• Title/Summary/Keyword: Personal Information Recognition

Search Result 328, Processing Time 0.022 seconds

Face recognition of Intra-red Images for Interactive TV Control System (인터랙티브 TV 컨트롤 시스템을 위한 근적외선 영상의 얼굴 인식)

  • Won, Chul-Ho;Lee, Sang-Heon;Lee, Tae-Gyoun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.11-17
    • /
    • 2010
  • In this parer, face recognition method which can be applied to ITCS (interactive TV control system) is proposed. We extracted ULBP(uniform local binary pattern) histogram feature from infra-red images, and we detected left-right eyes and face region by using SVM classifier. Then, We implemented face recognition system which is using Gabor transform and ULBP histogram feature and applied to personal verification for ITCS.

A Study on Emergency Medical Information Management Methods for Elderly Patients using QR code and Finger-print Recognition (QR 코드와 지문인식을 이용한 고령 환자의 응급 의료정보 관리 방법에 대한 연구)

  • Lee, Jung-hyun;Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.135-141
    • /
    • 2017
  • Recently, as elderly people suffering from chronic diseases have increased and disasters such as traffic accidents have increased, urgent rescue workers and doctors need to respond effectively to such emergencies. For elderly people, the difficulty in communicating their condition especially the health condition during disaster is one of the problems in which delay on immediate handling by rescue team can cause death. Providing a solution for this problem is one of the main issues in our research. In this paper, we use the QR code to communicate the minimum personal information and medical history needed for emergency medical treatment to emergency medical personnel, and to transmit the medical history and treatment data to the doctors of the hospital through QR code and fingerprint recognition, respectively. Especially, by using both QR code of smart phone and fingerprint of individual, we can protects personal information and strengthens privacy and security of medical information by allowing only authorized physicians to check medical records of the old patient.

Impact of Personal Health Information Security Awareness on Convenience (개인의료정보보안인식이 편의성에 미치는 영향)

  • Park, Jung-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.600-612
    • /
    • 2017
  • The purpose of the research is that how awareness of importance of personal medical data, laws regarding personal medical data and perception gap regarding information of medical data system may affect usage of hospital convenience between a regular patient who has experienced hospital service and medical professionals. Preceding research analysis was conducted previous on establishing research model; 150 questionnaires to a regular patient and 150 questionnaires for a medical professional, total of 300 questionnaires were gathered for conducting a question investigation. First of all, the research concluded that there are a regular perception differences between a regular patient and medical professional. Moreover, there are perception differences among the different gender, age, and area of residence. Furthermore, medical professionals tend to consider that convenience of hospital usage will be increased if user strengthens recognition of security of personal medical data. Results of hypothesis stress that higher awareness of exposure of personal medical data and medical information system affect decision making convenience for a better usage of hospital. On the other side, awareness of laws related with personal medical information security does not affect decision making convenience of hospital usage and transaction. The results of the research analyzes with proof that strengthening awareness of personal medical data security positively increase convenience of decision making and transactions in selection of provided medical service.

A Study of the Pattern Kernels for a Lip Print Recognition

  • Paik, Kyoung-Seok;Chung, Chin-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.64-69
    • /
    • 1998
  • This paper presents a lip print recognition by the pattern kernels for a personal identification. A lip print recognition is developed less than the other physical attributes of a fingerprint, a voice pattern, a retinal blood/vessel pattern, or a facial recognition. A new method is proposed to recognize a lip print bi the pattern kernels. The pattern kernels are a function consisted of some local lip print pattern masks. This function converts the information on a lip print into the digital data. The recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The results show that the proposed algorithm by the multi-resolution architecture can be efficiently realized.

  • PDF

A Study on Detecting Personal Information from Image Files (이미지파일에 포함된 개인정보추출에 관한 연구)

  • Lee, Minsuk;Kim, Sukhyeon;Yoon, Jiae;Won, Yoojae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.209-212
    • /
    • 2017
  • 최근 정보통신기술의 비약적 발전에 따라 문서 제작 과정 또한 디지털 방식의 형태가 주를 이루게 되었다. 하지만 이와 더불어 문서를 통한 개인 정보 유출의 문제 또한 대두되게 되었다. 본 논문에서는 이미지 형식의 문서의 유출 방지를 위해 광학문자인식(OCR)을 활용한 문자인식 기능과 개인정보 검출 기능을 통합적으로 수행 한하여 기존 OCR엔진과의 차별점을 두었다. 또한 원하는 경로의 파일 탐색을 가능하도록 하고, 선택한 경로에 저장되어 있는 이미지파일 내의 검출 문자들을 정규표현식을 사용해 특정한 개인정보 패턴과 매칭하여 문서 내 포함된 개인정보를 반환하여 출력한다. 이러한 개인정보 검출 결과 중요 개인정보가 포함된 파일을 사용자에게 별도로 통보하도록 한다. 따라서 본 논문에서는 기존의 개인정보 검출 과정의 번거로움을 극복하여 사용자의 편의 향상과 더불어 문서를 통한 개인정보의 유출을 사전에 방지 할 수 있도록 하였다.

  • PDF

Research a Study on Awareness and Practice of Personal Information Protection in Students (대학생들의 개인정보 보호인식과 실천에 대한 인지도 조사연구)

  • Lee, Hye-Seung;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.53-67
    • /
    • 2019
  • This study is expected to be of significance in that it attempted to examine the personal information protection awareness of college students and the state of their personal information protection as prospective information processors and private information owners to boost their will to put private information protection in practice. As a result of making an analysis, the most common average time that the students spent in doing every online activity on weekdays was fewer than two or three hours, and the most dominant activities that they did over the Internet were for entertainment or hobbies. As for awareness of the nature of the Internet, they looked upon it as a quite open public space. Regarding the state of private information protection, they thought that changing passwords on a regular basis would be beneficial to personal information protection, and many thought that it's needed to withdraw from or shut down web sites that weren't used for a long time. In terms of actual practice, however, they didn't change their e-mail passwords regularly on the grounds that it's a hassle, and even the students who had experience of personal information leakage didn't report it or didn't ask for counsel on the grounds that they didn't want to be bothered as well. The majority of the students weren't cognizant of how to report or seek counsel. In the future, personal information protection should be educated on a continual basis as part of curriculum to raise awareness of it among students and boost their will to practice it with a sense of responsibility in an effort to prevent the occurrence of collateral damages triggered by personal information leakage.

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

A study on the model of the information service in the taylorian researcher's cognitive viewpoint (테일러(R. S. Taylor)계 연구자 관점에서의 정보요구 및 탐색모형에 관한 연구)

  • 이승채
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.245-276
    • /
    • 1995
  • This study analyzed the process of information service and its factors in the cognitive viewpoint. And developed a conceptual model to help in developing future information systems and services. The results of this study were summarized as follows : 1) The paradigm of information user study is changing from the system-centered to the user-centered one. 2) The researchers describe the user's internal cognitive process as the starting point of the information service. 3) The user's personal cognitive process influence the process of the information service over. And the focus is a microscopic one including the factors of the perception and recognition of the stimulus, remembering and searching information, reasoning the rules, recognition of the patterns, formalization of the concepts, etc. 4) The information librarian performs the role as a knowledge/ information system interface, and his knowledge structure reflects the organization of that knowledge/information system. 5) The information librarians can perform their role as information specialists actively and offensively. And the performance of the librarians can be measured on the scales of the su n.0, pplying capability of relevant information and the client satisfaction.

  • PDF

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

Implementation of Automatic Microphone Volume Controller and Recognition Rate Improvement (자동 입력레벨 조절기의 구현 및 인식 성능 향상)

  • 김상진;한민수
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.503-506
    • /
    • 2001
  • In this paper, we describe the implementation of a microphone input level control algorithm and the speech improvement with this level controller in personal computer environment. The volume of speech obtained through a microphone affects the speech recognition rate directly. Therefore, proper input volume level control is desired fur better recognition. We considered some conditions for the successful volume controller implementation firstly, then checked its usefulness on our speech recognition system with common office environment speech database. Cepstral mean subtraction is also utilized far the channel-effect compensation of the database. Our implemented controller achieved approximately 50% reduction, i.e., improvement in speech recognition error rate.

  • PDF