• Title/Summary/Keyword: Abnormal Crime

Search Result 21, Processing Time 0.025 seconds

The Method of Feature Selection for Anomaly Detection in Bitcoin Network Transaction (비트코인 네트워크 트랜잭션 이상 탐지를 위한 특징 선택 방법)

  • Baek, Ui-Jun;Shin, Mu-Gon;Jee, Se-Hyun;Park, Jee-Tae;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.18-25
    • /
    • 2018
  • Since the development of block-chain technology by Satoshi Nakamoto and Bitcoin pioneered a new cryptocurrency market, a number of scale of cryptocurrency have emerged. There are crimes taking place using the anonymity and vulnerabilities of block-chain technology, and many studies are underway to improve vulnerability and prevent crime. However, they are not enough to detect users who commit crimes. Therefore, it is very important to detect abnormal behavior such as money laundering and stealing cryptocurrency from the network. In this paper, the characteristics of the transactions and user graphs in the Bitcoin network are collected and statistical information is extracted from them and presented as plots on the log scale. Finally, we analyze visualized plots according to the Densification Power Law and Power Law Degree, as a result, present features appropriate for detection of anomalies involving abnormal transactions and abnormal users in the Bitcoin network.

AI-Based Intelligent CCTV Detection Performance Improvement (AI 기반 지능형 CCTV 이상행위 탐지 성능 개선 방안)

  • Dongju Ryu;Kim Seung Hee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.117-123
    • /
    • 2023
  • Recently, as the demand for Generative Artificial Intelligence (AI) and artificial intelligence has increased, the seriousness of misuse and abuse has emerged. However, intelligent CCTV, which maximizes detection of abnormal behavior, is of great help to prevent crime in the military and police. AI performs learning as taught by humans and then proceeds with self-learning. Since AI makes judgments according to the learned results, it is necessary to clearly understand the characteristics of learning. However, it is often difficult to visually judge strange and abnormal behaviors that are ambiguous even for humans to judge. It is very difficult to learn this with the eyes of artificial intelligence, and the result of learning is very many False Positive, False Negative, and True Negative. In response, this paper presented standards and methods for clarifying the learning of AI's strange and abnormal behaviors, and presented learning measures to maximize the judgment ability of intelligent CCTV's False Positive, False Negative, and True Negative. Through this paper, it is expected that the artificial intelligence engine performance of intelligent CCTV currently in use can be maximized, and the ratio of False Positive and False Negative can be minimized..

A Scheme on Object Tracking Techniques in Multiple CCTV IoT Environments (다중 CCTV 사물인터넷 환경에서의 객체 추적 기법)

  • Hong, Ji-Hoon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2019
  • This study suggests a methodology to track crime suspects or anomalies through CCTV in order to expand the scope of CCTV use as the number of CCTV installations continues to increase nationwide in recent years. For the abnormal behavior classification, we use the existing studies to find out suspected criminals or abnormal actors, use CNN to track objects, and connect the surrounding CCTVs to each other to predict the movement path of objectified objects CCTVs in the vicinity of the path were used to share objects' sample data to track objects and to track objects. Through this research, we will keep track of criminals who can not be traced, contribute to the national security, and continue to study them so that more diverse technologies can be applied to CCTV.

A Study on a Violence Recognition System with CCTV (CCTV에서 폭력 행위 감지 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • With the increased frequency of crime such as assaults and sexual violence, the reliance on CCTV in arresting criminals has increased as well. However, CCTV, which should be monitored by human labor force at all times, has limits in terms of budget and man-power. Thereby, the interest in intelligent security system is growing nowadays. Expanding the techniques of an objects behavior recognition in previous studies, we propose a system to detect forms of violence between 2~3 objects from images obtained in CCTV. It perceives by detecting the object with the difference operation and the morphology of the background image. The determinant criteria to define violent behaviors are suggested. Moreover, provable decision metric values through measurements of the number of violent condition are derived. As a result of the experiments with the threshold values, showed more than 80% recognition success rate. A future research for abnormal behaviors recognition system in a crowded circumstance remains to be developed.

Danger detection technology based on multimodal and multilog data for public safety services

  • Park, Hyunho;Kwon, Eunjung;Byon, Sungwon;Shin, Won-Jae;Jung, Eui-Suk;Lee, Yong-Tae
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.300-312
    • /
    • 2022
  • Recently, public safety services have attracted significant attention for their ability to protect people from crimes. Rapid detection of dangerous situations (that is, abnormal situations where someone may be harmed or killed) is required in public safety services to reduce the time required to respond to such situations. This study proposes a novel danger detection technology based on multimodal data, which includes data from multiple sensors (for example, accelerometer, gyroscope, heart rate, air pressure, and global positioning system sensors), and multilog data, which includes contextual logs of humans and places (for example, contextual logs of human activities and crime-ridden districts) over time. To recognize human activity (for example, walk, sit, and punch), the proposed technology uses multimodal data analysis with an attitude heading reference system and long short-term memory. The proposed technology also includes multilog data analysis for detecting whether recognized activities of humans are dangerous. The proposed danger detection technology will benefit public safety services by improving danger detection capabilities.

Prohibition Clauses of Business of Money Changing on the Game Industry Promotion Act of 2007 (게임산업진흥법상 환전업금지 조항의 의의와 해석)

  • Hwang, Seung-Heum
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.61-72
    • /
    • 2007
  • Prohibition Clauses of Business of Money Changing(${\S}32(1)7$) on the Game Industry Promotion Act of 2007 was introduced for the purpose of preventing game from becoming gambling. By making the independent requisite of constituting a crime that there was no criminal punishment former times, it is possible actively to deal with mixing of game and gambling. Prohibition Clauses of Business of Money Changing prevent the material or formless results that are obtained on the use of game from making a business of money change, intermediation of money change, or re-purchase of it. The material or formless results mean points, prizes, game moneys, or game data that is obtained on the abnormal use of a game. Most real money trade of a game item will be pull into the application of Prohibition Clauses of Business of Money Changing on the interpretation of it. Therefore this clauses have a tremendous effect upon the business of sweated workshops and intermediation web sites of game items. None the less Prohibition Clauses of Business of Money Changing will have positive influence to the future of game industry through the separation of game and gambling.

  • PDF

Real-Time Change Detection Architecture Based on SOM for Video Surveillance Systems (영상 감시시스템을 위한 SOM 기반 실시간 변화 감지 기법)

  • Kim, Jongwon;Cho, Jeongho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.109-117
    • /
    • 2019
  • In modern society, due to various accidents and crime threats committed to an unspecified number of people, individual security awareness is increasing throughout society and various surveillance techniques are being actively studied. Still, there is a decline in robustness due to many problems, requiring higher reliability monitoring techniques. Thus, this paper suggests a real-time change detection technique to complement the low robustness problem in various environments and dynamic/static change detection and to solve the cost efficiency problem. We used the Self-Organizing Map (SOM) applied as a data clustering technique to implement change detection, and we were able to confirm the superiority of noise robustness and abnormal detection judgment compared to the detection technique applied to the existing image surveillance system through simulation in the indoor office environment.

A Study on the Prediction Method of Voice Phishing Damage Using Big Data and FDS (빅데이터와 FDS를 활용한 보이스피싱 피해 예측 방법 연구)

  • Lee, Seoungyong;Lee, Julak
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.185-203
    • /
    • 2020
  • While overall crime has been on the decline since 2009, voice phishing has rather been on the rise. The government and academia have presented various measures and conducted research to eradicate it, but it is not enough to catch up with evolving voice phishing. In the study, researchers focused on catching criminals and preventing damage from voice phishing, which is difficult to recover from. In particular, a voice phishing prediction method using the Fraud Detection System (FDS), which is being used to detect financial fraud, was studied based on the fact that the victim engaged in financial transaction activities (such as account transfers). As a result, it was conceptually derived to combine big data such as call details, messenger details, abnormal accounts, voice phishing type and 112 report related to voice phishing in machine learning-based Fraud Detection System(FDS). In this study, the research focused mainly on government measures and literature research on the use of big data. However, limitations in data collection and security concerns in FDS have not provided a specific model. However, it is meaningful that the concept of voice phishing responses that converge FDS with the types of data needed for machine learning was presented for the first time in the absence of prior research. Based on this research, it is hoped that 'Voice Phishing Damage Prediction System' will be developed to prevent damage from voice phishing.

Efficient Multi-spot Monitoring System Using PTZ Camera and Wireless Sensor Network (PTZ 카메라와 무선 센서 네트워크를 이용한 효율적인 다중 지역 절전형 모니터링 시스템)

  • Seo, Dong-kyu;Son, Cheol-su;Yang, Su-yeong;Cho, Byung-lok;Kim, Won-jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.581-584
    • /
    • 2009
  • Recently, the cameras which used for observation are installed in children protection area and local crime prevention area in order to protect life and property and by its work being recognized and are installed more. Normal cameras have cost problem to observe multiple area and detail, because they can observe only one place. PTZ camera can observe multiple area by moving focus by schedule or remote control, but it can't automatically move the focus of it to the place where event occurred, because it can't recognize the place. In this study, we can monitor multiple area effectively, by installing a wireless sensor node equipped with temperature, lighting, gas and human detection sensor to each area, to monitor many place low-price and actively and to move the focus of PTZ camera to preset position, and send recorded video to the user, when the various sensor data received from wireless sensors in observation area are to be determined abnormal by analyzing. In addition, at night we can record a scene using infrared, but to reduce power consumption of lighting system which are installed to improve resolution, it supplies power to the lighting system when event occurred. So we were able to implement low power green monitoring system.

  • PDF

A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information (RGB-D 정보를 이용한 2차원 키포인트 탐지 기반 3차원 인간 자세 추정 방법)

  • Park, Seohee;Ji, Myunggeun;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.41-51
    • /
    • 2018
  • Recently, in the field of video surveillance, deep learning based learning method is applied to intelligent video surveillance system, and various events such as crime, fire, and abnormal phenomenon can be robustly detected. However, since occlusion occurs due to the loss of 3d information generated by projecting the 3d real-world in 2d image, it is need to consider the occlusion problem in order to accurately detect the object and to estimate the pose. Therefore, in this paper, we detect moving objects by solving the occlusion problem of object detection process by adding depth information to existing RGB information. Then, using the convolution neural network in the detected region, the positions of the 14 keypoints of the human joint region can be predicted. Finally, in order to solve the self-occlusion problem occurring in the pose estimation process, the method for 3d human pose estimation is described by extending the range of estimation to the 3d space using the predicted result of 2d keypoint and the deep neural network. In the future, the result of 2d and 3d pose estimation of this research can be used as easy data for future human behavior recognition and contribute to the development of industrial technology.