• Title/Summary/Keyword: Security Robot

Search Result 122, Processing Time 0.02 seconds

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

Multiple-Background Model-Based Object Detection for Fixed-Embedded Surveillance System (고정형 임베디드 감시 카메라 시스템을 위한 다중 배경모델기반 객체검출)

  • Park, Su-In;Kim, Min Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • Due to the recent increase of the importance and demand of security services, the importance of a surveillance monitor system that makes an automatic security system possible is increasing. As the market for surveillance monitor systems is growing, price competitiveness is becoming important. As a result of this trend, surveillance monitor systems based on an embedded system are widely used. In this paper, an object detection algorithm based on an embedded system for a surveillance monitor system is introduced. To apply the object detection algorithm to the embedded system, the most important issue is the efficient use of resources, such as memory and processors. Therefore, designing an appropriate algorithm considering the limit of resources is required. The proposed algorithm uses two background models; therefore, the embedded system is designed to have two independent processors. One processor checks the sub-background models for if there are any changes with high update frequency, and another processor makes the main background model, which is used for object detection. In this way, a background model will be made with images that have no objects to detect and improve the object detection performance. The object detection algorithm utilizes one-dimensional histogram distribution, which makes the detection faster. The proposed object detection algorithm works fast and accurately even in a low-priced embedded system.

The Development of Mobile Robot for Security and Toy Functions (보안 및 완구기능의 모바일 로봇 개발)

  • Lee, Jeong-Ick
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.28-31
    • /
    • 2009
  • 여성의 사회참여, 평균수명의 증가에 따른 노령인구의 증가로 가정은 비어 있거나 노인, 어린이만 남게 되는 경우가 증가하고 있다. 본 제품은 이런 추세에 대응하여 가정과 동떨어진 장소에서 인터넷으로 가정을 보안, 감시할 수 있고, 가정에 남겨진 사람과 대화도 할 수 있는 로봇을 구현하고자 한다. 즉, 무선 영상 전송 카메라가 부착된 로봇을 이동시키면서 집안의 환경을 관찰할 수 있도록 하고, 스피커 및 마이크를 로봇에 내장하여 인터넷을 통한 실시간 대화도 가능하도록 하려고 한다. 또한, 외부 침입자 발견 시 자동 촬영 기능이 있으며, 집주인에게 메시지 나 경보음을 보내 대응할 수 있도록 하였다. 이렇게 함으로써 가정을 가진 여성이 집안 걱정을 하지 않고 근무에 전념할 수 있어 생산성이 향상되고, 집에 물건을 놓아두고 외출을 하였을 때 간단한 방법으로 확인 가능한 이점도 있을 뿐 아니라 장기간 집을 비우게 되는 경우에도 항상 집을 감시할 수 있어, 도난 화재 등에 신속하게 대처할 수 있다. 1년차 '보안 기능 탑재 애완용 로봇 개발'을 통한 2년차 과제로 로봇의 완성과 제품화 단계에 심혈을 기울였다. 본 연구는 2년차 연구의 결과를 보여주는 것이다.

  • PDF

Security Problems and Protection Methods in Remote Control Communication for Mobile Robots Using Wireless IP Network

  • Mizoguchi, Hiroshi;Teshiba, Masashi;Goto, Yoshiyasu;Hidai, Ken-Ichi;Shigehara, Takaomi;Mishima, Taketoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.401-406
    • /
    • 1998
  • If a mobile robot can be controlled remotely via the internet using wireless IP protocol network, it becomes much useful and convenient. However risk of illegal access is also increased. This paper discusses problems of the illegal access and proposes protection methods against the access.

  • PDF

Measurement-based Estimation of the Composite Load Model Parameters

  • Kim, Byoung-Ho;Kim, Hong-Rae
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.6
    • /
    • pp.845-851
    • /
    • 2012
  • Power system loads have a significant impact on a system. Although it is difficult to precisely describe loads in a mathematical model, accurately modeling them is important for a system analysis. The traditional load modeling method is based on the load components of a bus. Recently, the load modeling method based on measurements from a system has been introduced and developed by researchers. The two major components of a load modeling problem are determining the mathematical model for the target system and estimating the parameters of the determined model. We use the composite load model, which has both static and dynamic load characteristics. The ZIP model and the induction motor model are used for the static and dynamic load models, respectively. In this work, we propose the measurement-based parameter estimation method for the composite load model. The test system and related measurements are obtained using transient security assessment tool(TSAT) simulation program and PSS/E. The parameter estimation is then verified using these measurements. Cases are tested and verified using the sample system and its related measurements.

3D Information based Visualization System for Real-Time Teleoperation of Unmanned Ground Vehicles (무인 지상 로봇의 실시간 원격 제어를 위한 3차원 시각화 시스템)

  • Jang, Ga-Ram;Bae, Ji-Hun;Lee, Dong-Hyuk;Park, Jae-Han
    • The Journal of Korea Robotics Society
    • /
    • v.13 no.4
    • /
    • pp.220-229
    • /
    • 2018
  • In the midst of disaster, such as an earthquake or a nuclear radiation exposure area, there are huge risks to send human crews. Many robotic researchers have studied to send UGVs in order to replace human crews at dangerous environments. So far, two-dimensional camera information has been widely used for teleoperation of UGVs. Recently, three-dimensional information based teleoperations are attempted to compensate the limitations of camera information based teleoperation. In this paper, the 3D map information of indoor and outdoor environments reconstructed in real-time is utilized in the UGV teleoperation. Further, we apply the LTE communication technology to endure the stability of the teleoperation even under the deteriorate environment. The proposed teleoperation system is performed at explosive disposal missions and their feasibilities could be verified through completion of that missions using the UGV with the Explosive Ordnance Disposal (EOD) team of Busan Port Security Corporation.

ROS2 공격 기술 동향 분석

  • Jaewoong Heo;Lee Yeji;Hyo Jin Jo
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.57-63
    • /
    • 2023
  • Industry 4.0의 진행으로 이기종의 IoT 장비들 간의 통신을 위해 다양한 산업용 통신 미들웨어들이 등장했다. 그 중 Robotics 분야에서 활발히 사용되는 Robot Operating System (ROS)는 개발자 커뮤니티와 로봇 개발 도구들을 기반으로 지속적인 시장 점유율 증가세를 보이고 있다. 초기 발표된 ROS1의 경우 보안이 전혀 고려되지 않은 설계로 Packet Injection 공격등의 사이버 보안 위협에 취약했지만, ROS2의 경우 통신 미들웨어인 Data Distribution Service (DDS) 통신규격을 전송 계층에 적용하여 메시지 전송에 대한 보안 기능을 제공하고 있다. 그러나 최근 연구에서는 DDS와 관련된 ROS2 취약점이 발표되고 있다. 따라서 본 논문에서는 DDS와 관련된 ROS2의 공격 기술 동향을 소개한다.

Four-legged walking robot for school security using Lidar SLAM (라이다 SLAM을 이용한 교내경비용 4족 로봇)

  • Lee, Ki-Hyeon;Chung, Chang-Hyun;Ahn, Seung-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.740-742
    • /
    • 2022
  • 본 프로젝트에서는 다양한 지형에 구애받지 않고 전천후로 활동할 수 있는 로봇을 구현하기 위해 바퀴형 로봇 보다는 4족 보행 로봇을 채택하여 지형 극복에 더 유리하고 안정적인 자세 제어와 보행을 할 수 있는 동시에 LiDAR 센서와 카메라 모듈을 이용한 SLAM(동시적 위치 추정 및 지도작성)과 원격으로 사물과 사람들을 파악할 수 있는 원격조종 탐사로봇을 개발하고자 한다.

A Study on Defense Robot Combat Concepts Using Fourth Industrial Revolution Technologies

  • Sang-Hyuk Park;Jae-Geon Lee;Moo-Chun Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.249-253
    • /
    • 2024
  • The ultimate purpose of this study is as follows: The current primary concern in the defense sector revolves around how to strategically utilize Fourth Industrial Revolution technologies in combat. The Fourth Industrial Revolution denotes a shift towards an environment where automation and connectivity are maximized, driven by technologies such as artificial intelligence. Coined by Klaus Schwab in the 2015 Davos Forum, this term highlights the significant role of machine learning and artificial intelligence. Particularly, the military application of Fourth Industrial Revolution technologies is expected to be actively researched and implemented. Combat involves military actions between units, typically conducted as part of a larger war, with units striving to achieve one or more objectives. The concept of combat refers to the fundamental ideas of how units should engage with the enemy, both presently and in future scenarios, to achieve assigned objectives.

Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster Sites (재난 현장 물리적 보안을 위한 딥러닝 기반 요구조자 탐지 알고리즘)

  • Kim, Da-hyeon;Park, Man-bok;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.57-64
    • /
    • 2022
  • If the inside of a building collapses due to a disaster such as fire, collapse, or natural disaster, the physical security inside the building is likely to become ineffective. Here, physical security is needed to minimize the human casualties and physical damages in the collapsed building. Therefore, this paper proposes an algorithm to minimize the damage in a disaster situation by fusing existing research that detects obstacles and collapsed areas in the building and a deep learning-based object detection algorithm that minimizes human casualties. The existing research uses a single camera to determine whether the corridor environment in which the robot is currently located has collapsed and detects obstacles that interfere with the search and rescue operation. Here, objects inside the collapsed building have irregular shapes due to the debris or collapse of the building, and they are classified and detected as obstacles. We also propose a method to detect rescue requesters-the most important resource in the disaster situation-and minimize human casualties. To this end, we collected open-source disaster images and image data of disaster situations and calculated the accuracy of detecting rescue requesters in disaster situations through various deep learning-based object detection algorithms. In this study, as a result of analyzing the algorithms that detect rescue requesters in disaster situations, we have found that the YOLOv4 algorithm has an accuracy of 0.94, proving that it is most suitable for use in actual disaster situations. This paper will be helpful for performing efficient search and rescue in disaster situations and achieving a high level of physical security, even in collapsed buildings.