A real-time security surveillance system for personal authentication (English)
- New search for: Yi-Tsung Chien,
- New search for: Yea-Shuan Huang,
- New search for: Sheng-Wen Jeng,
- New search for: Yao-Hong Tasi,
- New search for: Hung-Xin Zhao,
- New search for: Yi-Tsung Chien,
- New search for: Yea-Shuan Huang,
- New search for: Sheng-Wen Jeng,
- New search for: Yao-Hong Tasi,
- New search for: Hung-Xin Zhao,
In:
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
;
190-195
;
2003
-
ISBN:
- Conference paper / Electronic Resource
-
Title:A real-time security surveillance system for personal authentication
-
Contributors:Yi-Tsung Chien, ( author ) / Yea-Shuan Huang, ( author ) / Sheng-Wen Jeng, ( author ) / Yao-Hong Tasi, ( author ) / Hung-Xin Zhao, ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2003-01-01
-
Size:340761 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Testing and Evaluation Counterterrorism TechnologyKing, S. G. / Wood, T. M. / Stewart, J. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 1
-
Testing and evaluating counterterrorism technologyKing, S.G. / Stewart, J.W. / Wood, T.M. et al. | 2003
- 8
-
Understanding concepts in the defence in depth strategySmith, C.L. et al. | 2003
- 17
-
IntelliFIBER Fiber Optic Fence Sensor DevelopmentsMak, M. / Weese, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 17
-
IntelliFIBER/spl trade/: fiber optic fence sensor developmentsMaki, M.C. / Weese, J.K. et al. | 2003
- 23
-
A research of information and communication security forensic mechanism in TaiwanI-Long Lin, / Tian-Shing Lan, / Jia-Chyi Wu, et al. | 2003
- 30
-
Intelligence security home networkVolner, R. / Pousek, L. et al. | 2003
- 38
-
Design of SPS model using mobile agent systemJin-Ho Park, / Jin-Wook Chung, et al. | 2003
- 43
-
Pocket device for authentication and data integrity on Internet banking applicationsde la Puente, F. / Sandoval, J.D. / Hernandez, P. et al. | 2003
- 51
-
On the security of multimedia video informationShieh, J.-R.J. et al. | 2003
- 57
-
An extended object-oriented security model for high secure office environmentsBao-Chyuan Guan, / Ping Wang, / Chen, S.-J. / Chang, R.-I. et al. | 2003
- 62
-
Progressive watermarking techniques with genetic algorithmsHuang, H.-C. / Pan, J.-S. / Shieh, C.-S. / Wang, F.-H. et al. | 2003
- 66
-
Vessel identification and monitoring systems for maritime securityShwu-Jing Chang, et al. | 2003
- 71
-
Virus detection using data mining techinquesJau-Hwang Wang, / Deng, P.S. / Yi-Shen Fan, / Li-Jing Jaw, / Yu-Ching Liu, et al. | 2003
- 71
-
Virus Detection Using Data Mining TechniquesWang, J. H. / Deng, P. S. / Fan, Y. S. / Jaw, L. J. / Liu, Y. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 77
-
New Development in Portable Sensor Allows Low-Cost Component to be Left Behind (Disposable)Andre, G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 77
-
New development in portable sensor allows low-cost components to be left behind (disposable)Gagnon, A. et al. | 2003
- 83
-
And-CFAR and Or-CFAR detectors design in Weibull backgroundLiu, W. / Liu, X. et al. | 2003
- 87
-
A detection algorithm for road feature extraction using EO-1 hyperspectral imagesTzu-Lung Sun, et al. | 2003
- 96
-
Millimeter wave control switch for secure giga-scale systemFu, J.S. / Cai, C. / Lu, Y. / Shen, Z. et al. | 2003
- 100
-
Secure 77GHz Vivaldi antenna for millimeter wave communicationChong, L.P. / Ng, P.T. / Fu, J.S. et al. | 2003
- 104
-
An intelligent real-time fire-detection method based on video processingThou-Ho Chen, / Cheng-Liang Kao, / Sju-Mo Chang, et al. | 2003
- 112
-
Security of ZLYH-key authentication schemeJae-Min Lee, / Kee-Won Kim, / Eun-Kyung Ryu, / Hyung-Mok Lee, / Kee-Young Yoo, et al. | 2003
- 115
-
A new convertible group signature scheme on the basis of dual complexitiesJonathan Jen-Rong Chen, / Richard Wen-Mao Lin, / An-Pin Chen, et al. | 2003
- 123
-
A novel blind signature scheme possessed with dual protectionsJen-Rong Chen, J. / An-Pin Chen, / Wen-Mao Lin, R. et al. | 2003
- 128
-
A simple key agreement protocolEun-Kyung Ryu, / Kee-Won Kim, / Kee-Young Yoo, et al. | 2003
- 132
-
A novel round function architecture for AES encryption/decryption utilizing look-up tableJhing-Fa Wang, / Sun-Wei Chang, / Po-Chuan Lin, et al. | 2003
- 137
-
An Integrated User Authentication and Access Control Scheme without PublicChien, H. Y. / Jan, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 137
-
An integrated user authentication and access control scheme without public key cryptographyHung-Yu Chien, / Jinn-Ke Jan, et al. | 2003
- 144
-
An authorization mechanism for Web services using an attribute certificateMyung-Hee Kang, / Kyung-Nam Kim, / Hwang-Bin Ryou, et al. | 2003
- 144
-
An Authorization Mechanism for Web Services Using Attribute CertificateKim, K. N. / Kang, M. H. / Ryou, H. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 151
-
Achieving database accountability and traceability using the bitemporal relationHsiang-Hui Chen, / Kwo-Jean Farn, / Dwen-Ren Tsai, et al. | 2003
- 157
-
Design of a computer-aided system for risk assessment on information systemsGen-Yih Liao, / Chen-Hwa Song, et al. | 2003
- 163
-
An electronic voting scheme based on undeniable blind signature schemeSung-Hyun Yun, / Sung-Jin Lee, et al. | 2003
- 168
-
Evaluation of Info Security Related Risks of an Organization-The Application of the Multi-Criteria Decision Making MethodGuan, B. C. / Lo, C. C. / Wang, P. / Hwang, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 168
-
Evaluation of information security related risks of an organization: the application of the multicriteria decision-making methodBao-Chyuan Guan, / Chi-Chun Lo, / Ping Wang, / Jaw-Shi Hwang, et al. | 2003
- 176
-
From Web server security to Web components securitySheng-Kang Lin, et al. | 2003
- 183
-
A panoramic stabilized periscope with common optical pathPing-Ho Chen, et al. | 2003
- 190
-
A real-time security surveillance system for personal authenticationYi-Tsung Chien, / Yea-Shuan Huang, / Sheng-Wen Jeng, / Yao-Hong Tasi, / Hung-Xin Zhao, et al. | 2003
- 196
-
A risk assessment system for multi-facility organizationsWood, T.M. / King, S.G. / Kennon, J.W. et al. | 2003
- 196
-
A Risk Assessment System for FacilitiesWood, T. M. / King, S. G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 200
-
An automatic bi-directional passing-people counting method based on color image processingThou-Ho Chen, et al. | 2003
- 200
-
An Auto Bi-Directional Passing-People Counting Method Based on Color Image ProcessingChen, T. H. / Hsu, C. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 208
-
Motion tracking of multi-objects for access surveillance based on the panoramic imaging systemMin-Cheng Pan, / Yau-Liang Tsai, / Ying-Jieh Huang, et al. | 2003
- 216
-
A new security key exchange channel for 802.11 WLANsYen-Chieh Ouyang, / Reay-Lin Chang, / Ji-Hau Chiu, et al. | 2003
- 222
-
Application of certificate on the ECC authentication protocol for point-to-point communicationsJeich Mar, / Ko-Ming Lee, et al. | 2003
- 225
-
Design and implementation of smartcard-based secure e-mail communicationHsien-Hau Chen, / Yung-Sheng Chen, / Hsia-Ling Chiang, / Chung-Huang Yang, et al. | 2003
- 232
-
Hiding binary images behind noise with authentication capability: a new approach to covert communicationChih-Hsuan Tzeng, / Wen-Hsiang Tsai, et al. | 2003
- 232
-
Hiding Binary Images behind Noise with Authentication Capability -A New Approach to Convert CommunicationTzeng, C. H. / Tsai, W. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 237
-
Integrate the structure of negotiation certification of set and the intelligent mobile agentPo-Hsian Huang, et al. | 2003
- 245
-
Light-weight authentication and billing in mobile communicationsHsing-Bai Chen, / Sue-Chen Hsueh, et al. | 2003
- 253
-
A group digital signature technique for authenticationChin-Ming Hsu, et al. | 2003
- 257
-
A knowledge-based model for defending distributed DoSShui-Sheng Lin, / Shun-Chieh Lin, / Shian-Shyong Tseng, et al. | 2003
- 257
-
A Knowledge-Based Model for Defending DDoSLin, S. S. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 264
-
A novel public digital watermarking for still images based on encryption algorithmGwo-Chin Tai, / Long-Wen Chang, et al. | 2003
- 268
-
A new proxy signature scheme based on dual complexitiesChen, J.J.-R. / Pin-Tai Sun, / Chih-Lin Lin, et al. | 2003
- 273
-
Integration of trusted operating system from open sourceYung-Feng Lu, / Chin-Fu Kuo, / Chung-Hsin Chen, et al. | 2003
- 281
-
Automatic biometric identification system by hand geometryGonzalez, S. / Travieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2003
- 285
-
Facial image database for law enforcement application: an implementationPo-Jen Lai, / Jau-Hwang Wang, et al. | 2003
- 290
-
Face recognition in a transformed domainFaundez-Zanuy, M. et al. | 2003
- 290
-
Face Recognition in Transformed DomainZanuy, M. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 298
-
3D visualization to support airport security operationsKoch, D.B. et al. | 2003
- 305
-
Airport access control standardsWilkinson, C. / Rao, E. et al. | 2003
- 314
-
Secure identity authentication and logical access control for airport information systemsDavid, M.W. / Hussein, G.A. / Sakurai, K. et al. | 2003
- 314
-
Secure Identity Authentication and Logical Access Control for Airport Info SystemDavid, M. W. / Hussein, G. / Sakurai, K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 321
-
A wavelet-based public key image authentication watermarkingChien-Chang Chen, / Kang-Chih Fan, / Sheng-Wen Wang, et al. | 2003
- 325
-
Adaptive digital watermarking using neural network techniqueDer-Chyuan Lou, / Jiang-Lung Liu, / Ming-Chiang Hu, et al. | 2003
- 333
-
Defining Requirement for Network Solution in Protection ProfilesSung, Y. G. / Yi, E. K. / No, B. G. / Kim, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 333
-
Defining requirements for network solution in protection profilesYune Gie Sung, / Eun-Kyoung Yi, / Byung-Gyu No, / Jae Sung Kim, et al. | 2003
- 337
-
Assigning cryptographic keys to access control in a multi-attribute hierarchyBao-Chyuan Guan, / Ping Wang, / Yen-Fu Chen, / Ray-I Chang, et al. | 2003
- 341
-
Constructing auditing rules from ERP system: a business process flow approachYi-Hsuan Hung, et al. | 2003
- 349
-
Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cardsBin-Tsan Hsieh, / Her-Tyan Yeh, / Hung-Min Sun, et al. | 2003
- 351
-
Countermeasures in curbing gambling activities on the Internet in TaiwanShiuh-Jeng Wang, / Hung-Jui Ke, et al. | 2003
- 351
-
Countermeasures in Curbing Gambling Activities on Internet in TaiwanWang, S. J. / Ke, H. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 354
-
Firearm dataloggersSutcliff, J. et al. | 2003
- 358
-
The Analysis of Primer Mixtures and Gunshot Residues Using Scanning Electron Microscop / Energy Dispersive X-ray AnalysisMeng, H. H. / Lee, H. C. / Chen, Y. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 358
-
The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysisHsien-Hui Meng, / Hsei-Chang Lee, / Yu-Liang Chen, et al. | 2003
- 364
-
The safety helmet detection for ATM's surveillance system via the modified Hough transformChe-Yen Wen, / Shih-Hsuan Chiu, / Jiun-Jian Liaw, / Chuan-Pin Lu, et al. | 2003
- 364
-
The Safety Helmet Detection for ATM's Surveillance System via Modified Hough TransformWen, C. Y. / Chiu, S. H. / Liaw, J. J. / Lu, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 370
-
Digital watermarking using multiresolution wavelet transformDer-Chyuan Lou, / Jiang-Lung Liu, / Ming-Chang Chang, et al. | 2003
- 378
-
Recommendation of Information Sharing and Analysis Center-A Suggestion of Defensive Mechanism against Mainland China Hacker EventsFarn, K. J. / Fung, A. R. W. / Lin, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 378
-
Recommendation of information sharing and analysis centerFarn, K.-J. / Fung, A.R.-W. / Lin, A.C. et al. | 2003
- 386
-
A study of information and communication security forensic technology capability in TaiwanI-Long Lin, / Hong-Cheng Yang, / Guo-Long Gu, / Lin, A.C. et al. | 2003
- 394
-
Robust image watermarking based on hybrid transformationDer-Chyuan Lou, / Chia-Hung Sung, et al. | 2003
- 400
-
A robust watermarking and image authentication techniqueKung, C.M. / Truong, T.K. / Jeng, J.H. et al. | 2003
- 405
-
The development of PKI interoperability in TaiwanGwo-Chin Tai, / Chung-Ming Ou, et al. | 2003
- 410
-
Video watermarking synchronization based on profile statisticsShih-Wei Sun, / Pao-Chi Chang, et al. | 2003
- 414
-
Vulnerability assessment system (VAS)Cabin Ying, / Tsai, A. / Yu, H. et al. | 2003
- 414
-
Vulnerability Assessment SystemYing, C. / Tsai, A. / Chang, T. / Yu, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 422
-
Visual robust oblivious watermarking techniqueKung, C.H. / Hsiao, H.H. / Cheng, W.S. / Yan, Y.H. et al. | 2003
- 428
-
A hybrid intelligent intrusion detection system to recognize novel attacksDwen-Ren Tsai, / Wen-Pin Tai, / Chi-Fang Chang, et al. | 2003
- 435
-
Securing a restricted site - biometric authentication at entry pointKukula, E.P. / Elliott, S.J. et al. | 2003
- 440
-
Performance evaluation and improvement of speaker recognition over GSM environmentTan-Hsu Tan, / Shih-Wei Chang, / Chung-Ho Yang, et al. | 2003
- 444
-
Securing the biometric modelLeniski, A.C. / Skinner, R.C. / McGann, S.F. / Elliott, S.J. et al. | 2003
- 450
-
Trace copy forgery detection for handwritten signature verificationPeter Shaohua Deng, / Li-Jing Jaw, / Jau-Hwang Wang, / Cheng-Tan Tung, et al. | 2003
- 456
-
Efficient method for security image data compressionPata, P. / Klima, M. et al. | 2003
- 460
-
Detecting offensive routers: a straightforward approachWang, B.-T. / Schulzrinne, H. et al. | 2003
- 468
-
SIM-based subscriber authentication for wireless local area networksYuh-Ren Tsai, / Cheng-Ju Chang, et al. | 2003
- 474
-
Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protectionHung-Min Sun, / Bin-Tsan Hsieh, et al. | 2003
- 477
-
Building intrusion pattern miner for snort network intrusion detection systemLih-Chyau Wuu, / Sout-Fong Chen, et al. | 2003
- 485
-
Design of an Active Intrusion Monitor SystemI-Hsuan Huang, / Cheng-Zen Yang, et al. | 2003
- 493
-
Protocol based foresight anomaly intrusion detection systemMeng-Kai Tsai, / Shun-Chieh Lin, / Shian-Shyong Tseng, et al. | 2003
- 501
-
The neuron security of joint defense for network intrusion detectionJain-Shing Wu, et al. | 2003
- 508
-
The use of laser scanning technology for perimeter protectionHosmer, P. et al. | 2003
- 515
-
External second gate Fourier transform ion mobility spectrometry: parametric optimization for detection of weapons of mass destructionTarver, E.E. et al. | 2003
- 523
-
Specification of a video test imagery library (VITAL)Baker, D. / Thomas, N. et al. | 2003
- 527
-
Face recognition for images from the same unknown personYea-Shuan Huang, / Yao-Hong Tsai, / Hong-Hsin Chao, / Yi-Tsung Chien, et al. | 2003
- 531
-
Facial Recognition at Purdue University Airport-2003-2008Morton, J. M. / Portell, C. M. / Elliott, S. J. / Kukula, E. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 531
-
Facial recognition at Purdue University's airport - 2003-2008Morton, J.M. / Portell, C.M. / Elliott, S.J. / Kukula, E.P. et al. | 2003
- 535
-
Contingency planning: emergency preparedness for terrorist attacksWang, H.-M. et al. | 2003
- 544
-
TSRG randomized cryptosystemHussein, G.A. / David, M.W. et al. | 2003
- 552
-
Audio content based feature extraction on subband domainShieh, J.-R.J. et al. | 2003
- 556
-
ID-based cryptographic schemes based on factoring and discrete logarithmsPin-Chang Su, / Erl-Huei Lu, / Henry Ker-Chang Chang, et al. | 2003
- 564
-
An encryption scheme for large Chinese textsBao-Chyuan Guan, / Ray-I Chang, / Yung Chung Wei, / Chia-Ling Hu, / Yu-Lin Chiu, et al. | 2003
- 569
-
Implementing the RSA algorithm on the TI TMS320C55x familyRen-Junn Hwang, / Feng-Fu Su, / Loang-Shing Huang, / Jen-Kang Peng, et al. | 2003
- 573
-
Fast implementation of AES cryptographic algorithms in smart cardsChi-Feng Lu, / Yan-Shun Kao, / Hsia-Ling Chiang, / Chung-Huang Yang, et al. | 2003
- 580
-
A host-based real-time intrusion detection system with data mining and forensic techniquesFang-Yie Leu, / Tzu-Yi Yang, et al. | 2003
- 587
-
Proxy certificates-based digital fingerprinting scheme for mobile communicationJae-Gwi Choi, / Kouichi Sakurai, / Ji-Hwan Park, et al. | 2003
- 595
-
A robust method for software self-defensePeter Shaohua Deng, / Wen-Gong Shieh, / Jau-Hwang Wang, / Cheng-Tan Tung, / Chih-Pin Yen, et al. | 2003
- 600
-
Intelligent automatic malicious code signatures extractionPeter Shaohua Deng, / Jau-Hwang Wang, / Wen-Gong Shieh, / Chin-Pin Yen, / Cheng-Tan Tung, et al. | 2003
-
Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (IEEE Cat. No.03CH37458)| 2003