• Title/Summary/Keyword: Security CCTV

Search Result 253, Processing Time 0.024 seconds

The Fish-eye Lens Distortion Correction of Facilities Monitoring CCTV (시설물 감시용 CCTV의 초광각 렌즈 왜곡보정)

  • Kang, Jin-A;Nam, Sang-Kwan;Kim, Tae-Hoon;Oh, Yoon-Seok
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.3
    • /
    • pp.323-330
    • /
    • 2009
  • The demand that we are monitoring security and crime of the urban facilities is increasing recently, but the using CCTV devices are expensive. In this research, we enlarge the angle of view using the Fish-eye Lens and the Photogrammetry, the efficiency of monitoring enhance. First, we carry out the calibration of the Fish-eye Lens indoors, we calculate the correction parameters, and then covert the original image-point to new image-point correcting distortion. Second, the correction program with the correction parameters can obtain the real-time correcting image. Lastly, for authorization the developed program we compare correcting-image with scanning-imge, it is showed the RMSE is 3.2pixel.

Secure and Efficient Storage of Video Data in a CCTV Environment

  • Kim, Won-Bin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3238-3257
    • /
    • 2019
  • Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Object Recognition Using Convolutional Neural Network in military CCTV (합성곱 신경망을 활용한 군사용 CCTV 객체 인식)

  • Ahn, Jin Woo;Kim, Dohyung;Kim, Jaeoh
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.2
    • /
    • pp.11-20
    • /
    • 2022
  • There is a critical need for AI assistance in guard operations of Army base perimeters, which is exacerbated by changes in the national defense and security environment such as force reduction. In addition, the possibility for human error inherent to perimeter guard operations attests to the need for an innovative revamp of current systems. The purpose of this study is to propose a real-time object detection AI tailored to military CCTV surveillance with three unique characteristics. First, training data suitable for situations in which relatively small objects must be recognized is used due to the characteristics of military CCTV. Second, we utilize a data augmentation algorithm suited for military context applied in the data preparation step. Third, a noise reduction algorithm is applied to account for military-specific situations, such as camouflaged targets and unfavorable weather conditions. The proposed system has been field-tested in a real-world setting, and its performance has been verified.

Reviewing the Utilization of Smart Airport Security - Case Study of Different Technology Utilization -

  • Sung-Hwan Cho;Sang Yong Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.3
    • /
    • pp.172-177
    • /
    • 2023
  • The main purpose of the research was to review the global trends of airport's smart security technologies. Moreover, using the case studies of airport using smart security, this paper tried to propose the implication how the findings through the case studies may be important for airport policy and will impact the future research of airport operation. It is expected in the future the aviation security technology with biometric information evolves from single identification to multiple identification technology which has combined application of iris, vein and others. Facing post COVID-19 era, the number of passengers traveling through airports continues increase dramatically and the risks as well, the role of AI becomes even more crucial. With AI based automated security robotics airport operators could effectively handle the growing passenger and cargo volume and address the associated issues Smart CCTV analysis with A.I. and IoT applying solutions could also provide significant support for airport security.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

Convergence CCTV camera embedded with Deep Learning SW technology (딥러닝 SW 기술을 이용한 임베디드형 융합 CCTV 카메라)

  • Son, Kyong-Sik;Kim, Jong-Won;Lim, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.103-113
    • /
    • 2019
  • License plate recognition camera is dedicated device designed for acquiring images of the target vehicle for recognizing letters and numbers in a license plate. Mostly, it is used as a part of the system combined with server and image analysis module rather than as a single use. However, building a system for vehicle license plate recognition is costly because it is required to construct a facility with a server providing the management and analysis of the captured images and an image analysis module providing the extraction of numbers and characters and recognition of the vehicle's plate. In this study, we would like to develop an embedded type convergent camera (Edge Base) which can expand the function of the camera to not only the license plate recognition but also the security CCTV function together and to perform two functions within the camera. This embedded type convergence camera equipped with a high resolution 4K IP camera for clear image acquisition and fast data transmission extracted license plate area by applying YOLO, a deep learning software for multi object recognition based on open source neural network algorithm and detected number and characters of the plate and verified the detection accuracy and recognition accuracy and confirmed that this camera can perform CCTV security function and vehicle number plate recognition function successfully.

A Case Study on the Interior design characteristics of Integrated CCTV Control Center - Focused at Human Factor Design aspect (CCTV 통합관제센터의 실내공간특성에 대한 사례분석연구 - 인간공학디자인(HFD)의 관점에서)

  • Han, Ji Eun;Kwon, Gyu Hyun
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.103-118
    • /
    • 2017
  • It is expected that the integrated control service of the public sector will be increased for the safety of citizens in the future. Therefore, In this study, we analyzed the classification of CCTV control center and the characteristics of interior design. The survey was conducted at eight control centers in Seoul that were constructed since 2007 and analyzed according to the criteria of general matters, services, spatial basic information, spatial structure, and internal structure. The results of the survey are summarized as follows. Based on the results of the study, the Integrated Control Center is a space where the ratio of the physical environment is not high but performs important tasks for the citizens of the city, which are operated 24 hours a day, and security and security. It is characterized by the efficient space allocation for the treatment, the design of the moving line, and the connection according to the urgent work flow. The results of this study are expected to be used as basic data for other integrated control center environment.

A Study on Establishment and Connection of Intelligent Security Integrated Platform Elements for Real-Time Crime Response (실시간 범죄대응을 위한 지능형 방범 통합 플랫폼 요소 설정 및 연계방안 연구)

  • Choi, Woo-Chul;Na, Joon-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.8-15
    • /
    • 2018
  • This article investigates intelligent security integrated platform for real-time crime response and preventive crime prevention. This study analyzed intelligent crime prevention platform elements by analyzing crime prevention system/platform research, intelligent crime prevention research, and case study of municipality integrated operation center crime prevention system. Through this, we developed a practical intelligent security platform, and suggested a linkage with existing municipalities and smart city integrated platform system considering scalability. This enables CCTV monitoring, which is used only for existing post processing, to cope with real-time crime. It is expected that it will be able to solve the incidents in golden-time by grasping the precise position of the complainant not only in the outdoor but also indoors. It is also possible to provide citizen-centered crime-prevention social safety net information sharing service by enhancing citizen participation as well as improving control efficiency. The intelligent security platform has advantages that it is easy to spread the municipality because it is developed considering existing municipal system, smart city integration platform, and linkage and expansion with other security services.

The Research on the Recovery Techniques of Deleted Files in the XFS Filesystem (XFS 파일 시스템 내의 삭제된 파일 복구 기법 연구)

  • Ahn, Jae-Hyoung;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.885-896
    • /
    • 2014
  • The files in computer storages can be deleted due to unexpected failures or accidents. Some malicious users often delete data by himself for anti-forensics. If deleted files are associated with crimes or important documents in business, they should be recovered and the recovery tool is necessary. The recovery methods and tools for some filesystems such as NTFS, FAT, and EXT have been developed actively. However, there has not been any researches for recovering deleted files in XFS filesystem applied to NAS or CCTV. In addition, since the current related tools are based on the traditional signature detection methods, they have low recovery rates. Therefore, this paper suggests the recovery methods for deleted files based on metadata and signature detection in XFS filesystem, and verifies the results by conducting experiment in real environment.