Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524729
J. Cross, C. Smith
Access control systems require positive identification of authorised persons for entry to restricted facilities. Possession of a card by an authorised person has been the traditional approach to high security access control. These cards range from simple magnetic swipe cards through to proximity smart cards for identification. More recently, serious attempts have been made to identify appropriate biometric characteristics of individuals to provide positive identification. The more popular biometric access control techniques have included facial images, hand geometry, fingerprints and retina patterns. Also, the dynamics of keyboard input, handwritten signature and voice patterns have been reasonably successful in identifying authorised persons. This paper describes research that has been undertaken by the authors to use the subcutaneous vascular network (vein pattern) of the back of the hand as a unique personal biometric for identification. An outline will be given of a prototype low cost automatic thermographic imaging system which has been developed by the authors to obtain vein patterns for positive identification. The paper includes consideration of the image acquisition, image processing and vein pattern matching strategies. A summary of experimental results concerning the acceptance and rejection rates for the system is also provided.
{"title":"Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification","authors":"J. Cross, C. Smith","doi":"10.1109/CCST.1995.524729","DOIUrl":"https://doi.org/10.1109/CCST.1995.524729","url":null,"abstract":"Access control systems require positive identification of authorised persons for entry to restricted facilities. Possession of a card by an authorised person has been the traditional approach to high security access control. These cards range from simple magnetic swipe cards through to proximity smart cards for identification. More recently, serious attempts have been made to identify appropriate biometric characteristics of individuals to provide positive identification. The more popular biometric access control techniques have included facial images, hand geometry, fingerprints and retina patterns. Also, the dynamics of keyboard input, handwritten signature and voice patterns have been reasonably successful in identifying authorised persons. This paper describes research that has been undertaken by the authors to use the subcutaneous vascular network (vein pattern) of the back of the hand as a unique personal biometric for identification. An outline will be given of a prototype low cost automatic thermographic imaging system which has been developed by the authors to obtain vein patterns for positive identification. The paper includes consideration of the image acquisition, image processing and vein pattern matching strategies. A summary of experimental results concerning the acceptance and rejection rates for the system is also provided.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524936
C. Rodriguez, J. Howell, H. Menlove, C. Brislawn, J. Bradley, P. Chare, T. Gorten
In this presentation we introduce digital video image processing and analysis systems that are being developed at Los Alamos for application to nuclear safeguards. Of specific interest are the Inventory Verification System (IVSystem), an automated materials monitoring system; the Video Time Radiation Analysis Program (VTRAP), an integrated safeguards system; VideoTech, a surveillance system designed in conjunction with EURATOM for use in international safeguards; and we introduce detector-activated predictive wavelet transform image coding used to significantly reduce the image data storage requirements for all of these unattended, remote safeguards systems.
{"title":"Video image processing for nuclear safeguards","authors":"C. Rodriguez, J. Howell, H. Menlove, C. Brislawn, J. Bradley, P. Chare, T. Gorten","doi":"10.1109/CCST.1995.524936","DOIUrl":"https://doi.org/10.1109/CCST.1995.524936","url":null,"abstract":"In this presentation we introduce digital video image processing and analysis systems that are being developed at Los Alamos for application to nuclear safeguards. Of specific interest are the Inventory Verification System (IVSystem), an automated materials monitoring system; the Video Time Radiation Analysis Program (VTRAP), an integrated safeguards system; VideoTech, a surveillance system designed in conjunction with EURATOM for use in international safeguards; and we introduce detector-activated predictive wavelet transform image coding used to significantly reduce the image data storage requirements for all of these unattended, remote safeguards systems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116344445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524937
B. Stubbington, P. Keenan
Recent increases in the criminal and terrorist threat have frequently been countered by a proliferation of CCTV cameras. Visible cameras offer some deterrence, and CCTV can be an effective means of patrolling an establishment, perhaps to track the source of alarms from other security systems. However, it is now widely accepted that CCTV does not provide an effective alarm system-the video images need to be interpreted with intelligence if false alarms are to be kept to a minimum; humans are expensive and particularly bad at monitoring TV screens for even short periods. The paper describes practical experiences gained from one of the world's first major installations of automated, intelligent scene monitoring systems. The system is EDS' SENTINEL SMS and the installation is at the UK end of the Channel Tunnel.
{"title":"Intelligent scene monitoring; technical aspects and practical experience","authors":"B. Stubbington, P. Keenan","doi":"10.1109/CCST.1995.524937","DOIUrl":"https://doi.org/10.1109/CCST.1995.524937","url":null,"abstract":"Recent increases in the criminal and terrorist threat have frequently been countered by a proliferation of CCTV cameras. Visible cameras offer some deterrence, and CCTV can be an effective means of patrolling an establishment, perhaps to track the source of alarms from other security systems. However, it is now widely accepted that CCTV does not provide an effective alarm system-the video images need to be interpreted with intelligence if false alarms are to be kept to a minimum; humans are expensive and particularly bad at monitoring TV screens for even short periods. The paper describes practical experiences gained from one of the world's first major installations of automated, intelligent scene monitoring systems. The system is EDS' SENTINEL SMS and the installation is at the UK end of the Channel Tunnel.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117132851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524956
K.-S. Wu, Yean-Hsi Chang
We design and implement an 8 node multiprocessor applied to a camera guided patrolling vehicle. The vehicle uses the middle line of the road as a guiding mark. The image of the road is grabbed and passed to the shared system memory by one node of the multiprocessor. The system memory with the priority encoder and rotator can be accessed by four nodes of the multiprocessor for image processing. The pixel coordinates of the image are calibrated with the road surface under certain conditions for guidance purposes. The sixth node is responsible for RS232C radio communications with the laboratory. It can transmit the calculated image data to the lab and/or receive the commands from the lab in case of emergency. The monitored environmental image is transmitted to the laboratory by analog radio. The seventh node takes care of obstacle avoidance with ultrasound. The eighth node is responsible for motor control of the vehicle. The commands are issued from other nodes through the hand shaking communications of Intel's 8255 chip. Each node has an Intel 8259 chip for instantaneous interrupt service. The performance of both the multiprocessor and the patrolling vehicle is evaluated.
{"title":"The application of the multiprocessor to the camera-guided patrolling vehicle","authors":"K.-S. Wu, Yean-Hsi Chang","doi":"10.1109/CCST.1995.524956","DOIUrl":"https://doi.org/10.1109/CCST.1995.524956","url":null,"abstract":"We design and implement an 8 node multiprocessor applied to a camera guided patrolling vehicle. The vehicle uses the middle line of the road as a guiding mark. The image of the road is grabbed and passed to the shared system memory by one node of the multiprocessor. The system memory with the priority encoder and rotator can be accessed by four nodes of the multiprocessor for image processing. The pixel coordinates of the image are calibrated with the road surface under certain conditions for guidance purposes. The sixth node is responsible for RS232C radio communications with the laboratory. It can transmit the calculated image data to the lab and/or receive the commands from the lab in case of emergency. The monitored environmental image is transmitted to the laboratory by analog radio. The seventh node takes care of obstacle avoidance with ultrasound. The eighth node is responsible for motor control of the vehicle. The commands are issued from other nodes through the hand shaking communications of Intel's 8255 chip. Each node has an Intel 8259 chip for instantaneous interrupt service. The performance of both the multiprocessor and the patrolling vehicle is evaluated.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524925
H. Cullum
Investigations into the use of capillary zone electrophoresis with indirect UV detection for the analysis of small inorganic anions and cations of explosives relevance have been carried out. The intention is to develop a procedure for the detection and identification of ions such as chlorate, nitrate, sulphate, ammonium and potassium. Separate methods for the analysis of anions and cations are described along with estimates of the limits of detection for each method.
{"title":"Capillary zone electrophoresis in the forensic analysis of explosives","authors":"H. Cullum","doi":"10.1109/CCST.1995.524925","DOIUrl":"https://doi.org/10.1109/CCST.1995.524925","url":null,"abstract":"Investigations into the use of capillary zone electrophoresis with indirect UV detection for the analysis of small inorganic anions and cations of explosives relevance have been carried out. The intention is to develop a procedure for the detection and identification of ions such as chlorate, nitrate, sulphate, ammonium and potassium. Separate methods for the analysis of anions and cations are described along with estimates of the limits of detection for each method.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524946
U. Oppelt
Continuous improvements of computer technology within the last years providing more and more powerful digital computers and computer equipment at decreasing costs, have made state of the art computers appropriate for digital image processing. This tendency will continue for the next few years, opening a wide area of applications of computers and digital image processing to security systems. The paper presents some impacts of computer and video technology on future security systems and summarizes how these technologies can be used to develop a new generation of security systems and applications.
{"title":"New possibilities for video applications in the security field","authors":"U. Oppelt","doi":"10.1109/CCST.1995.524946","DOIUrl":"https://doi.org/10.1109/CCST.1995.524946","url":null,"abstract":"Continuous improvements of computer technology within the last years providing more and more powerful digital computers and computer equipment at decreasing costs, have made state of the art computers appropriate for digital image processing. This tendency will continue for the next few years, opening a wide area of applications of computers and digital image processing to security systems. The paper presents some impacts of computer and video technology on future security systems and summarizes how these technologies can be used to develop a new generation of security systems and applications.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524744
C. Yeoman
In September 1991 the Home Office Police Scientific Development Branch was approached by the Directorate of Special and Central Services to undertake a study to determine if a "real-time" undercar viewing facility could be designed and developed for use at a central London location. Investigations were undertaken which resulted in PSDB being contracted to develop and prove the capabilities of such a system. Designed to a high specification the viewing facility, known as Fisheye, uses a gated CCD imager linked to an IBM PC based computer terminal. It has been designed to supplement an established manual search procedure for the inspection of the underside of passenger vehicles entering a secure area, prior to proceeding to an underground car park.
{"title":"Under vehicle examination and novel applications of digital storage techniques","authors":"C. Yeoman","doi":"10.1109/CCST.1995.524744","DOIUrl":"https://doi.org/10.1109/CCST.1995.524744","url":null,"abstract":"In September 1991 the Home Office Police Scientific Development Branch was approached by the Directorate of Special and Central Services to undertake a study to determine if a \"real-time\" undercar viewing facility could be designed and developed for use at a central London location. Investigations were undertaken which resulted in PSDB being contracted to develop and prove the capabilities of such a system. Designed to a high specification the viewing facility, known as Fisheye, uses a gated CCD imager linked to an IBM PC based computer terminal. It has been designed to supplement an established manual search procedure for the inspection of the underside of passenger vehicles entering a secure area, prior to proceeding to an underground car park.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"572 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524731
M. George, R. A. King
The need for simple, ubiquitous security procedures to verify the identity of authorised system users is assuming increasing importance in the expansion and exploitation of new technology. High performance Biometric Verification methods offer important tools for this purpose, enhancing the security, reliability and integrity of transactions conducted electronically. This paper describes TESPAR/FANN, a new digital data/artificial neural network combination which is proving highly effective in the Speaker Verification arena, and in other key non-speech applications.
{"title":"A robust speaker verification biometric","authors":"M. George, R. A. King","doi":"10.1109/CCST.1995.524731","DOIUrl":"https://doi.org/10.1109/CCST.1995.524731","url":null,"abstract":"The need for simple, ubiquitous security procedures to verify the identity of authorised system users is assuming increasing importance in the expansion and exploitation of new technology. High performance Biometric Verification methods offer important tools for this purpose, enhancing the security, reliability and integrity of transactions conducted electronically. This paper describes TESPAR/FANN, a new digital data/artificial neural network combination which is proving highly effective in the Speaker Verification arena, and in other key non-speech applications.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524727
I. Hawkes
This paper describes recent work on a fibre optic perimeter intruder detection system (FOPIDS), which is under continuous development at GEC-Marconi. This system is based around a technique called multiplexed heterodyne interferometry, and offers a novel method of protecting medium to large perimeters with a network of fibre optic sensors.
{"title":"Recent developments in a fibre optic perimeter intruder detection system","authors":"I. Hawkes","doi":"10.1109/CCST.1995.524727","DOIUrl":"https://doi.org/10.1109/CCST.1995.524727","url":null,"abstract":"This paper describes recent work on a fibre optic perimeter intruder detection system (FOPIDS), which is under continuous development at GEC-Marconi. This system is based around a technique called multiplexed heterodyne interferometry, and offers a novel method of protecting medium to large perimeters with a network of fibre optic sensors.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133536064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524955
E. Van Keuren, J. Knighten
The destructive power of high power microwave (HPM) generators allow them to be used as effective weapons by both law enforcement and criminal organizations. Now, with the desperate need for cash by some developing nations, devices such as relativistic magnetrons, capable of producing multi-megawatts and for use in weapons, have been offered for sale to other nations, groups, and individuals. Hence, HPM weapon capability has now become available not only for military use by any nation wishing to invest but by terrorists and other criminal organizations. Similarly this capability is now available for law enforcement activities. For the most part, it is believed that the aforementioned high multi-megawatt powers would not be necessary for law enforcement. Powers in the tens to hundred kilowatt range should be adequate, and tailorable sources such as microwave transmitters readily available.
{"title":"Use of high power microwave weapons","authors":"E. Van Keuren, J. Knighten","doi":"10.1109/CCST.1995.524955","DOIUrl":"https://doi.org/10.1109/CCST.1995.524955","url":null,"abstract":"The destructive power of high power microwave (HPM) generators allow them to be used as effective weapons by both law enforcement and criminal organizations. Now, with the desperate need for cash by some developing nations, devices such as relativistic magnetrons, capable of producing multi-megawatts and for use in weapons, have been offered for sale to other nations, groups, and individuals. Hence, HPM weapon capability has now become available not only for military use by any nation wishing to invest but by terrorists and other criminal organizations. Similarly this capability is now available for law enforcement activities. For the most part, it is believed that the aforementioned high multi-megawatt powers would not be necessary for law enforcement. Powers in the tens to hundred kilowatt range should be adequate, and tailorable sources such as microwave transmitters readily available.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"101 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133136504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}