首页 > 最新文献

2012 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
HLFSIM: Objective image quality metric based on ROI analysis HLFSIM:基于ROI分析的客观图像质量度量
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393587
Petr Dostál, Lukáš Krasula, M. Klima
The image/video quality is a key issue in security video systems. Therefore the objective image/video quality criteria are extensively studied. In this paper, the novel full reference objective metric for image quality assessment is proposed. This metric is based on FSIM. The ROI detection is embedded in order to improve the performance. For ROI estimation, the ground truth data together with two different algorithms were used and compared - The security and multimedia images from LIVE database were used for performance evaluation. The correlation between the objective and subjective tests of multimedia images was calculated using Pearson's and Spearman Rank Order Correlation Coefficient. For performance comparison the state-of-the-art full reference objective image quality metrics were used; PSNR, SSIM, MS-SSIM, VIF and FSIM. In our previous paper, the importance of demosaicing technique and ROI has been shown. This paper continues in this topic and implements new full reference objective metrics for the reconstructed image quality evaluation. The results reveal that the ROI controlled by bottom-up mechanism can be used for performance improvement.
图像/视频质量是安防视频系统中的一个关键问题。因此,客观的图像/视频质量标准被广泛研究。本文提出了一种新的图像质量评价全参考客观度量。该指标基于FSIM。为了提高性能,嵌入了ROI检测。在ROI估计中,使用了地面真实数据和两种不同算法进行比较,并使用LIVE数据库中的安全图像和多媒体图像进行性能评估。采用Pearson’s和Spearman秩序相关系数计算多媒体图像的客观和主观测试之间的相关性。为了进行性能比较,使用了最先进的全参考客观图像质量指标;PSNR, SSIM, MS-SSIM, VIF和FSIM。在之前的文章中,我们已经说明了去马赛克技术和ROI的重要性。本文在此基础上,提出了一种新的全参考客观指标来评价重建图像的质量。结果表明,由自下而上机制控制的ROI可以用于绩效改进。
{"title":"HLFSIM: Objective image quality metric based on ROI analysis","authors":"Petr Dostál, Lukáš Krasula, M. Klima","doi":"10.1109/CCST.2012.6393587","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393587","url":null,"abstract":"The image/video quality is a key issue in security video systems. Therefore the objective image/video quality criteria are extensively studied. In this paper, the novel full reference objective metric for image quality assessment is proposed. This metric is based on FSIM. The ROI detection is embedded in order to improve the performance. For ROI estimation, the ground truth data together with two different algorithms were used and compared - The security and multimedia images from LIVE database were used for performance evaluation. The correlation between the objective and subjective tests of multimedia images was calculated using Pearson's and Spearman Rank Order Correlation Coefficient. For performance comparison the state-of-the-art full reference objective image quality metrics were used; PSNR, SSIM, MS-SSIM, VIF and FSIM. In our previous paper, the importance of demosaicing technique and ROI has been shown. This paper continues in this topic and implements new full reference objective metrics for the reconstructed image quality evaluation. The results reveal that the ROI controlled by bottom-up mechanism can be used for performance improvement.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Methods for the prevention of the use of mobile phones in Correctional institutions 预防在惩教机构使用流动电话的方法
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393565
Sylvio Bisson, Pushkar E. Godbole, M. McKee, Marc St-Amand
Recognizing that the use of mobile phones in Correctional institutions continues to be an issue, the Correctional Service of Canada (CSC) has initiated an investigation into the various methods available for the prevention of the use of mobile phones in Institutions. The broad groups of “Institutional”, “Detection”, and “Interdiction” technologies reveal a wide range of methods to prevent unauthorized mobile phone use in correctional facilities; however, each has significant drawbacks that limit its efficacy in meeting CSC's goals. The development of a new concept in the interdiction of mobile phone use, the Access Denial Service (ADS), provides an encouraging solution while mitigating most, if not all, of the issues present in the current offerings.
认识到在惩教机构中使用移动电话仍然是一个问题,加拿大惩教署(CSC)已开始调查防止在惩教机构中使用移动电话的各种可用方法。“机构”、“探测”和“拦截”技术的广泛分类揭示了防止在惩教设施中未经授权使用移动电话的各种方法;然而,每一种都有明显的缺点,限制了其在实现CSC目标方面的有效性。在阻止移动电话使用方面,一个新概念的发展,即拒绝访问服务(ADS),提供了一个令人鼓舞的解决方案,同时缓解了当前产品中存在的大部分问题,如果不是全部的话。
{"title":"Methods for the prevention of the use of mobile phones in Correctional institutions","authors":"Sylvio Bisson, Pushkar E. Godbole, M. McKee, Marc St-Amand","doi":"10.1109/CCST.2012.6393565","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393565","url":null,"abstract":"Recognizing that the use of mobile phones in Correctional institutions continues to be an issue, the Correctional Service of Canada (CSC) has initiated an investigation into the various methods available for the prevention of the use of mobile phones in Institutions. The broad groups of “Institutional”, “Detection”, and “Interdiction” technologies reveal a wide range of methods to prevent unauthorized mobile phone use in correctional facilities; however, each has significant drawbacks that limit its efficacy in meeting CSC's goals. The development of a new concept in the interdiction of mobile phone use, the Access Denial Service (ADS), provides an encouraging solution while mitigating most, if not all, of the issues present in the current offerings.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems 自动车牌识别(ANPR)的准确性和现实世界的英国车牌问题
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393574
Mike Rhead, Robert Gurney, S. Ramalingam, N. Cohen
This paper considers real world UK number plates and relates these to ANPR. It considers aspects of the relevant legislation and standards when applying them to real world number plates. The varied manufacturing techniques and varied specifications of component parts are also noted. The varied fixing methodologies and fixing locations are discussed as well as the impact on image capture.
本文考虑了现实世界的英国车牌,并将这些与ANPR联系起来。在将有关法例和标准应用于实际车牌时,会考虑有关法例和标准的各方面。不同的制造技术和部件的不同规格也被注意到。讨论了不同的固定方法和固定位置以及对图像捕获的影响。
{"title":"Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems","authors":"Mike Rhead, Robert Gurney, S. Ramalingam, N. Cohen","doi":"10.1109/CCST.2012.6393574","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393574","url":null,"abstract":"This paper considers real world UK number plates and relates these to ANPR. It considers aspects of the relevant legislation and standards when applying them to real world number plates. The varied manufacturing techniques and varied specifications of component parts are also noted. The varied fixing methodologies and fixing locations are discussed as well as the impact on image capture.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131635458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Improved surface swimmer detection through multimodal data fusion 通过多模态数据融合改进水面游泳者检测
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393575
D. Sheaffer, D. Burnett
Waterborne intruder detection includes many new challenges not seen in land environments. One area of these challenges is the detection of surface swimmers. Swimmers, whose bodies are partially in air and partially submerged, have significantly reduced target strength (TS) for radar and sonar systems compared to intruders fully in air or fully submerged. This reduced TS results in more frequent missed detections or, if detection threshold is widened, increased nuisance alarms. Depending on sea state, a swimmer is also able to blend in with wave noise, making detection even more difficult. We present a method for improved surface swimmer detection in marine environments by fusing data from several sensor systems in both air and water domains to isolate a swimmer's signature from uncorrelated events. This system, tested in Dec 2011 in St. Petersburg FL, produced data indicating significantly improved detection over using any single system. By widening detection threshold of each sensor's detection algorithm but fusing data of each system together, more potential targets can be processed without the risk of increasing nuisance alarms. This work holds the potential to improve the security of several types of water-dependent assets, like commercial harbors, Navy or Coast Guard bases, and nuclear and other water-cooled power plans, and offshore oil platforms.
水上入侵者检测包括许多陆地环境中看不到的新挑战。这些挑战的一个方面是发现水面游泳者。游泳者的身体部分在空中,部分在水下,与完全在空中或完全在水下的入侵者相比,雷达和声纳系统的目标强度(TS)明显降低。这种降低的TS导致更频繁地错过检测,或者如果检测阈值扩大,则会增加滋扰警报。根据海况,游泳者还能混入海浪的噪音中,这使得探测更加困难。我们提出了一种在海洋环境中改进水面游泳者检测的方法,通过融合来自空气和水域中多个传感器系统的数据,将游泳者的特征从不相关的事件中分离出来。该系统于2011年12月在佛罗里达州圣彼得堡进行了测试,所产生的数据表明,与使用任何单一系统相比,该系统的检测能力都有了显著提高。通过扩大各个传感器检测算法的检测阈值,将各个系统的数据融合在一起,可以处理更多的潜在目标,而不会增加滋扰报警的风险。这项工作有可能提高几种依赖水的资产的安全性,如商业港口、海军或海岸警卫队基地、核能和其他水冷发电计划以及海上石油平台。
{"title":"Improved surface swimmer detection through multimodal data fusion","authors":"D. Sheaffer, D. Burnett","doi":"10.1109/CCST.2012.6393575","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393575","url":null,"abstract":"Waterborne intruder detection includes many new challenges not seen in land environments. One area of these challenges is the detection of surface swimmers. Swimmers, whose bodies are partially in air and partially submerged, have significantly reduced target strength (TS) for radar and sonar systems compared to intruders fully in air or fully submerged. This reduced TS results in more frequent missed detections or, if detection threshold is widened, increased nuisance alarms. Depending on sea state, a swimmer is also able to blend in with wave noise, making detection even more difficult. We present a method for improved surface swimmer detection in marine environments by fusing data from several sensor systems in both air and water domains to isolate a swimmer's signature from uncorrelated events. This system, tested in Dec 2011 in St. Petersburg FL, produced data indicating significantly improved detection over using any single system. By widening detection threshold of each sensor's detection algorithm but fusing data of each system together, more potential targets can be processed without the risk of increasing nuisance alarms. This work holds the potential to improve the security of several types of water-dependent assets, like commercial harbors, Navy or Coast Guard bases, and nuclear and other water-cooled power plans, and offshore oil platforms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131144813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and evaluation of image quality in wireless surveillance networks 无线监控网络中图像质量的建模与评价
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393583
Matthew Ibekwe, S. Vítek, M. Klima, Petr Dostál
This paper studies the security image quality attained in streaming video over wireless networks under different packet error models. Wireless video sensor networks are becoming common place due to increasing crime rates and growing terrorist activities. A crucial requirement for video surveillance technology especially for real-time monitoring is that the video quality must not fall below a certain threshold so that objects and events in these videos could be identified and properly interpreted by viewers. However, the time varying transmission characteristics of the wireless channel and limited throughput can lead to poor performance of multimedia traffic over wireless networks. As a result, the end user may perceive jerky motions, frame freezes, and missing segments which may affect their ability to recognize objects and effectively analyze the scenes. An experimental set-up required for wireless network surveillance using IEEE 802. is described. The authors adopt subjective user tests to study the degree of identification of objects and events in security videos generated from camera security systems and subjected to wireless channel packet loss conditions to benchmark identification in the degraded sequences. Packet loss conditions were introduced into the sequences using NS-2 network simulator.
本文研究了在不同分组错误模型下无线网络流视频的安全图像质量。由于犯罪率的上升和恐怖活动的增加,无线视频传感器网络正变得越来越普遍。视频监控技术,特别是实时监控技术的一个关键要求是视频质量不能低于一定的阈值,以便观众能够识别和正确解释这些视频中的对象和事件。然而,无线信道时变的传输特性和有限的吞吐量会导致无线网络上多媒体业务的性能不佳。因此,最终用户可能会感知到不稳定的运动、帧冻结和缺失的片段,这可能会影响他们识别物体和有效分析场景的能力。基于ieee802的无线网络监控实验装置。是描述。采用主观用户测试的方法,研究了摄像机安防系统生成的安全视频中物体和事件的识别程度,并在无线信道丢包条件下对降级序列进行基准识别。利用NS-2网络模拟器在序列中引入丢包条件。
{"title":"Modeling and evaluation of image quality in wireless surveillance networks","authors":"Matthew Ibekwe, S. Vítek, M. Klima, Petr Dostál","doi":"10.1109/CCST.2012.6393583","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393583","url":null,"abstract":"This paper studies the security image quality attained in streaming video over wireless networks under different packet error models. Wireless video sensor networks are becoming common place due to increasing crime rates and growing terrorist activities. A crucial requirement for video surveillance technology especially for real-time monitoring is that the video quality must not fall below a certain threshold so that objects and events in these videos could be identified and properly interpreted by viewers. However, the time varying transmission characteristics of the wireless channel and limited throughput can lead to poor performance of multimedia traffic over wireless networks. As a result, the end user may perceive jerky motions, frame freezes, and missing segments which may affect their ability to recognize objects and effectively analyze the scenes. An experimental set-up required for wireless network surveillance using IEEE 802. is described. The authors adopt subjective user tests to study the degree of identification of objects and events in security videos generated from camera security systems and subjected to wireless channel packet loss conditions to benchmark identification in the degraded sequences. Packet loss conditions were introduced into the sequences using NS-2 network simulator.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and performance testing of an integrated detection and assessment perimeter system 综合检测与评估周界系统的设计与性能测试
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393535
J. Dabling, James O. McLaughlin, Jason J. Andersen
Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia National Laboratories (Albuquerque, NM) to jointly develop and evaluate an integrated perimeter security solution, one that couples access delay with detection and assessment. This novel perimeter solution is designed to be sufficiently flexible for implementation at a wide range of facility types, from high security military or government installations to commercial power plants, to industrial facilities of various kinds. A prototype section of barrier has been produced and installed at the Sandia Exterior Intrusion Sensor Testing Facility in Albuquerque, NM. The prototype was implemented with a robust vehicle barrier and coupled with a variety of detection and assessment solutions to demonstrate both the effectiveness of such a solution, as well as the flexibility of the system. In this implementation, infrared sensors and fence disturbance sensors are coupled with a video motion detection sensor and ground sensors. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system will be characterized, as well as the Nuisance Alarm Rate.
近日,Kontek工业公司及其子公司Stonewater控制系统公司与桑迪亚国家实验室签署了一项合作研发协议,共同开发和评估一种集成的周长安全解决方案,该解决方案将访问延迟与检测和评估相结合。这种新颖的周界解决方案设计得足够灵活,可以在各种设施类型中实施,从高安全性的军事或政府设施到商业发电厂,再到各种工业设施。屏障的原型部分已经生产出来,并安装在新墨西哥州阿尔伯克基的桑迪亚外部入侵传感器测试设施。该原型车采用了坚固的车辆屏障,并结合了各种检测和评估解决方案,以证明这种解决方案的有效性以及系统的灵活性。在这个实现中,红外传感器和栅栏干扰传感器与视频运动检测传感器和地面传感器相结合。系统正确检测行人或车辆试图绕过、破坏或以其他方式破坏系统的能力将被表征,以及滋扰报警率。
{"title":"Design and performance testing of an integrated detection and assessment perimeter system","authors":"J. Dabling, James O. McLaughlin, Jason J. Andersen","doi":"10.1109/CCST.2012.6393535","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393535","url":null,"abstract":"Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia National Laboratories (Albuquerque, NM) to jointly develop and evaluate an integrated perimeter security solution, one that couples access delay with detection and assessment. This novel perimeter solution is designed to be sufficiently flexible for implementation at a wide range of facility types, from high security military or government installations to commercial power plants, to industrial facilities of various kinds. A prototype section of barrier has been produced and installed at the Sandia Exterior Intrusion Sensor Testing Facility in Albuquerque, NM. The prototype was implemented with a robust vehicle barrier and coupled with a variety of detection and assessment solutions to demonstrate both the effectiveness of such a solution, as well as the flexibility of the system. In this implementation, infrared sensors and fence disturbance sensors are coupled with a video motion detection sensor and ground sensors. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system will be characterized, as well as the Nuisance Alarm Rate.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring privacy and security of iris fuzzy commitment 虹膜模糊承诺的隐私性和安全性度量
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393553
Xuebing Zhou, C. Busch
Template protection techniques are important supplements to biometrics, which aim to improve system security and safeguard privacy of users. Their development brings a new challenge of privacy and security assessment especially for real systems. In the paper, we take a close look at fuzzy commitment, which is an efficient and widely used template protection algorithm and demonstrates rigorous assessment of an iris fuzzy commitment scheme using the information-theoretical metrics. For instance, a 56 bit long secret can be derived from iris codes. Instead of iris codes, its hash value is stored. However, due to the dependency of iris codes, the uncertainty of secrets reduces to 11.82 bits given protected templates. It confirms the empirical results that an adversary is able to retrieve the iris features from the protected templates with average number of attempts equal to 210.56 as shown in [1]. The poor security and privacy performance is caused by strong correlation of iris feature and unsuitable coding methods used in the algorithm. The quantitative measurement shown in this paper provides a reference guidance on evaluation of template protection in practice. It helps algorithm developers to show the security and privacy of template protection to end-users and to detect the weaknesses of the algorithms.
模板保护技术是生物识别技术的重要补充,旨在提高系统安全性和保护用户隐私。它们的发展给隐私和安全评估带来了新的挑战,特别是对真实系统。本文详细介绍了一种高效且应用广泛的模板保护算法——模糊承诺算法,并利用信息理论度量对虹膜模糊承诺方案进行了严格的评估。例如,一个56位长的秘密可以从虹膜代码中得到。存储的不是虹膜代码,而是它的哈希值。然而,由于虹膜码的依赖性,在给定保护模板的情况下,秘密的不确定性降低到11.82位。它证实了经验结果,攻击者能够从受保护的模板中检索虹膜特征,平均尝试次数为210.56次,如[1]所示。虹膜特征相关性强,编码方法不合适,导致该算法的安全性和隐私性较差。本文给出的定量测量方法对模板防护的评价具有参考指导意义。它帮助算法开发人员向最终用户展示模板保护的安全性和隐私性,并检测算法的弱点。
{"title":"Measuring privacy and security of iris fuzzy commitment","authors":"Xuebing Zhou, C. Busch","doi":"10.1109/CCST.2012.6393553","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393553","url":null,"abstract":"Template protection techniques are important supplements to biometrics, which aim to improve system security and safeguard privacy of users. Their development brings a new challenge of privacy and security assessment especially for real systems. In the paper, we take a close look at fuzzy commitment, which is an efficient and widely used template protection algorithm and demonstrates rigorous assessment of an iris fuzzy commitment scheme using the information-theoretical metrics. For instance, a 56 bit long secret can be derived from iris codes. Instead of iris codes, its hash value is stored. However, due to the dependency of iris codes, the uncertainty of secrets reduces to 11.82 bits given protected templates. It confirms the empirical results that an adversary is able to retrieve the iris features from the protected templates with average number of attempts equal to 210.56 as shown in [1]. The poor security and privacy performance is caused by strong correlation of iris feature and unsuitable coding methods used in the algorithm. The quantitative measurement shown in this paper provides a reference guidance on evaluation of template protection in practice. It helps algorithm developers to show the security and privacy of template protection to end-users and to detect the weaknesses of the algorithms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Advanced access control system for ports 先进的港口访问控制系统
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393551
F. Garzia, R. Cusani, E. Sammarco
The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is necessary to design and realize highly integrated, efficient and reliable access control systems. The authors illustrate the work made to design and realize the integrated access control system of the most important commercial and tourist ports of Italy.
港口的安全性很大程度上依赖于综合访问控制技术系统的使用。综合门禁系统的任何弱点都涉及到端口的弱点。因此,有必要设计和实现高度集成、高效、可靠的门禁系统。介绍了意大利最重要的商业和旅游港口综合门禁系统的设计与实现工作。
{"title":"Advanced access control system for ports","authors":"F. Garzia, R. Cusani, E. Sammarco","doi":"10.1109/CCST.2012.6393551","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393551","url":null,"abstract":"The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is necessary to design and realize highly integrated, efficient and reliable access control systems. The authors illustrate the work made to design and realize the integrated access control system of the most important commercial and tourist ports of Italy.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Basic Genetic Algorithm pattern for use in self-organizing agile security 用于自组织敏捷安全的基本遗传算法模式
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393577
Rich Messenger, R. Dove
Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a "fitness function" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.
安全策略和技术正落后于对抗性创新能力的敏捷步伐。一个项目正在进行中,它已经确定了对抗性自组织敏捷性的六个所谓的SAREPH特征,并且现在正在将模式编目为一种自组织安全技术的模式语言,这种模式语言可以用于相同或更高的安全敏捷性。最近出现了许多这样的模式。本文将遗传算法(GA)加入到目录中。遗传算法的本质是用“适应度函数”来表达要优化的问题,该函数评估候选解的优化程度。在自然进化中,适应性是生物体生存和繁殖的能力。计算应用抽象适合度来匹配手头的问题,例如入侵检测系统试图将看似不相关的事件关联起来,这些事件共同构成威胁。首先回顾一下遗传算法的模式项目和一般性质。开发了一个可重用的通用模式描述。显示了该模式如何符合SAREPH特征。然后从文献中的三个例子中展示了该模式如何用于SAREPH一致性:机器人群中的捕食者-猎物行为进化,金融交易股票的未来行为预测以及入侵检测系统中的攻击检测。
{"title":"Basic Genetic Algorithm pattern for use in self-organizing agile security","authors":"Rich Messenger, R. Dove","doi":"10.1109/CCST.2012.6393577","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393577","url":null,"abstract":"Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a \"fitness function\" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems 特殊核材料和关键基础设施安全建模和物理保护系统仿真
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393531
Dean Dominguez, M. Parks, Adam D. Williams, S. Washburn
Over the last decade, the world has faced a rapidly expanding and dynamic threat environment. As demonstrated by the 9/11 and 26/11 terrorist attacks, adversary capabilities have evolved to include advanced tactics and increased militancy. For the Department of Energy's National Nuclear Security Administration (DOE/NNSA), and other organizations responsible for protecting facilities housing special nuclear materials, this fragile mix of global uncertainty makes nuclear weapon security an important challenge. Sandia, using scientific and mathematic methodologies, is considered one of the world leaders in the design and implementation of physical protection systems (PPS) and VA methodology, in order to reduce the risk to both domestic and international high consequence facilities. Using the Presagis commercial software suite - primarily Scenario Toolkit and Generation Environment (STAGE), a complex simulation engine - the authors have developed a single analyst, Monte Carlo derived, agent decision-based, and event-driven interactive tool to help meet this need. Evaluating risk reduction for critical infrastructure against increasingly complex adversaries requires high fidelity VA modeling tools. Advanced adversary capabilities require modeling complex scenario variables, including multiple attack vectors and dynamically selected targets of opportunity. Large threat profiles with complex character behavior are needed for increasing adversary militancy. Coupled with Sandia methodology, the strength of the tool stems from the decision logic structure and built-in artificial intelligence components. STAGE allows for an inclusive command and control VA model that uses all traditional elements of a PPS (detection, communication, assessment, delay, command and control, response, interdiction, attrition, and neutralization). This paper will briefly describe the effect that the current threat environment has had on the VA process and then outline the role of STAGE in VA modeling and new threat reduction methodology. This paper also provides an update to the development of the STAGE tool, as well as a description of future plans to advance VA methodology and integrate STAGE simulation analysis with an existing physical site (the Integrated Security Facility at Sandia - a former Category I facility).
在过去十年中,世界面临着一个迅速扩大和动态的威胁环境。正如9/11和26/11恐怖袭击所表明的那样,对手的能力已经发展到包括先进的战术和日益增强的战斗力。对于美国能源部下属的国家核安全管理局(DOE/NNSA)和其他负责保护特殊核材料存放设施的组织来说,这种全球不确定性的脆弱组合使核武器安全成为一项重要挑战。桑迪亚使用科学和数学方法,被认为是设计和实施物理保护系统(PPS)和VA方法的世界领先者之一,以减少对国内和国际高后果设施的风险。使用Presagis商业软件套件-主要是场景工具包和生成环境(STAGE),一个复杂的模拟引擎-作者开发了一个单一的分析师,蒙特卡罗衍生,基于代理决策和事件驱动的交互工具来帮助满足这一需求。针对日益复杂的对手评估关键基础设施的风险降低需要高保真VA建模工具。先进的对手能力需要建模复杂的场景变量,包括多个攻击向量和动态选择的机会目标。为了提高对手的战斗力,需要具有复杂角色行为的大型威胁档案。结合Sandia方法论,该工具的优势源于决策逻辑结构和内置的人工智能组件。STAGE允许使用PPS的所有传统元素(探测、通信、评估、延迟、指挥和控制、响应、拦截、消耗和中和)的包容性指挥和控制VA模型。本文将简要描述当前威胁环境对VA过程的影响,然后概述STAGE在VA建模和新的威胁减少方法中的作用。本文还提供了STAGE工具开发的更新,以及对未来计划的描述,以推进VA方法,并将STAGE模拟分析与现有物理站点(桑迪亚综合安全设施-前一类设施)相结合。
{"title":"Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems","authors":"Dean Dominguez, M. Parks, Adam D. Williams, S. Washburn","doi":"10.1109/CCST.2012.6393531","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393531","url":null,"abstract":"Over the last decade, the world has faced a rapidly expanding and dynamic threat environment. As demonstrated by the 9/11 and 26/11 terrorist attacks, adversary capabilities have evolved to include advanced tactics and increased militancy. For the Department of Energy's National Nuclear Security Administration (DOE/NNSA), and other organizations responsible for protecting facilities housing special nuclear materials, this fragile mix of global uncertainty makes nuclear weapon security an important challenge. Sandia, using scientific and mathematic methodologies, is considered one of the world leaders in the design and implementation of physical protection systems (PPS) and VA methodology, in order to reduce the risk to both domestic and international high consequence facilities. Using the Presagis commercial software suite - primarily Scenario Toolkit and Generation Environment (STAGE), a complex simulation engine - the authors have developed a single analyst, Monte Carlo derived, agent decision-based, and event-driven interactive tool to help meet this need. Evaluating risk reduction for critical infrastructure against increasingly complex adversaries requires high fidelity VA modeling tools. Advanced adversary capabilities require modeling complex scenario variables, including multiple attack vectors and dynamically selected targets of opportunity. Large threat profiles with complex character behavior are needed for increasing adversary militancy. Coupled with Sandia methodology, the strength of the tool stems from the decision logic structure and built-in artificial intelligence components. STAGE allows for an inclusive command and control VA model that uses all traditional elements of a PPS (detection, communication, assessment, delay, command and control, response, interdiction, attrition, and neutralization). This paper will briefly describe the effect that the current threat environment has had on the VA process and then outline the role of STAGE in VA modeling and new threat reduction methodology. This paper also provides an update to the development of the STAGE tool, as well as a description of future plans to advance VA methodology and integrate STAGE simulation analysis with an existing physical site (the Integrated Security Facility at Sandia - a former Category I facility).","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2012 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1