The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MPEG media have been widely adopted and is very successful in promoting interoperable services that deliver video to consumers on a range of devices. However, media consumption is going beyond the mere playback of a media asset and is geared towards a richer user experience that relies on rich metadata and content description. This paper proposes a technique for extracting and analysing metadata from...
Security is very important in present day life. In this computer-networked world, most of the activities are computer based, and the data transactions arc protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords might be related to an individual that can lead to dictionary attacks. Indeed, remembering...
The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach...
The biometric encryption system is a significant addition in the areas of privacy, security and convenience among its users. The intent of this research is to propose an RSA based biometric encryption system which can be realized on field programmable gate arrays (FPGAs) using hardware-software co-design methods. Due to the high number of hackers that stand to profit from sub-par security methods,...
The purpose of this paper is to find whether there is any evidence of correlation between fingerprint quality and the factors of skin texture, keratin level, skin pigmentation, skin color, skin temperature, elasticity, and finger minutiae. In simpler terms, the goal was to see if and which finger characteristics affected the readability of the fingerprint. To achieve this goal, about 8000 random samples...
This paper provides an efficient framework for recognizing human interactions based on deep learning based architecture. The Harris corner points and the histogram form the feature vector of the spatiotemporal volume. The feature vector extraction is restricted to the region of interaction. A stacked autoencoder configuration is embedded in the deep learning framework used for classification. The...
An optical flow based approach for recognizing human actions and human-human interactions in video sequences has been addressed in this paper. We propose a local descriptor built by optical flow vectors along the edges of the action performer(s). By using the proposed feature descriptor with multi-class SVM classifier, recognition rates as high as 95.69% and 94.62% have been achieved for Weizmann...
The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption...
This work explores the human ability to recognize the authenticity of signatures. We use crowdsourcing to analyze the different factors affecting the performance of humans without Forensic Document Examiner experience. We present different experiments according to different scenarios in which laymen, people without Forensic Document Examiner experience, provide similarity measures related with the...
This paper directly follows on from prior research into DBS, the properties of DBS, security, its resistance to forgery and its stability. Experiments under stress situations, conducted during a survival course at the University of Defence of the Czech Republic, are described herein. It was shown that a handwritten signature developed by way of long-term practice and the reinforcement of a dynamic...
This paper describes a method for integrating security system data with systems engineering principles to increase the effectiveness and efficiency of security systems being designed and implemented. It defines various levels of security which require different methods of integrating security systems with operational activities to provide effective security while balancing risk. It also proposes that...
Current biometric modalities include fingerprint, palm, voice, face, gate, iris and even DNA recognition. Another known biometric technique involves subject identification using retinal Mood vasculature pattern matching. Regardless of the modality, however, there is an inherent requirement for liveness detection so as to make the acquisition system less susceptible to deception. One possible solution...
A fiber optic interrogator has been developed with software (SAV) that will detect people walking, vehicles and digging across a 100m swath around a buried fiber optic cable. These activities cause minute pressure waves that transmit through the ground to the buried fiber. The pressure waves then hit the fiber causing minute changes in the fiber index. Rayleigh backscattering is extremely sensitive...
The complexity of security systems at airports within the United States — indeed, worldwide — has grown significantly over the years in response to increasing threats and regulatory developments. Initially, each airport developed its own security system without recourse to unified standards. The result was a mixed bag of proprietary systems which were typically over budget, poorly integrated, did...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.