• Title/Summary/Keyword: Security Camera

Search Result 288, Processing Time 0.03 seconds

A Study on Multi-modal Near-IR Face and Iris Recognition on Mobile Phones (휴대폰 환경에서의 근적외선 얼굴 및 홍채 다중 인식 연구)

  • Park, Kang-Ryoung;Han, Song-Yi;Kang, Byung-Jun;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.1-9
    • /
    • 2008
  • As the security requirements of mobile phones have been increasing, there have been extensive researches using one biometric feature (e.g., an iris, a fingerprint, or a face image) for authentication. Due to the limitation of uni-modal biometrics, we propose a method that combines face and iris images in order to improve accuracy in mobile environments. This paper presents four advantages and contributions over previous research. First, in order to capture both face and iris image at fast speed and simultaneously, we use a built-in conventional mega pixel camera in mobile phone, which is revised to capture the NIR (Near-InfraRed) face and iris image. Second, in order to increase the authentication accuracy of face and iris, we propose a score level fusion method based on SVM (Support Vector Machine). Third, to reduce the classification complexities of SVM and intra-variation of face and iris data, we normalize the input face and iris data, respectively. For face, a NIR illuminator and NIR passing filter on camera are used to reduce the illumination variance caused by environmental visible lighting and the consequent saturated region in face by the NIR illuminator is normalized by low processing logarithmic algorithm considering mobile phone. For iris, image transform into polar coordinate and iris code shifting are used for obtaining robust identification accuracy irrespective of image capturing condition. Fourth, to increase the processing speed on mobile phone, we use integer based face and iris authentication algorithms. Experimental results were tested with face and iris images by mega-pixel camera of mobile phone. It showed that the authentication accuracy using SVM was better than those of uni-modal (face or iris), SUM, MAX, NIN and weighted SUM rules.

Multi-Scale, Multi-Object and Real-Time Face Detection and Head Pose Estimation Using Deep Neural Networks (다중크기와 다중객체의 실시간 얼굴 검출과 머리 자세 추정을 위한 심층 신경망)

  • Ahn, Byungtae;Choi, Dong-Geol;Kweon, In So
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.3
    • /
    • pp.313-321
    • /
    • 2017
  • One of the most frequently performed tasks in human-robot interaction (HRI), intelligent vehicles, and security systems is face related applications such as face recognition, facial expression recognition, driver state monitoring, and gaze estimation. In these applications, accurate head pose estimation is an important issue. However, conventional methods have been lacking in accuracy, robustness or processing speed in practical use. In this paper, we propose a novel method for estimating head pose with a monocular camera. The proposed algorithm is based on a deep neural network for multi-task learning using a small grayscale image. This network jointly detects multi-view faces and estimates head pose in hard environmental conditions such as illumination change and large pose change. The proposed framework quantitatively and qualitatively outperforms the state-of-the-art method with an average head pose mean error of less than $4.5^{\circ}$ in real-time.

Emphasizing Intelligent Event Processing Cooperative Surveillance System (지능형 사건 처리를 강조한 협업 감시 시스템)

  • Yoon, Tae-Ho;Song, Yoo-Seoung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.6
    • /
    • pp.339-343
    • /
    • 2012
  • Security and monitoring system has many applications and commonly used for detection, warning, alarm, etc. As the networking technology advances, user requirements are getting higher. An intelligent and cooperative surveillance system is proposed to meet current user demands and improve the performance. This paper focuses on the implementation issue for the embedded intelligent surveillance system. To cover wide area cooperative function is implemented and connected by wireless sensor network technology. Also to improve the performance lots of sensors are employed into the surveillance system to reduce the error but improve the detection probability. The proposed surveillance system is composed of vision sensor (camera), mic array sensor, PIR sensor, etc. Between the sensors, data is transferred by IEEE 802.11s or Zigbee protocol. We deployed a private network for the sensors and multiple gateways for better data throughput. The developed system is targeted to the traffic accident detection and alarm. However, its application can be easily changed to others by just changing software algorithm in a DSP chip.

Efficient Sharp Digital Image Detection Scheme

  • Kim, Hyoung-Joong;Tsomko, Elena;Kim, Dong-Hoi
    • Journal of Broadcast Engineering
    • /
    • v.12 no.4
    • /
    • pp.350-359
    • /
    • 2007
  • In this paper we present a simple, efficient method for detection of sharp digital images. Recently many digital cameras are equipped with various autofocusing functions to help users take well-focused pictures as easily as possible. However, acquired digital pictures can be further degraded by motion, limited contrast, and inappropriate amount of exposure, to name a few. In order to decide whether to process the image or not, or whether to delete it or not, reliable measure of image quality to detect sharp images from blurry ones is needed. This paper presents a blurriness/sharpness measure, and demonstrates its feasibility using extensive experiments. This method is fast and easy to implement, and accurate. Regardless of the detection accuracy, existing measures are computation-intensive. However, the proposed measure in this paper is not demanding in computation time. Needless to say, this measure can be used for various imaging applications including autofocusing and astigmatism correction.

Extraction of Physical Contact in Elevator (엘리베이터 내의 신체적 접촉 장면 추출)

  • Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2852-2857
    • /
    • 2015
  • Assault and violence in the elevator is a crime that occurs most frequently. In particular, these days, is a phenomenon that occurs frequently, knowing that there is a CCTV camera. In this paper, we extract the phenomena of contact between people in the elevator. Many people ride the elevator does not cause these symptoms. However, this crime occurs when fewer people ride the elevator. Extraction method of contact is seeking the skeleton of binary image and extracts the contact status of each skeleton. Therefore, immediately detecting the violence and assaults that occur in the elevator and to notify the security office of the building.

MultiView-Based Hand Posture Recognition Method Based on Point Cloud

  • Xu, Wenkai;Lee, Ick-Soo;Lee, Suk-Kwan;Lu, Bo;Lee, Eung-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2585-2598
    • /
    • 2015
  • Hand posture recognition has played a very important role in Human Computer Interaction (HCI) and Computer Vision (CV) for many years. The challenge arises mainly due to self-occlusions caused by the limited view of the camera. In this paper, a robust hand posture recognition approach based on 3D point cloud from two RGB-D sensors (Kinect) is proposed to make maximum use of 3D information from depth map. Through noise reduction and registering two point sets obtained satisfactory from two views as we designed, a multi-viewed hand posture point cloud with most 3D information can be acquired. Moreover, we utilize the accurate reconstruction and classify each point cloud by directly matching the normalized point set with the templates of different classes from dataset, which can reduce the training time and calculation. Experimental results based on posture dataset captured by Kinect sensors (from digit 1 to 10) demonstrate the effectiveness of the proposed method.

Intrusion Detection Algorithm based on Motion Information in Video Sequence (비디오 시퀀스에서 움직임 정보를 이용한 침입탐지 알고리즘)

  • Kim, Alla;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.284-288
    • /
    • 2010
  • Video surveillance is widely used in establishing the societal security network. In this paper, intrusion detection based on visual information acquired by static camera is proposed. Proposed approach uses background model constructed by approximated median filter(AMF) to find a foreground candidate, and detected object is calculated by analyzing motion information. Motion detection is determined by the relative size of 2D object in RGB space, finally, the threshold value for detecting object is determined by heuristic method. Experimental results showed that the performance of intrusion detection is better one when the spatio-temporal candidate informations change abruptly.

A Study on Image Noise Reduction Technique for Low Light Level Environment (저조도 환경의 영상 잡음제거 기술에 관한 연구)

  • Lee, Ho-Cheol;Namgung, Jae-Chan;Lee, Seong-Won
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.3
    • /
    • pp.283-289
    • /
    • 2010
  • Recent advance of digital camera results in that image signal processing techniques are widely adopted to railroad security management. However, due to the nature of railroad management many images are acquired in low light level environment such as night scenes. The lack of light causes lots of noise in the image, which degrades image quality and causes errors in the next processes. 3D noise reducing techniques produce better results by using consecutive sequence of images. On the other hand, they cause degradation such as motion blur if there are motions in the sequence. In this paper, we use an adaptive weight filter to estimate more accurate motions and use the result of the adaptive filter to 3D result to improve objective and subjective mage quality.

Design of Urban Transport Management System Based on Integrated Wireless LAN Technologies (통합 무선 기술 기반의 도시 교통 관리 시스템 설계)

  • Woo, Seok;Kim, Eun-Chan;Oh, Kyoung-Seok;Kim, Ki-Seon
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.99-100
    • /
    • 2007
  • Rapid developments of industry and economics have made a metropolis which demands an effective urban transport management system (UTMS). Specially, this paper considers a subway surveillance system based on integrated wireless LAN technologies for public safety. Since a current subway platform security entirely relies on conventional closed circuit television camera (CCTV) or human operators, subway train drivers cannot detect platform states and cope with abnormal situations or accidents immediately. However, through the IP cameras and some wireless routers, high qualify images of the platform conditions can be directly delivered to the train drivers and other station employees in advance of train entering the platform. In this paper, several design issues and problems are discussed when building up the subway management system. Further, we illustrate a system model with the system requirements in real parametric values in order to draw concrete system designs and to realize a practical implementation of the future UTMS.

  • PDF

Challenge-Response Authentication with a Smartphone (스마트폰을 이용한 Challenge-Response 인증)

  • Thiranant, Non;Hui, Yvonne Tan Ying;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.187-190
    • /
    • 2012
  • This paper proposes an one-time authentication system for web applications by making use of the quick-response code, which is widely used nowadays. The process is not time-consuming. It does not require any browser extensions or specific hardware to complete a task. The system uses QR code which is basically a two-dimensional black and white image encoding a piece of digital information. When a user logs into a site, the web server will generate a challenge encoded to form a QR code. The user captures a picture of QR code with a mobile camera which results in decoding the QR code. The challenge shall be sent back to the server; the web server then logs the PC browser in. The authentication using Challenge-Response is easy to understand and the process is fast. The system proposes the improvement of usability and security of online authentication.

  • PDF