be improved by using technologies such as remote terminals, interactive voice response systems (IVR) or fax on demand.
自古以来,保护生命和财产一直是我们世界的重要组成部分。几千年来,看管贵重物品的工作都是由受过专门训练的人或动物来完成的。今天,随着许多新技术的出现,越来越多地使用复杂的系统。基本上,几乎没有什么变化,程序几乎保持不变。有人注意到有些事情是错误的,必须做出决定,然后发起并监督适当的响应。本文提出了一种中央监测站如何以标准化的方式处理来自广泛不同的电信系统的传入信息,以及如何在减少误报的过程中整合干预服务(警察,消防队,私人服务)的解决方案。通过使用远程终端、交互式语音应答系统(IVR)或按需传真等技术,可以改善与安全链中不同合作伙伴的信息交换。
{"title":"Integration of systems and services in central monitoring stations (CMS)","authors":"Ulrich Urfer","doi":"10.1109/CCST.1995.524934","DOIUrl":"https://doi.org/10.1109/CCST.1995.524934","url":null,"abstract":"Since time immemorial the protection of life and property has been an important part of our world. For thousands of years the job of keeping watch over valuable objects was carried out by specially trained people or animals. Today, with the advent of many new kinds of technologies, sophisticated systems are being increasingly used. Basically, little has changed and the procedure remains virtually the same. Someone notices that something is wrong, has to make a decision and then initiate and supervise the appropriate response. This paper presents a solution as to how a central monitoring station can handle incoming information from widely disparate telecommunications systems in a standardized way and how the intervention services (police, fire brigades, private services) can be integrated in the process of false alarm reduction. Information exchange with different partners in the security chain can be improved by using technologies such as remote terminals, interactive voice response systems (IVR) or fax on demand.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Developments in and applications of fibre optic intrusion detection sensors 光纤入侵检测传感器的发展与应用
B. Griffiths
For many years optical fibre was the answer looking for the question. Now, after years of product applications and continued development, a range of fibre optic sensors are used in intrusion detection where the natural benefits of the material are matched by parallel developments in support technologies and applications experience. This paper describes some developments and applications in sensors and systems.
多年来,光纤一直是寻找这个问题的答案。现在,经过多年的产品应用和持续发展,一系列光纤传感器用于入侵检测,其中材料的天然优势与支持技术和应用经验的并行发展相匹配。本文介绍了传感器和系统的一些发展和应用。
{"title":"Developments in and applications of fibre optic intrusion detection sensors","authors":"B. Griffiths","doi":"10.1109/CCST.1995.524931","DOIUrl":"https://doi.org/10.1109/CCST.1995.524931","url":null,"abstract":"For many years optical fibre was the answer looking for the question. Now, after years of product applications and continued development, a range of fibre optic sensors are used in intrusion detection where the natural benefits of the material are matched by parallel developments in support technologies and applications experience. This paper describes some developments and applications in sensors and systems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Test methods and test equipment for thermal imagers 热成像仪的试验方法和试验设备
T. Williams
Some of the test parameters which can be used for assessing the performance of thermal imagers which are used for surveillance purposes, are discussed. Techniques which can be used for measuring these parameters, both in the laboratory and in the field, are described.
讨论了用于监控目的的热成像仪性能评估的一些测试参数。描述了可用于测量这些参数的技术,无论是在实验室还是在现场。
{"title":"Test methods and test equipment for thermal imagers","authors":"T. Williams","doi":"10.1109/CCST.1995.524740","DOIUrl":"https://doi.org/10.1109/CCST.1995.524740","url":null,"abstract":"Some of the test parameters which can be used for assessing the performance of thermal imagers which are used for surveillance purposes, are discussed. Techniques which can be used for measuring these parameters, both in the laboratory and in the field, are described.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure electronic voting protocol with IC cards 一个安全的电子投票协议与IC卡
J. Jan, Chih-Chang Tai
Computer networks have become more and more popular and important in our recent life. People can use the network system to do a variety of activities. Thus, we can expect that in the near future we will cast a ballot by using computer networks. In this paper, we propose a new electronic voting protocol with IC cards. Our scheme is so secure that it can meet all the security requirements. In our protocol, only legitimate voter can cast a valid ballot and only once. No one but the voter knows which voting strategy the voter adopts. Each voter can check whether or not his ballot has been counted correctly by the voting center. If any voter finds out that their ballot is miscounted, he can identify and recorrect this miscounting. Finally, no one can cheat or disrupt the entire election in our protocol.
计算机网络在我们最近的生活中变得越来越流行和重要。人们可以利用网络系统做各种各样的活动。因此,我们可以预期,在不久的将来,我们将通过计算机网络投票。本文提出了一种新的基于IC卡的电子投票协议。我们的方案非常安全,可以满足所有的安全要求。在我们的协议中,只有合法的选民才能投一次有效的选票。除了投票人之外,没有人知道投票人采用哪种投票策略。每个选民都可以检查他的选票是否被投票中心正确计数。如果任何选民发现他们的选票被错误计算,他可以识别和纠正这个错误。最后,在我们的协议中,没有人可以欺骗或破坏整个选举。
{"title":"A secure electronic voting protocol with IC cards","authors":"J. Jan, Chih-Chang Tai","doi":"10.1109/CCST.1995.524922","DOIUrl":"https://doi.org/10.1109/CCST.1995.524922","url":null,"abstract":"Computer networks have become more and more popular and important in our recent life. People can use the network system to do a variety of activities. Thus, we can expect that in the near future we will cast a ballot by using computer networks. In this paper, we propose a new electronic voting protocol with IC cards. Our scheme is so secure that it can meet all the security requirements. In our protocol, only legitimate voter can cast a valid ballot and only once. No one but the voter knows which voting strategy the voter adopts. Each voter can check whether or not his ballot has been counted correctly by the voting center. If any voter finds out that their ballot is miscounted, he can identify and recorrect this miscounting. Finally, no one can cheat or disrupt the entire election in our protocol.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Physical access to computers: can your computer be trusted? 对计算机的物理访问:您的计算机可信吗?
W. Fabian
The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys.
低成本电脑的普及对生产力是一个福音。然而,更容易的物理访问使基于计算机的信息面临更大的风险。处于危险中的信息不仅限于存储在暴露的计算机中的未加密文件。使用暴露的计算机加密的文件可能容易受到攻击。通过暴露的计算机访问的任何计算机,或同一局域网上的另一台计算机,都可能容易受到攻击。本文探讨了物理访问可能导致的一些威胁。这些包括数据清除、击键监控和网络数据包监控。目标信息本身可能具有价值(主要信息),也可能提供受保护信息的密钥(次要信息)。从信息目标的示例包括密码或加密密钥。
{"title":"Physical access to computers: can your computer be trusted?","authors":"W. Fabian","doi":"10.1109/CCST.1995.524920","DOIUrl":"https://doi.org/10.1109/CCST.1995.524920","url":null,"abstract":"The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130007144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AMETHYST: an enhanced detection system intelligently combining video detection and non-video detection systems AMETHYST:视频检测与非视频检测智能结合的增强型检测系统
M. Horner
The aim of the AMETHYST project (AutoMatic Event auTHentication SYSTems) is to encourage the development of a high performance perimeter intrusion detection system by combining Intelligent Scene Monitoring (ISM) or Video Motion Detection (VMD) technology with another detection system. The two systems would complement each other to produce a detection system with a high probability of detection and low false alarm rate. The performance of Perimeter Intrusion Detection Systems (PIDS) is often poor at sites with long perimeters, with extreme weather conditions and requiring a high probability of detection. Video based detection systems (ISM and VMD) are improving in sophistication and performance. Despite this there are still limitations with video based defection. Firstly, it may be several years before the video PIDS achieve the performance required for long perimeters. Secondly, when there is no video, for example in fog, there is no detection. There is potential for combining video detection with another sensor to reduce the disadvantages of video whilst retaining its advantages. A non-video SIDS would be used to detect intrusions. On alarm a sequence of CCTV images would be captured by a loop framestore system. A Targeted Automatic Verification Aid (TAVA) would then be used to decide if there was suspicious activity in the alarm sequence. Many false alarms have no visible cause, so a TAVA would filter these out. The false alarm rate would be lower than with a normal VMD as a TAVA would need to assess only alarm sequences. If there is no video or it is too foggy the TAVA would 'fail safe' by signalling the alarm from the non-video PIDS. A TAVA could use more sophisticated processing than a VMD and still be cheaper, because it could target the processing. PSDB is planning to collect alarm sequences from sites with a non-video PIDS and a loop framestore connected to the CCTV system. These sequences will be used to prove the concept and evaluate the performance of a TAVA.
AMETHYST项目(自动事件认证系统)的目的是通过将智能场景监控(ISM)或视频运动检测(VMD)技术与另一种检测系统相结合,鼓励高性能外围入侵检测系统的开发。两种系统相辅相成,形成一种检测概率高、虚警率低的检测系统。周界入侵检测系统(pid)在周界较长、极端天气条件和需要高检测概率的站点上的性能往往较差。基于视频的检测系统(ISM和VMD)在复杂性和性能方面都在不断提高。尽管如此,基于视频的叛逃仍然存在局限性。首先,视频pid可能需要几年时间才能达到长周长所需的性能。其次,当没有视频时,例如在雾中,就没有检测。有可能将视频检测与另一种传感器相结合,以减少视频的缺点,同时保留其优点。一个非视频小岛屿监测系统将用于探测入侵。在报警时,闭路电视图像序列将被一个循环帧存储系统捕获。然后将使用目标自动验证辅助(TAVA)来确定警报序列中是否存在可疑活动。许多假警报没有明显的原因,所以TAVA会过滤掉这些。误报率将低于正常VMD,因为TAVA只需要评估报警序列。如果没有视频或雾太大,TAVA将通过从非视频pid发出警报信号来“故障安全”。TAVA可以使用比VMD更复杂的处理,而且仍然更便宜,因为它可以针对处理。PSDB计划从具有非视频pid和连接到CCTV系统的环路框架存储的站点收集警报序列。这些序列将用于证明概念和评估TAVA的性能。
{"title":"AMETHYST: an enhanced detection system intelligently combining video detection and non-video detection systems","authors":"M. Horner","doi":"10.1109/CCST.1995.524734","DOIUrl":"https://doi.org/10.1109/CCST.1995.524734","url":null,"abstract":"The aim of the AMETHYST project (AutoMatic Event auTHentication SYSTems) is to encourage the development of a high performance perimeter intrusion detection system by combining Intelligent Scene Monitoring (ISM) or Video Motion Detection (VMD) technology with another detection system. The two systems would complement each other to produce a detection system with a high probability of detection and low false alarm rate. The performance of Perimeter Intrusion Detection Systems (PIDS) is often poor at sites with long perimeters, with extreme weather conditions and requiring a high probability of detection. Video based detection systems (ISM and VMD) are improving in sophistication and performance. Despite this there are still limitations with video based defection. Firstly, it may be several years before the video PIDS achieve the performance required for long perimeters. Secondly, when there is no video, for example in fog, there is no detection. There is potential for combining video detection with another sensor to reduce the disadvantages of video whilst retaining its advantages. A non-video SIDS would be used to detect intrusions. On alarm a sequence of CCTV images would be captured by a loop framestore system. A Targeted Automatic Verification Aid (TAVA) would then be used to decide if there was suspicious activity in the alarm sequence. Many false alarms have no visible cause, so a TAVA would filter these out. The false alarm rate would be lower than with a normal VMD as a TAVA would need to assess only alarm sequences. If there is no video or it is too foggy the TAVA would 'fail safe' by signalling the alarm from the non-video PIDS. A TAVA could use more sophisticated processing than a VMD and still be cheaper, because it could target the processing. PSDB is planning to collect alarm sequences from sites with a non-video PIDS and a loop framestore connected to the CCTV system. These sequences will be used to prove the concept and evaluate the performance of a TAVA.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attenuation of half-tone background detail from fingermark images using digital image processing techniques 利用数字图像处理技术衰减手印图像的半色调背景细节
P.M. Fabrizi, S. Bramble, G. Jackson
Frequency domain processing of fingermark images is valuable for reducing interfering periodic backgrounds. The success of the processing and the quality of the results depend upon a number of factors including structure and chosen processing method. This paper shows that in some circumstances it is possible to determine the most appropriate frequency domain filter for attenuation of interfering backgrounds using automatic computer based generation of frequency domain filters. Success has been achieved with half-tone printed backgrounds.
指纹图像的频域处理对于减少周期性背景干扰具有重要意义。加工的成功和结果的质量取决于许多因素,包括结构和选择的加工方法。本文表明,在某些情况下,可以利用计算机自动生成频域滤波器来确定最合适的频域滤波器来衰减干扰背景。半色调印刷背景已取得成功。
{"title":"Attenuation of half-tone background detail from fingermark images using digital image processing techniques","authors":"P.M. Fabrizi, S. Bramble, G. Jackson","doi":"10.1109/CCST.1995.524745","DOIUrl":"https://doi.org/10.1109/CCST.1995.524745","url":null,"abstract":"Frequency domain processing of fingermark images is valuable for reducing interfering periodic backgrounds. The success of the processing and the quality of the results depend upon a number of factors including structure and chosen processing method. This paper shows that in some circumstances it is possible to determine the most appropriate frequency domain filter for attenuation of interfering backgrounds using automatic computer based generation of frequency domain filters. Success has been achieved with half-tone printed backgrounds.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130956217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bodysearch technology uses X-ray imaging to remove hazards and humiliation from personnel searches 人体搜查技术使用x射线成像技术来消除人员搜查中的危险和羞辱
G.J. Smith
Smuggling of weapons, drugs, and valuable materials on the body across international borders and through security-sensitive installations presents difficult social problems such as the safety of the officers and the privacy of the subjects. The Bodysearch system, which uses low-exposure X-rays to image a person's body, solves some of these problems by providing a safe, fast, and effective way to unobtrusively search a person's body. At the same time the implementation of Bodysearch challenges society to decide if it is ready to go the next step and use more widespread inspections of persons in order to reduce the opportunities for criminal acts against society.
武器、毒品和贵重材料在尸体上的走私跨越国际边界,并通过安全敏感设施,带来了棘手的社会问题,例如警官的安全和受试者的隐私。人体搜索系统使用低曝光的x射线对人体进行成像,通过提供一种安全、快速、有效的方式对人体进行不引人注目的搜索,解决了其中的一些问题。与此同时,搜身的实施对社会提出了挑战,要求社会决定是否准备采取下一步行动,对个人进行更广泛的检查,以减少危害社会的犯罪行为的机会。
{"title":"Bodysearch technology uses X-ray imaging to remove hazards and humiliation from personnel searches","authors":"G.J. Smith","doi":"10.1109/CCST.1995.524958","DOIUrl":"https://doi.org/10.1109/CCST.1995.524958","url":null,"abstract":"Smuggling of weapons, drugs, and valuable materials on the body across international borders and through security-sensitive installations presents difficult social problems such as the safety of the officers and the privacy of the subjects. The Bodysearch system, which uses low-exposure X-rays to image a person's body, solves some of these problems by providing a safe, fast, and effective way to unobtrusively search a person's body. At the same time the implementation of Bodysearch challenges society to decide if it is ready to go the next step and use more widespread inspections of persons in order to reduce the opportunities for criminal acts against society.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1