A Based on Single Image Authentication System in Aviation Security

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 240)


An image protection apparatus includes an information collecting unit for collecting personally identifiable information to be embedded in images captured by an image capturing instrument; and an information processing unit for extracting personal information from the collected personally identifiable information. Further, the image protection apparatus includes an information embedding unit for embedding the extracted personal information into a captured image; and an image signature unit for writing a signature on the captured image by using the extracted personal information.


Aviation Security Surveillance System Authentication Authorization 


  1. 1.
    Kodali N, Farkas C, Wijesekera D (2003) Multimedia access control using rdf metadata. In: workshop on metadata for security, WMS 03Google Scholar
  2. 2.
    Kodali N, Wijesekera D (2002) Regulating access to smil formatted pay-per-view movies. In: 2002 ACM workshop on XML securityGoogle Scholar
  3. 3.
    Rutledge L, Hardman L, Ossenbruggen J (1999) The use of smil: multimedia research currently applied on a global scale Google Scholar
  4. 4.
    Kodali N, Wijesekera D, Michael. Sputers: A secure traffic surveillance and emergency response architecture. J Intell Transp Syst Google Scholar
  5. 5.
    Pihkala K, Cesar P, Vuorimaa P (2002) Cross platform smil player. In: International conference on communications, internet and information technologyGoogle Scholar
  6. 6.
    Rutledge L, Ossenbruggen J, Hardman L, Dick CA (1999) Bulterman. Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks, Amsterdam, Netherlands, 31(11–16):1421–1430Google Scholar
  7. 7.
    Schmidt BK (1999) An architecture for distributed, interactive, multi-stream, multi-participant audio and video. In: Technical report no CSL-TR-99-781, stanford computer science departmentGoogle Scholar
  8. 8.
    Kodali N, Wijesekera D, Farkas C (2004) SECRETS: a secure real-time multimedia surveillance system. In: Proceedings of the 2nd Symposium on intelligence and security informaticsGoogle Scholar
  9. 9.
    Damiani E, di Vimercati SDC (2003) Securing xml based multimedia content. In: 18th IFIP international information security conferenceGoogle Scholar
  10. 10.
    Damiani E, di Vimercati SDC, Paraboschi S, Samarati P (2000) Securing XML documents. Lect Notes Compt Sci 1777:121–122Google Scholar
  11. 11.
    FAA’S NEXTGEN AIR TRAFFIC CONTROL SYSTEM A CIO’s Perspective on Technology and Security Georgetown University Institute for Law, Science, and Global Security & Billington CyberSecurity, 28 Feb 2011Google Scholar
  12. 12.
    Damiani E, di Vimercati SDC, Paraboschi S, Samarati P (2002) A fine grained access control system for xml documents. ACM Trans Info Syst Security 5:121–135Google Scholar
  13. 13.
    Gu X, Nahrstedt K, Yuan W, Wichadakul D, Xu D (2001) An xml-based quality of service enabling language for the web. Kluwer Academic Publishers, Norwell Google Scholar
  14. 14.
    Kodali N, Farkas C, Wijesekera D (2003) Enforcing integrity in multimedia surveillance. In: IFIP 11.5 working conference on integrity and internal control in information systemsGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht(Outside the USA) 2013

Authors and Affiliations

  1. 1.Electronic and Telecommunications Research InstituteDaejeonRepublic. of Korea

Personalised recommendations