The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the physical and cyber we live in worlds converge, public security and forensics increasingly become problems of the information and communication network infrastructure that supports our society. Wireless communications, traditional telephony, the Internet, broadcast communication networks; to name a few, are elements of the networking fabric that weaves together our work, entertainment, health,...
Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems, the transmitter hops in a pseudo-random manner among available frequencies according to a pre-specified algorithm, and the receiver operates accordingly in exact synchronization with the transmitter's hopping pattern. In multiple...
Over the last few decades, a variety of multimedia services have become increasingly popular among various business and personal users. The security of multimedia is an important and challenging issue due to the large data volume of multimedia video and audio. The traditional data encryption framework, which encrypts the entire multimedia files, is not only slow, but also unable to tolerant any uncorrectable...
In this work, improved performance is obtained in human iris matching systems using a Fourier-based description to approximate non-circular pupil boundaries in human eyes. The study also leads an analysis of pupil shape. Excellent fitting is obtained for non-ideal cases such as oblong, irregular, off-centre and dilated pupils, and improved iris normalization is obtained compared to best fit circles...
In this paper we first briefly outline important areas of research in design of through-the-wall imaging and sensing systems from an electromagnetic perspective. Then we review some of our work in the applications of various polarization contrast techniques for detection of changes due to an object motion and/or orientation behind the wall. Finally, we discuss development of a low-profile wideband...
Through the present work a biometric pattern of a speaker's glottal source based on the power spectral density profile of the mucosal wave correlate residual is defined, after estimations derived from the removal of the vocal tract transfer function by inverse filtering. This pattern may be parameterized accordingly to its peak-trough profile, which may be shown to be related to the biomechanics of...
This paper describes a new visual target tracking algorithm which can be applied to intelligent video surveillance systems. We model the target under track as a nonlinear switching dynamic system, which is often referred as a jump Markov process. More specifically, we assume the target operates according to one dynamic model from a finite set of hypothetical models, known as regimes. The probability...
The newly urgent need for extensive, reliable, and fast screening for the identification of explosives stemming from public safety and homeland security concerns has stimulated the search for efficient, quantitative detectors and classifiers. Spectroscopic analysis in the terahertz frequency range is proposed as an efficient and powerful tool for explosive identification. It is shown that spectral...
Nowadays, the automatic recognition of violent or aggressive human activities is an important issue since it improves public safety. Violent acts are characterized by several features that make them distinguishable from other normal behaviors. The most relevant are audio and visual features, commonly used in multi-sensor architectures along with data fusion techniques. In this paper we address a particular...
The concept of ring signature was first introduced by Rivest, Shamir and Tanman in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, he is unable to tell which member actually produced the signature. Ring signature...
Electroencephalograms (EEG) can be used for implicit communication. It allows paralyzed patients to express their thoughts and a person to control devices using only his/her mind. Potential uses of EEGs are to detect individuals with negative intentions such as hijacking or committing crimes and to assist authorities in investigation. However, in such applications signal noise is unavoidable. This...
Intelligent Surveillance Systems is attracting unprecedented attention from research and industry. In this paper, we describe a real-life trial system where various video analytic systems are used to detect events and objects of interests in a mass transport environment. The system configuration and architecture of this system is presented. In addition to implementation and scalability challenges,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.