• Title/Summary/Keyword: Image Security

Search Result 1,167, Processing Time 0.033 seconds

Study on Image Processing Techniques Applying Artificial Intelligence-based Gray Scale and RGB scale

  • Lee, Sang-Hyun;Kim, Hyun-Tae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.252-259
    • /
    • 2022
  • Artificial intelligence is used in fusion with image processing techniques using cameras. Image processing technology is a technology that processes objects in an image received from a camera in real time, and is used in various fields such as security monitoring and medical image analysis. If such image processing reduces the accuracy of recognition, providing incorrect information to medical image analysis, security monitoring, etc. may cause serious problems. Therefore, this paper uses a mixture of YOLOv4-tiny model and image processing algorithm and uses the COCO dataset for learning. The image processing algorithm performs five image processing methods such as normalization, Gaussian distribution, Otsu algorithm, equalization, and gradient operation. For RGB images, three image processing methods are performed: equalization, Gaussian blur, and gamma correction proceed. Among the nine algorithms applied in this paper, the Equalization and Gaussian Blur model showed the highest object detection accuracy of 96%, and the gamma correction (RGB environment) model showed the highest object detection rate of 89% outdoors (daytime). The image binarization model showed the highest object detection rate at 89% outdoors (night).

The Study on the Development of the HD(High Definition) Level Triple Streaming Hybrid Security Camera (HD급 트리플 스트리밍 하이브리드 보안 카메라 개발에 관한 연구)

  • Lee, JaeHee;Cho, TaeKyung;Seo, ChangJin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.66 no.4
    • /
    • pp.252-257
    • /
    • 2017
  • In this paper for developing and implementing the HD level triple streaming hybrid security camera which output the three type of video outputs(HD-SDI, EX-SDI, Analog). We design the hardware and program the firmware supporting the main and sub functions. We use MN34229PL as image sensor, EN778, EN331 as image processor, KA909A as reset, iris, day&night function part, A3901SEJTR-T as zoom/focus control part. We request the performance test of developed security camera at the broadcasting and communication fusion testing department of TTA (Telecommunication Technology Association). We can get the three outputs (HD-SDI, EX-SDI, Analog) from the developed security camera, get the world best level at the jitter and eye pattern amplitude value and exceed the world best level at the signal/noise ratio, and minium illumination, power consumption part. The HD level triple streaming hybrid security camera in this paper will be widely used at the security camera because of the better performance and function.

Improving Imaging Quality Assessment of Cabinet X-Ray Security Systems (캐비닛 엑스선 검색장비 이미지품질평가 고도화 방안 연구)

  • Yoon, Yeon Ah;Jung, Jin Hyeong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.1
    • /
    • pp.47-60
    • /
    • 2021
  • Purpose: This study proposes methods and procedures for evaluating imaging security systems quality of cabinet x-ray screening system to enhance performance certification technology. Also, conducted a comparative analysis of the literature of test-kit for imaging security quality evaluation. Methods: Comparative analysis of the test-kits and related documents for image quality assessment of cabinet x-ray screening equipment. This allows assessment items were selected and the methods for each assessment item were proposed. In addition, the configuration method of the assessment team was established by applying the technology readiness assessment(TRA). Results: Four of the assessment items were selected when estimate image quality by a comparative analysis of literature. For each assessment item, the evaluation method and minimum level of availability were determined. Finally, this paper proposes an imaging quality assessment of cabinet X-ray imaging security systems. Conclusion: Development of imaging security systems evaluation procedures for cabinet X-ray screening systems can be help improve performance certification of aviation security equipment.

Create a hybrid algorithm by combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image Encryption

  • Rania A. Tabeidi;Hanaa F. Morse;Samia M. Masaad;Reem H. Al-shammari;Dalia M. Alsaffar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.129-134
    • /
    • 2023
  • The greatest challenge of this century is the protection of stored and transmitted data over the network. This paper provides a new hybrid algorithm designed based on combination algorithms, in the proposed algorithm combined with Hill and the Advanced Encryption Standard Algorithms, to increase the efficiency of color image encryption and increase the sensitivity of the key to protect the RGB image from Keyes attackers. The proposed algorithm has proven its efficiency in encryption of color images with high security and countering attacks. The strength and efficiency of combination the Hill Chipper and Advanced Encryption Standard Algorithms tested by statical analysis for RGB images histogram and correlation of RGB images before and after encryption using hill cipher and proposed algorithm and also analysis of the secret key and key space to protect the RGB image from Brute force attack. The result of combining Hill and Advanced Encryption Standard Algorithm achieved the ability to cope statistically

Security Analysis of MAC Algorithm using Block Cipher (블록 암호 알고리즘을 애용한 MAC 분석)

  • Seo Chang-Ho;Yun Bo-Hyun;Maeng Sung-Reol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.39-47
    • /
    • 2005
  • This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value. this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion. but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm (or detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving Picture image sequence. The proposed algorithm gives dense optical flow vectors.

  • PDF

Encryption and decryption using phase mapping of gray scale image based on a phase-shifting interferometry principle (위상천이 간섭계 원리에 기반한 계조도 영상의 위상 매핑을 이용한 암호화 및 복호화)

  • Seok-Hee Jeon;Sang-Keun Gil
    • Journal of IKEEE
    • /
    • v.28 no.3
    • /
    • pp.271-278
    • /
    • 2024
  • An encryption and decryption method using phase mapping of a gray scale image based on a phase-shifting interferometry principle is proposed in which an encrypted image is formed into complex digital hologram function by symmetric security key in the proposed encryption system.. The gray scale image to be encrypted is converted to phase mapped function that is mixed with a randomly generated binary security encryption key and is used as an input. Decryption of phase information is performed by complex digital hologram and security encryption key, which reconstructs the original gray scale image by phase unmapping. The proposed method confirms that correlation coefficient of the decrypted image is 0.995 when quantization level of CCD is 8-bits(28=256 levels).

Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System (다중변수 혼돈계를 이용한 이미지 암호화 방법의 설계 및 구현)

  • Yim, Geo-Su
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2008
  • The Security of digital images has become increasingly more important in highly computerized and interconnected world. Therefore, The chaos-based encryption algorithms have suggested some new and efficient ways to develop secure image encryption method. This paper is described for the point at issue in all chaos-based encryption method for distribution of a chaotic signals. It has a method for generation of uniformly distributed chaotic signals that we designed secure algorithm of multi-parameter chaotic systems. So we are present validity of the theoretical models for results of image encryption and decryption for proposed method.

  • PDF

Reversible Watermarking Based on Compensation

  • Qu, Xiaochao;Kim, Suah;Kim, Hyoung Joong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.422-428
    • /
    • 2015
  • This paper proposes a high performance reversible watermarking (RW) scheme based on a novel compensation strategy. RW embeds data into a host image by modifying its pixel values slightly. It is found that certain modified pixels can be compensated to their original values during the proposed embedding procedure. The compensation effect in the RW scheme can improve the marked image quality significantly. By incorporating the pixel selection method, a higher quality image is obtained, which is verified by extensive experiments.

Facial Feature Extraction Based on Private Energy Map in DCT Domain

  • Kim, Ki-Hyun;Chung, Yun-Su;Yoo, Jang-Hee;Ro, Yong-Man
    • ETRI Journal
    • /
    • v.29 no.2
    • /
    • pp.243-245
    • /
    • 2007
  • This letter presents a new feature extraction method based on the private energy map (PEM) technique to utilize the energy characteristics of a facial image. Compared with a non-facial image, a facial image shows large energy congestion in special regions of discrete cosine transform (DCT) coefficients. The PEM is generated by energy probability of the DCT coefficients of facial images. In experiments, higher face recognition performance figures of 100% for the ORL database and 98.8% for the ETRI database have been achieved.

  • PDF

Unattended fire detection system using a wireless communication device (무선통신 단말기를 이용한 무인화재 감지시스템)

  • Chang, Rak-Ju;Lee, Soon-Yi;Kang, Suk-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.25-26
    • /
    • 2015
  • The Unattended fire detection system using a wireless communication device is designed in this paper. If a fire occurs in some area, the system can detect and automatically extinguish the fire. The major functions for the system are: Unattended detection system for fire based on wireless communication system and Automatic extinguish device system; Thermal imaging camera and video camera system; Monitoring viewer and map viewer system.

  • PDF