• Title/Summary/Keyword: Privacy Prevention

Search Result 89, Processing Time 0.022 seconds

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.

Bed Side Monitoring System using Occupancy Sensor and Doppler Radar (Occupancy 센서와 도플러 Radar를 이용한 침상 모니터링 시스템)

  • Kang, Byung Wuk;Yoo, Sun Kook
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.3
    • /
    • pp.382-390
    • /
    • 2018
  • A major accident occurring on the bed is falls that occur during at times when the care of nurses or protectors is inadequate, which is fatal to patients or the elderly. In particular, Enuresis or sleepiness caused by sleep apnea increases the risk of falls. Therefore, it is very important to detect falls and sleep apnea of patients without infringing privacy in the bed to patient's safety and accident prevention. In this paper, we reviewed the technologies developed for bed monitoring and implemented a non-intrusive monitoring system. The Occupancy Sensor allows the temperature of the bed and surrounding area to be extracted to enable track of the patient's motion. The Doppler Radar detects the patient's movements at normal times and the respiration state when patients have no movement during sleeping. It is specially designed for real-time monitoring of falling and respiration during sleeping through contactless multi-sensing while solving patient's privacy problems.

Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique

  • Park, Sanghyun;Kang, Sang-ug
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3664-3677
    • /
    • 2017
  • Abrupt scene changes generally incur the afterimage effect. So, the unblocked image portion is still viewed by human eyes just after it is blocked by some pattern. Yovo's secure display method utilized this phenomenon and it is systematically analyzed using computational afterimage modeling by replacing the complex afterimage effect via simple low-pass filtering. With this approach, realistic images perceived by the human eye can be computationally generated at every single moment, especially reflecting the afterimage effect. The generated images are compared with the original images to determine the factors that affect the image quality of the secure display method. The simulation results demonstrate that the ratio of the unblocked portion to the blocked portion of an image and the playback rate are two primary factors related to the recognized image quality. We also found that the two factors are still effective for generalized secure display techniques.

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

Face Information Conversion Mechanism to Prevent Privacy Infringement (프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.115-122
    • /
    • 2019
  • CCTV(Closed-Circuit Television) is increasingly exposed to CCTV per person as the number of installations increases every year for accident prevention and facility safety. The intelligent video surveillance system technology is attracting attention to the privacy protection of exposed subjects. The intelligent video surveillance system performs a process for the privacy protection so as to perform the action type of the subject and the judgment of the situation in the simple identification of the photographed image data, or to prevent the information, from which the information of the photographed subject is exposed. The proposed technique is applied to the video surveillance system and converts the original image information taken from the video surveillance system into similar image information so that the original image information is not leaked to the outside. In this paper, we propose an image conversion mechanism that inserts a virtual face image that approximates a preset similarity.

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

A Study on Improvement of Crime Prevention Environment Design in Gyeongui Line Forest Park - In Case of Changjeon-dong section - (경의선 숲길공원의 범죄예방 환경디자인 개선점 연구 - 창전동 구간을 중심으로 -)

  • Kim, Yeon-Kyeong;Yoo, Daun
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.36 no.1
    • /
    • pp.113-124
    • /
    • 2020
  • The purpose of this study is to suggest an improvement for the CPTED(Crime Prevention Through Environmental Design) guidelines for the urban linear park. We analysed the Changjeon-dong section of Gyeongui Line Forest Park into 12 sub-areas and evaluated CPTED design applied on the park based on analysis framework derived from 15 precedent studies by conducting on-site observations. Both surveys and in-depth interviews on users of the park were conducted and the results of analysis on the evaluation from users and the on-site observation were compared. We found that the lighting condition and the height of wall and trees at the park boundaries are very important to insure natural surveillance since the adjacent areas are easy to be hidden from passers-by and subject to invasion and threat of crime while protecting the privacy of residents on the boundary. There should be improvement on management facilities and crime prevention facilities for more safe and convenient use of the linear park and the adjacent commercial use during nighttime also need to be managed for conflicts between various type of users.

A Study on Privacy Framework for Prevention Leakage (개인정보 유출방지 프레임워크에 관한 연구)

  • Lee, Yari
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.503-504
    • /
    • 2017
  • 현대 사회는 정보화에 따른 혜택과 더불어 부작용 현상으로 개인정보의 유출 사고로 사회적 불안감 및 관심을 증가시키고 있다. 우리나라 "개인정보보호법"은 공공, 민간 부문의 모든 개인정보 처리자에게 공통으로 적용되고 전자문서와 수기문서에도 적용된다. 그러나 업무특성에 따라 여러 곳에 다양한 형태로 산재되어 있는 개인정보 관리는 쉽지 않으며 정보 유출에 대한 우려 또한 크다고 볼 수 있다. 따라서 본 연구에서는 체계적인 개인정보 보호 관리를 통해 사전에 정보 유출을 방지할 수 있는 개인정보 유출방지 프레임워크를 제안하였다.

  • PDF