By Topic

Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on

Date 14-16 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 101
  • Design of SPS model using mobile agent system

    Publication Year: 2003, Page(s):38 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB) | HTML iconHTML

    This research presents the development of a certain highly efficient model for group security policy negotiation using mobile agents in the IPSec environment. The conventional IP security systems have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligence security home network

    Publication Year: 2003, Page(s):30 - 37
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1593 KB) | HTML iconHTML

    The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Progressive watermarking techniques with genetic algorithms

    Publication Year: 2003, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1439 KB) | HTML iconHTML

    An innovative watermarking scheme based on progressive transmission with genetic algorithms (GA) is proposed. We implement the watermarking embedding and extraction system in the discrete cosine transform (DCT) domain, and apply the JPEG spectral selection mode for progressive transmission. By employing GA with a proper fitness function into the watermarking system, both the watermark imperceptibi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended object-oriented security model for high secure office environments

    Publication Year: 2003, Page(s):57 - 61
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1359 KB) | HTML iconHTML

    In [S. Castano et al. (1992)], an object-oriented security model was proposed to protect documents in office environments. It defined role as a set of actions and responsibilities played by users to identify the operations that they can execute on documents. This scheme can make representation and realization easy while using modem object-oriented programming languages to model an information syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D visualization to support airport security operations

    Publication Year: 2003, Page(s):298 - 304
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1607 KB) | HTML iconHTML

    In the summer of 2000, the National Safe Skies Alliance awarded a project to the Applied Visualization Center at the University of Tennessee to develop a 3D computer tool to assist the US Federal Aviation Administration security group, now the Transportation Security Administration, in evaluating new equipment and procedures to improve airport checkpoint security. At the time of this writing, nume... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A research of information and communication security forensic mechanism in Taiwan

    Publication Year: 2003, Page(s):23 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1418 KB) | HTML iconHTML

    With the rapid development of network technology, Internet security information and communication security, crime is becoming a serious problem. According to the data, those who commit crimes in cybersociety are rarely found guilty. This is because there is no professional information or communication security forensic organization. In addition, the legal procedures to deal with digital evidence a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facial image database for law enforcement application: an implementation

    Publication Year: 2003, Page(s):285 - 289
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1396 KB) | HTML iconHTML

    This paper described an automatic facial feature extraction method from mug shots. Since most facial features locate at specific regions on a facial image, the region detection and partitioning techniques were used to segment and extract facial features. Heuristics were developed to detect the top, bottom, left and right margins of each feature region from the histograms of the vertical and horizo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust image watermarking based on hybrid transformation

    Publication Year: 2003, Page(s):394 - 399
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1449 KB) | HTML iconHTML

    Watermarking techniques are mainly used for protecting intellectual property right. The transparency and robustness of watermarks are critical. However, they are often conflicting. We propose a new image watermarking scheme, which incorporates two kinds of transformation technologies to provide the better compromises between the visual quality and the robustness for resisting various signal proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure 77GHz Vivaldi antenna for millimeter wave communication

    Publication Year: 2003, Page(s):100 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1400 KB) | HTML iconHTML

    The antenna was fed by a unilateral fin line and then transmitted to its taper slotline radiator. The design and fabrication of the substrate containing the fin line transmission section and tapered slot radiating section were carried out The waveguides were also designed to house the fin line section of the substrate. Simulations were carried out using XFDTD software to determine the radiating ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proxy certificates-based digital fingerprinting scheme for mobile communication

    Publication Year: 2003, Page(s):587 - 594
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1552 KB) | HTML iconHTML

    Protection of intellectual property in digital contents has been a subject of research for many years and led to the development of various techniques. Digital fingerprinting scheme is an important class of these techniques. The goal of fingerprinting scheme is to deter people from illegally redistributing digital data. But, the problem of known anonymous fingerprinting schemes is that, being base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient method for security image data compression

    Publication Year: 2003, Page(s):456 - 459
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1467 KB) | HTML iconHTML

    We devote to the further development of our tests in the field of image compression for security purposes. This phase has been oriented to the application of Karhunen-Loeve Transform (KLT) for efficient coding of car plate images. The car plate is a special class of images and the KLT is well matched to this purpose. A set of car plates was recorded and the suboptimal coding base was generated. Ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrate the structure of negotiation certification of set and the intelligent mobile agent

    Publication Year: 2003, Page(s):237 - 244
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1518 KB) | HTML iconHTML

    The Internet with far-reaching characteristic and various network technologies become modern medium for information to spread and market. E-Commerce promoted the convenience of consumption and competitive advantage of business, and gradually affected national competition ability. The key factors of trade on the network are trust and safety. The internal electronic signature has already passed, so ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • External second gate Fourier transform ion mobility spectrometry: parametric optimization for detection of weapons of mass destruction

    Publication Year: 2003, Page(s):515 - 522
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1554 KB) | HTML iconHTML

    Ion mobility spectrometry (IMS) is recognized as one of the most sensitive and robust techniques for the detection of narcotics, explosives and chemical warfare agents. Increasing threat of terrorist attacks, the proliferation of narcotics, Chemical Weapons Convention treaty verification as well as humanitarian de-mining efforts have mandated that equal importance be placed on the analysis time as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of PKI interoperability in Taiwan

    Publication Year: 2003, Page(s):405 - 409
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1434 KB) | HTML iconHTML

    Taiwan established its first Certification Authority, namely, Government Certification Authority (GCA), in 1998 which launched the electronic certification services in Taiwan. From year 2001 to 2004, Government Public Key Infrastructure (GPKI) is being established according to the planning set forth in E-Government Program with the aim of strengthening electronic government infrastructure and esta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IntelliFIBER™: fiber optic fence sensor developments

    Publication Year: 2003, Page(s):17 - 22
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1581 KB) | HTML iconHTML

    Many different detection technologies have been employed for perimeter detection to sensitize a barrier, including for example, strain-sensing taut wire sensors, electric fences, electrostatic sensors, and various linear "microphonic" cable-sensing devices. These outdoor perimeter fence detection sensors must reliably detect intruders attempting to cut or climb the barrier, while ignoring the effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion tracking of multi-objects for access surveillance based on the panoramic imaging system

    Publication Year: 2003, Page(s):208 - 215
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1542 KB) | HTML iconHTML

    Panoramic images, especially focused images, have many applications in surveillance, robot navigation, art, etc. Described here is a CCD camera with a hyperboloidal mirror for acquiring panoramic focused images. This optical imaging system can greatly simplify the process of acquiring an omni-directional view in real time, thereby presenting panoramic still images or offering a panoramic full moti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic biometric identification system by hand geometry

    Publication Year: 2003, Page(s):281 - 284
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1433 KB) | HTML iconHTML

    We propose a novel and simple method to recognize individuals based on their hand-palm geometry. A compact set of parameters has been extracted and reduced using different transformations. Two classification methods have been implemented: neural networks (NN) based on the commonly used multilayer perceptron (MLP) and the most nearby neighbor classifier (KNN). Results show that not complex algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital watermarking using multiresolution wavelet transform

    Publication Year: 2003, Page(s):370 - 377
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1463 KB) | HTML iconHTML

    A novel technique for digital watermarking of still image based on the concept of wavelet transform is proposed. This algorithm takes advantages of multiresolution signal decomposition to obtain the frequency components of the image. Unlike most previous tree-based wavelet methods that embed a watermark into multiple subbands to enhance the robustness, the proposed method embeds a visually recogni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Millimeter wave control switch for secure giga-scale system

    Publication Year: 2003, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1389 KB) | HTML iconHTML

    A driver-enhanced single pole double-throw (SPDT) switch was designed and implemented for secured giga-scale system. The design were simulated on advanced design system (ADS) package and implemented on RT-duriod 5880 with 10 mils thick dielectric substrate in a 3-port WR28 waveguide, to validate the design for broadband application in Ka-band of digital millimeter waves. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firearm dataloggers

    Publication Year: 2003, Page(s):354 - 357
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1439 KB) | HTML iconHTML

    We discuss the development of a versatile electronic data capture system. This system is unobtrusively fitted to the lethal or less-than-lethal firearms carried by armed police, security forces etc in the course of their duties. The system has the potential to increase accountability and the effectiveness of post incident evaluation by capturing secure, legally submitable digital evidence. This ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A host-based real-time intrusion detection system with data mining and forensic techniques

    Publication Year: 2003, Page(s):580 - 586
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1524 KB) | HTML iconHTML

    Host-based detective methods play an important role in developing an intrusion detection system (IDS). One of the major concerns of the development is its latency delay. Host-based IDS systems inspecting log files provided by operating systems or applications need more time to analyze log content. It demands a large number of computer resources, such as CPU time and memory. Besides, there still a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New development in portable sensor allows low-cost components to be left behind (disposable)

    Publication Year: 2003, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1500 KB) | HTML iconHTML

    Tactical deployment of out-of-doors intrusion detection system sensors can be hazardous to law-enforcement personnel. There is a growing demand for deployment to be done secretly. Personnel are obliged to minimize their exposure to hazards and maximize mission effectiveness. Sensor hardware must be exceptionally low-cost in order to be "left behind", or considered disposable. Recent developments i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure identity authentication and logical access control for airport information systems

    Publication Year: 2003, Page(s):314 - 320
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1500 KB) | HTML iconHTML

    We propose identity authentication by using a contactless smart card (CSC) with multiple biometric features for secure logical access to improve airport security. Proper identification of a cardholder with reliable data securely stored in a CSC provides a means to validate and audit access into a computer or communications network. We recommend the CSC because it facilitates fast, secure physical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation and improvement of speaker recognition over GSM environment

    Publication Year: 2003, Page(s):440 - 443
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1368 KB) | HTML iconHTML

    Performance evaluation and improvement of speaker recognition over real GSM environment are investigated. A text-independent speaker recognition system based on Gaussian mixture model (GMM) is implemented for performance evaluation. To match the real-world conditions, an NTUT-LAB416 speech corpus is collected over GSM telecommunication network from in-car environment of various driving speeds. An ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of smartcard-based secure e-mail communication

    Publication Year: 2003, Page(s):225 - 231
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1549 KB) | HTML iconHTML

    E-mail system is by far the most widely used application in the Internet. However, mainly due to the lack of communication security, sensitive messages could not transmit securely over open networks using off-the-shell e-mail systems. A new secure e-mail system is proposed and implemented to extend the popular Microsoft Outlook e-mail software with flexible security services and to combine these s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.