首页 > 最新文献

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

英文 中文
Moving object surveillance and analysis for camera based security systems 基于摄像机的安全系统的运动物体监视和分析
J. Freer, B. J. Beggs, H. Fernandez-Canque, F. Chevrier, A. Goryashko
In this article we present an image processing based approach for the automatic identification of moving objects (primarily people) within monochrome video images. Object motion is analysed by algorithms which are used to distinguish suspicious movement from non-suspicious movement. A human operator can be alerted on recognition of a suspicious event occurrence. The methods used are described along with the results obtained.
在本文中,我们提出了一种基于图像处理的方法,用于在单色视频图像中自动识别运动物体(主要是人)。通过算法对目标运动进行分析,从而区分可疑运动和非可疑运动。在识别到可疑事件发生时,可以向人工操作员发出警报。叙述了所采用的方法以及所得到的结果。
{"title":"Moving object surveillance and analysis for camera based security systems","authors":"J. Freer, B. J. Beggs, H. Fernandez-Canque, F. Chevrier, A. Goryashko","doi":"10.1109/CCST.1995.524735","DOIUrl":"https://doi.org/10.1109/CCST.1995.524735","url":null,"abstract":"In this article we present an image processing based approach for the automatic identification of moving objects (primarily people) within monochrome video images. Object motion is analysed by algorithms which are used to distinguish suspicious movement from non-suspicious movement. A human operator can be alerted on recognition of a suspicious event occurrence. The methods used are described along with the results obtained.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134469489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fuzzy feature selection for fingerprint identification 指纹识别中的模糊特征选择
V. Sagar, D.B.L. Ngo, K. Foo
Fingerprint verification systems are expensive and complex, requiring sensing facilities, preprocessing algorithms for image quality enhancement and procedures for ridge and minutiae detection which can be used for classification, verification and recognition. To-date, the main published approaches to fingerprint recognition break down the process of ridge detection into smoothing or early pre-processing, edge detection, thresholding, binarization and subsequently thinning. This whole procedure can be very computationally expensive and hence requires more expensive hardware to meet the response-time requirements. The approach presented in this paper is based on fuzzy logic techniques. This has the advantage of being simple and less expensive.
指纹验证系统既昂贵又复杂,需要传感设备、增强图像质量的预处理算法以及可用于分类、验证和识别的脊线和细节检测程序。迄今为止,已发表的主要指纹识别方法将脊线检测过程分解为平滑或早期预处理、边缘检测、阈值化、二值化和随后的细化。整个过程在计算上可能非常昂贵,因此需要更昂贵的硬件来满足响应时间要求。本文提出的方法是基于模糊逻辑技术。这样做的优点是简单和便宜。
{"title":"Fuzzy feature selection for fingerprint identification","authors":"V. Sagar, D.B.L. Ngo, K. Foo","doi":"10.1109/CCST.1995.524738","DOIUrl":"https://doi.org/10.1109/CCST.1995.524738","url":null,"abstract":"Fingerprint verification systems are expensive and complex, requiring sensing facilities, preprocessing algorithms for image quality enhancement and procedures for ridge and minutiae detection which can be used for classification, verification and recognition. To-date, the main published approaches to fingerprint recognition break down the process of ridge detection into smoothing or early pre-processing, edge detection, thresholding, binarization and subsequently thinning. This whole procedure can be very computationally expensive and hence requires more expensive hardware to meet the response-time requirements. The approach presented in this paper is based on fuzzy logic techniques. This has the advantage of being simple and less expensive.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114254366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Computer evidence analysis and recovery of magnetic storage media data 磁存储介质数据的计算机证据分析与恢复
H.-J. Leimkueller
The recovery of data that were stored on magnetic media normally poses no problems if the same hardware is used to recover the data that was used to store it on the medium. This is not the case if the magnetic information or the storage media itself have been damaged. If the hardware or software system used to store the data on the media is unknown, then this must be determined by initial analysis. Once the storage format has been analysed and is known, the storage media can then be read using the appropriate equipment. If it is unknown or the storage media is damaged, one can try to recover the data using laboratory measures. The paper describes the possibilities for analysis and recovery. The main emphasis is laid on the technical problem of making the magnetically stored information available as digital data.
如果使用与存储在介质上的数据相同的硬件来恢复数据,则存储在磁性介质上的数据的恢复通常不会出现问题。如果磁性信息或存储介质本身已经损坏,则不是这种情况。如果用于在介质上存储数据的硬件或软件系统未知,则必须通过初始分析确定。一旦分析并知道了存储格式,就可以使用适当的设备读取存储介质。如果未知或存储介质损坏,可以尝试使用实验室措施恢复数据。本文描述了分析和回收的可能性。重点讨论了将磁存储信息转化为数字数据的技术问题。
{"title":"Computer evidence analysis and recovery of magnetic storage media data","authors":"H.-J. Leimkueller","doi":"10.1109/CCST.1995.524748","DOIUrl":"https://doi.org/10.1109/CCST.1995.524748","url":null,"abstract":"The recovery of data that were stored on magnetic media normally poses no problems if the same hardware is used to recover the data that was used to store it on the medium. This is not the case if the magnetic information or the storage media itself have been damaged. If the hardware or software system used to store the data on the media is unknown, then this must be determined by initial analysis. Once the storage format has been analysed and is known, the storage media can then be read using the appropriate equipment. If it is unknown or the storage media is damaged, one can try to recover the data using laboratory measures. The paper describes the possibilities for analysis and recovery. The main emphasis is laid on the technical problem of making the magnetically stored information available as digital data.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new invisible volumetric sensor for solid wall applications 固体墙应用的新型隐形体积传感器
A. Gagnon
Even though, chain link fences are popular in North America for property delimitation, most European countries use solid walls, i.e., brick, stone or concrete. Solid walls are also very common in detention centres, for court yard delimitation. Other applications include sensors mounted on the external wall of a stone building, where detection of intrusions by wall climbing is needed. Until recently, the sensors used had to be mounted on the facade or the top of the wall using stand offs to perform properly. The sensor discussed in the article presents interesting characteristics that allow it to address the need for an invisible solid wall sensor. Indeed, ENCLOSURE uses a single cable concept that can be mounted directly on the wail. Using a local FM broadcast tower, the field surrounding the cable is not dense and distributes uniformly along the wail to prevent problems associated with rain or ice which are a problem to other sensors. For covert applications, the single leaky coaxial cable, can be embedded directly in the mortar of the wall during its construction, or grooved into an existing wall. Recently, ENCLOSURE has been successfully installed on different wall constructions. The latest results which include brick walls for detention centres, brick walls of an archaeological site and stone wall fences for a private VIP property are very encouraging. We present results of longer term beta testing for new wall mounted and fast deployable applications. Emphasis is placed on site particularities and the treatment of site impairments for those applications.
尽管链式围栏在北美很流行,用于财产划分,但大多数欧洲国家使用实心墙,即砖,石头或混凝土。在拘留所,实心墙也很常见,用于划定庭院。其他应用包括安装在石头建筑外墙的传感器,需要通过爬墙来检测入侵。直到最近,使用的传感器必须安装在立面或墙壁顶部,使用支架才能正常工作。本文中讨论的传感器呈现出有趣的特性,使其能够满足对隐形固体壁传感器的需求。事实上,ENCLOSURE使用了一个单一的电缆概念,可以直接安装在墙上。使用本地调频广播塔,电缆周围的场不密集,沿着墙壁均匀分布,以防止与雨或冰相关的问题,这是其他传感器的问题。对于隐蔽的应用,单泄漏同轴电缆,可以在施工期间直接嵌入墙壁的砂浆中,或者在现有的墙壁上开槽。最近,围护结构已经成功地安装在不同的墙体结构上。最近的成果包括拘留中心的砖墙、考古遗址的砖墙和私人贵宾财产的石墙围栏,这些都非常令人鼓舞。我们提供了对新的壁挂式和快速部署应用程序的长期beta测试结果。重点放在场地的特殊性和这些应用的场地损伤的处理。
{"title":"A new invisible volumetric sensor for solid wall applications","authors":"A. Gagnon","doi":"10.1109/CCST.1995.524749","DOIUrl":"https://doi.org/10.1109/CCST.1995.524749","url":null,"abstract":"Even though, chain link fences are popular in North America for property delimitation, most European countries use solid walls, i.e., brick, stone or concrete. Solid walls are also very common in detention centres, for court yard delimitation. Other applications include sensors mounted on the external wall of a stone building, where detection of intrusions by wall climbing is needed. Until recently, the sensors used had to be mounted on the facade or the top of the wall using stand offs to perform properly. The sensor discussed in the article presents interesting characteristics that allow it to address the need for an invisible solid wall sensor. Indeed, ENCLOSURE uses a single cable concept that can be mounted directly on the wail. Using a local FM broadcast tower, the field surrounding the cable is not dense and distributes uniformly along the wail to prevent problems associated with rain or ice which are a problem to other sensors. For covert applications, the single leaky coaxial cable, can be embedded directly in the mortar of the wall during its construction, or grooved into an existing wall. Recently, ENCLOSURE has been successfully installed on different wall constructions. The latest results which include brick walls for detention centres, brick walls of an archaeological site and stone wall fences for a private VIP property are very encouraging. We present results of longer term beta testing for new wall mounted and fast deployable applications. Emphasis is placed on site particularities and the treatment of site impairments for those applications.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multimedia technology and applications in security 多媒体技术及其在保安中的应用
O. D'Souza
Security Systems deal with realtime or near realtime data to evaluate and prosecute crime. The data to date is predominantly text based interpretations of exception reports from an alarmed site. Where images or "video" is used the information is in the form of either "frozen frames" or a "video feed" often temporally unsynchronised with the event. Multimedia (MM) Presentation and Communications Technology are two distinctly different application streams of the very versatile Multimedia Technology that can be applied to security to satisfy most requirement via a common platform. The focus of this paper will be to present a view on why security technology must develop more interactivity and integration between technology groups used and then explore the relevant multimedia characteristics that could be used to make security systems more efficient. Examples of implementation show that this technology will develop to provide the security industry a very versatile platform to achieve highly efficient and information rich integration of functions.
安全系统处理实时或接近实时的数据来评估和起诉犯罪。迄今为止的数据主要是对来自警报站点的异常报告的基于文本的解释。当使用图像或“视频”时,信息以“定格帧”或“视频馈送”的形式出现,通常与事件暂时不同步。多媒体(MM)表示和通信技术是非常通用的多媒体技术的两个截然不同的应用流,它们可以通过一个通用的平台应用于安全以满足大多数需求。本文的重点将是提出为什么安全技术必须在使用的技术组之间发展更多的交互性和集成的观点,然后探索可用于使安全系统更有效的相关多媒体特征。实例实现表明,该技术的发展将为安防行业提供一个非常通用的平台,实现高效和信息丰富的集成功能。
{"title":"Multimedia technology and applications in security","authors":"O. D'Souza","doi":"10.1109/CCST.1995.524944","DOIUrl":"https://doi.org/10.1109/CCST.1995.524944","url":null,"abstract":"Security Systems deal with realtime or near realtime data to evaluate and prosecute crime. The data to date is predominantly text based interpretations of exception reports from an alarmed site. Where images or \"video\" is used the information is in the form of either \"frozen frames\" or a \"video feed\" often temporally unsynchronised with the event. Multimedia (MM) Presentation and Communications Technology are two distinctly different application streams of the very versatile Multimedia Technology that can be applied to security to satisfy most requirement via a common platform. The focus of this paper will be to present a view on why security technology must develop more interactivity and integration between technology groups used and then explore the relevant multimedia characteristics that could be used to make security systems more efficient. Examples of implementation show that this technology will develop to provide the security industry a very versatile platform to achieve highly efficient and information rich integration of functions.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of moving objects in natural scenes by a stochastic multi-feature analysis of video sequences 基于视频序列随机多特征分析的自然场景运动目标检测
M. Hotter, R. Mester, M. Meyer
A new technique for the detection and description of moving objects in natural scenes is presented which is based on an object-oriented, statistical multi-feature analysis of video sequences. In most conventional schemes for the detection of moving objects, temporal differences of subsequent images from a video sequence are evaluated in a block based manner by so called change detection algorithms. These methods are based on the assumption that significant temporal changes of an image signal are caused by moving objects in the scene. However, as temporal changes of an image signal can as well be caused by many other sources (camera noise, varying illumination, small camera motion, trees in motion), such systems are afflicted with the dilemma of either causing many false alarms or failing to detect relevant events. To scope with this problem, the additional features texture and motion beyond temporal signal differences are extracted and evaluated in the new algorithm. Furthermore, these features are evaluated in an object-oriented instead of a block oriented fashion to increase the reliability of detection. The adaption of this method to normal fluctuations of the observed scene is performed by a time-recursive space-variant estimation of the temporal probability distributions of the different features (signal difference, texture and motion). Feature data which differ significantly from the estimated distributions are interpreted to be caused by moving objects.
提出了一种基于面向对象的视频序列统计多特征分析的自然场景运动目标检测与描述新技术。在大多数传统的运动目标检测方案中,通过所谓的变化检测算法以基于块的方式评估视频序列中后续图像的时间差异。这些方法都是基于这样的假设,即图像信号的显著时间变化是由场景中的移动物体引起的。然而,由于图像信号的时间变化也可能由许多其他来源(摄像机噪声、不同的照明、小摄像机运动、运动中的树木)引起,因此这种系统要么会产生许多假警报,要么无法检测到相关事件。为了解决这一问题,在新算法中提取和评估了除了时间信号差异之外的附加特征纹理和运动。此外,这些特征以面向对象而不是面向块的方式进行评估,以提高检测的可靠性。该方法通过对不同特征(信号差、纹理和运动)的时间概率分布进行时递归空变估计来适应观测场景的正常波动。特征数据与估计分布有很大差异,被解释为是由运动物体引起的。
{"title":"Detection of moving objects in natural scenes by a stochastic multi-feature analysis of video sequences","authors":"M. Hotter, R. Mester, M. Meyer","doi":"10.1109/CCST.1995.524732","DOIUrl":"https://doi.org/10.1109/CCST.1995.524732","url":null,"abstract":"A new technique for the detection and description of moving objects in natural scenes is presented which is based on an object-oriented, statistical multi-feature analysis of video sequences. In most conventional schemes for the detection of moving objects, temporal differences of subsequent images from a video sequence are evaluated in a block based manner by so called change detection algorithms. These methods are based on the assumption that significant temporal changes of an image signal are caused by moving objects in the scene. However, as temporal changes of an image signal can as well be caused by many other sources (camera noise, varying illumination, small camera motion, trees in motion), such systems are afflicted with the dilemma of either causing many false alarms or failing to detect relevant events. To scope with this problem, the additional features texture and motion beyond temporal signal differences are extracted and evaluated in the new algorithm. Furthermore, these features are evaluated in an object-oriented instead of a block oriented fashion to increase the reliability of detection. The adaption of this method to normal fluctuations of the observed scene is performed by a time-recursive space-variant estimation of the temporal probability distributions of the different features (signal difference, texture and motion). Feature data which differ significantly from the estimated distributions are interpreted to be caused by moving objects.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evaluation of automatic explosive detection systems 爆炸物自动探测系统的评价
N. C. Murray, K. Riordan
The implications of legislation, acts of terrorism directed at air transport, have led to the development of a number of pieces of equipment that are capable of automatically screening luggage items for explosive materials. These systems, known as explosive detection systems (EDSs) have the high throughput combined with realistic detection and false alarm rates that mass screening at busy airports requires. The paper describes the advances that have been made in baggage X-ray technology, with reference to systems implemented at airports, that have allowed this automated screening process. A programme for the objective testing of EDSs is described in detail. Because these systems are used to screen the luggage of foreign nationals, the acceptance criteria must be internationally agreed. This process is outlined.
立法的影响,针对航空运输的恐怖主义行为,导致开发了一些能够自动检查行李物品是否有爆炸材料的设备。这些被称为爆炸物检测系统(eds)的系统具有高吞吐量,结合了繁忙机场大规模筛查所需的真实检测和误报率。本文介绍了行李x光技术取得的进展,并参考了机场实施的系统,这些系统使这种自动筛选过程成为可能。详细介绍了一种对EDSs进行客观检测的方案。因为这些系统是用来检查外国人的行李的,所以接收标准必须得到国际上的一致同意。概述了这一过程。
{"title":"Evaluation of automatic explosive detection systems","authors":"N. C. Murray, K. Riordan","doi":"10.1109/CCST.1995.524908","DOIUrl":"https://doi.org/10.1109/CCST.1995.524908","url":null,"abstract":"The implications of legislation, acts of terrorism directed at air transport, have led to the development of a number of pieces of equipment that are capable of automatically screening luggage items for explosive materials. These systems, known as explosive detection systems (EDSs) have the high throughput combined with realistic detection and false alarm rates that mass screening at busy airports requires. The paper describes the advances that have been made in baggage X-ray technology, with reference to systems implemented at airports, that have allowed this automated screening process. A programme for the objective testing of EDSs is described in detail. Because these systems are used to screen the luggage of foreign nationals, the acceptance criteria must be internationally agreed. This process is outlined.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The use of digital CCTV in an airport car-park application 数字闭路电视在机场停车场的应用
M.J. Cattle
The paper examines the use of multimedia computing as the basis for modern security surveillance systems. Based on an existing product and application examples, the paper aims to illustrate the power which new technology can bring to surveillance, monitoring and control systems. Multimedia computing is a hot topic which is seen as a vital part of the drive towards wider home use of PCs. This means that the technology is developing rapidly and most importantly the prize of a truly mass market is driving prices lower, thus making "spin off" applications such as the one described much more economically feasible and attractive. We look at a set of small case studies, based on a system called PanSeer which is available from Joyce-Loebl Ltd. in the United Kingdom.
本文探讨了多媒体计算作为现代安防监控系统的基础。本文以现有产品和应用实例为基础,阐述了新技术为监控系统带来的强大功能。多媒体计算是一个热门话题,它被视为推动个人电脑广泛家庭使用的重要组成部分。这意味着该技术正在迅速发展,最重要的是,真正的大众市场带来的好处正在推动价格下降,从而使上述“衍生”应用在经济上更加可行和具有吸引力。我们看了一组小的案例研究,基于一个名为PanSeer的系统,该系统由英国Joyce-Loebl有限公司提供。
{"title":"The use of digital CCTV in an airport car-park application","authors":"M.J. Cattle","doi":"10.1109/CCST.1995.524909","DOIUrl":"https://doi.org/10.1109/CCST.1995.524909","url":null,"abstract":"The paper examines the use of multimedia computing as the basis for modern security surveillance systems. Based on an existing product and application examples, the paper aims to illustrate the power which new technology can bring to surveillance, monitoring and control systems. Multimedia computing is a hot topic which is seen as a vital part of the drive towards wider home use of PCs. This means that the technology is developing rapidly and most importantly the prize of a truly mass market is driving prices lower, thus making \"spin off\" applications such as the one described much more economically feasible and attractive. We look at a set of small case studies, based on a system called PanSeer which is available from Joyce-Loebl Ltd. in the United Kingdom.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secure anonymous voting by employing Diffie-Hellman PKD concept 采用Diffie-Hellman PKD概念的安全匿名投票
J. Jan, R. Lin
We propose a voting protocol that satisfies the requirements of secure voting in computer networks. By using the IC card, this protocol can be much more practical. Since the data is processed in advance by the CPU of the IC card, it reduces the loading of a voting system and the congestion of networks. We handle the voter's authentication with the Diffie-Hellman (1976) public key distribution (PKD) concept.
提出了一种满足计算机网络安全投票要求的投票协议。通过使用IC卡,该协议可以更加实用。由于数据是由IC卡的CPU提前处理的,因此减少了投票系统的负载和网络的拥塞。我们使用Diffie-Hellman(1976)公钥分发(PKD)概念来处理投票人的身份验证。
{"title":"A secure anonymous voting by employing Diffie-Hellman PKD concept","authors":"J. Jan, R. Lin","doi":"10.1109/CCST.1995.524921","DOIUrl":"https://doi.org/10.1109/CCST.1995.524921","url":null,"abstract":"We propose a voting protocol that satisfies the requirements of secure voting in computer networks. By using the IC card, this protocol can be much more practical. Since the data is processed in advance by the CPU of the IC card, it reduces the loading of a voting system and the congestion of networks. We handle the voter's authentication with the Diffie-Hellman (1976) public key distribution (PKD) concept.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133225405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The development of 3-D (stereoscopic) imaging systems for security applications 开发用于安全应用的三维(立体)成像系统
Jorgen Evens, Max Robinson, S. Godber, Rs Petty
Stereoscopic or 3D imaging systems have been investigated by many research groups for a considerable number of years. Experimentation has shown that the use of such vision systems enables quite sophisticated manipulative tasks to be carried out remotely. Recent developments in materials science, electronics and video camera capabilities now make 3-D television systems for teleoperator applications a much more viable proposition than in the past. This paper describes the development of a range of 3-D systems which have been used for remote controlled vehicle and manipulator guidance in hazardous environments. Two particular scenarios are in dealing with improvised explosive devices (IEDs) and also in a nuclear industry application. The paper mentions the development of novel stereoscopic sensors based on line-scan cameras. One application of such packages may well be in wide area surveillance.
许多研究小组对立体或三维成像系统进行了相当多年的研究。实验表明,使用这种视觉系统可以远程执行相当复杂的操作任务。材料科学、电子学和视频摄像能力的最新发展使得用于遥控操作的3-D电视系统比过去更加可行。本文介绍了一系列用于危险环境中遥控车辆和机械臂制导的三维系统的开发。两个特殊的场景是处理简易爆炸装置(ied)和核工业应用。本文介绍了基于线扫描相机的新型立体传感器的研制。这种包的一个应用很可能是广域监视。
{"title":"The development of 3-D (stereoscopic) imaging systems for security applications","authors":"Jorgen Evens, Max Robinson, S. Godber, Rs Petty","doi":"10.1109/CCST.1995.524959","DOIUrl":"https://doi.org/10.1109/CCST.1995.524959","url":null,"abstract":"Stereoscopic or 3D imaging systems have been investigated by many research groups for a considerable number of years. Experimentation has shown that the use of such vision systems enables quite sophisticated manipulative tasks to be carried out remotely. Recent developments in materials science, electronics and video camera capabilities now make 3-D television systems for teleoperator applications a much more viable proposition than in the past. This paper describes the development of a range of 3-D systems which have been used for remote controlled vehicle and manipulator guidance in hazardous environments. Two particular scenarios are in dealing with improvised explosive devices (IEDs) and also in a nuclear industry application. The paper mentions the development of novel stereoscopic sensors based on line-scan cameras. One application of such packages may well be in wide area surveillance.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1