• Title/Summary/Keyword: 영상보안시스템

Search Result 439, Processing Time 0.026 seconds

Real-Time Motion Detection Using Background Image Change for Web Camera Security System (웹 카메라 보안 시스템을 위한 배경화면 변화를 이용한 실시간 움직임 검출)

  • Lee, Chang-Soo;Kim, Yong-Gyun;Min, Byoung-Muk;Lee, Jeong-Gyu;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.771-774
    • /
    • 2002
  • 인터넷 시대에 접어들면서 웹 카메라를 이용한 보안 시스템의 개발이 활발하다. 원격지에 설치된 카메라가 보내준 영상을 통하여 현재의 상황을 파악할 수 있으며, 적절한 조치를 웹을 통해 취할 수 있다. 실시간 영상전송에 따른 저장 방식에 있어서 움직임이 검출되었을 때에만 영상을 저장하는 방식을 선호하고 있다. 따라서 본 논문에서는 카메라로부터 입력되어지는 입력영상과 배경영상의 차를 이용하여 움직임 검출하는 방법을 제안한다. 카메라에서 받아오는 영상을 배경영상과 입력영상으로 구분 한 다음 두 영상의 차를 구하여 영상의 변화점을 찾는다. 이미지 픽셀 검사는 모든 픽셀을 연산에 참석하는 방식을 탈피하여 일정한 간격을 두고 이미지의 픽셀을 검색하여 움직임 검출을 한다.

  • PDF

The Implementation of the Multiple Security System Based on RFID and Biometrics (RFID와 생체인식기반 다중보안 시스템 구현)

  • Lee, Jae-Yong;Joung, Lyang-Jae;Kim, Jang-Hui;Kang, Dae-Seong
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2006.06a
    • /
    • pp.1-4
    • /
    • 2006
  • 본 논문에서는 보다 높은 보안 체계를 요구하는 환경에서 개인의 얼괄 인증과 RFID의 인증을 통한 다중 보안 시스템을 제안하고자 한다. 이 시스템은 추출된 얼굴 영상의 특징 벡터들을 각각 사용자의 태그에 저장하고 개인 인증 시 얼굴 영상의 입력과 비교 및 판독에 사용하도록 한다. 태그의 생체정보와 입력 얼굴영상에서 추출한 특징벡터가 일치하여야만 Database에 접근이 가능하며, 만약 하나라도 만족하지 못하면 인증은 실패한다. 이것은 사람의 얼굴뿐만 아니라 지문, 홍채 등의 생체인증 기술과 RFID와의 결합으로 보다 안전하고 효과적인 개인 인증 기술로 사용될 수 있을 것이다.

  • PDF

Implementation of Video Surveillance System with Motion Detection based on Network Camera Facilities (움직임 감지를 이용한 네트워크 카메라 기반 영상보안 시스템 구현)

  • Lee, Kyu-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.169-177
    • /
    • 2014
  • It is essential to support the image and video analysis technology such as motion detection since the DVR and NVR storage were adopted in the real time visual surveillance system. Especially the network camera would be popular as a video input device. The traditional CCTV that supports analog video data get be replaced by the network camera. In this paper, we present the design and implementation of video surveillance system that provides the real time motion detection by the video storage server. The mobile application also has been implemented in order to provides the retrieval functionality of image analysis results. We develop the video analysis server with open source library OpenCV and implement the daemon process for video input processing and real-time image analysis in our video surveillance system.

Implementation of Smart Video Surveillance System Based on Safety Map (안전지도와 연계한 지능형 영상보안 시스템 구현)

  • Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.169-174
    • /
    • 2018
  • There are many CCTV cameras connected to the video surveillance and monitoring center for the safety of citizens, and it is difficult for a few monitoring agents to monitor many channels of videos. In this paper, we propose an intelligent video surveillance system utilizing a safety map to efficiently monitor many channels of CCTV camera videos. The safety map establishes the frequency of crime occurrence as a database, expresses the degree of crime risk and makes it possible for agents of the video surveillance center to pay attention when a woman enters the crime risk area. The proposed gender classification method is processed in the order of pedestrian detection, tracking and classification with deep training. The pedestrian detection and tracking uses Adaboost algorithm and probabilistic data association filter, respectively. In order to classify the gender of the pedestrian, relatively simple AlexNet is applied to determine gender. Experimental results show that the proposed gender classification method is more effective than the conventional algorithm. In addition, the results of implementation of intelligent video security system combined with safety map are introduced.

Multimedia Data Security of Video Conferencing System (영상회의 시스템에서의 멀티미디어 데이터 보안)

  • 이원호;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.231-236
    • /
    • 2003
  • Video conferencing system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the video compression technique and multimedia data, supports the video conference the research of the Mbone of the If multicast for being active, being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

Security Method of Multimedia Data Characteristics on Video Conference System (영상회의 시스템에서 멀티미디어 데이터 특성에 따른 보안 방법)

  • Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.143-148
    • /
    • 2005
  • Video conference system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the compression technique and multimedia data, supports the video conference the research of the Mbone of the IP multicast for being active. being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

A Study on Mobile Security System using Real-Time Object Tracking (실시간 객체 추적을 이용한 모바일 보안시스템에 관한 연구)

  • Baek, Ju-Ho;Park, Yeon-Chool;Lee, Kwang-Hyoung;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11a
    • /
    • pp.73-76
    • /
    • 2003
  • 모바일 보안 시스템은 웹 카메라에 실시간으로 입력되어지는 객체를 추적한 후, 영상처리를 거쳐, 추적된 객체를 휴대폰으로 전송하는 시스템을 말한다. 본 논문에서는 배경영상과 카메라로부터 입력되는 입력영상과의 차를 이용하여 객체를 추출하고, 추출된 객체를 휴대폰으로 전송한다. 휴대폰은 데이터의 전송속도에서 많은 문제점을 가지고 있기 때문에 객체가 이동했을 경우에만 휴대폰으로 영상을 전송함으로써 트래픽을 최소화하는 방법을 제안한다. 핸드폰은 사용자가 항상 소지하고 있기 때문에, 긴급 상태 발생시 현장의 상황을 실시간 영상을 전송함으로서 사용자가 긴급 상황에 따른 대책을 신속 정확히 할 수 있다.

  • PDF

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

A Study on the Image Encryption for Video Conference System Construction that Security Improves (보안성이 향상된 화상회의 시스템 구축을 위한 영상 암호화에 관한 연구)

  • 김형균;김단환;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.631-634
    • /
    • 2002
  • Video conference system has guided swiftness of information transmission and business processing taking away time and manufacturing drug of space that is happened that long-distance gather and talk. But, leakage of important meeting content, peculation etc., in that execute video-conferences can happen. Therefore, research about video conference system of safety is progressing under secure superhigh speed information communication fetters. This treatise studied about techniques to encipher videotex to prevent variation and outward flow of burn information, peculation etc., except general encryption notation such as user certification to have drawn problem about stability of general video conference system, and is used present as countermeasure about here. Used improved Vernam's encryption techniques to encrypt videotex.

  • PDF

Hardware Design of Super Resolution on Human Faces for Improving Face Recognition Performance of Intelligent Video Surveillance Systems (지능형 영상 보안 시스템의 얼굴 인식 성능 향상을 위한 얼굴 영역 초해상도 하드웨어 설계)

  • Kim, Cho-Rong;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.9
    • /
    • pp.22-30
    • /
    • 2011
  • Recently, the rising demand for intelligent video surveillance system leads to high-performance face recognition systems. The solution for low-resolution images acquired by a long-distance camera is required to overcome the distance limits of the existing face recognition systems. For that reason, this paper proposes a hardware design of an image resolution enhancement algorithm for real-time intelligent video surveillance systems. The algorithm is synthesizing a high-resolution face image from an input low-resolution image, with the help of a large collection of other high-resolution face images, called training set. When we checked the performance of the algorithm at 32bit RISC micro-processor, the entire operation took about 25 sec, which is inappropriate for real-time target applications. Based on the result, we implemented the hardware module and verified it using Xilinx Virtex-4 and ARM9-based embedded processor(S3C2440A). The designed hardware can complete the whole operation within 33 msec, so it can deal with 30 frames per second. We expect that the proposed hardware could be one of the solutions not only for real-time processing at the embedded environment, but also for an easy integration with existing face recognition system.