• Title/Summary/Keyword: 보안인식

Search Result 1,361, Processing Time 0.029 seconds

A study on Prevent fingerprints Collection in High resolution Image (고해상도로 찍은 이미지에서의 손가락 지문 채취 방지에 관한 연구)

  • Yoon, Won-Seok;Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.19-27
    • /
    • 2020
  • In this study, Developing high resolution camera and Social Network Service sharing image can be easily getting images, it cause about taking fingerprints to easy from images. So I present solution about prevent to taking fingerprints. this technology is develop python using to opencv, blur libraries. First of all 'Hand Key point Detection' algorithm is used to locate the hand in the image. Using this algorithm can be find finger joints that can be protected while minimizing damage in the original image by using the coordinates of separate blurring the area of fingerprints in the image. from now on the development of accurate finger tracking algorithms, fingerprints will be protected by using technology as an internal option for smartphone camera apps from high resolution images.

Facial Contour Extraction in PC Camera Images using Active Contour Models (동적 윤곽선 모델을 이용한 PC 카메라 영상에서의 얼굴 윤곽선 추출)

  • Kim Young-Won;Jun Byung-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.633-638
    • /
    • 2005
  • The extraction of a face is a very important part for human interface, biometrics and security. In this paper, we applies DCM(Dilation of Color and Motion) filter and Active Contour Models to extract facial outline. First, DCM filter is made by applying morphology dilation to the combination of facial color image and differential image applied by dilation previously. This filter is used to remove complex background and to detect facial outline. Because Active Contour Models receive a large effect according to initial curves, we calculate rotational degree using geometric ratio of face, eyes and mouth. We use edgeness and intensity as an image energy, in order to extract outline in the area of weak edge. We acquire various head-pose images with both eyes from five persons in inner space with complex background. As an experimental result with total 125 images gathered by 25 per person, it shows that average extraction rate of facial outline is 98.1% and average processing time is 0.2sec.

  • PDF

A Basic Study for Accumulating Scheduling Knowledge-Base (공정관리 지식기반 구축을 위한 기초적 연구)

  • Jang Se-Han;Kim Kyung-Rai
    • Korean Journal of Construction Engineering and Management
    • /
    • v.2 no.3 s.7
    • /
    • pp.83-91
    • /
    • 2001
  • Generally the level of accumulating scheduling knowledge-base in Korean construction companies is in the scheduling knowledge-base infrastructure construction phase and Even in top 10 construction companies, the level is in early scheduling knowledge activity phase. The principle causes of this situation are unawareness of importance to scheduling knowledge and absence of procedure related to scheduling knowledge-base. This research analyzes the problems to accumulate scheduling knowledge-base in Korean construction companies and proposes a procedure model to accumulate scheduling knowledge-base property, which adds items of scheduling knowledge-base infrastructure and scheduling knowledge activity to the existing scheduling procedures of Korean construction companies. Using procedure model for accumulating scheduling knowledge-base, Korean construction companies can develop a new scheduling procedure and accumulate scheduling knowledge accordingly. If scheduling knowledge were accumulated property according to the procedure, a framework for knowledge management system could be provided.

  • PDF

Three channel Skin-Detection Algorithm for considering all constituent in YCbCr color space (YCbCr 색 좌표계의 모든 요소를 고려한 3-channel 피부 검출 알고리즘)

  • Shin, Sun-Mi;Im, Jeong-Uk;Jang, Won-Woo;Kwak, Boo-Dong;Kang, Bong-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.127-130
    • /
    • 2007
  • Skin detection research is important role in the 3G of mobile phone for video telephony and security system by using face recognition. We propose skin detection algorithm as preprocessing to the face recognition, and use YCbCr color space. In existing skin detection algorithm using CbCr, skin colors that is brightened by camera flash or sunlight at outdoor in images doesn't acknowledged the skin region. In order to detect skin region accuracy into any circumstance, this paper proposes 3-channel skin detection algorithm.

  • PDF

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.

A Design of Mobile Robot based on Camera and Sound Source Localization for Intelligent Surveillance System (지능형 감시 시스템 구축을 위한 영상과 음원 추적 기반 임베디드 모바일로봇 개발)

  • Park, Jung-Hyun;Kim, Hyung-Bok;Oh, Jung-Suk;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.532-537
    • /
    • 2009
  • The necessity of intelligent surveillance system is gradually considered seriously from the space where the security is important. In this paper, we embodied unmanned intelligent system by developing embedded mobile robot based on images and sounds tracking. For objects tracking, we used block-matching algorithm and for sound source tracking, we calculated time differences and magnitude dissimilarities of sound. And we demonstrated the superiority of intruder tracking algorithm through the embodiment of Pan-Tilt camera and sound source tracking module using system, Network camera and mobile robot using system and mobile robot using system. By linking security system, the suggested system can provide some interfacing functions for the security service of the public facilities as well as that of home.

Study on the perception of health science college students about the personal protection of dental personnels (치과 의료종사자의 개인보호장구 착용에 대한 보건계열 대학생의 인식)

  • Kang, Eun-Ju;Choi, Mi-Hye
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.5
    • /
    • pp.637-647
    • /
    • 2011
  • Objectives : This study was performed to enhance infection control and to establish the fundamental and practical improvement by the survey on personal protection of dental personnels with health science college students. Methods : We performed the survey with 585 individual students affiliated with health science in Jeonbuk province and statistically analyzed by SPSS 12.0 program. Results : The frequencies of the clinic gown as a personal protection were 96.0% of dentists (p<0.01) and 88.0% of dental hygienists (p<0.05) respectively in college-associated dental hospital when we compared with institution scale. The frequencies of the medical gloves as a compulsory personal protection were 47.2% of dentists and 34.6% of dental hygienists respectively (p<0.001). The frequencies of the medical mask as a compulsory personal protection were 84.0% of dentists (p<0.001) and 52.2% of dental hygienists (p<0.05) respectively shown by freshman students. The frequencies of the safety glasses as a compulsory personal protection were 12.3% of dentists and 2.5% of dental hygienists shown by freshman students (p<0.001). Conclusions : The results reflect that current dental personnel's concern of personal protection need to be increased continuously in accordance with current demands and eventually suggest their effort to put their action on personal protection in their dental office.

Kindergarten teachers' needs for educational practice supervisors :Focusing on field teachers who experienced supervision (교육실습 수퍼바이저에 대한 현장 교사들의 요구 :수퍼바이징을 경험한 현장 교사 중심으로)

  • Park, Ji-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5240-5249
    • /
    • 2015
  • This study aimed to explore the supervisors' qualification and roles and to analyze the possible policy directions related to supervision for the efficient educational practice aid. 6 field teachers who experienced educational practice aid, participated in the in-depth interviews from April to May 2015. The participants reported that 5 field career and PhD qualification were needed for supervisors. Also, supervisors were expected to be 'relationship-oriented counselors' who were comfortable and tried to keep secrets. The participants felt the needs for a policy of educational practice aid, supervising and for this, financial matter and clear role description should be solved out.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Design of Smart Digital Door Lock System Using Heterogeneous Communication (이종 통신을 이용한 스마트 디지털 도어락 시스템 설계)

  • Han, Yong-Sik;Cho, Hyun-Chul;Park, Jin-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • In this paper, we propose smart digital door lock system using heterogeneous communication. This system has efficient function using RF communication and Internet communication, and realizes access and real image of the passengers by combining camera control technology to secure original competitiveness with existing products. It uses the Internet of things and receive images to and from your smart-phone. And senses human behavior. In the simulated results, the image transmission rate of 90 % or more and the time required to transmit 10,000 images have an average transmission speed of 3 seconds. It is expected to secure competitiveness to increase the security of door lock in the future by enabling minimum security and fire monitoring service in real time.