The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses covert testing data and key human factors. First, different reasons why airport security screeners sometimes fail to detect threats when covert tests are conducted at airports are discussed. Key human factors are identified and analyzed with regard to covert test results. It is explained that pre-employment selection and training are indispensable prerequisites for good operational...
This document concentrates on how aviation security can be largely improved by selecting the right people for the x-ray screening task. X-ray images dispose of a different colour range, single objects superimpose each other independently of whether they are in front or behind of each other, and the single objects look very different from what they look like under natural light. Therefore, individual...
In March 2009, QinetiQ conducted an Early Human Factors Analysis (EHFA) on behalf of the UK Department for Transport (DfT) for the implementation of body scanning technology in the airport security screening context. EHFA is a well-established technique, used extensively as part of UK Ministry of Defence (MoD) acquisition. This was the first time EHFA was used in the security domain. The aim of EHFA...
Hand Biometric Recognition not only gathers a good performance in identifying individuals but also it is known to be a non-invasive biometric technique. Furthermore, there exist new trends towards mobile implementation developments, focusing on embedding current biometric systems in mobile devices. This paper aims to implement hand biometric recognition with mobile devices. This approach involves...
Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping...
Developing and evaluating exterior physical security system alternatives can be a daunting task. Once alternatives are identified, they must be evaluated not to only the set of threats they provide against, but also to other factors such as cost, performance, schedule and environmental impact. This article describes a systematic approach of applying decision analysis tools and techniques to develop,...
The airport security information management system (ASIMS) has been playing very important role in preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database...
The Imagery Library for Intelligent Detection Systems (iLids) is the UK Government's standard for Video Based Detection Systems (VBDS). The first four iLids scenarios were released in November 2006 and annual evaluations for these four scenarios began in 2007. The Home Office Scientific Development Branch (HOSDB), in partnership with the Centre for the Protection of National Infrastructure (CPNI),...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
In this paper, we propose an UML-based generic format set of intrusion signatures for heterogeneous intrusion detecting systems (IDSs) via analyzing signature formats of three popular IDS products. We also propose an attack signature exchange model of heterogeneous IDSs. With this model, an attack signature generated by one IDS could be adopted by different IDSs easily. The proposed XML-based generic...
The visual inspection of x-ray images of luggage items at airports is a challenging task, where detection rates suffer when threat item complexity increases. The relationship between threat-item types, aspects of image difficulty, and decision time are explored using a combination of Drury's Two-Component Model and Signal Detection Theory. 67 professional screeners completed a 2048-image battery that...
The National Police Agency has contributed to the construction, maintenance, and management of its own nationwide info-communications network composed of a microwave radio system operated by the NPA, dedicated lines leased from major carriers and so on. Due to overhanging crises of natural disasters and threats posed by people of malicious intent to the confidential police network, the NPA is urgently...
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test,...
Biometrics is more and more used in many security applications. This fact has led suppliers and researches to analyze biometric algorithms power and vulnerabilities, as to improve the feasibility of this technology. Nevertheless, as many authors claim, biometric performance does also depend on other factors such as usability and/or user acceptance, which can influence significantly their performance...
The competency of an aviation security screener to detect prohibited items in X-ray images quickly and reliably is important for any airport security system. This paper details the requirements and principles for reliable, valid, and standardized competency assessment as well as different methods that can be applied for this purpose. First, the concepts of reliability, validity and standardization...
To design today's complex networks and computerbased physical protection systems require the application of sound Systems Engineering principles and discipline. This paper provides an introduction to using several Systems Engineering tools to design advanced security systems. Examples are given for specific design tasks, and concepts from the US Department of Defense Architecture Framework are introduced.
A system for parallel face detection, tracking and recognition in real-time video sequences is being developed. The paper describes its particle filtering based face recognition module, which operates on low quality video sequences and utilizes the results of the preceding phases of face detection and tracking. The temporal information from video sequence is utilized for the purpose of object tracking...
Face recognition has been a main object of study, producing robust systems with high reliability. However, these systems face the inconvenience of long processing times which are, in many cases, unwanted. This paper presents a simple face recognition approach from TV video files based on the redundancy of information and a face recognition system used in regular face pictures. More precisely, the...
For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.