Using Face Recognition System in Ship Protection Process
AbstractThe process of security improvement is a huge problem especiallyin large ships. Terrorist attacks and everyday threatsagainst life and property destroy transport and tourist companies,especially large tourist ships. Every person on a ship can berecognized and identified using something that the personknows or by means of something the person possesses. The bestresults will be obtained by using a combination of the person'sknowledge with one biometric characteristic. Analyzing theproblem of biometrics in ITS security we can conclude that facerecognition process supported by one or two traditional biometriccharacteristics can give very good results regarding ship security.In this paper we will describe a biometric system basedon face recognition. Special focus will be given to crew member'sbiometric security in crisis situation like kidnapping, robbelyor illness.
Ashbourn, J. 'Biometrics: Advanced Identity Verification:
The Complete Guide', Springer-Verlag, 2000.
Ashbourn, J. 'Practical Biometrics', Springer, 2004.
Baca, M., Rabuzin, K. (2005): 'Biometrics in Network
Security', MIPRO 2005, XXVIII International Convention,
Proceedings Information Systems Security,
pp. 205-210, Opatija
Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzales-
Rodriguez, J. 'Multimodal Biometric Authentication
using Quality Signals in Mobile Communications',
IEEE-Computer Society Press, (Proc. of 1th Inf. Conf.
on image analysis and processing, Mantova, Italy), pp.
11, 17-19 Sept. 2003.
Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior,
A., 'Guide to Biometrics', Springer, 2003.
Chellapa, R., Wilson, C., Sirohey, A. 'Human and machine
recognition of faces: A survey', Proceedings IEEE,
(5): 705-740, 1995.
Clarke, R. 'Human Identification in Infonnation Systems:
Management Challenges and Public Policy Issues',
Information Technology & People, Vol. 7, No. 4, pp.
Davies S. G. 'Touching Big Brother', Information Technology
& People, Vol. 7, No. 4, 1994.
Dieckmann, U., Plankensteiner, P., Wagner, T. 'Sesam:
A biometric person identification system using sensor
fusion', Pattern Recognition Letters, 18(9): 827-
Diegert K. V. 'Estimating performance characteristics of
biometric identifiers', Proceedings of Biometrics Consortium
Conference, San Jose, CA, 1996.
Hong, L., Jain, A., Pankianti, S. 'Can multibiometrics
improve performance?', Proceedings AutoiD, NJ, 1999.
International Security Home page,
http://www.security-int.com (27 Oct. 2003)
Jain, A. Bolle, R., Pankanti, S. 'Biometrics: Personal
Identification in Networked Society', Kluwer, 1999.
Jain, A., Ross, A., Prabhakar, S. ''An introduction to
biometric recognition', Michigan State University, 2004
Kittler, J., Li, Y., Matas, K., Sanchez, M. U. 'Combining
evidence in multimodal personal Identity recognition
systems', Proc. 1' Int. Conf. on Audio Video-Based
Personal Authentication, pp. 327-334, 1997.
Nanavati S., Thieme, M., Nanavati, R. 'Biometrics',
Panikanti, S., Bolle, R., Jain, A. 'Biometrics: The Future
of Identification', IEEE Computer, Vol. 33, No. 2000.
Reid, P. 'Biometrics for Network Security', Prentice
Hall, Upper Saddle River, NJ, 2004.
The Biometrics Glossary Page,
biometric-terrns.html (29 Oct. 2003)
Wayman, J., Jain, A., Maltoni, D., Maio, D. 'Biometric
Systems', Springer, 2005.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).