Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

European Convention on Security and Detection, 1995.

16-18 May 1995

Filter Results

Displaying Results 1 - 25 of 62
  • Automatic recognition of suspicious activity for camera based security systems

    Publication Year: 1995, Page(s):54 - 58
    Cited by:  Papers (8)  |  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (836 KB)

    We present a digital processing based method of intruder detection. CCTV (Closed Circuit Television) camera images are processed and analysed. An object detection algorithm is used to determine whether a camera image contains a possible intruder, while further feature extraction processing can isolate the image containing any possible intruder for further analysis. An artificial intelligence based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure systems-defence in depth

    Publication Year: 1995, Page(s):34 - 39
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1040 KB)

    Analysis of secure or defensive systems generally explores the technology of such systems and looks at the various parts separately. For simple systems, this piecemeal approach may be adequate but, as systems become more complex, there is advantage in a more structured, systems approach. The paper discusses how multi-layer system behaviour may be explored with simple models such as the STELLA mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low cost, intelligent micro-camera for surveillance

    Publication Year: 1995, Page(s):50 - 53
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (544 KB)

    This paper describes an ultra-miniature intelligent camera system which converts light directly into processed digital data. The micro-camera comprises the following component parts, a camera, processing interface and a pipelined processing architecture. The processing resources have been configured to optimise the performance of computationally intensive routines such as image encoding. The micro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • European standards, the expectations of the industry and the users

    Publication Year: 1995, Page(s):28 - 33
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (344 KB)

    The paper gives an overview of the situation in Europe concerning security standardization, testing and certification and the expectations of the industry and the users. The main problem which is identified is to match the production time of the standards with the innovation speed. Today technology changes so fast that the danger exists that product standards become obsolete when they come out, ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surface penetrating radar as an aid to search operations

    Publication Year: 1995, Page(s):293 - 300
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1716 KB)

    The article presents the principle of operation of surface-penetrating radar for hidden object detection; this involves an impulse of a few microseconds' duration. Ancillary requirements are discussed. Surface penetrating radar relies for its effectiveness on efficient coupling of electromagnetic radiation into the ground, adequate penetration of the radiation through depth, obtaining from buried ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital subtraction techniques applied to analysis of footwear changes with time

    Publication Year: 1995, Page(s):96 - 100
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (424 KB)

    Linking a suspect to a scene, has traditionally comprised the majority of footwear examinations. To a lesser extent, effort is directed at linking scenes by determining footwear marks common to them. More recently, changes in the approach to policing have increased the requirement for linking of scenes and intelligence activities. The introduction of advanced computer technology has provided the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eurotunnel security design to reality

    Publication Year: 1995, Page(s):6 - 10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (488 KB)

    A discussion is given on security systems for the Eurotunnel project (between the UK and France). The following areas were tackled in the project: staff selection and training, video security system, access control system, government issues, and security equipment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G3 facsimile security option-UK proposal for ITU-TS recommendation

    Publication Year: 1995, Page(s):146 - 150
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    The presented facsimile security proposal, made from the British Facsimile Industry Consultative Committee, addresses both the security aspect of the transmission and the parallel requirements for message integrity and authentication. The proposal uses two cypher algorithms: HFX40, which is used for the secure transfer of the main facsimile message, and HKM, which is used for secure key management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwriting identification using global and local features for forensic purposes

    Publication Year: 1995, Page(s):272 - 278
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper presents some research work that has been undertaken in the area of software tools for forensic document analysis. The purpose of research into this area is to study the methods used by human experts in the forensic analysis and examination of questioned hand-written documents and to formulate computer tools to assist in this task. The computer tools needed will require image processing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Covert and visible lighting for surveillance imaging

    Publication Year: 1995, Page(s):70 - 76
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (612 KB)

    Surveillance video systems have been around for several years now, and much attention has been given to the different system components, however the subject of the best way to light a scene has been dodged by the standardised approach of fitting luminaires at the camera position. Lighting engineers have for many years developed luminaires fit for the purpose of providing light in the right directi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3DAS: a 3-dimensional-structure authentication system

    Publication Year: 1995, Page(s):45 - 49
    Cited by:  Patents (15)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (664 KB)

    It has been argued that the degree of microstructural order of an optical security feature is an approximate measure of its practical value for document security. Examples of highly ordered structures are diffractive devices like holograms, kinograms and zero order devices as well as interference devices like multilayer thin films and liquid crystals. An entirely different type of security feature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-based 3D X-ray imaging for second-line security screening

    Publication Year: 1995, Page(s):310 - 313
    Cited by:  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (464 KB)

    X-rays in 1, 2 or 3 orthogonal views are excellent for first-line security screening. If any doubt remains after such 1st.-line inspection, the relevant item of luggage or container is normally unpacked. Here we propose an X-ray technique creating a precise 3D model of any object under suspicion - and characterising its material - thus giving the benefit of unpacking without the inconvenience. Ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The handwritten signature as a biometric identifier: psychophysical model and system design

    Publication Year: 1995, Page(s):23 - 27
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (568 KB)

    The paper presents a signature generation model based on a few fundamental properties of the human neuromuscular system. It suggests some causes of the intrinsic stability and variability of signatures and provides conditions for using the signature as a biometric identifier. A brief critical survey of the different online approaches that have been used to tackle these problems over the past decad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nitrogen-14 quadrupole resonance detection of RDX and HMX based explosives

    Publication Year: 1995, Page(s):288 - 292
    Cited by:  Papers (13)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (368 KB)

    Concerns the use of 14N signals in RDX and HMX. The principle is to subject the quadrupole nuclei to bursts of RF radiation and monitor the signals generated in the quiescent periods between pulses. These signals may be divided into two types: free induction decays (FID) and echoes. The first is the decaying signal observed immediately following the pulse; it is generated by the interac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perimeter security-towards 2000 and beyond

    Publication Year: 1995, Page(s):172 - 175
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (368 KB)

    This paper recognises the considerable developments that have been made in perimeter security technology. It indicates that as technological solutions become cheaper and more reliable they will become more widely used. The paper cites three areas for further innovation: applying technology to crime prevention; the use of video in automatic alarm verification; and improving fence-mounted detection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security for distributed applications

    Publication Year: 1995, Page(s):156 - 160
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    The advent of low-cost computing platforms has led to a re-evaluation of the way in which computing services are delivered to end users. The centralised computer with all its carefully managed security controls no longer reigns supreme. Instead, applications and their data are increasingly distributed across a multiplicity of platforms involving a mixture of vendors and operating systems. This has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image processing tools for the interactive forensic examination of questioned documents

    Publication Year: 1995, Page(s):225 - 228
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (384 KB)

    Handwriting and handwritten signatures are biometrics which have a legally accepted role in banking, legal and commercial work. The identification of forged handwriting (where the writer was not the person they claimed to be) and disguised writing (where the writer tried to disguise their writing in order to disclaim writing it later) is sometimes required in such documents as cheques, credit card... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The implementation of intelligent integrated security and communications systems for the Kuala Lumpur city centre development

    Publication Year: 1995, Page(s):1 - 5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (492 KB)

    Kuala Lumpur city centre (KLCC) is a mixed-use commercial megaproject that is presently under construction in Malaysia. The total development will be comprised of approximately 2.O mm2 of premium quality, retail, hotel, conference, entertainment, residential, parking and service space constructed on a 40 ha site in the central business district of Kuala Lumpur. The paper discusses the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An alternative to public key encryption

    Publication Year: 1995, Page(s):142 - 145
    Cited by:  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    Distribution of session keys is the single most important issue in encryption. The distribution problem is assumed to be complicated, and there is already a plethora of elaborate mechanisms for maintaining security, all based on interventionist strategies such as key distribution centres and certification authorities. This paper calls into question whether such elaboration is either necessary or d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shoeprint image coding and retrieval system

    Publication Year: 1995, Page(s):267 - 271
    Cited by:  Papers (4)  |  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (484 KB)

    Footwear marks frequently provide good evidence in certain types of crime. This is particularly true now that sports shoes of all kinds are in popular use. Such footwear is characterised by a huge variety of designs which are often complex in appearance. Microcomputers are now sufficiently powerful to handle large quantities of data including detailed images. This has been accompanied by the avail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCTV systems thinking-systems practice

    Publication Year: 1995, Page(s):64 - 69
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (468 KB)

    The introduction of formal evaluation techniques for use with CCTV systems is an important step toward the much needed improvement in systems performance. The inclusion of mandatory use of these methods in invitations to tender for new CCTV systems imposes potentially severe constraints upon the would be contractor. In fact this is a twin edged sword because these requirements also mean that the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developments in observation technology and image processing

    Publication Year: 1995, Page(s):43 - 44
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (140 KB)

    Developments in observation technology for security applications follow many of the trends to be found in professional and consumer video applications, such as Broadcast Television, CamCorders and multimedia systems. It is a general characteristic of the security industry that solutions need not only be technologically feasible but also affordable. The author discusses image analysis and processin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solid image models derived from security X-ray equipment

    Publication Year: 1995, Page(s):306 - 309
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (380 KB)

    A technique has been developed for deriving solid image models from line-scan X-ray equipment which is itself capable of providing three-dimensional images. Descriptions of both the 3-D X-ray equipment and the solid image modelling technique are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational requirement analysis-a new approach to effective security

    Publication Year: 1995, Page(s):18 - 22
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (496 KB)

    A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; develop a method o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible fingerprint identification system

    Publication Year: 1995, Page(s):284 - 287
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (336 KB)

    In this paper we describe a fingerprint identification system which allows for the adjustment of the degree of match. The extracted features from the fingerprint image, such as location and angle are allowed to deviate by user definable margins. The system offers likely candidates from the database using these margins. The system may be requested to pick the best match or candidates may be visuall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.