Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology

24-24 Oct. 2002

Filter Results

Displaying Results 1 - 25 of 38
  • Proceedings IEEE 36th Annual 2002 International Carnahan Conference on Security Technology (Cat. No.02CH37348)

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Critical asset protection, perimeter monitoring and threat detection using automated video surveillance - a technology overview with case studies

    Publication Year: 2002
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB)

    Summary form only given. The appeal of automated real-time surveillance is obvious - maximizing efficiency and effectiveness of security personnel and resources while increasing the probability of preventing a serious security breach. The appeal of using video-based solutions includes many considerations. Video is intuitive, readily interpreted and provides immediately actionable intelligence abou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First response to terrorist bombings

    Publication Year: 2002, Page(s):88 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    This paper highlights considerations for a successful response to an incident involving a terrorist bombing. First, it describes the characteristics of bombing as a tactic that make the threat of a bombing highly relevant in a world where the emphasis has shifted to other weapons of mass destruction, such as chemical, biological, and nuclear weapons. It then identifies the roles and responsibiliti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric identification system by lip shape

    Publication Year: 2002, Page(s):39 - 42
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Biometrics systems based on lip shape recognition are of great interest, but have received little attention in the scientific literature. This is perhaps due to the belief that they have little discriminative power. However, a careful study shows that the difference between lip outlines is greater than that between shapes at different lip images of the same person. So, biometric identification by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid MicroTrack leaky cable sensor

    Publication Year: 2002, Page(s):191 - 197
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    Intrepid MicroTrack is the first leaky coaxial cable sensor to utilize FM CW radar techniques to detect and locate intruders. The first leaky coaxial cable sensor, introduced at the 1976 Carnahan Conference in Lexington, Kentucky, used pulse radar techniques to detect and locate intruders. Since then, there have been numerous papers on CW leaky cable sensors that detect, but do not locate intruder... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiscale analysis for iris biometrics

    Publication Year: 2002, Page(s):35 - 38
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    In this work, a new biometric identification approach based on the human iris pattern is proposed. The main idea of this technique is to represent features of the iris by multiscale analysis of the corresponding discrete dyadic wavelet transform zero-crossing representation. In this study we consider the iris signature as the mean of the gray values of different contours of virtual circles in a de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV security architecture

    Publication Year: 2002, Page(s):209 - 215
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation of weather and terrain effects on intrusion detection

    Publication Year: 2002, Page(s):179 - 190
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    Two types of decision aids for incorporating weather and terrain effects in IDS-based security decisions are presented for eight classes of exterior IDSs: passive [thermal] infrared, fence-mounted, microwave radar, taut wire, near-infrared beambreak, ground motion, ported. coaxial cable, and video motion detection. One decision aid is a diagram of weather and terrain influences; it indicates inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid MicroPoint system - European fence experience

    Publication Year: 2002, Page(s):80 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    When Southwest Microwave introduced the Intrepid MicroPoint fence disturbance sensor at the 1994 Carnahan Conference, it was primarily directed at chain link fencing. While the vast majority of fencing in North America is of the chain link variety this is certainly not true in Europe where a plethora of fence types are in use. Steel Palisade fencing, the most common type of fence installed in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An infrastructure vulnerability assessment methodology for metropolitan areas

    Publication Year: 2002, Page(s):29 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    This paper highlights an infrastructure assessment methodology that can be applied to a metropolitan area or geographical region. The methodology considers and accommodates infrastructure component significance, destructive events (both malevolent acts and natural disasters), and the consequences of a destructive event. The methodology is applied in a logical, sequenced fashion and uses algorithms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A first step towards automatic hoax detection

    Publication Year: 2002, Page(s):102 - 114
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Recent hoaxes, specially virus-related hoaxes, have shown a previously unknown degree of danger. Although current policies against hoaxes are certainly helpful, their ability for dealing with them is very limited, especially against some of the new and more imaginative types of hoaxes outlined in this article. The expansion of the Internet, and the corresponding boost in hoax evolution, have incre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMETHYST: automatic alarm assessment

    Publication Year: 2002, Page(s):202 - 208
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The aim of the AMETHYST (AutoMatic Event auTHentication sYSTem) project is to encourage the development of a high-performance, perimeter-alarm verification system that, using computer-vision, automatically rejects false alarms. AMETHYST will pass to an operator only those alarms that are caused by an intruder. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital video recorder selection for a casino

    Publication Year: 2002, Page(s):223 - 227
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Most casino's CCTV systems still use analog video tape recording but Surveillance Managers within these facilities have to consider the move to digital. The reasons for using digital technology are now quite well understood; better image quality, system flexibility, instant access to images and improved management with no tapes to change and store. Treasure Island spent one and a half years resear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving security in information technology using cryptographic hardware modules

    Publication Year: 2002, Page(s):120 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc. But many other security holes have appeared in this kind of applications, making the improvements ach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migration of Internet security protocols to the IPSEC framework

    Publication Year: 2002, Page(s):134 - 143
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the future Internet. Efforts made by the IETF have produced the first Internet Protocol version that includes security services, this framework is called IPSEC and it is a flexible solution designed taking into account the heterogeneity of the Internet. In fact the IPSEC mec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart card technology with case studies

    Publication Year: 2002, Page(s):158 - 159
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Smart card technology not only enables secure access to logical and physical applications but also provides inherent value in the areas of security, authentication and multi-application capabilities for a variety of industries in the areas of transportation, banking, telecommunications and public sector. The impact of society on the use of security systems and technology enabled with smart card te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Field testing of outdoor intrusion detection sensors

    Publication Year: 2002, Page(s):171 - 178
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    Sensors for outdoor perimeter detection must reliably detect intruders under all possible intrusion threat scenarios while rejecting environmental stimuli including nearby human activity. For the outdoors a wide variety of detection principles are possible in order to provide a measurable signal of an intruder's presence. Generally algorithms implemented in firmware are employed to differentiate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Man portable sensor technology for use in dynamic environments with multiple areas for concealment

    Publication Year: 2002, Page(s):75 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Very large structures characterized by free public access, high traffic volume and 24 hour operation present unique challenges to security providers. Airports and Casinos are among the many types of facilities that embody these characteristics. In addition to providing physical security and access control for occupants and visitors, security providers must also account for secure conveyance, handl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Flow: a totally integrated transportation security system

    Publication Year: 2002, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Secure Flow is a holistic, integrated methodology that addresses all security vectors (paths that a terrorist may take to introduce a threat object into the transportation system), allowing people, baggage, and cargo to move via various transportation systems in a secure fashion, while maintaining an "ease of access" to these diverse systems through innovative technology, procedures, and training.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • September 11, 2001 - response to the Pentagon

    Publication Year: 2002, Page(s):94 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (534 KB) | HTML iconHTML

    This paper is a case study summarizing the response to the Pentagon in Arlington, Virginia, following the attacks of September 11, 2001. It describes the building, the attack itself, and then characterizes some of the key milestones in the response. At also identifies a number of lessons learned from the response that are applicable to other similar responses to incidents involving weapons of mass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical morphology approaches for fingerprint thinning

    Publication Year: 2002, Page(s):43 - 45
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Our paper describes the design and implementation of a fingerprint thinning algorithm by means of morphological image processing operations, in order to improve the minutiae map involved. The final goal is to incorporate the thinning algorithm proposed with the minutiae extraction algorithm for fingerprint identification systems, developed and presented at IEEE ICCST'01. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some remarks on very high-rate image compression and its impact on security image data subjective evaluation

    Publication Year: 2002, Page(s):198 - 201
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    The paper deals with selected problems of image transmission through extremely narrow communication channels using very high compression rates. Such conditions are very common in the security technology field. The same problem relates to image retrieval systems when limited storage capacity is available. As an example of a typical security scenario, a seven-segment display was chosen and compresse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linescan imaging of ballistics projectile markings for identification

    Publication Year: 2002, Page(s):216 - 222
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    The identification of firearms from forensic ballistics specimens is an exacting and intensive activity performed by specialists with extensive experience. The introduction of imaging technology to assist the identification process of firearms has enhanced the ability of forensic ballisticians to conduct analyses of these specimens for identification. The characteristic markings on the cartridge a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the use of trusted objects to enforce isolation between processes and data

    Publication Year: 2002, Page(s):115 - 119
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    This paper highlights the problem of run-time execution correctness of high-consequence applications in conventional Von Neumann computer architectures. It proposes an approach, trusted objects, in which the application program and data are cryptographically encapsulated in their own environment. The remainder of the paper is organized as follows: after presenting a description of trusted objects,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.