• Title/Summary/Keyword: 출입보안시스템

Search Result 121, Processing Time 0.025 seconds

Watermark Recognition Techniques from a Distorted Image (왜곡된 영상으로부터 워터마크 인식 기법)

  • Maeng, Il Hee;Park, JiSu;Shon, Jin Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1541-1544
    • /
    • 2015
  • 최근 스마트폰으로 워터마크가 인쇄된 문서를 촬영하여 유출을 하는 범죄가 일어나고 있으며, 특별한 감시 방안이 없다. 이를 위해 정부 및 기업에서는 문서의 외부 유출을 막기 위해 복사기 및 팩스 장치에 워터마크 패턴 보호 기법을 탑재하여 광학적으로 불법 복제를 방지한다. 특히 기업에 출입시 스마트폰에 보안 앱들을 설치하고, 스마트폰으로 문서를 촬영할 경우 앱이 보안 문서를 인식하여 경고를 시스템에 알린다. 그러나 스마트폰으로 촬영된 영상은 카메라의 위치와 각도에 따라 왜곡 현상이 발생되어 워터마크가 훼손된다. 이렇게 훼손된 영상은 기존 워터마크 패턴 인식 방법으로는 정상적으로 인식 되지 않는 문제가 있다. 본 논문에서는 실험을 통하여 훼손된 워터마크를 보정하고 인식하는 알고리즘을 이용하여 인식률과 처리속도를 높인다.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

Design of Context-awareness Smart Digital DoorLock based on Open Source Hardware (오픈 소스 하드웨어 기반의 상황인식 스마트 디지털 도어락 설계)

  • Lee, Se-Hoon;Lee, Byeong-Gi;Lee, Soon-Chan;Lee, Deung-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.5-8
    • /
    • 2014
  • 본 논문에서는 오픈 소스 하드웨어를 이용한 상황인식 스마트 디지털 도어락 시스템을 제안한다. 이 시스템은 오픈 소스 하드웨어를 이용하여 효율적으로 개발기간을 단축하고, 상황인식 센서를 이용하여 사용자에게 편리성을 제공하는 것에 목적을 두고 있다. 이 시스템은 사물인터넷(IoT) 기술을 이용하여 사용자의 스마트 폰을 인식하고, 센서를 이용해 사용자가 문을 열려고 하는 행동 인식한다. 위 두 가지의 요건이 충족된다면, 사용자가 도어락에 별다른 인증 절차를 거치지 않고도 출입이 가능하며, 이러한 인증 절차의 간소화로 인해 편리성은 증대 되고, 보안성도 보다 효과적이다.

  • PDF

Development of step classification security system using artificial intelligence and radar (인공지능과 레이다를 활용한 걸음 분류 보안 시스템 개발)

  • Kwack, DaeWon;Kim, DaYun;Kim, JiHoon;Park, ChanYeol;Lee, JunHee;Kim, Hyung Hoon;Shim, Hyeon-min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.1207-1210
    • /
    • 2021
  • 본 본문은 사람의 걸음걸이를 분석을 하여 사람을 인식하는 시스템을 개발한다. mmWave 레이다 센서를 사용하여 사람의 걸음걸이를 인식하고 인식한 데이터를 바탕으로 어떤 사용자인지 분석한다. 데이터를 분석하여 등록된 사용자가 왔을 경우 개방하는 방식으로 출입을 통제하는 개폐 시스템을 사용하고 통신을 사용하여 스마트폰과 통신하여 문이 열리면 실시간으로 사용자가 볼 수 있게 한다.

Technical Suggestions for Smart Airport Realization - Viewpoint of Passenger Convenience (스마트공항 실현을 위한 기술적 제언 - 여객 편의성 관점)

  • Hong, Jin Woo;Oh, Jeong Hoon;Lee, Han Kyu;Kim, Moon Ku;Song, Ho Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.268-271
    • /
    • 2018
  • Smart Airport which applies the new ICT technologies to the airport is a future airport to provide convenient and safe services for passengers who are airport users, and promote the efficient management of the airport system in point of airport operator's view. The ranges of smart airport include the overall area of the airport like land side, terminal, and air side. In this paper, we propose a technical solution for airport process of terminal providing passenger convenience in various ranges for smart airport realization. Self-service such as web or mobile check-in, self check-in/tagging/back drop/boarding etc. should be strengthened to smartize the airport process and technologies such as automatic immigration, smart security search and automatic AI-based baggage search should be applied. In this paper, we explain the concept of smart airport and smart process, and then propose technical considerations.

  • PDF

The implementation of Access Control System using Biometric System (생체인식 시스템을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.494-498
    • /
    • 2004
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometries is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Bionietric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Weigand (Data format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

Design and Implementation of Wireless Multicommunication Circuit Based On USN (USN 기반의 무선 멀티 커뮤니케이션 회로 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.33-42
    • /
    • 2011
  • In this paper we designed and implemented a wireless communication circuit which can control the remote devices integrating RFID and ZigBee. This system unifies transmit part and receive part. And this system recognizes RFID tag data, then the recognized information is controlled by MCU, and transmitted to a remote device through the ZigBee. This is operated on TinyOS. If this system is applied to a entrance security system, it can permit/deny one's entrance as well as control the personal computer or other electronic devices. Our experiment shows the result of the recognized data transmission is very different according to a opened playground and a closed place. The data transmission time is stable in the indoor and the data transmission distance is long in the outdoor. We anticipate that our system be applied the various office oriented domains by connecting to the Wired LAN or the WLAN of IEEE 802.11x category.

A Study of Gate Control System Using RFID (RFID를 이용한 출입문 제어 시스템 연구)

  • Kang, Sung-Chul;Kim, Hyung-Chan;Doh, Yang-Hoi;Lee, Kwang-Man;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1505-1512
    • /
    • 2007
  • The RFID Technology (which is importantly used at the Ubiquitous environment) is attached to all of the units like the ID cards and then information on the units and units' environment is transferred and processed through the radio frequency. so it is the no touched recognition system. RFID Technology's research of the middle ware and wireless interface etc. is currently conducted and variously broaden like the industry of the distribution and logistics. This paper suggests that the gate control system which is based on RFID middle ware is realized to prevent the district and facility for security. The indication of this paper is that algorithm (which is to certificate Users' enterance through RFID EPC code) is proposed and realizes the user certification module, the control module of the gates' opening and closing, the maintenance module of the gate, the display module of coming and going information, test program ect. through RFID technology.

  • PDF