Advertisement

A Based on Identity Surveillance System in Aviation Security

  • Deok Gyu LeeEmail author
  • Jong Wook Han
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 179)

Abstract

An image protection apparatus includes an information collecting unit for collecting personally identifiable information to be embedded in images captured by an image capturing instrument; and an information processing unit for extracting personal information from the collected personally identifiable information. Further, the image protection apparatus includes an information embedding unit for embedding the extracted personal information into a captured image; and an image signature unit for writing a signature on the captured image by using the extracted personal information.

Keywords

Aviation Security Surveillance System Authentication Authorization 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Damiani, E., De Capitani di Vimercati, S.: Securing XML based multimedia content. In: 18th IFIP International Information Security Conference (2003)Google Scholar
  2. 2.
    Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML Documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–122. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  3. 3.
    Kodali, N., Wijesekera, D., Farkas, C.: SECRETS: A Secure Real-Time Multimedia Surveillance System. In: Proc. of the 2nd Symposium on Intelligence and Security Informatics (2004)Google Scholar
  4. 4.
    FAA’S NEXTGEN AIR TRAFFIC CONTROL SYSTEM A CIO’s Perspective on Technology and Security Georgetown University Institute for Law, Science, and Global Security & Billington CyberSecurity (February 28, 2011)Google Scholar
  5. 5.
    Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine grained access control system for XML documents. ACM Transactions on Information and System Security 5 (2002)Google Scholar
  6. 6.
    Gu, X., Nahrstedt, K., Yuan, W., Wichadakul, D., Xu, D.: An XML-based quality of service enabling language for the web (2001)Google Scholar
  7. 7.
    Kodali, N., Farkas, C., Wijesekera, D.: Enforcing integrity in multimedia surveillance. In: IFIP 11.5 Working Conference on Integrity and Internal Control in Information Systems (2003)Google Scholar
  8. 8.
    Kodali, N., Farkas, C., Wijesekera, D.: Multimedia access contol using rdf metadata. In: Workshop on Metadata for Security, WMS 2003 (2003)Google Scholar
  9. 9.
    Kodali, N., Wijesekera, D.: Regulating access to SMIL formatted pay-per-view movies. In: 2002 ACM Workshop on XML Security (2002)Google Scholar
  10. 10.
    Kodali, N., Wijesekera, D., Michael, J.B.: Sputers: A secure traffic surveillance and emergency response architecture. Submission to the Journal of Intelligent Transportaion Systems (2003)Google Scholar
  11. 11.
    Pihkala, K., Cesar, P., Vuorimaa, P.: Cross platform SMIL player. In: International Conference on Communications, Internet and Information Technology (2002)Google Scholar
  12. 12.
    Rutledge, L., Hardman, L., Ossenbruggen, J.: The use of SMIL: Multimedia research currently applied on a global scale (1999)Google Scholar
  13. 13.
    Rutledge, L., van Ossenbruggen, J., Hardman, L., Bulterman, D.C.A.: Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks 31(11-16), 1421–1430 (1999)CrossRefGoogle Scholar
  14. 14.
    Schmidt, B.K.: An architecture for distributed, interactive, multi-stream, multi-participant audio and video. Technical Report No CSL-TR-99-781, Stanford Computer Science Department (1999)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  1. 1.Electronic and Telecommunications Research InstituteDaejeonRep. of Korea

Personalised recommendations