• Title/Summary/Keyword: Security Camera

Search Result 292, Processing Time 0.029 seconds

Vulnerability Analysis Model for IoT Smart Home Camera

  • Aljahdali, Asia Othman;Alsaidi, Nawal;Alsafri, Maram
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.229-239
    • /
    • 2022
  • Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

IP Camera Hacking Analysis And Measure (IP카메라 해킹 분석과 대책)

  • Han, Sang-Hoon;Jang, Jin-Hui;Kang, Gil-Uk;Park, Han-Sol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.165-166
    • /
    • 2018
  • IP카메라는 CCTV와 달리 값도 저렴하고 네트워크와 연결돼 PC와 스마트 폰을 통해서 실시간 조회 및 제어가 가능한 카메라이다. 이러한 장점에 힘입어 일반 가정이나 매장 등에서 도난 방지 및 감시를 위해 IP 카메라를 사용하는 사람들이 급격히 증가하고 있으며, 이에 따라 해킹을 통한 사생활 침해 문제도 같이 증가하고 있다. 이는 사용자들의 보안 인식이 턱없이 부족해 전문가가 아니더라도 손쉽게 프로그램과 사이트를 이용하여 해킹이 가능하기 때문인 것으로 사료된다. 따라서 본 논문에서는 해킹이 얼마나 쉽게 이뤄지는지, 어떠한 피해가 있는지, 그리고 이에 대한 해결방안을 제안한다.

  • PDF

Design of an IOT System based on Face Recognition Technology using ESP32-CAM

  • Mahmoud, Ines;Saidi, Imen;bouzazi, Chadi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.1-6
    • /
    • 2022
  • In this paper, we will present the realization of a facial recognition system using the ESP32-CAM board controlled by an Arduino board. The goal is to monitor a remote location in real time via a camera that is integrated into the ESP32 IOT board. The acquired images will be recorded on a memory card and at the same time transmitted to a pc (a web server). The development of this remote monitoring system is to create an alternative between security, reception, and transmission of information to act accordingly. The simulation results of our proposed application of the facial recognition domain are very efficient and satisfying in real time.

스마트폰 카메라 및 보안 스티커 검출 방법

  • Kim, Chang-dae;Choi, Seo-hyuk;Ryu, Sung-pil;Kim, Dong-woo;Ahn, Jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.823-826
    • /
    • 2016
  • This paper proposes a method for detecting automatically a smartphone camera in order to put a security stickers and detecting security sickers to recognize whether the removable security sticker or not. The method reduce the time that a person put a security stickers and check the stickers whether the removable stickers at rush hour. It is significantly low to detect rate if the image quality is poor low by LED light flickering phenomenon at the time of the camera detection of the smartphone. Therefor, in this paper, it implement the method that detecting camera to inspect frequently degree after applying the adaptive threshold. Further, in order to recognize whether the removable security sticker or not implement the sticker region detection method using a color filter. The proposed method could increase detecting ratio than earlier methods with LED light flickering phenomenon. In addition, it was also high security sticker detection ratio.

  • PDF

A Study on the control of lights for BEMS using Adaptive GMM (Adaptive GMM을 활용한 BEMS용 조명제어 연구)

  • Ko, Kwangseok;Lee, Juyoung;Kang, Yongsik;Shim, Dongha;Kim, Jaemoon;Kim, Eunsoo;Lee, Jongsung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.116-120
    • /
    • 2012
  • There has been increased interest for building energy-saving for worldwide. There is continuing research on IT technology for efficient management of BEMS. Recently, It be able to control of LED and to maximize energy savings to the development of LED lighting technology. We propose the security image processing system to improve efficiency and we implement the real-time status monitoring system to surveil the object in the building energy management system. In this paper, we proposed the system of LED control using IP camera and Adaptive Gaussian Mixture Model for BEMS. We implement LED light control software on the based of the security camera image processing so the reliable controling based on the security camera is possible efficiently.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

Unattended fire detection system using a wireless communication device (무선통신 단말기를 이용한 무인화재 감지시스템)

  • Chang, Rak-Ju;Lee, Soon-Yi;Kang, Suk-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.25-26
    • /
    • 2015
  • The Unattended fire detection system using a wireless communication device is designed in this paper. If a fire occurs in some area, the system can detect and automatically extinguish the fire. The major functions for the system are: Unattended detection system for fire based on wireless communication system and Automatic extinguish device system; Thermal imaging camera and video camera system; Monitoring viewer and map viewer system.

  • PDF

Exploring Image Processing and Image Restoration Techniques

  • Omarov, Batyrkhan Sultanovich;Altayeva, Aigerim Bakatkaliyevna;Cho, Young Im
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.172-179
    • /
    • 2015
  • Because of the development of computers and high-technology applications, all devices that we use have become more intelligent. In recent years, security and surveillance systems have become more complicated as well. Before new technologies included video surveillance systems, security cameras were used only for recording events as they occurred, and a human had to analyze the recorded data. Nowadays, computers are used for video analytics, and video surveillance systems have become more autonomous and automated. The types of security cameras have also changed, and the market offers different kinds of cameras with integrated software. Even though there is a variety of hardware, their capabilities leave a lot to be desired. Therefore, this drawback is trying to compensate by dint of computer program solutions. Image processing is a very important part of video surveillance and security systems. Capturing an image exactly as it appears in the real world is difficult if not impossible. There is always noise to deal with. This is caused by the graininess of the emulsion, low resolution of the camera sensors, motion blur caused by movements and drag, focus problems, depth-of-field issues, or the imperfect nature of the camera lens. This paper reviews image processing, pattern recognition, and image digitization techniques, which will be useful in security services, to analyze bio-images, for image restoration, and for object classification.

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.