1,214 Hits in 2.7 sec

Multi-Perspective and Low-Cost Coverage Network Design for Implementing in Campus Network : A Case Study

A. Tongkaw
2019 IOP Conference Series: Materials Science and Engineering  
For the personal perspective (P), the network designer needs to recognize the applications that meet the requirement of the users, whether it is WIFI, VoIP, or CCTV-the authentication software to protect  ...  the network and still maintain system security.  ...  We used RG-SAM+ is a proven comprehensive authentication and accounting system based on RADIUS systems.  ... 
doi:10.1088/1757-899x/551/1/012031 fatcat:lngmu54dg5axtl2rxqekaumtqm

Gait-based person-verification system for forensics

Haruyuki Iwama, Daigo Muramatsu, Yasushi Makihara, Yasushi Yagi
2012 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS)  
The first gait-based person-verification system that can analyze the gait for forensic science is presented.  ...  The gait can provide information for identity determination in forensic science; however, the limitation of gait-based person authentication is that the analysis of gait features is a difficult task for  ...  If there was a gait-based person-authentication system for forensic science, forensic experts could analyze the gait information from CCTV footage themselves, and obtain clues from the information in the  ... 
doi:10.1109/btas.2012.6374565 dblp:conf/btas/IwamaMMY12 fatcat:5cs4jsayi5cdlmjgjinachhj7q

Standardising the Capture and Processing of Custody Images

Shelina Khalid Jilani, Hassan Ugail, Stephen Cole, Andrew Logan
2018 Current Journal of Applied Science and Technology  
Halo is a pioneering system which (1) uses machine vision cameras to capture high quality facial images from 8 planes of view (including CCTV simulated), (2) uses high quality video technology to Jilani  ...  Results based on our preliminary experiments have concluded a 100% facial recognition rate for layer 34 within the VGG-Face model.  ...  Halo system is the only system to capture points, including 3 simulated views.  ... 
doi:10.9734/cjast/2018/44481 fatcat:33avkotlsfbadgmsnra7moeqeu

Privacy Protection Method based on Multi-Object Authentication in Intelligent CCTV Environment
지능형 CCTV 환경에서의 다중객체 인증기반 프라이버시 보호방안

Donghyeok Lee, Namje Park
2019 Journal of KIISE  
The proposed method can increase the recognition rate of objects based on the CCTV-RFID hybrid authentication method, and thus protect the privacy of the image object.  ...  In the intelligent CCTV surveillance environment, personal identity is confirmed based on face recognition. However, the recognition rate of the current face recognition technology is still faulty.  ...  그림 4 CCTV-RFID 기반의 영상접근제어 Fig. 4 CCTV-RFID based access control 든 데이터를 암호화 처리하여 보관하고, 전송 과정에서 종단간 암호화를 적용하는 것이 바람직하며, CCTV 전 송부터 감시/클라우드 서버 및 클라이언트까지 모든 단 위에서 해커의 공격을 방지할 수 있는 구조가 필요하다.  ... 
doi:10.5626/jok.2019.46.2.154 fatcat:ixts6pzwmngpjh5rwxwo2h5ila

Front Matter: Volume 6741

Proceedings of SPIE, Colin Lewis
2007 Optics and Photonics for Counterterrorism and Crime Fighting III  
The last two digits indicate publication order within the volume using a Base 36 numbering system employing both numerals and letters.  ...  SPIE uses a six-digit CID article numbering system in which: The first four digits correspond to the SPIE volume number.  ...  Best, LogicaCMG (United Kingdom) 6741 0H Iris-based authentication system with template protection and renewability [6741-18] C. Ercole, P. Campisi, A.  ... 
doi:10.1117/12.779554 fatcat:p2dllguun5fvlnfytqkxlvocfq

Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain [article]

Alem Fitwi, Yu Chen
2021 arXiv   pre-print
Hence, the traditional video surveillance system (VSS) cannot guarantee the protection of the privacy of individuals caught on CCTV cameras.  ...  At present, more than a billion closed-circuit television (CCTV) cameras are watching the world.  ...  The off-BC storage refers to secure cloud/fog based storage system for the storage of surveillance videos connected to the BC nodes. The BC network ensures authenticity.  ... 
arXiv:2104.05617v1 fatcat:zb42p46ktjhldcmufpatpswyyy

Security architecture for law enforcement agencies

Manuel Urueña, Petr Machník, Marcin Niemiec, Nikolai Stoianov
2014 Multimedia tools and applications  
The proposed LEA security architecture features state-of-the-art technologies, such as encrypted communications at network and application levels, or multifactor authentication based on certificates stored  ...  However, police information and communication technology (ICT) systems have stringent security requirements that may delay the deployment of these new applications, since necessary security measures must  ...  Moreover, multi-factor authentication is supported by storing users' certificates in smart cards.  ... 
doi:10.1007/s11042-014-2386-3 fatcat:tqidpe6inbah3dnthivcmmqn7i

Anti- Forensics: The Tampering of Videos

Fayyad Kazan H
2021 International Journal of Forensic Sciences  
Concerning this issue, tampering a CCTV recording is the impact of extrinsic or intrinsic factors [23] .  ...  Video surveillance systems or what is called CCTV (closed ciruit television) is a system that relies on a strategic placement of cameras for the aim of monitoring , watching and recording a particular  ... 
doi:10.23880/ijfsc-16000219 fatcat:jkv4dk4ls5bvzfvadbvnmu3wzi

Implementation of ARIA Cryptographic Modules based on ARM9 Devices

Okyeon Yi, Seunghwan Yun, Myungseo Park, HaengGwon Song
2014 International Journal of Security and Its Applications  
or Full HD CCTV cameras.  ...  But every cryptographic algorithm of the information requires extra time and memory space for execution in the systems such as PC or smart device.  ...  systems.  ... 
doi:10.14257/ijsia.2014.8.2.25 fatcat:haelvqcoujc5hh7gjj33t47ptm

CCTV Surveillance System, Attacks and Design Goals

Muthusenthil B., Hyun Sung Kim
2018 International Journal of Electrical and Computer Engineering (IJECE)  
The correct design and use of such systems is paramount to ensure a CCTV surveillance system meets the needs of the user, provides a tangible benefit and provides safety and security for the wider law-abiding  ...  In this paper, a 360-degree view presented on the assessment of the diverse CCTV video surveillance systems (VSS) of recent past and present in accordance with technology.  ...  CCTV system CCTV-based surveillance networks are widely used for security in public places.  ... 
doi:10.11591/ijece.v8i4.pp2072-2082 fatcat:y2dzsbopxzg3rhxqp5rv362i5a

Efficient Transcoding and Encryption for Live 360 CCTV System

Tuan Thanh Le, JongBeom Jeong, Eun-Seok Ryu
2019 Applied Sciences  
system and existing 2D/3D CCTV system.  ...  High-performance transcoding is one of the key factors of real time CCTV stream. Additionally, the security of video streams from cameras to endpoints is also an important priority in CCTV research.  ...  Due to above factors, 360 video technology is promising in changing the surveillance of CCTV systems in the near future.  ... 
doi:10.3390/app9040760 fatcat:2mviszszp5fq7itw6d7fj7ijhq

Design and Implementation of Cost Effective Multi-factor Authentication Framework for ATM Systems

Nuku Atta Kordzo Abiew, Maxwell Dorgbefu Jnr., Samuel Osei Banning
2020 Asian Journal of Research in Computer Science  
Based on these authentication factors, authentication is classified into knowledge-based (KBA), token-based (TBA) and biometrics-based (BBA) authentications.  ...  The verification process is usually based on authentication factors like facts, characteristics, behaviors, or knowledge known only to both the claimant and the verifier.  ...  The face recognition technology proposed in their system was to cater for the biometric authentication bit of their multi-factor authentication system.  ... 
doi:10.9734/ajrcos/2020/v5i330135 fatcat:4s3brvqeireptlsw5lqic4gqke

Usable comprehensive-factor authentication for a secure time attendance system

Chalee Vorakulpipat, Sasakorn Pichetjamroen, Ekkachan Rattanalerdnusorn
2021 PeerJ Computer Science  
The contribution of this paper is therefore to provide a security scheme seamlessly integrating all classical authentication factors plus a location factor into one single system in a real environment  ...  This paper proposes the use of all possible authentication factors, called comprehensive-factor authentication, which can maintain the required security level and usability in real-world implementation  ...  Multi-factor authentication protocol based on fuzzy extractor (Mohammed & Yassin, 2019) specific attendance systems.  ... 
doi:10.7717/peerj-cs.678 pmid:34497871 pmcid:PMC8384039 fatcat:tdzv4x3gnza2nhzl2bmcgtahr4

My fingers are all mine: Five reasons why using biometrics may not be a good idea

Siraj A. Shaikh, Christos K. Dimitriadis
2008 2008 International Symposium on Biometrics and Security Technologies  
Would we ever be satisfied with a password-based authentication system, where the system can potentially reject even the right password even once in a million times?  ...  Scalability for biometric systems depends on two technological factors.  ... 
doi:10.1109/isbast.2008.4547654 fatcat:h4ypyzxj4ngpla5qjdvf2yzpnm

Enabling Video Privacy through Computer Vision

A. Senior, S. Pankanti, A. Hampapur, L. Brown, Ying-Li Tian, A. Ekin, J. Connell, Chiao Fe Shu, M. Lu
2005 IEEE Security and Privacy  
In this paper we describe a technology for protecting privacy in video systems.  ...  privacy in video surveillance and describes how a computer vision approach to understanding the video can be used to represent "just enough" of the information contained in a video stream to allow video-based  ...  The former establishes the identity of the system operator through the user authentication module (which authenticates the operator through token-, knowledge-or biometrics-based authentication [10] )  ... 
doi:10.1109/msp.2005.65 fatcat:yjxflptaznblvoqm2vpdogqche
« Previous Showing results 1 — 15 out of 1,214 results