• Title/Summary/Keyword: Security Camera

Search Result 292, Processing Time 0.03 seconds

MURO - Mangpo high school Unmanned Robotic Observatory

  • Kim, Hyunjong;Pak, Soojong;Kim, Youngjong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.52.1-52.1
    • /
    • 2016
  • We introduce the characteristics and performance of the 0.25m telescope at Mangpo high school Unmanned Robotic Observatory (MURO) which was established in Yangpyeong-gun, Gyeongi-do, KOREA in 2015 January. MURO system included Astrohaven 2.1m non-rotation fiberglass clamshell dome, Paramount MEII mount, Takahashi CCA 0.25m wide field telescope, FLI PL 16803 4K CCD with 7-positions filter wheel system, all sky camera and point grey wide field camera, IR 4 chanel heat sensor camera for security, DAVIS realtime weather cast, and power controled by ARS system. All control softwares are from off-the-shelf products based on Windows 7 OS to be easily operated and maintained. We expect to perform variety of science programs ranging from supernovae follow-up observation to narrow band imaging survey as well as science class activities at Mangpo high school.

  • PDF

A Study on Monitoring Technique for Home Server based on Web Camera (웹 카메라 기반 홈 서버용 모니터링 기술에 관한 연구)

  • Jeong Jong-Geun;Cheon Sung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1754-1761
    • /
    • 2005
  • A monitoring system for the security is increasingly demanded in line with the issue of the infringement of privacy. This paper has conducted the study on the monitoring technique via the Internet using PC or PDA. This is a monitoring system for web-camera based home server, which transmits the images and sound data captured by mike-embedded USB camera, though multiplexer of H.263 and internet. It integrates the operating processors of each device into a unified drive module and provides it the operator to facilitate the system operation and maintenance.

Study of Monitoring Performance Measurement and Performance Evaluation for Car Surveillance using CCTV Camera (CCTV기반 차량관제의 성능 평가 및 관제율 측정 방법 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.802-804
    • /
    • 2011
  • There are various monitoring and control system using CCTV camera. However, it is important to consider disaster and terrorism with unauthorized changes on location information. Therefore we analyzed performance of observation when the camera is break down as a result from hacking to CCTV monitoring and control system.

  • PDF

A Study on System Development for Ship's Integrated Safety and Security

  • Yoon, Daeg-Wun;Kim, Cheol-Seung
    • Journal of Navigation and Port Research
    • /
    • v.35 no.2
    • /
    • pp.131-136
    • /
    • 2011
  • As the faithful performance of ISPS of IMO, nowadays actually applicable an integrated safety and security system in and out of vessel should be organized in views of seafarers. Therefore, this paper is aimed to design a fundamental system for ship's integrated safety and security. The system of integrated grabbing will affect efficiently in any maritime field of material and human flow. Therefore this research will be expected to affect economical side by securing all the risk of maritime issues. In addition to the passenger ship and merchant vessel, it is applicable to other public and private vessels either. As a result of this paper, the system designed collecting various data through integrating the system including RFID reader, PIR sensor, and CMOS camera by putting an individual number into each unit that could be control at easy.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

A Study on the Analysis and Countermeasures of Security Vulnerabilities in Drone (드론의 보안 취약점 분석 및 대응방안 연구)

  • Son, Chung-Ho;Sim, Jaebum;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.355-358
    • /
    • 2016
  • Recently, As the interest of the drone has increased the fields such as broadcasting, disaster site and leisure which uses the drone has been constantly expanded. However, an invasion of a person's privacy and a threat of hacking attack also have increased as population of drone. High-resolution cameras mounted on drones can take a photo or real-time video anytime and anywhere. It causes the invasion of privacy from private houses, buildings, and hotels. In this paper, we perform a security vulnerability assessment tests on the camera's from common commercial drones and we propose the countermeasures to protect the drones against unauthorized attacker who attempts to access the drone's camera from internal or external. Through this research, we expect the Aviation Act and legislation accept the concept of security and provide the polices such as drones equipped with security devices from the production stage to promote drone industry.

  • PDF

영상보안산업에서의 IP Camera 시장 및 기술 동향

  • Hong, Soon-Ho
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.18-23
    • /
    • 2010
  • 본 문서에서는 믈리보안 중에서 영상보안 산업 특히 IP 카메라에 대한 시장 및 기술동향을 살펴본다. 아날로그 CCTV에서 IP로 진화하는 과정과 IP 영상보안시스템의 특장점에 대해서 간략히 살펴보고, IP 영상감시 부분의 최신 기술동향에 대해 기술하였다.

A Design and Implementation of Camera Information File Creation Tool for Efficient Recording Data Search in Surveillance System (보안 관제 시스템에서 효율적인 영상 검색을 위한 카메라 연동 정보 파일 자동 생성 도구의 설계 및 구현)

  • Hwang, Gi-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.55-61
    • /
    • 2016
  • For the purpose of video security equipment is to protect personal property and life against from terrorism or recent threats. In this study, if you proceed with the recorded data search, we propose a method for increasing the user's search convenience. It has predefined data structure which is between camera's movement path and relationship. Also, design and implement a tool that automatically generates a files which has inter camera related information on the control center in a multi-camera is installed environment. Using generated file, minimize searching time and increase searching efficiency.

Digital Watermarking Method for User's Certification of Camera-Phone (카메라 폰 상에서 사용자 인증을 위한 디지털 워터마킹 기법)

  • Lee, Seung-Ik;Sohn, Jae-Sik;Im, Sung-Woon;Kim, Duk-Gyoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • In the event of a traffic accident, a fire accident, or a criminal act, anyone will be able to capture these important moments and use authentic photographs for evidence purposes. Digital watermarking is able to ensure that the digital photographs taken from a particular camera-phone are authentic and indeed. This paper presents a blind image watermarking technique for digital phone camera. This method is based on singular value decomposition (SVD) and wavelet decomposition. Experimental results show that the proposed technique performs well in security and robustness against JPEG compression.

  • PDF

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.