• Title/Summary/Keyword: 신용카드 인식

Search Result 29, Processing Time 0.032 seconds

Credit Card Number Recognition for People with Visual Impairment (시력 취약 계층을 위한 신용 카드 번호 인식 연구)

  • Park, Dahoon;Kwon, Kon-Woo
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.25-31
    • /
    • 2021
  • The conventional credit card number recognition system generally needs a card to be placed in a designated location before its processing, which is not an ideal user experience especially for people with visual impairment. To improve the user experience, this paper proposes a novel algorithm that can automatically detect the location of a credit card number based on the fact that a group of sixteen digits has a fixed aspect ratio. The proposed algorithm first performs morphological operations to obtain multiple candidates of the credit card number with >4:1 aspect ratio, then recognizes the card number by testing each candidate via OCR and BIN matching techniques. Implemented with OpenCV and Firebase ML, the proposed scheme achieves 77.75% accuracy in the credit card number recognition task.

Recognition of Cardslip Images Using Extraction of ROI and Image Enhancement (인식 영역의 추출과 이미지 개선을 통한 신용카드 전표 이미지 인식)

  • 박상은;강경원;최영우;김진형
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.341-343
    • /
    • 2000
  • 본 논문은 신용카드 전표 이미지를 효과적으로 인식하기 위한 이미지의 분석 및 처리 방법을 제안한다. Histogram Matching 기법을 통하여 ROI를 추출함으로써 빠른 속도로 고급 전처리 방법을 적용할 수 있는 방법과 이미지 개선을 위한 필터의 조합 방법 및 ROI 내부에서 숫자열을 정확하게 추출하여 인식하는 방법을 제안하고 있다. 그리고 실제 전표 영상에 대하여 수행한 실험을 통하여 제안한 방법이 유효함을 보여준다.

  • PDF

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

효과적인 지불카드산업(PCI DSS) 컴플라이언스 구현 방안 연구

  • Choi, Dae-Soo
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.21-32
    • /
    • 2008
  • 신용카드 정보를 노린 해킹이나 카드 분실 도난 사고가 증가하면서 고객정보를 보호하고자 하는 지불카드산업 데이터 보안표준(PCI DSS) 컴플라이언스가 제정되고 이를 준수하도록 강제화 되고 있다. 국내에서는 정보보호 인식이 높아지고 정보보호시스템이 운영되고 있음에도 불구하고 PCI DSS 를 준수하기 위한 중복된 정보보호활동이 필연적인 상황이다. 본 논문에서 제안하는 정보보호 통제항목 코드화 방안은 효과적인 PCI DSS 구현을 가능하게 하며 하나의 통제 항목 준수로 유사한 다중 정보보호관리체계 준수를 가능하게 한다. 결과적으로 IT 컴플라이언스 통제항목 준수의 상시적 자가진단을 할 수 있다.

Design and Implementation of Face Recognition Security System for ATM based on extracting skin color using Java (Java로 구현한 피부색 추출 기반 ATM 안면 인식 보안 시스템의 설계 및 구현)

  • Kang, Bo-Gyung;Bae, Seok Chan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.373-376
    • /
    • 2010
  • 요즘 현금카드나 신용카드를 훔치고 비밀번호를 알아내 ATM(현금자동지급기)에서 현금을 인출하는 범죄가 늘고 있는데 범인들은 대부분 선글라스, 안경, 마스크, 모자 등으로 얼굴을 가리고 인출을 함으로 은행의 CCTV는 범인색출에 거의 도움이 되지 않는다. 본 논문에서의 영상처리는 모두 Java언어를 사용하였으며 피부색을 사전 추출하는 과정을 거쳐 구현된 분류기능을 이용해 얼굴의 이목구비들의 위치를 인식하도록 한다. 이는 ATM이용자가 선글라스, 안경, 마스크 등으로 얼굴을 가리면 기기에서 애초에 서비스 받는 것을 불가능 하게 하여, 범죄를 예방할 수 있게 한다. 또한 카드의 사용자 정보와 서비스를 시도했던 시간과 캡쳐 이미지를 저장해 놓음으로써 범인의 인상착의, 알리바이 등을 확인하는데 크게 도움을 주는 ATM 안면 인식 보안 시스템의 가능성을 제안하고자 한다.

A Study for the Perception and Management Behaviors on Credit Cards According to the Shopping Value Types of College Students (대학생의 쇼핑가치에 따른 신용카드인식 및 신용카드관리행동에 관한 연구)

  • Seo, In-Joo
    • Journal of Family Resource Management and Policy Review
    • /
    • v.13 no.2
    • /
    • pp.129-151
    • /
    • 2009
  • The first purpose of this study was to reveal the types of shopping value of college students. The second purpose was to examine the change in the perception and management behaviors related to credit cards according to the types of shopping value. The third purpose was to examine the effects of shopping value on perception and management behaviors on credit cards. The data were collected from 392 college students in Seoul by a self-administered questionnaire. Analyses including frequency, mean, factor analysis, Cronbach's alpha, Pearson's correlation analysis, Crosstabulation analysis, analysis of variance, K-means Cluster analysis and Multiple linear regression were conducted using SPSS WIN12.0. The major findings were as follows. First, college students can be categorized into 3 types of shopping values by K-means Cluster analysis of 14 items. The groups were entitled the hedonistic shopping value, the utilitarian shopping value, and the saving shopping value. Second, positive perception and management behaviors related to credit cards were different depending on the types of shopping value. The hedonistic shopping value group had a higher level of positive perception of credit cards and a lower level of credit card management, compared with the other groups. The saving shopping value group had higher levels of both positive perception and management of credit cards. Among the three groups, the utilitarian shopping group had the lowest level of positive perception of credit cards, despite having ahigher level of credit card management. Lastly, the most effective variance on credit card management was the utilitarian shopping value. These results suggest that a healthy shopping value is very important for having a healthy perception and management of credit cards, because shopping value is a critical variance to affect perception and management of credit cards.

  • PDF

The implementation of Biometric System using RF-ID (RF(RF-ID)을 이용한 Biometric System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.626-629
    • /
    • 2003
  • In this paper, a system that implementation of Biometric System Using RF-ID. We organize a certification system which the security is strengthened, the information is flowed out and the presentation will do the possibility not to be abused. The loss of the credit card and problems which there is many of forgery back are happening. To solve such problems, We organized the system to use after we stored a fingerprint data at RF Card and going through certification necessary formalities. Various research to be related uses this system and is predicted. The development to common use goods will be possible through a certification procedure.

  • PDF