European Convention on Security and Detection, 1995.

16-18 May 1995

Filter Results

Displaying Results 1 - 25 of 62
  • G3 facsimile security option-UK proposal for ITU-TS recommendation

    Publication Year: 1995, Page(s):146 - 150
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    The presented facsimile security proposal, made from the British Facsimile Industry Consultative Committee, addresses both the security aspect of the transmission and the parallel requirements for message integrity and authentication. The proposal uses two cypher algorithms: HFX40, which is used for the secure transfer of the main facsimile message, and HKM, which is used for secure key management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An alternative to public key encryption

    Publication Year: 1995, Page(s):142 - 145
    Cited by:  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    Distribution of session keys is the single most important issue in encryption. The distribution problem is assumed to be complicated, and there is already a plethora of elaborate mechanisms for maintaining security, all based on interventionist strategies such as key distribution centres and certification authorities. This paper calls into question whether such elaboration is either necessary or d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct non-destructive detection and identification of contraband using Raman microscopy

    Publication Year: 1995, Page(s):138 - 141
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (544 KB)

    This paper is designed to bring to the notice of a wider audience the technique of Raman microscopy as a means for the accurate detection and identification of explosive materials in a non destructive fashion. The direction of the proposed programme of work is also described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced technologies for perimeter intrusion detection sensors

    Publication Year: 1995, Page(s):133 - 137
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (528 KB)

    Perimeter intrusion detection systems are an integral part of most physical security systems. Sandia National Laboratories, under the sponsorship of the US Department of Energy, Office of Safeguards and Security; the US Military Services; and many other US Government Agencies, has over the last 20 years conducted surveys of available perimeter intrusion detection sensors and has tested many of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3DAS: a 3-dimensional-structure authentication system

    Publication Year: 1995, Page(s):45 - 49
    Cited by:  Patents (15)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (664 KB)

    It has been argued that the degree of microstructural order of an optical security feature is an approximate measure of its practical value for document security. Examples of highly ordered structures are diffractive devices like holograms, kinograms and zero order devices as well as interference devices like multilayer thin films and liquid crystals. An entirely different type of security feature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwriting identification using global and local features for forensic purposes

    Publication Year: 1995, Page(s):272 - 278
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper presents some research work that has been undertaken in the area of software tools for forensic document analysis. The purpose of research into this area is to study the methods used by human experts in the forensic analysis and examination of questioned hand-written documents and to formulate computer tools to assist in this task. The computer tools needed will require image processing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Custom hardware for high performance and high security digital data ciphering

    Publication Year: 1995, Page(s):128 - 132
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (472 KB)

    REDOC III is an algorithm for data ciphering which uses only XORing to combine key and data, without substitutions or permutations. In this paper several extensions to the algorithm are proposed for use in customised cryptosystems, which increase complexity without reducing ciphering speed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fibre optic sensor system for integrated perimeter protection

    Publication Year: 1995, Page(s):188 - 192
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (432 KB)

    The paper describes a novel fibre optic sensor system for use within an integrated perimeter protection system. This system is under continuous development at GEC-Marconi and is called FOPIDS (Fibre Optic Perimeter Intruder Detection System). The main technical, operational and market aspects are presented, including results from recent trials and demonstrations. The system is presented as having ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developments in observation technology and image processing

    Publication Year: 1995, Page(s):43 - 44
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (140 KB)

    Developments in observation technology for security applications follow many of the trends to be found in professional and consumer video applications, such as Broadcast Television, CamCorders and multimedia systems. It is a general characteristic of the security industry that solutions need not only be technologically feasible but also affordable. The author discusses image analysis and processin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The implementation of intelligent integrated security and communications systems for the Kuala Lumpur city centre development

    Publication Year: 1995, Page(s):1 - 5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (492 KB)

    Kuala Lumpur city centre (KLCC) is a mixed-use commercial megaproject that is presently under construction in Malaysia. The total development will be comprised of approximately 2.O mm2 of premium quality, retail, hotel, conference, entertainment, residential, parking and service space constructed on a 40 ha site in the central business district of Kuala Lumpur. The paper discusses the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shoeprint image coding and retrieval system

    Publication Year: 1995, Page(s):267 - 271
    Cited by:  Papers (4)  |  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (484 KB)

    Footwear marks frequently provide good evidence in certain types of crime. This is particularly true now that sports shoes of all kinds are in popular use. Such footwear is characterised by a huge variety of designs which are often complex in appearance. Microcomputers are now sufficiently powerful to handle large quantities of data including detailed images. This has been accompanied by the avail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nitrogen-14 quadrupole resonance detection of RDX and HMX based explosives

    Publication Year: 1995, Page(s):288 - 292
    Cited by:  Papers (13)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (368 KB)

    Concerns the use of 14N signals in RDX and HMX. The principle is to subject the quadrupole nuclei to bursts of RF radiation and monitor the signals generated in the quiescent periods between pulses. These signals may be divided into two types: free induction decays (FID) and echoes. The first is the decaying signal observed immediately following the pulse; it is generated by the interac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corporate risk analysis and management strategies

    Publication Year: 1995, Page(s):120 - 127
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (696 KB)

    Whilst many organisations consider they assess security risks in some way, and fair numbers conduct detailed risk analysis and management reviews, very few so far have stood back and questioned “are we spending time and money on the right systems?” and/or “are we focusing on the systems of high risk and providing low risk systems with a level of attention appropriate to low risk ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost effective perimeter security

    Publication Year: 1995, Page(s):183 - 187
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (512 KB)

    The measurement of perimeter barrier and alarm system performance has, over the years, produced a wealth of data for many different measures that could be taken to make perimeters more secure. These measures can be expensive and security practitioners must decide whether the expense is justified by the benefits they provide. A research project to assist security practitioners in this task led to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of safety cases in risk management

    Publication Year: 1995, Page(s):40 - 42
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (208 KB)

    There are similarities in the approaches to managing security and safety risks and it has been suggested that the safety case approach used in National Air Traffic Services (NATS) may be of interest to the security fraternity in the approach to managing security risks. Although the paper describes the use of safety cases in NATS for air traffic control systems the reader may assess the relevance o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-based 3D X-ray imaging for second-line security screening

    Publication Year: 1995, Page(s):310 - 313
    Cited by:  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (464 KB)

    X-rays in 1, 2 or 3 orthogonal views are excellent for first-line security screening. If any doubt remains after such 1st.-line inspection, the relevant item of luggage or container is normally unpacked. Here we propose an X-ray technique creating a precise 3D model of any object under suspicion - and characterising its material - thus giving the benefit of unpacking without the inconvenience. Ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of Authors

    Publication Year: 1995
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (56 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic imaging of fingermarks

    Publication Year: 1995, Page(s):261 - 266
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1408 KB)

    Operational use of the crime scene and laboratory based electronic imaging systems have saved considerable time in the capture of weakly fluorescing fingermarks. The high sensitivity of the camera has allowed us to use low transmission and narrow band interference filters for further reducing the background signal. Observation of captured fingermark images at crime scenes has made immediate evalua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible fingerprint identification system

    Publication Year: 1995, Page(s):284 - 287
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (336 KB)

    In this paper we describe a fingerprint identification system which allows for the adjustment of the degree of match. The extracted features from the fingerprint image, such as location and angle are allowed to deviate by user definable margins. The system offers likely candidates from the database using these margins. The system may be requested to pick the best match or candidates may be visuall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing `plastic' counterfeiting

    Publication Year: 1995, Page(s):198 - 201
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    The security of payment cards in the UK needs to be enhanced and effective crime prevention measures must be built into them by the industry to prevent plastic card fraud especially counterfeiting. However, it would be extremely shortsighted to think smart cards will eliminate counterfeiting overnight or rely upon them totally in isolation of other technologies because, despite the hype surroundin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screening of bottles

    Publication Year: 1995, Page(s):115 - 119
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    The use of liquid explosives or incendiaries concealed within common beverage bottles such as wines or spirits represents a threat to aviation security. Although liquid explosives and incendiaries may differ in colour and viscosity from alcoholic or non-alcoholic beverage they are nonetheless difficult to distinguish when concealed within coloured bottles. A reliable method of screening bottles is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in automated pedestrian counting

    Publication Year: 1995, Page(s):106 - 110
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (500 KB)

    Recent developments in automated building management and road traffic monitoring systems have highlighted a need for accurate real time data relating to occupancy and flow of pedestrians in relatively unconstrained physical areas. The ESPRIT PEDMON (PEDestrian MONitoring) project, which was funded through the Central European Commission, focused on the development of technologies to enable the aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote intrusion detection-improvements in equipment and detection methods

    Publication Year: 1995, Page(s):176 - 182
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (564 KB)

    Increasingly, due to manpower restrictions and the capabilities of intruders, more and more security forces are turning to simple tactical intrusion detection systems to aid their security/monitoring requirements. It is not only good equipment design which must be considered by a prospective user, but more important is how the equipment is used/deployed in order to achieve a successful surveillanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure systems-defence in depth

    Publication Year: 1995, Page(s):34 - 39
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1040 KB)

    Analysis of secure or defensive systems generally explores the technology of such systems and looks at the various parts separately. For simple systems, this piecemeal approach may be adequate but, as systems become more complex, there is advantage in a more structured, systems approach. The paper discusses how multi-layer system behaviour may be explored with simple models such as the STELLA mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of neural network techniques to automatic licence plate recognition

    Publication Year: 1995, Page(s):81 - 85
    Cited by:  Papers (2)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (692 KB)

    With the ever-increasing cost and inconvenience of traffic congestion all around the world, many initiatives for effective control of traffic have been proposed or are undergoing trials. Intelligent transport management systems, which include video recording and analysis, are being applied to the enforcement of traffic regulations, such as speed violation and red traffic light infringement, road u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.