• Title/Summary/Keyword: 출입감시

Search Result 61, Processing Time 0.034 seconds

Smart CCTV for Human Detection (인체감지 스마트 감시 카메라)

  • Choi, Duk-Kyu;Jang, Tae-Jin;Oh, Seung-Hun;Kang, Chang-wook;Lim, Joung-Woo;Kim, Bo-Young;Lim, Young-Woong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.667-668
    • /
    • 2020
  • 최근에는 범죄예방과 시설물 안전 및 출입관리, 화제예방 등 다양한 목적으로 감시카메라(CCTV)가 널리 보급되어 공공기관이나 상업시설 등 어느 곳에서나 찾을 수 있다. 이렇듯 많은곳에서 저마다의 이유로 사용되고 있는 감시카메라지만, 가장 흔하게 사용되는 이유는 범죄예방에 있다. 시설 내·외부에 감시카메라를 설치하여 도난사건 등을 사전에 방지하고 사후 증거확보에 유용하게 쓰일 수 있기 때문인데 문제는 감시카메라를 통해 사건을 사전에 방지하기 위해서는 실시간으로 사람이 카메라 영상을 지켜보고 있어야 한다. 하지만 사람이 항상 감시할수있을수는 없기 때문에 예방보다는 사후 증거확보를 위해 사용되는 실정이다. 즉 대부분의 감시카메라가 본래의 역할에 절반밖에 하지 못하고 있다는 것이다. 본 과제는 이러한 문제점을 해결하기 위해 감시카메라 자체의 기능을 추가하여 감시카메라가 인력을 필요로 하지않고 스스로 본래의 역할을 다할수있게 할 것이다.

  • PDF

Intelligent Video Surveillance System for Video Analysis, Recognition and Tracking (비디오 영상분석, 인식 및 추적을 위한 지능형 비디오 감시시스템)

  • Kim, Tae-Kyung;Paik, Joon-Ki
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.498-500
    • /
    • 2012
  • 비디오 해석 및 추적기술은 특정한 시스템에서만 적용되는 것이 아니다. 이것은 비디오 내에서 의미 있는 정보를 능동적으로 감시 대상을 정의, 해석, 모델화, 추정 및 추적 할 수 있는 기반 기술을 의미하다. 일반적으로 감시시스템에서 감시 대상은 사람이나 차량이며, 상황에 따라 출입통제 구역으로 설정하기도 한다. 이는 연속된 영상에서 객체의 형태, 모양, 행동 분석, 움직임, 색상정보를 가지고 데이터 정의, 검출, 모델화를 통하여 인식, 식별 그리고 추적한다. 본 논문에서는 비디오 영상분석을 통해 단일카메라기반의 감시시스템과 PTZ 카메라기반 감시시스템 제안한다. 이때 단일 카메라기반의 감시는 배경생성방법을 이용하여 연속된 영상내의 객체를 지속적으로 관리가 가능하도록 설계하였고, PTZ 카메라기반의 감시는 카메라의 이동에 따른 배경안정화 방법과 카메라의 절대좌표를 활용하여 카메라 이동을 제어함과 동시에 오검출 문제를 해결하였다. 실험 및 결과분석으로는 시나리오 환경에서 배경생성방법을 이용한 검출의 정확성과 PTZ카메라 위치 변화에도 강인한 검출 결과를 비교 분석하였다.

A Face Recognition Based Retrieval for Surveillance System (감시 시스템을 위한 얼굴 인식 기반의 검색)

  • Lee, Jong-uk;Park, Seung-jin;Lee, Han-sung;Park, Dai-hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.588-591
    • /
    • 2010
  • 본 논문에서는 CCTV 감시 환경에서 얼굴 이미지를 이용하여 영상에 저장된 범죄 용의자 또는 특정한 시간대에 출입한 사람들을 검색할 수 있는 시스템을 설계 및 구현하였다. 제안된 시스템은 감시 영상을 효율적으로 검색하기 위하여 사람의 얼굴이 나타난 장면을 기반으로 감시 영상을 분할하였으며, 최근 얼굴 인식 분야에서 성공적인 업적을 보여주고 있는 신호 처리 분야의 SRC 를 이용하여 얼굴 검색 모듈을 구성하였다. 자체 제작한 KUFD(Korea University Face Database)와 CCTV 환경의 얼굴 인식 기반 검색 시스템 환경을 캠퍼스 내에서 모의 구축하여 제안된 시스템의 성능을 실험적으로 검증하였다.

Digital Video Recoding System for Security based on USN (USN 기반 보안 감시 디지털 비디오 녹화 시스템)

  • Ha, Eun-Yong;Choi, Hyun Jin;Bae, Tae Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.857-859
    • /
    • 2007
  • 기존의 보안용 감시 녹화 시스템은 유선, Ethernet, WIFI 기술을 이용해서 서버 녹화 장비에 기록하는 방식을 많이 사용하고 있다. 본 논문에서는 ZigBee 무선 통신과 센서 네트워크 기술을 기반으로 보안 감시 녹화 시스템을 설계하고 프로토타입을 구현하였다. 녹화 시스템은 사람의 출입이 있을 때만 동작하도록 인체 감지 센서와 무선 ZigBee 모듈이 탑재된 소형 모트, 감시 카메라, 녹화 및 웹을 통한 제어 기능이 가능하도록 웹서버가 포팅된 전용 임베디드 보드로 구성되고, 소프트웨어로는 카메라를 제어하는 기능, 녹화된 비디오를 관리하는 기능을 갖는 프로그램을 개발하였다.

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

Design of Automatic Inspection System for Maintenance of Unmanned Monitoring Facility (무인감시설비 유지보수를 위한 자동점검시스템 설계)

  • Moon, Chaeyoung;Kim, Semin;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.515-517
    • /
    • 2018
  • Access to public facilities such as substations, dams and railway facilities is strictly controlled, and unmanned surveillance equipment has been introduced and operated recently due to the development of IT technology and the government's cost reduction policy. However, if an unmanned surveillance system is broken, surveillance space, information leakage caused by intruders, and damage to facilities may occur. Also, it is necessary to check periodical visit by the manager in order to check the surveillance facilities, which causes additional management costs. In order to solve this problem, we designed a system to check the operation status of the unmanned monitoring facility in real time, attempt to recover automatically when a problem occurs, and notify the administrator of the problem. The designed system consists of an NVR that receives and judges information such as image, sound, and lighting condition, and a control device that detects and restores the state of the unmanned monitoring facility. The system proposed in this paper is expected to contribute to the improvement of the economic efficiency due to the minimization of surveillance space due to the failure of the unmanned monitoring facility and the reduction of the inspection cost.

  • PDF

Surveillance Video Summarization System based on Multi-person Tracking Status (다수 사람 추적상태에 따른 감시영상 요약 시스템)

  • Yoo, Ju Hee;Lee, Kyoung Mi
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.2
    • /
    • pp.61-68
    • /
    • 2016
  • Surveillance cameras have been installed in many places because security and safety has become an important issue in modern society. However, watching surveillance videos and judging accidental situations is very labor-intensive and time-consuming. So now, requests for research to automatically analyze the surveillance videos is growing. In this paper, we propose a surveillance system to track multiple persons in videos and to summarize the videos based on tracking information. The proposed surveillance summarization system applies an adaptive illumination correction, subtracts the background, detects multiple persons, tracks the persons, and saves their tracking information in a database. The tracking information includes tracking one's path, their movement status, length of staying time at the location, enterance/exit times, and so on. The movement status is classified into six statuses(Enter, Stay, Slow, Normal, Fast, and Exit). This proposed summarization system provides a person's status as a graph in time and space and helps to quickly determine the status of the tracked person.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Design of Access Security System in conjunction with SNS Service based on the Physical Computing (피지컬 컴퓨팅 기반에서의 SNS 서비스를 연계한 출입 보안 시스템 설계)

  • Kim, Heewan;Jung, Gillyoung
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.93-101
    • /
    • 2015
  • Today, various access security technology appeared in this society as a result of the informatization and automation. Most building, floor, or door security certification system for the office units are installed, but there are many inconvenient matters. In order to minimises this, we used the face recognition function via the camera, and various sensors. In this paper, I designed the access security system through physical computing which Arduino offered, facial recognition program, and Twitter. Check that the personal information stored in the individual RFID tag is matched to the personal information stored on the existing server. Face recognition program input the face using a camera, and allow to confirm the identity. The system's abnormal or when the unauthenticated person is to penetrate, the system transmits the Twitter status message to the manager. It was designed continuously to monitor the status in real time in this way.

Robot Navigation Control using Laserscanner to Restrict Human Movement (인간행동제약을 위한 레이저파인더 기반의 로봇주행제어)

  • Jin, Tae-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1070-1075
    • /
    • 2013
  • In this research, we describe a security robot system and ongoing research results to control human's wrong direction in order to forbid human to enter security zone. Proposed robot system surveils a security area with equipped laserscanner sensor usually. When it detect walking human who is for the area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. The walking human is assumed to be a point-object and projected onto an scanning plane to form a geometrical constraint equation that provides position data of the human based on the kinematics of the mobile robot. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.