• Title/Summary/Keyword: CCTVs

Search Result 97, Processing Time 0.026 seconds

Assessment technology for spatial interaction of Artificial Monitoring System through 3-dimensional Simulation (3차원 시뮬레이션을 이용한 인위감시체계의 공간대응성능 평가기술)

  • Kim, Suk-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1426-1433
    • /
    • 2015
  • CCTV-applied monitoring is an effective measure to suppress potential crimes and record objective relationship; however, there is no methodology that can quantitatively compare and assess the afore-mentioned effects. Thus, this study intended to construct the methodology and analysis application that can measure the changes in the space-corresponding performance of CCTVs depending on installation measures by using 3-dimenstional virtual simulation technology. For analysis, the raster-based Isovist theory was 3-dimensionally expanded and the amount of incident sight line to each point was accumulated. At the same time, the amount of overlapped monitoring in the CCTV cameras that were connected to each measurement node was accumulated for cross-analysis. By applying the examples and analyzing the results, it was possible to construct an analysis application in use of collision detection model and quantify the changes of monitoring performance depending on positioning alternative of the cameras. Moreover, it enabled intuitive review and supplementation by reproducing visible shadow areas in a graph.

An OpenPose-based Child Abuse Decision System using Surveillance Video (감시 영상을 활용한 OpenPose 기반 아동 학대 판단시스템)

  • Yoo, Hye-Rim;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.282-290
    • /
    • 2019
  • Recently child abuse has occurred frequently in educational institutions such as daycare center and kindergarten. Therefore, government made it mandatory to install CCTVs, but it is not easy to inspect the CCTV images. In this paper, we propose a model for judging child abuse using CCTV images. First of all, child abuse is a physical abuse of children by adults, thus a model for classifying adults and children is needed. The existing Haar scheme uses the frontal image to classify adults and children. However, the OpenPose allows to classify adults and children regardless of frontal and side image. In this research, a child abuse judgment model was designed and implemented by applying characteristics of adult and child posture when a child was abused. Since the implemented system utilizes the currently installed CCTV image, it is possible to monitor the child abuse in real time without any additional installation, which enables us to cope with the abuse promptly.

CCTV Cooperation Authentication Model Using Block Chain (블록체인을 이용한 CCTV 협력 검증 모델)

  • Kwon, Yong-Been;An, Kyu-Hwang;Kwon, Hyeok-Dong;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.462-469
    • /
    • 2019
  • According to the survey of Ministry of the Interior and Safety in Korea, The number of public and private CCTV reached over ten million and is still increasing. Also with improving Image Processing Technology, it is possible to obtain diverse information. Recently, various services using CCTV are being provided. Therefore it is necessary to ensure CCTV image integrity. However there is no system to prove events in film yet. In this paper, we suggest system model that can manage, use and authenticate CCTV. This model allows a CCTV film to be verified by other nearby CCTVs' data. This model ensures film's integrity by using blockchain. And also, It addresses privacy problem in CCTV and file size problem in blockchain by using not large film data but much smaller analyzed data.

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

Detection of Abnormal Vessel Trajectories with Convolutional Autoencoder (합성곱 오토인코더를 이용한 이상거동 선박 식별)

  • Son, June-Hyoung;Jang, Jun-Gun;Choi, Bongwan;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.190-197
    • /
    • 2020
  • Recently there was an incident that military radars, coastal CCTVs and other surveillance equipment captured a small rubber boat smuggling a group of illegal immigrants into South Korea, but guards on duty failed to notice it until after they reached the shore and fled. After that, the detection of such vessels before it reach to the Korean shore has emerged as an important issue to be solved. In the fields of marine navigation, Automatic Identification System (AIS) is widely equipped in vessels, and the vessels incessantly transmits its position information. In this paper, we propose a method of automatically identifying abnormally behaving vessels with AIS using convolutional autoencoder (CAE). Vessel anomaly detection can be referred to as the process of detecting its trajectory that significantly deviated from the majority of the trajectories. In this method, the normal vessel trajectory is gridded as an image, and CAE are trained with images from historical normal vessel trajectories to reconstruct the input image. Features of normal trajectories are captured into weights in CAE. As a result, images of the trajectories of abnormal behaving vessels are poorly reconstructed and end up with large reconstruction errors. We show how correctly the model detects simulated abnormal trajectories shifted a few pixel from normal trajectories. Since the proposed model identifies abnormally behaving ships using actual AIS data, it is expected to contribute to the strengthening of security level when it is applied to various maritime surveillance systems.

An Method for Inferring Fine Dust Concentration Using CCTV (CCTV를 이용한 미세먼지 농도 유추 방법)

  • Hong, Sunwon;Lee, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1234-1239
    • /
    • 2019
  • This paper proposes a method for measuring fine dust concentration through digital processing of images captured by only existing CCTVs without additional equipment. This image processing algorithm consists of noise reduction, edge sharpening, ROI setting, edge strength calculation, and correction through HSV conversion. This algorithm is implemented using the C ++ OpenCV library. The algorithm was applied to CCTV images captured over a month. The edge strength values calculated for the ROI region are found to be closely related to the fine dust concentration data. To infer the correlation between the two types fo data, a trend line in the form of a power equation is established using MATLAB. The number of data points deviating from the trend line accounts for around 12.5%. Therefore, the overall accuracy is about 87.5%.

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

Study on the Electromagnetic Shielding of Accessory Device without Electromagnetic Shielding Technology in the Magnetic Resonance Room (자기공명검사실 내 전자기파 차단이 이루어지지 않은 부속장치의 차폐에 관한 연구)

  • Son, Soon-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.431-436
    • /
    • 2021
  • In this study, a new shielding method was applied to an accessory device that produces electromagnetic waves in the magnetic resonance room to prevent the generation of artifact caused by electromagnetic waves. The research method applied a new shielding made of metal plating fiber to patient surveillance CCTVs without shielding technology, and obtained and evaluated noise map when the power was not cut off and when the new shielding technology was applied without shutting down the CCTV. As a result of the study, it was found that there was at least one group with significant differences. Type I and type III belonged to group 1 while type II belonged to group 2 in the Post-hoc analysis, which meant blocking power of the CCTV and the applying new shielding technology were in the same group. In conclusion, if electromagnetic waves are generated due to additional accessories in the scanning room, the shielding material proposed in this study should be applied which enables the electric state become similar to type I, not generating noise, thereby preventing the artifacts caused by electromagnetic waves.

A Study on the Crime Prediction System using Big Data (빅데이터를 이용한 범죄 예측 시스템에 관한 연구)

  • Han, Sang-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1113-1122
    • /
    • 2020
  • Recently, as violent crimes of crime without reason (Korea : Do not ask), women and the elderly are getting serious. In the existing system, many CCTVs are installed, but it is difficult to prevent crime due to only follow-up measures after a crime occurs. This device prevents crime through this device for incidents in shaded areas and closed spaces such as apartments and buildings. To do this, we research this technology to develop products and software. It sends an alarm signal using communication technology to a specific place where you want to receive an event of an alarm or a CCTV device operated using image analysis big data technology and convergence sensor technology for a specific target of the behavior expected to be a crime or movement. Develop the device. This development device researches and develops this device and supplies low-cost devices to consumers, which is used as a device that predicts the occurrence of crime in advance, processes it as an alarm signal in real time, and transmits it, and constitutes a standalone device and a server. Will provide the device to be connected.

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.