• Title/Summary/Keyword: IP CCTV

Search Result 52, Processing Time 0.037 seconds

Trends and Technical Analysis of IP-Surveillance System (영상보안 시스템의 동향 및 기술 분석)

  • Kim, Pyeong-Kang;Park, Seok-Cheon;Kim, Hyeong-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1554-1557
    • /
    • 2013
  • 기존 아날로그 방식의 CCTV는 화질이 좋지 않고, 장시간 사용할 경우 화질이 나빠지는 문제가 발생한다. 이와 같은 문제를 해결하기 위해 아날로그 신호출력을 디지털 방식으로 변환하는 DVR과 IP 네트워크로부터 디지털 신호를 받아 처리하는 NVR이 등장하게 되었다. 이와 같은 영상 보안 이슈가 등장함에도 불구하고 보안 산업 보수성과 새로운 기술을 받아들이는데 있어서의 제약사항 등의 이유로 IP-Suveillance에 대한 이해가 부족한 실정이다. 따라서 본 논문에서는 영상보안 시스템의 동향과 분석을 위해 DVR과 NVR을 투자측면, 비용측면, 유지측면에서 비교 분석하였다.

Cloud-based smart maritime logistics warehouse management system with IP cameras (IP 카메라와 클라우드 기반 스마트 해상물류 창고 관리 시스템)

  • Kang-Hyeon Ryu;Dae-Hoon Kang;Dong-Min Kim;Min-Ho Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1082-1083
    • /
    • 2023
  • 우리나라의 수출입 대부분은 해상을 통해 이루어지고 있으나 항만의 물류 창고는 데이터 네트워크를 통한 유기적인 화물의 출입과 현황관리가 부족한 실정이다. 이는 부족한 데이터 네트워크 인프라와 CCTV에 의한 아날로그 영상 데이터에 의존하는 기존 시스템의 한계로 인해 기인하는 바가 크다. 이에 IP 카메라와 엣지 디바이스의 영상분석에 의한 개별 화물 창고의 디지털 현황 분석 기반을 구축하고 분산된 개별 화물 창고의 데이터를 클라우드에 위치한 중앙 집중 데이터 분석 시스템을 구축하여 유연한 개별 화물 창고 관리와 지속적인 모니터링 기반을 제공한다. 사용자 인터페이스는 웹 기반으로 구축하여 항만 화물 관계자에게 편의성과 위치에 구애받지 않는 서비스를 제공한다. 이 과정에서 사설 IoT 네트워크를 통한 최소한의 시공비용으로 항만 내 인터넷 데이터 네트워크를 구축하여 향후 항만 내 다양한 데이터 서비스를 위한 초석을 제공한다.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Wireless Traffic Management System Development (무선 교통정보 시스템의 구축)

  • Jin, Jin-Yu;Kang, Young-Goo;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.857-859
    • /
    • 2008
  • 본 연구에 구축한 무선 교통 정보시스템은 시공기간 단축과 비용절약에 목적을 두고 무선 네트워크 핵심기술를 이용해 도심내의 간선도로 및 교차로에 대한 CCTV 교통감시 카메라를 이용하여 교통관제 센타에서 동영상에의한 교통감시와 실시간 교통정보를 수집하는 시스템으로서 도로현장의 CCTV 감시카메라와 통신장비, 센타의 영상검지기 및 VDS Sever컴퓨터 시스템과 동영상표시 Color Monitor로 구성 되어 있는 IP Surveillance 시스템 체계를 제시하고자 한다.

Development of Traffic Management System for Realtime A Broader Area (실시간 광역 교통정보시스템의 구축)

  • Kang, Young-Goo;Jin, Jin-Yu;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.513-515
    • /
    • 2007
  • 본 연구에 구축한 실시간 광역 교통 정보시스템은 도심지내의 간선도로 및 교차로에대한CCTV 교통감시 카메라를 이용하여 교통관제센타에서 동영상에의한 교통감시와 실시간 교통정보를 수집하는 시스템으로서 도로현장의 CCTV 감시카메라와 광통신장비, 센타의 영상검지기 및 VDS Sever컴퓨터 시스템과 동영상표시 Color Monitor로 구성 되어 있는 IP Surveillance 시스템 체계를 제시하고자 한다.

A Virtual Environment for Optimal use of Video Analytic of IP Cameras and Feasibility Study (IP 카메라의 VIDEO ANALYTIC 최적 활용을 위한 가상환경 구축 및 유용성 분석 연구)

  • Ryu, Hong-Nam;Kim, Jong-Hun;Yoo, Gyeong-Mo;Hong, Ju-Yeong;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.11
    • /
    • pp.96-101
    • /
    • 2015
  • In recent years, researches regarding optimal placement of CCTV(Closed-circuit Television) cameras via architecture modeling has been conducted. However, for analyzing surveillance coverage through actual human movement, the application of VA(Video Analytics) function of IP(Internet Protocol) cameras has not been studied. This paper compares two methods using data captured from real-world cameras and data acquired from a virtual environment. In using real cameras, we develop GUI(Graphical User Interface) to be used as a logfile which is stored hourly and daily through VA functions and to be used commercially for placement of products inside a shop. The virtual environment was constructed to emulate an real world such as the building structure and the camera with its specifications. Moreover, suitable placement of the camera is done by recognizing obstacles and the number of people counted within the camera's range of view. This research aims to solve time and economic constraints of actual installation of surveillance cameras in real-world environment and to do feasibility study of virtual environment.

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.

Implementation of a unified live streaming based on HTML5 for an IP camera (IP 카메라를 위한 HTML5 기반 통합형 Live Streaming 구현)

  • Ryu, Hong-Nam;Yang, Gil-Jin;Kim, Jong-Hun;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.9
    • /
    • pp.99-104
    • /
    • 2014
  • This paper presents a unified live-streaming method based on Hypertext Mark-up Language 5(HTML5) for an IP camera which is independent of browsers of clients and is implemented with open-source libraries. Currently, conventional security systems based on analog CCTV cameras are being modified to newer surveillance systems utilizing IP cameras. These cameras offer remote surveillance and monitoring regardless of the device being used at any time, from any location. However, this approach needs live-streaming protocols to be implemented in order to verify real-time video streams and surveillance is possible after installation of separate plug-ins or special software. Recently, live streaming is being conducted through HTML5 using two different standard protocols: HLS and DASH, that works with Apple and Android products respectively. This paper proposes a live-streaming approach that is linked on either of the two protocols which makes the system independent with the browser or OS. The client is possible to monitor real-time video streams without the need of any additional plug-ins. Moreover, by implementing open source libraries, development costs and time were economized. We verified usefulness of the proposed approach through mobile devices and extendability to other various applications of the system.

Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems (물리보안 관제시스템의 보안위협 사례를 통한 취약점 분석 및 대응방안 연구)

  • Ko, Yun Seong;Park, Kwang Hyuk;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.51-59
    • /
    • 2016
  • Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.