• Title/Summary/Keyword: 지능형 감시 시스템

Search Result 276, Processing Time 0.029 seconds

PTZ Camera Based Multi Event Processing for Intelligent Video Network (지능형 영상네트워크 연계형 PTZ카메라 기반 다중 이벤트처리)

  • Chang, Il-Sik;Ahn, Seong-Je;Park, Gwang-Yeong;Cha, Jae-Sang;Park, Goo-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11A
    • /
    • pp.1066-1072
    • /
    • 2010
  • In this paper we proposed a multi event handling surveillance system using multiple PTZ cameras. One event is assigned to each PTZ camera to detect unusual situation. If a new object appears in the scene while a camera is tracking the old one, it can not handle two objects simultaneously. In the second case that the object moves out of the scene during the tracking, the camera loses the object. In the proposed method, the nearby camera takes the role to trace the new one or detect the lost one in each case. The nearby camera can get the new object location information from old camera and set the seamless event link for the object. Our simulation result shows the continuous camera-to-camera object tracking performance.

The encryption research of the sensor gateway for traffic surveillance and control system (교통감시.제어시스템을 위한 센서게이트웨이 암호화 연구)

  • Lim, Il-Kwon;Kim, Young-Hyuk;Park, So-Ah;Gui, Li Qi;Lee, Jae-Kwang;Park, Woo-Jun;Cheon, Byeong-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.477-480
    • /
    • 2010
  • This paper develops a sensor gateway for using Internet for traffic flow control and remote monitoring, it suggest the required protocol with authentication and encryption. The traffic Surveillance and Control System is an important service to the ITS(Intelligent Transportation System). The traffic surveillance and control system's TCP / IP and the Internet network using is may cause damage means accessing from unauthorized users, Subsequent authentication and encryption of data is essential.

  • PDF

A design and implementation of Intelligent object recognition system in urban railway (도시철도내 지능형 객체인식 시스템 구성 및 설계)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.209-214
    • /
    • 2018
  • The subway, which is an urban railway, is the core of public transportation. Urban railways are always exposed to serious problems such as theft, crime and terrorism, as many passengers use them. Especially, due to the nature of urban railway environment, the scope of surveillance is widely dispersed and the range of surveillance target is rapidly increasing. Therefore, it is difficult to perform comprehensive management by passive surveillance like existing CCTV. In this paper, we propose the implementation, design method and object recognition algorithm for intelligent object recognition system in urban railway. The object recognition system that we propose is to analyze the camera images in the history and to recognize the situations where there are objects in the landing area and the waiting area that are not moving for more than a certain time. The proposed algorithm proved its effectiveness by showing detection rate of 100% for Selected area detection, 82% for detection in neglected object, and 94% for motionless object detection, compared with 84.62% object recognition rate using existing Kalman filter.

Robust Detection of Abandoned Objects Using Visual Context (시각적 정황을 이용한 가림 현상에 강건한 버려진 물체 검출)

  • Lee, Jung-Hyun;Im, Jae-Hyun;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.60-66
    • /
    • 2012
  • In this paper, we propose abandoned object detection algorithm. When abandoned object was occluded other object, the existing methods cannot detect abandoned object because those methods are not able to estimate the location of abandoned object. In order to overcome this problem, the proposed algorithm extracts the corners around abandoned object. The detected corners are linked to center of abandoned object called by supporters. We can then estimate the location of abandoned object by using supporters. Therefore, the proposed algorithm can detect and estimate the location of abandoned object, when abandoned object is occluded by other object. For this reason, the proposed algorithm can be applied to intelligent surveillance system to prevent bomb terror, which disguises as luggage or box.

Design of Video Analytics Information Management System for Optimizing the Storage Load. (스토리지 부하 최적화를 위한 영상분석정보 관리시스템 설계)

  • Shim, Jae-Sung;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.941-942
    • /
    • 2014
  • 본 논문에서는 기존 지능형 영상감시 시스템에서의 영상정보 분석 시 발생하는 XML 데이터가 불필요하게 많이 생성(XML data 30ea/1s)되어 스토리지의 저장 및 관리 부하를 개선하기 위해 분석되어진 XML 데이터를 Parsing & Filtering하여 저장함으로써 생성되는 데이터를 간소화함으로써, 효율적인 관리가 가능한 스토리지 부하 최적화를 위한 영상분석정보 관리시스템을 설계하였다.

The Implementation of Face Recognition System for Intelligent Surveillance (지능형 영상 보안을 위한 얼굴 인식 시스템 구현)

  • Kim, Su-Hyun;Jeong, Chang-sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1401-1403
    • /
    • 2013
  • 사건 발생 후의 대응이 아닌 영상 분석을 통해 실시간으로 위협 상황에 대응할 수 있는 지능형 영상 보안 기술이 매우 중요한 이슈가 되고 있다. 본 논문에서는 지능형 영상 보안에 사용할 수 있는 실시간 얼굴 인식 및 추적 기법을 제안한다. 사람의 정면 얼굴 영상을 ASM(Active Shape Model) 알고리즘을 이용하여 정규화 시키고 Gabor Wavelet Filter를 이용하여 얼굴 고유 특징 벡터를 추출하여 인식에 사용하였다. 인식이 완료된 얼굴은 Camshift와 Kalman Filter를 이용하여 카메라 감시 영역에서 벗어날 때까지 강건한 추적을 통하여 관리자가 실시간으로 확인 및 대응할 수 있게 하였다.

Soundsource Localization and Tracking System of Intruder for Intelligent Surveillance System (지능형 감시 시스템 구축을 위한 침입자의 음원 위치 파악 및 추적 시스템)

  • Park, Jung-Hyun;Yeom, Hong-Gi;Jung, Bong-Gyu;Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.6
    • /
    • pp.786-791
    • /
    • 2007
  • In the place that its security is crucial, the necessity of system which can tract and recognize random person is getting more important. In this paper, we'd like to develop the invader tracking system which consists of the sound source tracking-sensor and the pan-tilt camera for wide-area guard. After detecting the direction of any sound with the sound source tracking-sensor at first, our system make move the pan-tilt camera to that direction and extract reference image from that camera. This reference image is compared and updated by the next captured image after some interval time. By keeping on it over again, we can realize the guard system which can tract an invader using the difference image and the result of another image processing. By linking home network security system, the suggested system can provide some interfacing functions for the security service of the public facilities as well as that of home.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

The encryption research of traffic surveillance and control system for the ITS (ITS를 위한 교통감시·제어시스템의 암호화 연구)

  • Lim, Il Kwon;Kim, young Hyuk;Li, Qi Gui;Lee, Jae Kwang;Lee, Soo Kyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.198-201
    • /
    • 2010
  • 본 논문은 현재 국내 외에서 활발히 연구개발이 진행되고 있는 지능형 교통시스템(ITS: Intelligent Transportation System)의 중요한 역할을 하게 되는 원격감시망의 교통감시 제어시스템을 Internet을 이용하여 개발하고 그에 따라 데이터 송 수신 시 발생할 수 있는 정보 보안의 취약점을 해소하기 위해 대칭암호 알고리즘인 AES(Advanced Encryption Standard) 알고리즘을 적용하였다.

Abnormal behavior detection using Gaussian Mixture Model and Optical Flow (가우시안 혼합 모델과 옵티컬 플로우 기법을 이용한 특이행동 인지 기법 연구)

  • Park, Jong-Hyun;Lim, Sung-Jo;Kang, Dong-Joong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.173-176
    • /
    • 2009
  • 본 논문에서는 감시시스템이 갖추어진 환경 내에서 발생할 수 있는 특이 행동을 효율적으로 감지하기 위한 기법을 제시한다. 최근 대형 범죄 및 방화 사건 등의 방지목적으로 DVR 의 단순 녹화를 벗어나 지능형 감시시스템을 도입하려는 연구가 활발히 진행되고 있다. 그러나 이러한 시스템들은 아직 초기 연구 단계에 있으며 영상내의 관심물체 추출을 위한 전경과 배경의 분리 및 추적 단계에 그치고 있다. 이에 본 논문에서는 가우시안 혼합 모델을 통하여 전경과 배경을 분리하고, 관심영역에 한해서 Optical Flow 기법을 이용하여 폭력상황과 같은 특이 행동의 감지 여부를 판단 할 수 있는 방법에 대해 실험을 통해 평가하였다.