Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393572
Philipp Sury, S. Ritzmann, A. Schwaninger
With the currently implemented high standards in passenger screening, air cargo is being perceived as the security chain's weakest link in civil aviation and therefore becomes an attractive target for terrorists. Detailed regulations exist to harden air cargo against terrorist attacks. Blended learning training methods can be used to enable screeners to detect suspicious consignments even in situations when technical measures (e.g. x-ray) do not indicate any threat In this study, blended learning was conducted at a handling agents premises at a Swiss airport in three courses (seven trainees in total) and evaluated subsequently. Results show a very high satisfaction with the training and very high scores in the final exam. However, trainees repeatedly skipped text inside the web based training (WBT) leading to the conclusion that the WBT has to be optimized in terms of presentation modes. Suggestions on how to create even more engaging WBT content can be found in various methods of classification of computer based training (CBT) and are discussed in this paper.
{"title":"Initial results of web based blended learning in the field of air cargo security","authors":"Philipp Sury, S. Ritzmann, A. Schwaninger","doi":"10.1109/CCST.2012.6393572","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393572","url":null,"abstract":"With the currently implemented high standards in passenger screening, air cargo is being perceived as the security chain's weakest link in civil aviation and therefore becomes an attractive target for terrorists. Detailed regulations exist to harden air cargo against terrorist attacks. Blended learning training methods can be used to enable screeners to detect suspicious consignments even in situations when technical measures (e.g. x-ray) do not indicate any threat In this study, blended learning was conducted at a handling agents premises at a Swiss airport in three courses (seven trainees in total) and evaluated subsequently. Results show a very high satisfaction with the training and very high scores in the final exam. However, trainees repeatedly skipped text inside the web based training (WBT) leading to the conclusion that the WBT has to be optimized in terms of presentation modes. Suggestions on how to create even more engaging WBT content can be found in various methods of classification of computer based training (CBT) and are discussed in this paper.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393538
Z. Vintr, D. Valis, J. Malach
The paper deals with attack tree-based evaluation of vulnerability. The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.
{"title":"Attack tree-based evaluation of physical protection systems vulnerability","authors":"Z. Vintr, D. Valis, J. Malach","doi":"10.1109/CCST.2012.6393538","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393538","url":null,"abstract":"The paper deals with attack tree-based evaluation of vulnerability. The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393561
R. Guest, O. Miguel-Hurtado
Automatic biometric static signature verification performs a comparison between signature images (or preformed templates) to verify authenticity. Although widely recognised that performance enhancement can be achieved when using dynamic features, which use temporal/ constructional information, alongside static features, this scenario requires the capture of signatures using specialist sample equipment such a tablet device. The vast majority of (legacy) signatures across a range of important domains, including banking, legal and forensic applications, are in a static format. In this paper we use the Speeded-Up Robust Features (SURF) image registration technique in a novel application to static signature image matching. We use genuine and skilled forgery signatures from the GPDS960 dataset as test data and across a range of enrolment and SURF point distance configurations. The best performance from our method was 11.5% equal error rate by employing a product distance combination of 5 enrolment templates using the lowest 50% of returned registration-point distances. This encouraging result is in line with the current state-of-the-art performance.
{"title":"Enhancing static biometric signature verification using Speeded-Up Robust Features","authors":"R. Guest, O. Miguel-Hurtado","doi":"10.1109/CCST.2012.6393561","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393561","url":null,"abstract":"Automatic biometric static signature verification performs a comparison between signature images (or preformed templates) to verify authenticity. Although widely recognised that performance enhancement can be achieved when using dynamic features, which use temporal/ constructional information, alongside static features, this scenario requires the capture of signatures using specialist sample equipment such a tablet device. The vast majority of (legacy) signatures across a range of important domains, including banking, legal and forensic applications, are in a static format. In this paper we use the Speeded-Up Robust Features (SURF) image registration technique in a novel application to static signature image matching. We use genuine and skilled forgery signatures from the GPDS960 dataset as test data and across a range of enrolment and SURF point distance configurations. The best performance from our method was 11.5% equal error rate by employing a product distance combination of 5 enrolment templates using the lowest 50% of returned registration-point distances. This encouraging result is in line with the current state-of-the-art performance.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393554
Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo
Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.
{"title":"Handwritten signature recognition in mobile scenarios: Performance evaluation","authors":"Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo","doi":"10.1109/CCST.2012.6393554","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393554","url":null,"abstract":"Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393576
E. Gonzaga, Harold J. Cossette
The methodology and concept used by Plasma Technologies Inc. to design and develop a plasma barrier force-field access denial system is described. The Tesla coil technology is exploited in the system. Basic engineering circuit principle and analysis were applied. Upgrading from classical to modern solid state version was discussed. Effects of major electrical hazards to physiological being of humans were identified. These guide the design and development effort adapted for the system to avoid serious harm, physiological damages, and life endangerment of personnel denied of entry.
{"title":"Plasma barrier force-field access denial system","authors":"E. Gonzaga, Harold J. Cossette","doi":"10.1109/CCST.2012.6393576","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393576","url":null,"abstract":"The methodology and concept used by Plasma Technologies Inc. to design and develop a plasma barrier force-field access denial system is described. The Tesla coil technology is exploited in the system. Basic engineering circuit principle and analysis were applied. Upgrading from classical to modern solid state version was discussed. Effects of major electrical hazards to physiological being of humans were identified. These guide the design and development effort adapted for the system to avoid serious harm, physiological damages, and life endangerment of personnel denied of entry.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393579
J. Hamar, R. Dove
Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.
{"title":"A quorum sensing pattern for multi-agent self-organizing security systems","authors":"J. Hamar, R. Dove","doi":"10.1109/CCST.2012.6393579","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393579","url":null,"abstract":"Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393533
M. Murton, D. T. Dongen, Michael P. Ross, F. Bouchier
Technological advances provide new capabilities to increase the robustness of security systems, but can also potentially add new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a crucial performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches - typically 96 square inches (620.1 square centimeters). The dimensions of a flexible aperture, unlike those of standard rigid openings, are not fixed, but are variable and conformable. It has been demonstrated that a human intruder can move through a 96-square-inch opening that is conformable to the human body with ease. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This paper proposes to define a new requirements approach for flexible netting intrusion detection systems that is risk based and documented. An illustrative requirement is developed based on performance testing and statistical analysis to validate this approach.
{"title":"Toward a performance requirement for sensored conformable apertures","authors":"M. Murton, D. T. Dongen, Michael P. Ross, F. Bouchier","doi":"10.1109/CCST.2012.6393533","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393533","url":null,"abstract":"Technological advances provide new capabilities to increase the robustness of security systems, but can also potentially add new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a crucial performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches - typically 96 square inches (620.1 square centimeters). The dimensions of a flexible aperture, unlike those of standard rigid openings, are not fixed, but are variable and conformable. It has been demonstrated that a human intruder can move through a 96-square-inch opening that is conformable to the human body with ease. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This paper proposes to define a new requirements approach for flexible netting intrusion detection systems that is risk based and documented. An illustrative requirement is developed based on performance testing and statistical analysis to validate this approach.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393566
L. Cano
Extended Detection (ED) has become required especially when protecting high valued assets. Physical Protection Systems (PPS) usually integrate Detection, Delay, and Response (DDR) elements in a manner to assess threats at well defined perimeters. Situational Awareness (SA) beyond PPS perimeters requires the use of longer range sensors systems such as Radars or Unattended Ground Sensors which cover relatively large areas. Gathering such sensor data, especially in high noise environments poses a serious challenge to building reliable ED systems. The use of Neural Networks to merge sensor data and identify potential threats can make SA systems available for broader use.
{"title":"Using Neural Networks for Extended Detection","authors":"L. Cano","doi":"10.1109/CCST.2012.6393566","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393566","url":null,"abstract":"Extended Detection (ED) has become required especially when protecting high valued assets. Physical Protection Systems (PPS) usually integrate Detection, Delay, and Response (DDR) elements in a manner to assess threats at well defined perimeters. Situational Awareness (SA) beyond PPS perimeters requires the use of longer range sensors systems such as Radars or Unattended Ground Sensors which cover relatively large areas. Gathering such sensor data, especially in high noise environments poses a serious challenge to building reliable ED systems. The use of Neural Networks to merge sensor data and identify potential threats can make SA systems available for broader use.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393552
K. Takeda
Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.
{"title":"User Identification and Tracking with online device fingerprints fusion","authors":"K. Takeda","doi":"10.1109/CCST.2012.6393552","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393552","url":null,"abstract":"Identification and Tracking of online digital identity has been significant issue around efforts on cyber security. The purpose of this research is to demonstrate how to utilized information being emitted from digital devices carried by suspicious user. In this paper, techniques to identify owner of digital devices connected to the Internet or local network are proposed. Techniques include tracing physical id of network interface, profiling of network traffic pattern of devices, Bluetooth device signals, web browser finger printings, and header information of e-mail messages. Each devices connected to computer network has its own finger print such as physical MAC address, network traffic generated by operating systems and its installed applications thus such information can be applied to identify and track unique digital device. If the device is personal item such as smartphone or personal computer owned by a specific person this information is being able to use to detect and trace location of the person. Each web browser installed on such devices also has its unique characteristics such as version, installed fonts, and difference in its settings, such information can be used to identify a person. E-mail message has significant information in its header, by analyzing messages headers certain amount of information of its sender are extracted. This is also used to detect impersonation of a message sender. By integrating these information obtained through such monitoring activity and related network sensors we are able to identify existence and physical location of a targeted personnel, to monitor their behavior and also we are able to use such data as evidence for law suites. Preservation of privacy is the issued to be considered for such application and this would discuss how to balance between user privacy and traceability of users in certain types of network.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393586
V. Espinosa-Duro, M. Faúndez-Zanuy, J. Mekyska
When focusing an image, depth of field, aperture and distance from the camera to the object, must be taking into account, both, in visible and in infrared spectrum. Our experiments reveal that in addition, the focusing problem in thermal spectrum is also hardly dependent of the temperature of the object itself (and/or the scene).
{"title":"Contribution of the temperature of the objects to the problem of thermal imaging focusing","authors":"V. Espinosa-Duro, M. Faúndez-Zanuy, J. Mekyska","doi":"10.1109/CCST.2012.6393586","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393586","url":null,"abstract":"When focusing an image, depth of field, aperture and distance from the camera to the object, must be taking into account, both, in visible and in infrared spectrum. Our experiments reveal that in addition, the focusing problem in thermal spectrum is also hardly dependent of the temperature of the object itself (and/or the scene).","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"16 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}