European Convention on Security and Detection, 1995.

16-18 May 1995

Filter Results

Displaying Results 1 - 25 of 62
  • “Shoe-fit”-a computerised shoe print database

    Publication Year: 1995, Page(s):86 - 89
    Cited by:  Papers (7)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (508 KB)

    Shoe prints found at the scene of a crime can provide valuable evidence and intelligence. The wealth of information provided is perplexing unless a methodical system of recognition, investigation and identification is adopted. To assist in this process, a pattern coding system has been devised for use in conjunction with a computerised database providing storage, search and graphic display facilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of neural network techniques to automatic licence plate recognition

    Publication Year: 1995, Page(s):81 - 85
    Cited by:  Papers (2)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (692 KB)

    With the ever-increasing cost and inconvenience of traffic congestion all around the world, many initiatives for effective control of traffic have been proposed or are undergoing trials. Intelligent transport management systems, which include video recording and analysis, are being applied to the enforcement of traffic regulations, such as speed violation and red traffic light infringement, road u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in digital recognition technologies

    Publication Year: 1995, Page(s):77 - 80
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (348 KB)

    The automatic analysis of images for security systems depends on two key system aspects. Firstly, sensing technology and secondly, the processing technology that follows it. This paper is an introduction to some of the advances in recognition systems processing which have recently led to more sophisticated, reliable and powerful systems being deployed in operational use. Examples of such systems i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Covert and visible lighting for surveillance imaging

    Publication Year: 1995, Page(s):70 - 76
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (612 KB)

    Surveillance video systems have been around for several years now, and much attention has been given to the different system components, however the subject of the best way to light a scene has been dodged by the standardised approach of fitting luminaires at the camera position. Lighting engineers have for many years developed luminaires fit for the purpose of providing light in the right directi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCTV systems thinking-systems practice

    Publication Year: 1995, Page(s):64 - 69
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (468 KB)

    The introduction of formal evaluation techniques for use with CCTV systems is an important step toward the much needed improvement in systems performance. The inclusion of mandatory use of these methods in invitations to tender for new CCTV systems imposes potentially severe constraints upon the would be contractor. In fact this is a twin edged sword because these requirements also mean that the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote intrusion detection-improvements in equipment and detection methods

    Publication Year: 1995, Page(s):176 - 182
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (564 KB)

    Increasingly, due to manpower restrictions and the capabilities of intruders, more and more security forces are turning to simple tactical intrusion detection systems to aid their security/monitoring requirements. It is not only good equipment design which must be considered by a prospective user, but more important is how the equipment is used/deployed in order to achieve a successful surveillanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel magnetic card protection system

    Publication Year: 1995, Page(s):207 - 211
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (512 KB)

    We propose a protection method for magnetic card against counterfeit by recording a unique digital signature in the magnetic stripe using `fuzzy' characteristics of partial magnetized particle. Under this scheme, a novel protection system is developed with three verification layers. Using the characteristics of the `fuzzy' bits, a unique and non-duplicable digital signature is implemented in the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical approaches to image restoration

    Publication Year: 1995, Page(s):59 - 63
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (756 KB)

    Our work has been based on X-ray images of suitcases typical of those which can be seen at an airport. Specifically we have been trying to locate components, such as a detonator, wires and (less successfully) plastic explosive, which would constitute a bomb. Standard thresholding techniques to extract lead solder, for example, do not use any spatial information. By using prior knowledge, a number ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perimeter security-towards 2000 and beyond

    Publication Year: 1995, Page(s):172 - 175
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (368 KB)

    This paper recognises the considerable developments that have been made in perimeter security technology. It indicates that as technological solutions become cheaper and more reliable they will become more widely used. The paper cites three areas for further innovation: applying technology to crime prevention; the use of video in automatic alarm verification; and improving fence-mounted detection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image processing tools for the interactive forensic examination of questioned documents

    Publication Year: 1995, Page(s):225 - 228
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (384 KB)

    Handwriting and handwritten signatures are biometrics which have a legally accepted role in banking, legal and commercial work. The identification of forged handwriting (where the writer was not the person they claimed to be) and disguised writing (where the writer tried to disguise their writing in order to disclaim writing it later) is sometimes required in such documents as cheques, credit card... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nitrogen-14 quadrupole resonance detection of RDX and HMX based explosives

    Publication Year: 1995, Page(s):288 - 292
    Cited by:  Papers (13)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (368 KB)

    Concerns the use of 14N signals in RDX and HMX. The principle is to subject the quadrupole nuclei to bursts of RF radiation and monitor the signals generated in the quiescent periods between pulses. These signals may be divided into two types: free induction decays (FID) and echoes. The first is the decaying signal observed immediately following the pulse; it is generated by the interac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low cost dynamic signature verification system

    Publication Year: 1995, Page(s):202 - 206
    Cited by:  Papers (10)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (492 KB)

    Dynamic signature verification (DSV) makes use of parameters such as pen velocity, acceleration, jerk and pressure as described by R. Plamondon and G. Lorette (1989) and is an attractive biometric for identity verification since signature checking is already accepted by the public as noted by R. Carter (1990). The slow uptake of DSV by electronic fund transfer point of sale (EFTPOS) equipment manu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic recognition of suspicious activity for camera based security systems

    Publication Year: 1995, Page(s):54 - 58
    Cited by:  Papers (8)  |  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (836 KB)

    We present a digital processing based method of intruder detection. CCTV (Closed Circuit Television) camera images are processed and analysed. An object detection algorithm is used to determine whether a camera image contains a possible intruder, while further feature extraction processing can isolate the image containing any possible intruder for further analysis. An artificial intelligence based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwriting identification using global and local features for forensic purposes

    Publication Year: 1995, Page(s):272 - 278
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (644 KB)

    This paper presents some research work that has been undertaken in the area of software tools for forensic document analysis. The purpose of research into this area is to study the methods used by human experts in the forensic analysis and examination of questioned hand-written documents and to formulate computer tools to assist in this task. The computer tools needed will require image processing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure systems-defence in depth

    Publication Year: 1995, Page(s):34 - 39
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1040 KB)

    Analysis of secure or defensive systems generally explores the technology of such systems and looks at the various parts separately. For simple systems, this piecemeal approach may be adequate but, as systems become more complex, there is advantage in a more structured, systems approach. The paper discusses how multi-layer system behaviour may be explored with simple models such as the STELLA mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-based 3D X-ray imaging for second-line security screening

    Publication Year: 1995, Page(s):310 - 313
    Cited by:  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (464 KB)

    X-rays in 1, 2 or 3 orthogonal views are excellent for first-line security screening. If any doubt remains after such 1st.-line inspection, the relevant item of luggage or container is normally unpacked. Here we propose an X-ray technique creating a precise 3D model of any object under suspicion - and characterising its material - thus giving the benefit of unpacking without the inconvenience. Ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G3 facsimile security option-UK proposal for ITU-TS recommendation

    Publication Year: 1995, Page(s):146 - 150
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (396 KB)

    The presented facsimile security proposal, made from the British Facsimile Industry Consultative Committee, addresses both the security aspect of the transmission and the parallel requirements for message integrity and authentication. The proposal uses two cypher algorithms: HFX40, which is used for the secure transfer of the main facsimile message, and HKM, which is used for secure key management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmentally caused variation in exterior intrusion detection

    Publication Year: 1995, Page(s):167 - 171
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (404 KB)

    Environmentally-dependent detection capability is an inescapable aspect of the overall reliability of exterior intrusion detection systems (IDSs). For this reason, security managers need to be aware of the specific site conditions that affect their IDSs. Proximity-to-alarm monitoring provides a direct indication of the interaction between an IDS and its operating environment. In addition to tempor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fibre optic sensor system for integrated perimeter protection

    Publication Year: 1995, Page(s):188 - 192
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (432 KB)

    The paper describes a novel fibre optic sensor system for use within an integrated perimeter protection system. This system is under continuous development at GEC-Marconi and is called FOPIDS (Fibre Optic Perimeter Intruder Detection System). The main technical, operational and market aspects are presented, including results from recent trials and demonstrations. The system is presented as having ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The insurance industry's use of databases to prevent and detect fraud, and improve recoveries

    Publication Year: 1995, Page(s):216 - 224
    Cited by:  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (944 KB)

    The methods by which insurance fraud are perpetrated include: over insurance; multiple insurance; suppression of information; conversion of uninsured to insured; faking of loss; deliberate loss by policyholder or agent; loss exaggeration. These and other types of fraud can be tackled with the use of centralised databases such as CUE (Common Underwriting Exchange) set up by the ABI. The use of data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible fingerprint identification system

    Publication Year: 1995, Page(s):284 - 287
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (336 KB)

    In this paper we describe a fingerprint identification system which allows for the adjustment of the degree of match. The extracted features from the fingerprint image, such as location and angle are allowed to deviate by user definable margins. The system offers likely candidates from the database using these margins. The system may be requested to pick the best match or candidates may be visuall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developments in observation technology and image processing

    Publication Year: 1995, Page(s):43 - 44
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (140 KB)

    Developments in observation technology for security applications follow many of the trends to be found in professional and consumer video applications, such as Broadcast Television, CamCorders and multimedia systems. It is a general characteristic of the security industry that solutions need not only be technologically feasible but also affordable. The author discusses image analysis and processin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing `plastic' counterfeiting

    Publication Year: 1995, Page(s):198 - 201
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (408 KB)

    The security of payment cards in the UK needs to be enhanced and effective crime prevention measures must be built into them by the industry to prevent plastic card fraud especially counterfeiting. However, it would be extremely shortsighted to think smart cards will eliminate counterfeiting overnight or rely upon them totally in isolation of other technologies because, despite the hype surroundin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low cost, intelligent micro-camera for surveillance

    Publication Year: 1995, Page(s):50 - 53
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (544 KB)

    This paper describes an ultra-miniature intelligent camera system which converts light directly into processed digital data. The micro-camera comprises the following component parts, a camera, processing interface and a pipelined processing architecture. The processing resources have been configured to optimise the performance of computationally intensive routines such as image encoding. The micro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shoeprint image coding and retrieval system

    Publication Year: 1995, Page(s):267 - 271
    Cited by:  Papers (4)  |  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (484 KB)

    Footwear marks frequently provide good evidence in certain types of crime. This is particularly true now that sports shoes of all kinds are in popular use. Such footwear is characterised by a huge variety of designs which are often complex in appearance. Microcomputers are now sufficiently powerful to handle large quantities of data including detailed images. This has been accompanied by the avail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.