Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures

14-16 Oct. 1992

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings. The Institute of Electrical and Electronics Engineers 1992 International Carnahan Conference on Security Technology: Crime Countermeasures (Cat. No.CH3119-5/92)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • An object-oriented security model for office environments

    Publication Year: 1992, Page(s):146 - 152
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical applications of acoustoopic signal processing units

    Publication Year: 1992, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The authors consider the basic ideas of acoustooptic signal processing where an acoustooptic unit is used as a spatial modulator. The selection of applications is oriented for the purposes of the security technology. Some experimental results based upon mercurous halides are summarized. These experimentally verified bulk acoustooptic units have been applied as a part of a model of a spectrum analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radar as part of a netted surveillance system-a problem revisited

    Publication Year: 1992, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The authors discuss the use of radar as a security surveillance sensor and present methods for integrating this sensor technology into netted sensor systems. The capabilities and limitations of radar sensors are discussed, and several surveillance scenarios are presented. A general architecture for netting multiple radar sensors together and for netting radar sensors with more conventional surveil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synergistic radar: a new approach to intrusion detection

    Publication Year: 1992, Page(s):8 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The authors introduce a new electromagnetic sensor technology called synergistic radar as it is utilized in the RadioGuard intrusion detection product. This passive line sensor detects disturbances to commercial FM radio signals caused by an intruder moving in proximity to an open transmission line relative to the same radio signal received on a central reference antenna. The product utilizes a to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spread spectrum digital signal synchronization using neural networks

    Publication Year: 1992, Page(s):225 - 237
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    The authors investigate whether an artificial neural network (ANN) can be trained to estimate the phase of the signal carrier frequency and acquire the timing of the spreading code sequence, only from samples of the received signal. They present an overview of the current work, the results obtained, and the future developments expected in this area. Very secure digital radio communication can be o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimising the performance of fence-mounted detection systems

    Publication Year: 1992, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    The performance of fence-mounted perimeter intrusion detection systems (PIDSs) is examined. Performance specifications, the current performance of operational systems, fence and sensor types, and other factors affecting sensor performance are discussed, along with the implications of fence sensitivity variations and the measurement of these variations. The on-site optimization method (OSOM) is the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Custody systems for improved house arrest and prison security

    Publication Year: 1992, Page(s):81 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The Virtual Custody electronic monitoring systems offer features beyond those of current electronic monitoring systems. Virtual Custody was designed to address concerns associated with house arrest, and to offer significant benefits for use in prisons. Systems have been developed for cooperative self-reporting and for automatic monitoring. The cooperative Virtual Custody system replaces current el... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A penetrationless secure container

    Publication Year: 1992, Page(s):238 - 243
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Secure containers are needed to protect the communication link between a data-gathering instrument and the device used to authenticate that instrument's reports. A container formed by a continuous, penetration-free glass envelope provides a robust solution. The author explores the problems involved with providing power and communications for such a penetrationless secure container. The design uses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless spread spectrum sensor element signaling

    Publication Year: 1992, Page(s):141 - 145
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    As a result of high installation costs and the desire to optimally place sensor elements without the limitation of wire access, there is a growing need for a reliable, low-cost wireless signaling method. It is now possible to make a 1/10 W spread-spectrum, 912 MHz carrier transmitter. This discussion is limited to the FCC's Part 15 treatment of spread spectrum. Spread-spectrum reliability, jamming... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new similarity measurement method for fuzzy-attribute graph matching and its application to handwritten character recognition

    Publication Year: 1992, Page(s):46 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    For problems of pattern recognition and classification procedures, the concept of fuzziness is usually applied when patterns are mapped into the feature space. To handle such fuzzy concepts, the authors extend the attributed graph to the fuzzy-attribute graph (FAG) by making the attributes fuzzy. The attributed graph is widely used as a straightforward representation of structural patterns. The ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HABSI: an expert system to reconstruct crime scene based on bloodstain interpretations

    Publication Year: 1992, Page(s):74 - 80
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The authors present a new way to reconstruct a crime scene by using modern technology. They select bloodstain evidence which is based on Mark theory as the approach. Mark theory relates to the gathering, analyzing, and inferencing of physical evidence. The crime scene is reconstructed using the expert system HABSI, which uses a heuristic approach to bloodstain interpretation. EXSYS was used as an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inquiring system for high-resolution image materials

    Publication Year: 1992, Page(s):91 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The National Police Agency of Japan (NPA) developed an inquiring system for high-resolution image materials (ISI) that can handle image information. The author explains the structure and capacity of this system and the effect that can be expected when it is fully implemented. Image information, such as photographs of suspects and the scenes of crimes, is filed and utilized at respective prefectura... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of seismic detection system performance using the human heartbeat

    Publication Year: 1992, Page(s):244 - 251
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The need for calibration and validation of seismic measurements sometimes arises during data acquisition at field locations. The authors deal with the need for verification of signature acquisition system performance resulting from anomalous data acquired during seismic testing. A series of seismic tests was planned and initiated to acquire intruder and false/nuisance alarm signatures required for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-core hackers a clear and present danger

    Publication Year: 1992, Page(s):133 - 140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    The authors address the increase in security risks that telecommunications carriers and service providers have been experiencing. They present, in general terms, the methods that are used by intruders to gain unauthorized access to telephone company resources. An excerpt from a hacker's bulletin board illustrates several types of damage that an intruder can inflict. The reasons for this increased ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on the category of criminal signs

    Publication Year: 1992, Page(s):103 - 107
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The concept of a criminal sign means a sign of suspicion with a concrete basis related to the particular individual. An attempt is made to collect possible crime signs through the police officer's perception and to categorize them. The procedures of this study include: collecting possible criminal signs through police officers' reports and the design of a questionnaire: collecting data on the perc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of individuals by means of facial thermography

    Publication Year: 1992, Page(s):120 - 125
    Cited by:  Papers (9)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    It was demonstrated that facial thermograms are unique to the individual, and methods and systems for positive identification were developed. This capability is inherently more accurate and more robust over varying lighting and environment conditions than is the use of video images. The technology involves the use of biosensor data for uniquely and automatically identifying individuals. Due to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New solutions to perimeter protection and point access control

    Publication Year: 1992, Page(s):41 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced scientific detection of deception-ERP augmented polygraphy

    Publication Year: 1992, Page(s):72 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    The authors address the current state of polygraphy and the application of the brain's field potential data, specifically event-related potentials (ERPs), and pupillometrics to advanced scientific detection of deception and polygraphy. In the scientific detection of deception, the evoked potential of interest is commonly referred to as the P300. One means of assessing the efficacy of ERP augmented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Status of the video imaging system for detection, tracking, and assessment (VISDTA) scanning sensor program

    Publication Year: 1992, Page(s):194 - 196
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    The video imaging system for detection, tracking, and assessment (VISDTA) is an automatic scanning, wide area, surveillance sensor with built-in change detection and video motion detection features. Recent modifications and performance improvements are described in terms of environmental and mechanical ruggedness, and detection probability. In addition, a VISDTA expansion is described that could c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security mechanisms for distributed information system in Industrial Technology Research Institute (ITRI)

    Publication Year: 1992, Page(s):158 - 163
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    A security mechanism based upon a public key cryptosystem and signature scheme, used in the ITRI distributed information system is proposed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and sensitive information integrity guarantees. An access control scheme for a distributed information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensitivity enhancement in interferometric fiber sensors by using the optical Kerr effect

    Publication Year: 1992, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Sensitivity enhancement in fiber interferometric sensors was achieved by connecting a balanced nonlinear Mach-Zehnder fiber interferometer to the sensing interferometer. Taking advantage of the phase-sensitive nature of this nonlinear interferometer, the improvement of the sensitivity for each output of the interferometer was found to be proportional to the nonlinear phase shift due to the optical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gravitational field sensor for prediction of big seismic waves

    Publication Year: 1992, Page(s):218 - 224
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The authors outline the gravitational field sensor for prediction of large seismic waves. They studied the turbulence of a Newtonian gravitational field due to large seismic waves and the detection of the turbulent field by an interferometric gravitational wave antenna. The cause of the turbulent field is the variation of the mass density in the ground by the waves. The warning system using the an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High security tagging system for evidence marking and verification

    Publication Year: 1992, Page(s):86 - 90
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Optically encoded tags can provide highly secure, inexpensive assistance in verifying the identity and integrity of items including documents, containers, and parcels. An optically encoded tag system comprises means for producing the tag, means for affixing the tag, means for archiving the tag for future comparison, security provisions to restrict access to the archives, means for verifying the ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High confidence personal identification by rapid video analysis of iris texture

    Publication Year: 1992, Page(s):50 - 60
    Cited by:  Papers (16)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    The concept of using the iris of the eye as a kind of optical fingerprint for personal identification is discussed. By isolating and encoding the visible texture of the iris from a video image into a multiscale sequence of quadrature 2D Gabor coefficients, a 256-byte iris code has been developed that uniquely identifies any individual, with astronomic confidence levels. Following image analysis, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.