• Title/Summary/Keyword: Information Protection Recognition

Search Result 122, Processing Time 0.019 seconds

A Study on Vehicle License Plate Recognition System through Fake License Plate Generator in YOLOv5 (YOLOv5에서 가상 번호판 생성을 통한 차량 번호판 인식 시스템에 관한 연구)

  • Ha, Sang-Hyun;Jeong, Seok Chan;Jeon, Young-Joon;Jang, Mun-Seok
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.6_2
    • /
    • pp.699-706
    • /
    • 2021
  • Existing license plate recognition system is used as an optical character recognition method, but a method of using deep learning has been proposed in recent studies because it has problems with image quality and Korean misrecognition. This requires a lot of data collection, but the collection of license plates is not easy to collect due to the problem of the Personal Information Protection Act, and labeling work to designate the location of individual license plates is required, but it also requires a lot of time. Therefore, in this paper, to solve this problem, five types of license plates were created using a virtual Korean license plate generation program according to the notice of the Ministry of Land, Infrastructure and Transport. And the generated license plate is synthesized in the license plate part of collectable vehicle images to construct 10,147 learning data to be used in deep learning. The learning data classifies license plates, Korean, and numbers into individual classes and learn using YOLOv5. Since the proposed method recognizes letters and numbers individually, if the font does not change, it can be recognized even if the license plate standard changes or the number of characters increases. As a result of the experiment, an accuracy of 96.82% was obtained, and it can be applied not only to the learned license plate but also to new types of license plates such as new license plates and eco-friendly license plates.

Smart Radar System for Life Pattern Recognition (생활패턴 인지가 가능한 스마트 레이더 시스템)

  • Sang-Joong Jung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.91-96
    • /
    • 2022
  • At the current camera-based technology level, sensor-based basic life pattern recognition technology has to suffer inconvenience to obtain accurate data, and commercial band products are difficult to collect accurate data, and cannot take into account the motive, cause, and psychological effect of behavior. the current situation. In this paper, radar technology for life pattern recognition is a technology that measures the distance, speed, and angle with an object by transmitting a waveform designed to detect nearby people or objects in daily life and processing the reflected received signal. It was designed to supplement issues such as privacy protection in the existing image-based service by applying it. For the implementation of the proposed system, based on TI IWR1642 chip, RF chipset control for 60GHz band millimeter wave FMCW transmission/reception, module development for distance/speed/angle detection, and technology including signal processing software were implemented. It is expected that analysis of individual life patterns will be possible by calculating self-management and behavior sequences by extracting personalized life patterns through quantitative analysis of life patterns as meta-analysis of living information in security and safe guards application.

Wearable Sensing Device Design for Biological Monitoring (생체정보 모니터링을 위한 웨어러블 센싱 디바이스 디자인)

  • Lee, Jee Hyun;Lee, Eun Ji;Kim, Ji Eun;Kim, Yoolee;Cho, Sinwon
    • Journal of the Korean Society of Costume
    • /
    • v.65 no.1
    • /
    • pp.118-135
    • /
    • 2015
  • In recent years, smart clothing had been developed in order to better detect and monitor physical movement of the patient, so that such activities such as location identification and biometric recognition could be done. However, most of the sensing devices of smart clothing were limited to smart sensing sports clothing and the designs did not consider the physical characteristics and the behavior of the wearer. Therefore, this study aimed to create an open protection system by developing a wearable sensing device for health monitoring and location information. For this purpose, this study developed eleven types of wearable sensing design that could be commercially sold and worn by people who needed their biological information to be constantly monitored. The study conducted four tests in order to develop three types of sensing devices for various sensing wears. The purpose of this study was to expand the user rang of smart sensing wears, and provide a foundation for the development of distinctive wearable sensing devices reflecting the user. Furthermore, contribute to the design for the person subject to protection.

Grope for a Summary Program about a Traditional Medical Database for Intellectual Property Protection in WIPO (지적재산권 보호를 위한 전통의학 DB 구축에 관한 고찰)

  • Choi Hwan-Soo;Lee Je-Hyun;Kim Yong-Jin
    • The Journal of Korean Medicine
    • /
    • v.25 no.3
    • /
    • pp.12-19
    • /
    • 2004
  • Objectives : In the WIPO conference about the protection of intellectual property for traditional knowledge (TK) and genetic resources (GR), there was a demand concerning the necessity of recognizing the invention of TK and GR and the foundation of a related database. Methods : In the standard of the foundation of a database, the content and resource identification standards, the technological standards and the security and transmission standards were discussed. In a decision on intellectual property, it means the protection and recognition as a technology precedent of the materials of the database. Results : Massive material on traditional medical care technology in Korea has existed in many areas. However, it is hard to make a database because it is difficult to organize and find the data. In addition, a database demanded by WIPO is not only the material of images or texts of simple technology information, but also the use of patent decisions about traditional knowledge technology and the public sharing of information in related areas. A traditional medical care database would consist of the core of a subject and the related areas. The core part is the medical herb resource and Oriental clinical technology. Conclusions : These are necessary to detail the kind of medicines and prescriptions, their use, and their processing. In the related areas, it needs to detail PIAS and clinical data in regarding the industrialization. These DB have to protect the TK and the GR of Korea.

  • PDF

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

Research on Attitudes of Daejeon Citizens toward the Domestic Adaption (국내입양에 대한 인식과 태도 조사: 대전시민을 대상으로)

  • Lee, Kab-Sook;Sohn, Jin-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.357-365
    • /
    • 2008
  • The Korean Government is enforcing policies to activate domestic adoption in order to guarantee and protect stable family lives of children requiring protection. We surveyed recognitions and attitudes toward adoption and adoption policies of Daejeon citizens. The result will be important information for activating domestic adoption. We could find that motives of adoption centered on adopted children rather than adoptive parents. Especially, the recognition level toward open adoption is high, which shows that the domestic adoption can be activated if multiple political supports are provided for adopted children and adoptive families.

A Study on Protection of Visual Information Design by Arbitration (중재제도를 활용한 시각정보디자인 보호에 관한 연구)

  • Kim, Sung-Ryong;Kim, In-Kyung
    • Journal of Arbitration Studies
    • /
    • v.26 no.1
    • /
    • pp.53-72
    • /
    • 2016
  • The importance of design is emphasized in many industries. It began to earn recognition as part of industry rather than the arts. In particular, utilization of visual information design including moving images, packaging, advertisement, publication, editorial and visual information processing is higher than others in the design field. However, disputes relating to intellectual property rights have been also increasing as it became known. Therefore, now is the time to consider and establish an effective dispute settlement system for the design industry. In this view, arbitration will be a suitable method for dispute settlement in visual information design because of characteristics such as confidentiality, professionalism, efficiency, economy and flexibility. However, Arbitration system is not well known to the people who work in this industry. Thus, in order to aggressively advertise the arbitration system, an arbitration institution has to appoint design experts as new arbitrators for domestic and international arbitration. Next, an arbitration institution needs to prepare the new and expediting rules with design field characterization. Finally, it has to plan to cooperate with all of the institutions and schools concerned.

Two-level Information Hiding Method for the Transmission of Military Secret Images (군사용 비밀 영상 전송을 위한 이단계 정보은닉 기법)

  • Kim, In-Taek;Kim, Jae-Cheol;Lee, Yong-Kyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.482-491
    • /
    • 2011
  • The purpose of this study is to design and implement a 2-level secret information transmission system which can be used for information hiding of images transmitted over various IT communication media. To increase the robustness of the hiding power, we combined the steganography method which inserts secret object into cover object to hide the very fact of information hiding itself, and the preprocessing stage to encrypt the secret object before the stego-insertion stage. As a result, even when the stego-image is broken by an attacker, the secret image is protected by encryption. We implemented the 2-level image insertion and extraction algorithm by using C++ programming language. Experiment shows that the PSNR values of stego-images of ours exceed 30.00db which is the threshold of human recognition. The methodology of this study can be applied broadly to the information hiding and protection of the military secret images.

The Extraction of Fingerprint Corepoint And Region Separation using Labeling for Gate Security (출입 보안을 위한 레이블링을 이용한 영역 분리 및 지문 중심점 추출)

  • Lee, Keon-Ik;Jeon, Young-Cheol;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.243-251
    • /
    • 2008
  • This study is to suggest the extraction algorithms of fingerprint corepoint and region separation using the labeling for gate security in order that it might be applied to the fingerprint recognition effectively. The gate security technology is entrance control, attendance management, computer security, electronic commerce authentication, information protection and so on. This study is to extract the directional image by dividing the original image in $128{\times}128$ size into the size of $4{\times}4$ pixel. This study is to separate the region of directional smoothing image extracted by each directional by using the labeling, and extract the block that appeared more than three sorts of change in different directions to the corepoint. This researcher is to increase the recognition rate and matching rate by extracting the corepoint through the separation of region by direction using the maximum direction and labeling, not search the zone of feasibility of corepoint or candidate region of corepoint used in the existing method. According to the result of experimenting with 300 fingerprints, the poincare index method is 94.05%, the proposed method is 97.11%.

  • PDF