• Title/Summary/Keyword: Person Identification

Search Result 237, Processing Time 0.029 seconds

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

Real-time Tracking and Identification for Multi-Camera Surveillance System

  • Hong, Yo-Hoon;Song, Seung June;Rho, Jungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.16-22
    • /
    • 2018
  • This paper presents a solution for personal profiling system based on user-oriented tracking. Here, we introduce a new way to identify and track humans by using two types of cameras: dome and face camera. Dome camera has a wide view angle so that it is suitable for tracking human movement in large area. However, it is difficult to identify a person only by using dome camera because it only sees the target from above. Thus, face camera is employed to obtain facial information for identifying a person. In addition, we also propose a new mechanism to locate human on targeted location by using grid-cell system. These result in a system which has the capability of maintaining human identity and tracking human activity (movement) effectively.

Person Re-Identification Algorithm using pedestrian mask segmentation (보행자 영역 분류를 이용한 보행자 재 검출 알고리즘)

  • Kwon, Kibum;Cho, Nam Ik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.120-122
    • /
    • 2019
  • 본 논문은 보행자 재 검출 알고리즘, 즉 person Re-Identification 알고리즘에 대하여 다루고 있다. 기존의 CNN 네트워크를 이용한 보행자 재 검출 알고리즘의 경우, 실제 감시 카메라 네트워크를 이용하여 보행자 재 검출을 할 경우 주변 환경 조건이 급격하게 변하는 경우 잘못 검출하는 경우가 발생하는 것을 확인할 수 있다. 이는 보행자 검출 후 해당 영역에 대하여 보행자 재 검출을 하는데 있어서 배경 부분의 변화에 영향을 받는다는 것을 의미한다. 따라서 본 논문에서는 배경 부분의 영향에 의한 효과를 줄이기 위하여, 보행자 영역 분리 알고리즘을 이용하여 보행자 영역을 분리한 후, 보행자 재 검출을 수행하는 연구를 진행한다.

  • PDF

Person Re-Identification Algorithm using pedestrian mask segmentation (보행자 영역 분류를 이용한 보행자 재 검출 알고리즘)

  • Kwon, Kibum;Cho, Nam Ik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.06a
    • /
    • pp.102-104
    • /
    • 2018
  • 본 논문은 보행자 재 검출 알고리즘, 즉 person Re-Identification 알고리즘에 대하여 다루고 있다. 기존의 CNN 네트워크를 이용한 보행자 재 검출 알고리즘의 경우, 실제 감시 카메라 네트워크를 이용하여 보행자 재 검출을 할 경우 주변 환경 조건이 급격하게 변하는 경우 잘못 검출하는 경우가 발생하는 것을 확인할 수 있다. 이는 보행자 검출 후 해당 영역에 대하여 보행자 재 검출을 하는데 있어서 배경 부분의 변화에 영향을 받는다는 것을 의미한다. 따라서 본 논문에서는 배경 부분의 영향에 의한 효과를 줄이기 위하여, 보행자 영역 분리 알고리즘을 이용하여 보행자 영역을 분리한 후, 보행자 재 검출을 수행하는 연구를 진행한다.

  • PDF

Person Re-Identification Method using Image Adaption (영상 변형을 통한 보행자 재 검출 알고리즘)

  • Kwon, Kibum;Cho, Nam Ik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.07a
    • /
    • pp.261-262
    • /
    • 2020
  • 보행자 재 검출 알고리즘, 즉 person Re-Identification 알고리즘은 주어진 영상 내에 존재하는 보행자들 중 특정 보행자를 검출해내는 방법이다. 최근까지 보행자 재 검출 알고리즘에 대한 여러 연구가 진행되어 오고 있지만 기존의 CNN 네트워크를 이용한 보행자 재 검출 알고리즘의 경우, 실제 영상 데이터를 이용하여 보행자 재 검출을 할 경우 주변 환경 조건이나 조명의 조건, 보행자를 촬영한 방향 등에 따라 정확도가 떨어지는 현상이 발행한다. 이에 따라, 보행자 재 검출 알고리즘을 수행하는데 있어서, 조명 등의 조건에 구애 받지 않고 정확한 검출을 할 수 있도록 style transfer를 이용하여 영상을 변형하여 보행자 재검출을 수행하는 연구를 진행한다.

  • PDF

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

Implementation of GPS Based Location Management System (GPS를 이용한 위치관리시스템 구현)

  • Choi, Jae-Myeong;Kang, Heau-Jo;Lee, Sang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.15-21
    • /
    • 2008
  • In this paper, person monitoring and personal identification information management by using the location positioning device and the location management system based on GPS is analysed and developed. Mobile HTE(Mobile HTE : Mobile Home Terminal Equipment) of the developed system uses the module for transmitting PID(Personal Identification Device) information and the module based on GPS's location information. HTE transmits the received information from Mobile HTE to the Location Management System through the internet system. The Location Management System is developed for person location management and information management.

  • PDF

Personal Identification Based on Radio Signal Strength for Ubiquitous Healthcare Systems

  • Lee, Jong-Shill;Park, Sang-Hae;Chee, Young-Joon;Kim, In-Young;Kim, Sun-I.
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.3
    • /
    • pp.325-331
    • /
    • 2007
  • Personal identification is essential for the automatic measurement of biosignal information in home healthcare systems. Personal identification is usually achieved with passive radio frequency identification (RFID), which does little more than store a unique identification number. However, passive RFID is not ideal for automatic identification. We present a user identification system based on radio signal strength indication (RSSI) using ZigBee for active RFID tags. Personal identification is achieved by finding the largest RSSI value from aggregated beacon messages that are periodically transmitted by active RFID tags carried by users. Obtaining reliable person!'.! identification without restricting the orientation requires a certain distance between the closest active RFID tag from the ZED and the second closest tag. The results show that the closest active RFID tag from the ZED and the second closest tag must be at least 70 cm apart to achieve reliable personal identification.

Correlations of Cold and Heat Pattern between Menstrual Symptoms and Whole Body Symptoms (월경통(月經痛) 증후(證候)와 전신(全身) 증후(證候)의 한열(寒熱) 상호 관련성 연구)

  • Hwang, Jae-Ho;Yun, Young-Jin
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.25 no.4
    • /
    • pp.27-37
    • /
    • 2012
  • Purpose: Dysmenorrhea is mostly depending on the causative factor, which usually falls under the categories of Cold and Heat pattern in traditional Oriental medical theories and diagnosis. Thus, we investigated menstruation symptom and sign related to dysmenorrhea and verified the validity of Cold and Heat pattern identification. Methods: We investigated menstruation symptom and sign related to dysmenorrhea in total 14 gynecology-medical books including ${\ll}$Exemplar Of Korean Medicine (Dongui Bogam)${\gg}$ and whole body symptom and sign identifying Cold and Heat pattern at the same time. A survey based on this investigation was carried out targeting women of childbearing age. Results: According to 14 gynecology-medical books, polymenorrhea is relevant to Heat pattern, oligomenorrhea to Cold pattern and darkness of menstrual blood is relevant to Heat pattern. Among the total of 343 womens, 196 subjects suffered from dysmenorrhea. The number of dysmenorrhea with polymenorrhea(Heat pattern) was 6 person, with oligomenorrhea(Cold pattern) was 27 person. And the number of dysmenorrhea with darkness of menstrual blood(Heat pattern) was 39 person. As the result of checking correlations of menstrual symptom scores and whole body symptom scores, there was no significance of Cold and Heat pattern between menstrual symptoms and whole body symptoms. Conclusions: The results suggest that the period of menstrual cycle and the color of menstrual blood provides some informations of Cold and Heat pattern identification. But considering with other whole body symptom and sign is needed for more precise result.

iDENTIfyme Informative Campaign: Raising Forensic Dental Identification Awareness in the Community

  • Nuzzolese, Emilio
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.3
    • /
    • pp.218-219
    • /
    • 2021
  • The identification of human remains can be performed visually through families and next-of-kin, but it is not advisable to rely only on visual recognition; instead, it is preferable to conduct a forensic comparison of antemortem and postmortem data for primary identifiers (fingerprints, DNA, and dental data). A dental autopsy is particularly valuable in the identification process of skeletonized, carbonized, saponified, and fragmented human remains. The principal challenge in the identification process is the search and collection of antemortem data. To this end, all dental information held on a missing person can represent a precious source of individualizing information that families should share with the police or investigating agencies after reporting a disappearance.