The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture...
Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing...
In order to improve aviation security, many airports apply Threat Image Projection (TIP) and computer-based X-ray image interpretation training (CBT). One difference between TIP and CBT X-ray images is the algorithm used to merge virtual threat items into X-ray images of passenger bags, resulting in different color nuances. In this study, we tested the influence of merging algorithms on threat object...
The methods developed in the research project ldquoHerbar Digitalrdquo are to help plant taxonomists to master the great amount of material of about 3.5 million dried plants on paper sheets belonging to the Botanic Museum Berlin in Germany. Frequently the collector of the plant is unknown. So a procedure had to be developed in order to determine the writer of the handwriting on the sheet. In the present...
The color TV security cameras are mostly based upon a single-sensor configuration with on-chip CFA (color filter array, Bayer configuration). The impact of different spatial sampling rasters in R G B channels causes an additional image distortion. In the field of security technology the identification task is among very frequent and above-mentioned sampling effect can affect it significantly. There...
Paper deals with utilization of audio source localization in security systems especially dedicated for additional securing of larger objects like squares or military basis for instance. Proposed detection system supposes that intruder makes uniquely determinable noise which can be picked up by microphone array. On the basis of real-time signal analysis from each microphone unit direction to acoustic...
Modern nuclear power plants have been adopting open standards in their digital networks to enhance extensibility and interoperability. This also opens another possibility for an attacker to intrude into the networks. To prevent digital networks from being attacked, the U.S. Nuclear Regulatory Commission provides guidelines regarding achieving high reliability and design quality requirements. However,...
The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development...
In 2005, Pon et al. proposed a generalized signature scheme based on the intractability of solving two well-known cryptographic assumptions, the factorization (FAC) and the discrete logarithm problem (DLP). They claimed that their scheme is still secure, provided that one of these two assumptions is solved. This paper, however, will show that Pon et al.'s scheme is insecure against the universal forgery...
Security Operations Center (SOC) is a unit inside or outside an organization that monitors and deals with information security incidents, on a technical level. In this paper, a trusted security incident information sharing mechanism among SOCs is proposed. The information needed to share among SOCs to prevent incident dispersions usually were just the time of occurrence, origin of attack, consequence,...
The impact of leadership structure and behavior on team or crew performance is well known and has been demonstrated in various studies (see e.g. Guzzo & Dickson, 1996; Zaccaro, Rittmann, & Marks, 2001). However, as far as we know, there is no empirical study available on leadership structures and crew performance in the applied setting of airport security control. This study compares the structure...
Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using location limited channels to transmit secure pairing information that can be verified as originating from the intended...
Currently, the number of users accessing to the network is significantly increasing which requires a tightly control based on the organization policy. Network access control (NAC) is an essential tool focuses on checking and granting permission. In general, NAC requires specific network devices which may not work with the existing devices. In this paper, a Policy-Based Network Access Control framework...
In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors...
Threat Image Projection (TIP) is a software system that is used at airports to project images of threat items amongst the passenger baggage being screened by X-ray. The use of TIP is becoming more widespread and is increasingly being included as part of security regulation. This is due to its purported benefits of improved attention and vigilance, and increased exposure to threat items that are linked...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
This article discusses different ways to enhance human-machine interaction in x-ray screening, especially regarding x-ray image display technology. It represents a summary of the studies conducted as work package 4 of the EU funded VIA project (www.viaproject.eu). First, important theoretical issues regarding the interpretation of x-ray images are discussed. We then explain how to measure x-ray image...
With the advances in the processing capabilities of wireless devices such as smart phones and laptops, the demand for staying connected to the Internet has steadily increased. This demand is strengthened further by the introduction of Internet connectivity within the airplanes. Mobile IP is one of the protocols that have been proposed to support user/network mobility. Mobile IP introduces new entities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.