• Title/Summary/Keyword: ID 식별

Search Result 195, Processing Time 0.029 seconds

A Unique Identification hiding technique for Internet Broadcast service of Digital Audio (디지털 오디오의 인터넷 방송 서비스를 위한 저작물 식별 코드 은닉 기술)

  • 신승원;김종원;최종욱
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2001.11b
    • /
    • pp.163-168
    • /
    • 2001
  • 본 논문은 인터넷을 이용한 방송 서비스에서 저작권 보호 및 저작물 식별을 위한 고유 식별 정보(unique identification)를 삽입, 추출하는 기술을 제안한다. 인터넷을 통한 방송 서비스의 활성화를 위해서는 저작권의 보호와 저작물의 불법 사용 방지, 저작물에 대한 저작권료 지불, 그리고 차후에 불법 사용자의 적발 등을 할 수 있는 기술이 필요하다. 본 논문에서 제안하는 기술은 디지털 음악을 소비자에게 서비스할 때, 사용자의 아이디(ID)와 신상 정보를 이용해서 생성된 정보와 음악의 식별 정보를 같이 저작물에 삽입하여 다운로드 받은 음악 파일이나 또는 청취 중에 녹음한 음악 파일을 불법으로 유통시킬 경우에 유통된 음악 파일에서 삽입된 식별코드를 추출하여 음악 파일의 불법 유통경로를 추적하여 불법 사용자를 적발할 수 있는 기능을 갖고 있다. 이러한 기능을 만족시키기 위해서 인터넷 서비스에서 널리 이용되는 MP3, AAC, WMA 등과 같은 손실 압축을 거친 이후에도 삽입된 워터마크를 검출할 수 있으며, 일반 사용자들이 손쉽게 접할 수 있는 여러 신호처리에도 강인한 특성을 갖는 기술을 제안한다.

  • PDF

A Attendance-Absence Checking System using the Self-organizing Face Recognition (자기조직형 얼굴 인식에 의한 학생 출결 관리 시스템)

  • Lee, Woo-Beom
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.72-79
    • /
    • 2010
  • A EAARS(Electronic Attendance-Absence Recording System) is the important LSS(Learning Support System) for blending a on-line learning in the face-to-face classroom. However, the EAARS based on the smart card can not identify a real owner of the checked card. Therefore, we develop the CS(Client-Sever) system that manages the attendance-absence checking automatically, which is used the self-organizing neural network for the face recognition. A client system creates the ID file by extracting the face feature, a server system analyzes the ID file sent from client system, and performs a student identification by using the Recognized weight file saved in Database. As a result, The proposed CS EAARS shows the 92% efficiency in the CS environment that includes the various face image database of the real classroom.

Video Analysis System for Action and Emotion Detection by Object with Hierarchical Clustering based Re-ID (계층적 군집화 기반 Re-ID를 활용한 객체별 행동 및 표정 검출용 영상 분석 시스템)

  • Lee, Sang-Hyun;Yang, Seong-Hun;Oh, Seung-Jin;Kang, Jinbeom
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.89-106
    • /
    • 2022
  • Recently, the amount of video data collected from smartphones, CCTVs, black boxes, and high-definition cameras has increased rapidly. According to the increasing video data, the requirements for analysis and utilization are increasing. Due to the lack of skilled manpower to analyze videos in many industries, machine learning and artificial intelligence are actively used to assist manpower. In this situation, the demand for various computer vision technologies such as object detection and tracking, action detection, emotion detection, and Re-ID also increased rapidly. However, the object detection and tracking technology has many difficulties that degrade performance, such as re-appearance after the object's departure from the video recording location, and occlusion. Accordingly, action and emotion detection models based on object detection and tracking models also have difficulties in extracting data for each object. In addition, deep learning architectures consist of various models suffer from performance degradation due to bottlenects and lack of optimization. In this study, we propose an video analysis system consists of YOLOv5 based DeepSORT object tracking model, SlowFast based action recognition model, Torchreid based Re-ID model, and AWS Rekognition which is emotion recognition service. Proposed model uses single-linkage hierarchical clustering based Re-ID and some processing method which maximize hardware throughput. It has higher accuracy than the performance of the re-identification model using simple metrics, near real-time processing performance, and prevents tracking failure due to object departure and re-emergence, occlusion, etc. By continuously linking the action and facial emotion detection results of each object to the same object, it is possible to efficiently analyze videos. The re-identification model extracts a feature vector from the bounding box of object image detected by the object tracking model for each frame, and applies the single-linkage hierarchical clustering from the past frame using the extracted feature vectors to identify the same object that failed to track. Through the above process, it is possible to re-track the same object that has failed to tracking in the case of re-appearance or occlusion after leaving the video location. As a result, action and facial emotion detection results of the newly recognized object due to the tracking fails can be linked to those of the object that appeared in the past. On the other hand, as a way to improve processing performance, we introduce Bounding Box Queue by Object and Feature Queue method that can reduce RAM memory requirements while maximizing GPU memory throughput. Also we introduce the IoF(Intersection over Face) algorithm that allows facial emotion recognized through AWS Rekognition to be linked with object tracking information. The academic significance of this study is that the two-stage re-identification model can have real-time performance even in a high-cost environment that performs action and facial emotion detection according to processing techniques without reducing the accuracy by using simple metrics to achieve real-time performance. The practical implication of this study is that in various industrial fields that require action and facial emotion detection but have many difficulties due to the fails in object tracking can analyze videos effectively through proposed model. Proposed model which has high accuracy of retrace and processing performance can be used in various fields such as intelligent monitoring, observation services and behavioral or psychological analysis services where the integration of tracking information and extracted metadata creates greate industrial and business value. In the future, in order to measure the object tracking performance more precisely, there is a need to conduct an experiment using the MOT Challenge dataset, which is data used by many international conferences. We will investigate the problem that the IoF algorithm cannot solve to develop an additional complementary algorithm. In addition, we plan to conduct additional research to apply this model to various fields' dataset related to intelligent video analysis.

The Analysis of TxID Signal's Effect to Legacy Receivers in ATSC DTV System (ATSC DTV 시스템에서 TxID 신호가 기존 수신기에 미치는 영향 분석)

  • Mok, Ha-Kyun;Park, Sung-Ik;Lee, Jae-Kwon;Ryu, Ho-Jin;Kim, Heung-Mook
    • Journal of Broadcast Engineering
    • /
    • v.15 no.3
    • /
    • pp.414-425
    • /
    • 2010
  • When we implement the single frequency network (SFN) in ATSC terrestrial DTV system, there is an interference problem to DTV receivers due to the use of same frequency channel among transmitters and repeaters. To resolve this problem, it is recommended to adopt the transmitter identification signals in transmitting equipments. In this paper, we analyzed the influence suffered by legacy DTV receivers when the TxID signal is added to the DTV transmitting signals and the results were further verified by computer simulation, laboratory test and field test. The above tests show that if the TxID signal is added to the level of -30dB compared to the original DTV signal, the TOV(Threshold Of Visibility) increment in legacy receivers is about 0.17 dB. It means that we can insert and transmit the TxID signal in ATSC terrestrial DTV system without making the negative effect to the legacy DTV receivers.

ID기반의 영지식 대화형 프로토콜을 이용한 개인 식별 및 키 분배 프로토콜에 관한연구

  • 이윤호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.2 no.1
    • /
    • pp.3-14
    • /
    • 1992
  • 본 논문에서는 ZKIP의 랜덤 정보를 이용한 영지식 키 분배 프로토콜을 제안하였다.제안된 방식은 이미 안전하다고 입증된 ZKIP 을 이용한 개인 식별을 행하고 더 이상의 정보 교환 없이 키 생성을 할 수 있다. 또한 키 분배 프로토콜을 행할 때, 센터에 대한 의존도를 줄이기 위해 확장 Fist-Shamir방식과 Schnorr 방식을 결합하여 인증을 행하도록 하였다. 결합된 프로토콜은 제3자의 일반적인 위장을 방지할 수 있으며, 센터와 가입자의 결탁도 방지할 수 있다.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

A Study of Spreading code for Watermarking of TxID of ATSC-DTV (ATSC-DTV의 송신기 식별을 위한 워터마킹용 확산코드에 관한 연구)

  • Cha Jae-Sang;Choi Seong-Jin;Lee Seon-Hee;Lee Kwang-Jik;Lee Yong-Tae;Park Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.100-106
    • /
    • 2006
  • In this paper, we proposed a TxID(Transmitter Identification) system using ZCD (Zero Correlation Duration) code as interference-cancelled spread codes for single frequency network of ATSC terrestrial DTV broadcasting. ZCD codes are simply implemented and have ZCD characteristics. Then, Proposal system can fundamentally solve interference problems caused by ICI(Inter Code Interference) and MPI(Multi-Path Interference) which happens in TxID system using spread coding method. Also, those can cancel truncated error which happens at watermarking for TxID since those can remove its period. In this paper, we identified the availability of TxID system applying interference-cancelled ZCD codes by analyzing DER (Detection Error Rate) which is simulated in various interference environments such as AWGN, ICI, and MPI.

Efficient Digital Signal Processing of DTV TxID Based On Decimation Algorithm (Decimation 알고리즘을 이용한 DTV TxID수신 신호의 효율적인 신호처리 기법에 관한 연구)

  • Son, Ju-Hee;Lee, Yong-Tae;Park, Sung-Ik;Kim, Heung-Mook;Seo, Jae-Hyun;Lee, Jae-Young;Cha, Jae-Sang
    • Journal of Broadcast Engineering
    • /
    • v.12 no.3
    • /
    • pp.266-277
    • /
    • 2007
  • Recently, Transmitter Identification(TxID) technology has been issued as a technology of ATSC DTV. ATSC DTV networks are comprised of a plurality of transmitters, broadcasting the same signal sing one frequency network(SFN) connected to EDOCR. In this single frequency network, TxID technology has been recognized as a technology in the ATSC DTV system since it enables the broadcast authorities and classify multiple transmitters. However, conventional TxID uses extremely long spreading sequence to identifying transmitters, so it increases H/W complexity and registers. Thus, to solve those hardware problems, we propose an efficient signal processing technology using decimation algorithm. Furthermore, we certified the availability of the proposed algorithm via various simulations.

A Study of Transmitter Detection Method for LED-ID using OOK-SS Watermarking (OOK-SS Watermarking을 이용한 LED-ID용 송신기 검출기법에 관한 연구)

  • Cha, Jae-Sang;Kim, Jin-Young;Jang, Yeong-Min;Lim, Yoon-Sik;Kim, Jong-Tae;Lee, Kyong-Gun;Lee, Min-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.281-285
    • /
    • 2010
  • We propose new identification method of LED location in indoor environment. It can transmit and receive position information and additional data, as applying OOK-SS watermarking method for LED transmission signal. Especially, we use a unipolar form code for watermarking spread code, because LED signal has unipolar characteristic. we analysis LED signal influence and interference with watermarking code, demonstrate usefulness of LED-ID using OOK-SS Watermarking.

Self Updatable Pseudonym System for VANET (VANET를 위한 차량자체 갱신가능 익명ID 시스템)

  • Kim, Sang-Jin;Lee, Byeong-Woo;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.93-103
    • /
    • 2009
  • Since message forgery or alteration in VANET may cause severe consequences, authentication of critical messages must be provided. However, using normal digital signature may infringe privacy of drivers. Therefore, VANET requires authentication systems that provide conditional anonymity. In this paper, we propose a new authentication system for VANET. In our proposed system, each vehicle can update its pseudonym using re-encryption technique and digitally sign messages using representation problem on the pseudonym. By limiting the usage period, revocation of individual pseudonym is not required. Moreover, we also provide a way to revoke the vehicle itself. Secureness of our system partially rely on the usage of tamper-resistance hardware.