Advances in security technologies: Imaging, anomaly detection, and target and biometric recognition

被引:0
|
作者
O'Sullivan, Joseph A. [1 ]
Pless, Robert [2 ]
机构
[1] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
[2] Washington Univ, Dept Comp Sci & Engn, St Louis, MO 63130 USA
关键词
image sensors; object recognition; pattern classification; pattern recognition; security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security system design and analysis are constantly improving. There are advances in sensors, in system concept, and in signal and image processing that all contribute to these improvements. Several of these advances are discussed, with an emphasis on imaging sensors with a wide range of wavelengths and deployment scenarios. In order for a security system to provide timely, reliable information, the processing must be efficient and robust. Specific, yet generalizable, developments in surveillance systems and in recognition systems are detailed.
引用
收藏
页码:760 / 763
页数:4
相关论文
共 50 条
  • [31] Extending the imaging volume for biometric iris recognition
    Narayanswamy, R
    Johnson, GE
    Silveira, PEX
    Wach, HB
    APPLIED OPTICS, 2005, 44 (05) : 701 - 712
  • [32] Remote Target Recognition and Tracking Based On Biometric Characteristics
    An, Wei-Ning
    Chen, Zhuo
    Yuan, Ying-Hai
    Qin, Xiao-Li
    Wu, Hang
    Liu, Bao-Zhen
    Su, Wei-Hua
    INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION CONTROL (ICEEAC 2017), 2017, 123 : 276 - 280
  • [33] Target-to-Anomaly Conversion for Hyperspectral Anomaly Detection
    Chang, Chein-, I
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60
  • [34] Radar HRRP clutter robust target recognition method based on double anomaly detection
    Guo P.
    Liu Z.
    Luo D.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2019, 41 (10): : 2221 - 2226
  • [35] On ubiquitous network security and anomaly detection
    Van Dyke, C
    Koc, CK
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 374 - 378
  • [36] Exploratory security analytics for anomaly detection
    Pierazzi, Fabio
    Casolari, Sara
    Colajanni, Michele
    Marchetti, Mirco
    COMPUTERS & SECURITY, 2016, 56 : 28 - 49
  • [37] Anomaly detection survey for information security
    Kaur, Harsurinder
    Pannu, Husanbir Singh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +
  • [38] Advances in Imaging Target Delineation
    Hunter, Klaudia U.
    Eisbruch, Avraham
    CANCER JOURNAL, 2011, 17 (03): : 151 - 154
  • [39] Security Anomaly Detection in Enterprise GitHub
    Jordan, Adam
    Chen, Yong
    PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2024, PEARC 2024, 2024,
  • [40] A Review of the Fingerprint, Speaker Recognition, Face Recognition and Iris Recognition Based Biometric Identification Technologies
    Majekodunmi, Tiwalade O.
    Idachaba, Francis E.
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL II, 2011, : 1681 - 1687