• Title/Summary/Keyword: Security Camera

Search Result 291, Processing Time 0.026 seconds

Active Object Tracking System for Intelligent Video Surveillance (지능형 비디오 감시를 위한 능동적 객체 추적 시스템)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.2
    • /
    • pp.82-85
    • /
    • 2014
  • It is helpful to use Intelligent Video Surveillance to replace and supplement the demerit which can possibly occur due to the mistake that can be made by human management. To accomplish this, it is essential that the system should digitalize image information from surveillance camera so that the system, itself, can be able to locate a object and to analyze the pattern of the object. Also, it is imperative that the system should have ability to operate a alarm and a entrance blocking system and to notify a situation to a security manager. Zooming a small object form a screen, however, requires a exact zooming ratio of the object and a shift of centric coordinate. In this paper, It is able to locate and observe closely a object from flexible background, regardless of the distance, by calculating a zooming ratio according to object moment, pan coordinate, and tilt coordinate.

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.

Design and Implementation of Multimedia Monitoring System Using WebCam Structure (WebCam을 이용한 멀티미디어 보안시스템의 설계와 구현)

  • 송은성;오용선
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.161-166
    • /
    • 2003
  • In this paper, we propose a novel method of design and implementation for the multimedia monitoring system using Web Camera. Recently WebCam is variously applied to many different areas and implemented as an improved performance using convenient functions of Web in this Internet era. Multimedia moving pictures has been popularly used in a variety of ways in different areas of monitoring systems in order to enhance the performance and the service with their data compression capability and the speed of the communication network these days. The design method of WebCam system presented in this paper might offer not only a convenient function of the monitoring system but great application capabilities. It can be used for a real time application of the multimedia picture and audio transmission so that the monitoring system can manage the security information in the sense for the reality. Tn addition, the monitoring system may be used as an inreal-time application using data storage and retrieval features of the Web. We offer both functions of monitoring in this structured form of implemented system.

  • PDF

Reliable extraction of moving edge segments in the dynamic environment (동적인 입력환경에서 신뢰성이 있는 이동 에지세그먼트 검출)

  • Ahn Ki-Ok;Lee June-Hyung;Chae Ok-Sam
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.5 s.311
    • /
    • pp.45-51
    • /
    • 2006
  • Recently, the IDS(Intrusion Detection System) using a video camera is an important part of the home security systems which start gaining popularity. However, the video intruder detection has not been widely used in the home surveillance systems due to its unreliable performance in the environment with abrupt illumination change. In this paper, we propose an effective moving edge extraction algerian from a sequence image. The proposed algorithm extracts edge segments from current image and eliminates the background edge segments by matching them with reference edge list, which is updated at every frame, to find the moving edge segments. The test results show that it can detect the contour of moving object in the noisy environment with abrupt illumination change.

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF

Detection of Moving Objects using Depth Frame Data of 3D Sensor (3D센서의 Depth frame 데이터를 이용한 이동물체 감지)

  • Lee, Seong-Ho;Han, Kyong-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.243-248
    • /
    • 2014
  • This study presents an investigation into the ways to detect the areas of object movement with Kinect's Depth Frame, which is capable of receiving 3D information regardless of external light sources. Applied to remove noises along the boundaries of objects among the depth information received from sensors were the blurring technique for the x and y coordinates of pixels and the frequency filter for the z coordinate. In addition, a clustering filter was applied according to the changing amounts of adjacent pixels to extract the areas of moving objects. It was also designed to detect fast movements above the standard according to filter settings, being applicable to mobile robots. Detected movements can be applied to security systems when being delivered to distant places via a network and can also be expanded to large-scale data through concerned information.

Facial Contour Extraction in PC Camera Images using Active Contour Models (동적 윤곽선 모델을 이용한 PC 카메라 영상에서의 얼굴 윤곽선 추출)

  • Kim Young-Won;Jun Byung-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.633-638
    • /
    • 2005
  • The extraction of a face is a very important part for human interface, biometrics and security. In this paper, we applies DCM(Dilation of Color and Motion) filter and Active Contour Models to extract facial outline. First, DCM filter is made by applying morphology dilation to the combination of facial color image and differential image applied by dilation previously. This filter is used to remove complex background and to detect facial outline. Because Active Contour Models receive a large effect according to initial curves, we calculate rotational degree using geometric ratio of face, eyes and mouth. We use edgeness and intensity as an image energy, in order to extract outline in the area of weak edge. We acquire various head-pose images with both eyes from five persons in inner space with complex background. As an experimental result with total 125 images gathered by 25 per person, it shows that average extraction rate of facial outline is 98.1% and average processing time is 0.2sec.

  • PDF

A Study of Clothing Design in the Digital Age (디지털 시대의 의상 디자인 개발에 관한 연구)

  • 배리사;이인성
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.4
    • /
    • pp.63-74
    • /
    • 2004
  • This study shows that clothes to be just the same as the real thing can be Produced through the third dimension computer graphics, and then presents that not only the area of fashion design can be expanded in the virtual reality field by doing the simulation of the fashion show, but also the information can be made the real time public ownership and the communication can be fulfilled smoothly. In this study, analyzing the third dimension computer graphic programs to be used much at present, Alias Wavefront Company's Maya software which was the most effective in the clothes simulation and the clothes CAD SGS OptiTex 8.7 which went well substitutive for it were used of them. The conclusions of this study that got through the work manufacture are as follows: The first, if the file manufacturing in the clothes CAD by using the computer was stored, the pattern used 3D simulation was available because it could be summoned in 3D software. The second, if the data of DXF form in Maya program was summoned, they could not be applied by Maya Cloth supported in Nurbs only because they were recognized as the DXF_layer. So the curve along the outer lines of the pattern was drawn and Maya Cloth was applied to be possible to get the natural silhouette of clothes. The third, when the clothes were manufactured by 3D, if the draping character was applied according to the textile special quality, not only the control of textile's thickness, weight, quality feeling, and silhouette was available, but also the clothes were available to graft the special textile materials. The fourth, the natural motion of model was produced by capturing the actual model's walking action In order to produce the fashion show motion and also the dynamic fashion show was available by the angle of camera, the establishment of lighting, and etc. in the final rendering. The clothes manufactured by 3D are available to change the design by changing the materials, or by adding the details, or by utilizing the special materials on clothes. Therefore, the trial and error following at the clothes manufacture can be reduced. But the elevation of the rendering speed, the price down, the strengthening of personal security, and etc. are required.

Three channel Skin-Detection Algorithm for considering all constituent in YCbCr color space (YCbCr 색 좌표계의 모든 요소를 고려한 3-channel 피부 검출 알고리즘)

  • Shin, Sun-Mi;Im, Jeong-Uk;Jang, Won-Woo;Kwak, Boo-Dong;Kang, Bong-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.127-130
    • /
    • 2007
  • Skin detection research is important role in the 3G of mobile phone for video telephony and security system by using face recognition. We propose skin detection algorithm as preprocessing to the face recognition, and use YCbCr color space. In existing skin detection algorithm using CbCr, skin colors that is brightened by camera flash or sunlight at outdoor in images doesn't acknowledged the skin region. In order to detect skin region accuracy into any circumstance, this paper proposes 3-channel skin detection algorithm.

  • PDF

A Preliminary Study on UAV Photogrammetry for the Hyanho Coast Near the Military Reservation Zone, Eastern Coast of Korea (동해안 군사시설보호구역 주변 향호 연안역을 대상으로 무인항공사진측량에 관한 예비 연구)

  • Kim, Baeck-Oon;Yun, Kong-Hyun;Chang, Tae-Soo;Bahk, Jang-Jun;Kim, Seong-Pil
    • Ocean and Polar Research
    • /
    • v.39 no.2
    • /
    • pp.159-168
    • /
    • 2017
  • To evaluate the accuracy of UAV photogrammetry for Hyangho coast, eastern coast of Korea, we conducted a field experiment wherein UAV photogrammetry test was repeated three times. Since the Haygho coast is located within a military reservation zone, it was necessary to obtain permission to gain access to the beach and to have sensitive aerial photographs showing military facilities inspected and cropped. The standard deviation of the UAV shooting position between the three tests was less than 1 m, but repeatability of footprint on the ground was low due to wind-driven variability of the UAV pose. Self-calibrating bundle adjustment(SCBA) of implementing non-metric camera calibration was failed in one test. In two tests, the vertical error was twice as large as the pixel size except for those areas that were subject to security inspection and cropping. Given the problems that can arise with regard to the repeatability of the shooting area as well as the possibility of failure with regard to SCBA, we strongly recommend that UAV photogrammetry in coastal areas needs to be repeated at least twice.