• Title/Summary/Keyword: 영상 보안

Search Result 759, Processing Time 0.067 seconds

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Design on Smart Security Disk System with Wireless Interface of High Definition Image (고해상도 영상의 무선 인터페이스를 갖는 스마트 보안 디스크 시스템의 설계)

  • Kim, Won
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.195-200
    • /
    • 2013
  • In visual surveillance system abandoned objects in public places are the deliberately left things, which should be automatically detected by intelligent systems in the environment where the number of cameras is increasing. This research deals with the design scheme of a smart security disk system which can detect these abandoned objects automatically and save the relevant image information with the wireless interface of high definition images. By implementing the proposed system in this research it is confirmed that the transmission performance shows 60 frames per second without compression of high definition images and the capability of the disk system shows the relevant images can be saved in a RAID configuration. Also, the proposed visual surveillance software shows a good detection rate of 80% in PAT performance.

Improvement of security of cloud-based medical image storage transmission systems (PACS) (클라우드 기반 의료영상저장전송시스템(PACS)의 보안성 향상 연구)

  • Jung, Myoung-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.672-675
    • /
    • 2015
  • 다른 IT 분야에 비해 헬스케어 IT 분야는 의료정보의 중요성이 매우 높으나 현재 의료정보 보관, 데이터 전송에 대한 보안 부분이 매우 취약하며 보안관리에 대한 인력 또한 매우 부족한 상태이다. 향후 클라우드발전법으로 인한 의료영상저장전송시스템의 환경 변화로 보안에 대한 취약성은 더욱 두드러질 것이며 사고 또한 급증할 것이다. 이에 대한 보안성 향상에 대한 방안을 제시 하고자 한다.

Medical Image Security Algorithm Implement using Wavelet (웨이블릿을 이용한 의료영상보안 알고리즘 구현)

  • Oh, Keun-Tak;Yoon, H.S.;Lee, S.T.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.601-605
    • /
    • 2006
  • 의료영상은 디지털이라는 속성으로 인해서 일상생활에 적용되는 저작권법으로 저작권을 보호한다는 것이 어렵다. 특히 의료 영상은 복사를 하면 또 하나의 원본이 생성되므로, 의료 영상 이미지를 생산해 내는 사람의 입장에서는 똑같은 원본을 자신도 모르는 사이에 다른 사람에게 전달하게 된다. 그렇게 되면 과연 누가 이 디지털 작품을 만들었는지에 대한 의료 분쟁이 생길 수밖에 없다. 디지털시대의 의료 환경에서 필수 불가결하게 제기될 수 있는 의료영상보안은 특히 우리나라처럼 의료보험의 부당 청구가 사회적인 큰 물의를 일으키고 있는 시점에서 많은 관심과 연구가 필요하다. 따라서 이 분야의 핵심적인 문제점을 도출하고, 문제점 개선을 위해서 워터 마크를 통해 영상 보안 기법을 제안하였다. 그러나 의료영상의 대표적인 특징인 무결성을 보장 받지 못해 법적인 인증에는 한계가 있음을 알 수 있었다.

  • PDF

Trend of Technology in Video Surveillance System

  • Song, Jaemin;Park, Arum;Lee, Sae Bom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.57-64
    • /
    • 2020
  • Video surveillance is consists of cameras, transmission devices, storage and playback devices, and is used for crime prevention and disaster monitoring. Recently, it has been spreading to a wide variety of fields, and has developed into an intelligent video surveillance system that can automatically recognize or track characteristic objects of people and things. The purpose of this study was to investigate the cases of video surveillance service applying the latest technology by dividing it into the home, public, and private sectors. also this study tried to investigate and research what advantage it brings from a business perspective. By looking at the cases introduced in this study, it was confirmed that the viedo security service is developing intelligently, such as excellent compatibility with CCTV, multiple video surveillance, CCTV screen motion detection, and alarm through automatic analysis.

DVR 기술 동향

  • Seol, Chang-Hoon
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.24-30
    • /
    • 2010
  • 영상보안시스템의 저장 장치는 초기의 아날로그 방식인 VCR에서 디지털 방식인 DVR로 넘어오면서 급격한 기술 개발과 성능 개선이 이루어진데 이어 현재에도 해상도, 적용된 압축코덱, Interface 등의 부분에서 기술의 발전 및 변화의 흐름이 지속되고 있다. 특히 최근에는 다양한 요인으로 인한 영상보안시스템의 HD 전환과 실질적인 지능형 영상보안시스템 구현을 위한 새로운 기술이 요구되고 있으며 그에 기반한 기술적인 변화와 발전이 점차 이루어지고 있다. 본 논문에서는 최근의 핵심적인 DVR 기술동향과 함께 앞으로의 DVR 전망에 대해서 살펴보고자 한다.

Security Analysis based on Differential Entropy m 3D Model Hashing (3D 모델 해싱의 미분 엔트로피 기반 보안성 분석)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12C
    • /
    • pp.995-1003
    • /
    • 2010
  • The content-based hashing for authentication and copy protection of image, video and 3D model has to satisfy the robustness and the security. For the security analysis of the hash value, the modelling method based on differential entropy had been presented. But this modelling can be only applied to the image hashing. This paper presents the modelling for the security analysis of the hash feature value in 3D model hashing based on differential entropy. The proposed security analysis modeling design the feature extracting methods of two types and then analyze the security of two feature values by using differential entropy modelling. In our experiment, we evaluated the security of feature extracting methods of two types and discussed about the trade-off relation of the security and the robustness of hash value.

An intelligent video security system for the tracking of multiple moving objects (복수의 동체 추적을 위한 지능형 영상보안 시스템)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.359-366
    • /
    • 2013
  • Due to the development and market expansion of image analysis and recognition technology, video security such as CCTV cameras and digital storage devices, are required for real-time monitoring systems and intelligent video security systems. This includes the development of more advanced technologies. A rotatable PTZ camera, in a CCTV camera system, has a zoom function so you can acquire a precise picture. However it can cause blind spots, and can not monitor two or more moving objects at the same time. This study concerns, the intelligent tracking of multiple moving objects, CCTV systems, and methods of video surveillance. An intelligent video surveillance system is proposed. It can accurately shoot broad areas and track multiple objects at the same time, much more effectively than using one fixed camera for an entire area or two or more PTZ cameras.

Security Algorithm for Vehicle Type Recognition (에지영상의 비율을 이용한 차종 인식 보안 알고리즘)

  • Rhee, Eugene
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • In this paper, a new security algorithm to recognize the type of the vehicle with the vehicle image as a input image is suggested. The vehicle recognition security algorithm is composed of five core parts, such as the input image, background removal, edge areas extraction, pre-processing(binarization), and the vehicle recognition. Therefore, the final recognition rate of the security algorithm for vehicle type recognition can be affected by the function and efficiency of each step. After inputting image into a gray scale image and removing backgrounds, the binarization is performed by extracting only the edge region. After the pre-treatment process for making outlines clear, the type of vehicles is categorized into large vehicles, passenger cars and motorcycles through the ratio of height and width of the vehicle.

Technology of Medical Image Security using Cellular Automata Transform (CAT를 이용한 의료영상보안 기술)

  • Nam, Tae-Hee
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.332-335
    • /
    • 2012
  • 본 논문에서는 CAT(Cellular Automata Transform) 성질을 이용하여 의료 영상의 단계적 변환을 제안한다. 적용 방법은 먼저, CAT 초기 값과 다양한 규칙에 따라 단계적으로 Gateway Values와 rule matrix에 대한 전이행렬 T를 이용하여 CAT 기저함수를 생성한다. 그런 다음, 생성된 CAT 기저함수를 의료 영상에 곱하여 영상을 다양한 방법으로 변환한다. 마지막으로, 키 공간 분석을 통하여 제안한 방법이 높은 영상 변환 및 보안의 성질을 가졌음을 검증한다.

  • PDF