By Topic

Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303)

5-7 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 71
  • Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):19 - 20
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Identification of individuals using fingerprints by linguistic descriptions fuzzy comparison

    Publication Year: 1999, Page(s):227 - 232
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    One of the most reliable known methods of personal identification (besides DNA recognition) is the use of fingerprints of an individual. In the present paper it is sought to introduce a new method of personal identification through fingerprints by comparing two fingerprints (one known and the other unknown) by means of linguistic elements fuzzy comparison. For each fingerprint a linguistic express... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech variability in automatic speaker recognition systems for forensic purposes

    Publication Year: 1999, Page(s):327 - 331
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    It is becoming increasingly usual to find audio physical traces (telephone calls, recorded tapes, security surveillance recordings, etc.) while committing crimes, forcing the speech research community to find reliable methods that allow the association of an unknown voice sample with a determined person identity. Regarding speech variability in forensic approaches, some of these variability source... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security communication in headrace tunnel using beam transmission of laser lights

    Publication Year: 1999, Page(s):423 - 427
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    We describe an experimental study of security communication in a headrace tunnel using atmospheric beam transmission of laser light. The purpose of the study is to experimentally prove the potential of laser beam communication for security in headrace tunnels View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • O'Hare International Airport's air cargo security access system

    Publication Year: 1999, Page(s):210 - 226
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    The increasing emphasis that has been placed over the last few years on building a global economy and creating seamless political boundaries requires governments to augment all aspects of aviation security. This is becoming increasingly important in the air cargo sector of aviation-given that truck-to-air cargo movements are growing at a rate of nearly ten per cent per year. The concern is exacerb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New microwave sensors for intrusion detection systems

    Publication Year: 1999, Page(s):49 - 53
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Intrusion detection systems based on the utilisation of continuous wave (CW) radar and Doppler effect have several advantages over electrooptic sensors, namely, their ability to work in dark or smoky spaces, and under adverse weather conditions. However, they pose some practical problems such as: their inability to provide any range measure, nor to distinguish between different targets; high sensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new public-key cryptosystem family based on feedback shift registers

    Publication Year: 1999, Page(s):318 - 326
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    Nearly all public-key cryptographic algorithms are based on hard problems of number theory, which are related to each other. That is to say, if one of these algorithms is broken, the other's security will be threatened. This work presents a new public-key ciphering mechanism that isn't based on any of the classic cryptographical problems. The method consists of permuting the elements of the field ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Campus security technology and university crime: a comparative investigation and analysis

    Publication Year: 1999, Page(s):391 - 397
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Violent crimes and property crimes at our nation's colleges and universities are alarming. Collegian studies estimate that between 25 percent to 35 percent of all college-aged women are sexually assaulted during their four years of undergraduate studies. Aggravated assaults, robberies, burglaries, theft, arson and vandalism are common problems occurring on campuses across the nation. Many college ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applied cryptography in Java

    Publication Year: 1999, Page(s):345 - 348
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    This paper unveils two facts that are tightly linked: firstly, Internet users require increasingly effective security policies, since there are plenty of scenarios where the introduction of security elements is highly recommended (e.g. integrity and confidentiality requirements in the everyday use of interpersonal communications by e-mail). Secondly, checking the suitability and performance of an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced method for improvement of obscure video image

    Publication Year: 1999, Page(s):440 - 445
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    There are a lot of video cameras equipped in service windows, cash dispenser corners, in banks or all-night stores for monitoring burglars. Therefore, in case a robbery happens there, the image taken by a monitoring camera often provides important information to the criminal investigation. However, for various reasons such as quick motion of objects, small images and too much or too little brightn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reflections on the incorporation of modern technology in the refurbishment of a Victorian prison

    Publication Year: 1999, Page(s):412 - 422
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    The paper reports the experience of Barlinnie prison in Glasgow in through-designing a new pedestrian entrance, visit area and staff facilities block with the design intention of maximising the benefit achievable through the use of modern technology and improved staff practices. In reporting the overall success of the project it describes the variable performance of some elements of the overall de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User performance testing of the Perimitrax buried cable sensor

    Publication Year: 1999, Page(s):112 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Beginning in the 1970's buried cable sensors have been used extensively to provide perimeter intrusion detection for a wide range of military, government and industrial facilities around the world. In 1998, the U.S. Army Engineer Research and Development Center (USAERDC), in partnership with Senstar-Stellar Corporation, conducted testing of the Perimitrax buried cable sensor. Perimitrax is a new p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric identification system based on keyboard filtering

    Publication Year: 1999, Page(s):203 - 209
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    We have revised several authentication systems based on biometric technology to resume advantages and disadvantages. Because pure hardware biometric systems of user authentication have low rate on results over computational and economic cost, alternate biometric methods of low computational cost based on software development, are also being evaluated. We have developed a first prototype of a softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic CCTV surveillance-towards the VIRTUAL GUARD

    Publication Year: 1999, Page(s):42 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The VIRTUAL GUARD is a general-purpose computer-based CCTV surveillance system for detecting potential criminal activity in public areas. The system monitors all activity in the surveillance area, the vast majority of which is people innocently going about their normal business. It will alarm when the observed activities of particular pedestrians and vehicles match any of the pre-defined suspiciou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security protocols in the Internet new framework

    Publication Year: 1999, Page(s):311 - 317
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The Internet is one of the most important advances of the last few years. It has provoked a revolution in many areas (research, education, business, communication, etc.). But obviously the foundations of the Internet were not prepared to afford the type and amount of information now being dealt with. This is the main reason that has prompted the IETF (Internet Engineering Task Force) to develop a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signature classification by hidden Markov model

    Publication Year: 1999, Page(s):481 - 484
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    Signature recognition is a relevant area in secure applications referred to as biometric identification. The image of the signature to be recognized (in off-line systems) can be considered as a spatio-temporal signal due to the shapely geometric and sequential character of the pencil drawing. The recognition and classification methods known to us are based on the extraction of geometric parameters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High discrimination of nuisance alarms in a low cost movement videosensing system for remote surveillance of unattended sites

    Publication Year: 1999, Page(s):382 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The on-going improvement of the digital image processing technologies together with the usage of specialised hardware has lead to the development of the system we are now introducing. The system incorporates a videosensor with improved capabilities on nuisance alarm discrimination based on an algorithm which combines both movement detection and object tracking with the aim of providing a wide rang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tutorial on digital watermarking

    Publication Year: 1999, Page(s):286 - 292
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    This paper gives a tutorial on the techniques and reference models used in digital watermarking. Distorsions, attacks and applications are described in some detail. Finally, the need for benchmarking is discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric identification through speaker verification over telephone lines

    Publication Year: 1999, Page(s):238 - 242
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    In this paper, the identity of a remote user is verified through his voice by means of a simple telephone in order to gain access to a specific system or service. We have used state-of-the-art text-independent speaker modeling algorithms, likelihood normalization in the verification process, and channel normalization techniques. Several experiments are presented showing the negative effects of cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel algorithm for number factorization

    Publication Year: 1999, Page(s):339 - 344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    This paper presents a novel algorithm for number factorization, which makes use of some classical calculus theory for real functions. An iterative procedure is constructed that searches for specific features of the image values in a function related with the factorization of the number. Studies of the complexity of the method are being performed and its applicability to very large numbers is being... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology and security services

    Publication Year: 1999, Page(s):432 - 439
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    Are current security requirements the same as they were a few years ago? For reasons which are obvious to all of us who work in this sector, we have to answer no. Not only because they have increased or decreased, but because they are different, because they have been changing as the years have gone by. The objectives which require protection have increased, as have the number of properties and pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multisensorial modular system of monitoring and tracking with information fusion techniques and neural networks

    Publication Year: 1999, Page(s):59 - 66
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1084 KB)

    The article presents a model of a monitoring system with high benefits, based on two complementary sensorial systems (images and acoustics), that allow the information received to fuse, and to prioritize the computational resources towards the zones with considered risks. The application uses components developed completely in the Multimedia Technology Group of the ETSI of Telecommunication in Val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the development of a digital video motion detection test set SAND99-0410C

    Publication Year: 1999, Page(s):405 - 411
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    We describe the current effort to develop a standardized data set, or suite of digital video sequences, that can be used for test and evaluation of digital video motion detectors (VMDs) for exterior applications. We have drawn from an extensive video database of typical application scenarios to assemble a comprehensive data set. These data, some existing for many years on analog videotape, have be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An user authentication infrastructure for extranet applications

    Publication Year: 1999, Page(s):354 - 362
    Cited by:  Papers (1)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    An extranet is used to connect businesses with their suppliers, customers or other businesses that share common goals in a way that automates their administrative interactions using Internet technology. The security of the communications over Internet is considered an essential feature. To guarantee secure operation the aid of some user authentication infrastructure is needed. This paper introduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.