• Title/Summary/Keyword: Video Fingerprint

Search Result 18, Processing Time 0.022 seconds

Blind Video Fingerprinting Using Temporal Wavelet Transform (시간축 웨이블릿 변환을 이용한 블라인드 비디오 핑거프린팅)

  • Kang Hyun-Ho;Park Ji-Hwan;Lee Hye-Joo;Hong Jin-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1263-1272
    • /
    • 2004
  • In this paper, we present a novel video fingerprinting implementation method to identify the source of illegal copies. The video fingerprinting is achieved by the insertion of uniform distributed random number is made by seller and buyer's identification key-in the video wavelet coefficients by their temporal wavelet transform. The proposed fingerprinting is able to detect unique fingerprint of video contents even if they have been distorted by collusion attacks and MPEG2 compression. Especially, we use characteristics of the temporal wavelet transform to assign user's embedding area. Experimental results show the traceability of unauthorized distribution of video contents and its robustness to various collusion attacks and MPEG2 compression.

  • PDF

A Study on Protection of Iris and fingerprint Data Based on Digital Watermarking in Mid-Frequency Band (중간 주파수 영역에서의 디지털 워터마킹 기법에 의한 홍채 및 지문 데이터 보호 연구)

  • Jeong, Dae-Sik;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1227-1238
    • /
    • 2005
  • Recently, with the advance of network and internet technologies, it is appeared the Problem that the digital contents such as image, voice and video are illegally pirated and distributed. To protect the copyright of the digital contents, the digital watermarking technology of inserting the provider's information into the contents has been widely used. In this paper, we propose the method of applying the digital watermarking into biometric information such as fingerprint and iris in order to prevent the problem caused by steal and misuse. For that, we propose the method of inserting watermark in frequency domain, compare the recognition performance before and aster watermark inserting. Also, we experiment the robustness of proposed method against blurring attack, which is conventionally taken on biometrics data. Experimental results show that our proposed method can be used for protecting iris and fingerprint data, efficiently.

  • PDF

Development of Video Watermark System for Low-specification System as Android Platforms (저 사양 안드로이드 기반 동영상 보안을 위한 워터마크 시스템 개발)

  • Hwang, Seon-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.141-149
    • /
    • 2014
  • This paper describes a method to insert and detect watermark or fingerprint to/from videos in low-computing powered system as Android platforms. Fingerprint, which is a kind of watermark, has features such as patterns that contain information. The inserting frame numbers in video-stream and the positions in a picture were chosen from the encrypted user ID to insert the watermarks. The used encrypt algorithm is the HIGHT algorithm which was developed for low-computing powered systems by KISA(Korean Internet & Security Agency). Subtracting an inferred picture from the previous picture was used to extract a candidate feature. Median filtering was used to get rid of noise and stabilize the candidate feature. New algorithm that reduces calculating steps of the median filtering was developed and applied for low-specification systems. The stabilized features were accumulated over 150 times and calculated by correlation coefficient method to recognize the patterns. We examined 22 videos and successfully detected the patterns from 21 videos. The correlation coefficient r values that we examined through this study exceeded over 0.79 more than the threshold (0.7).

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Interactive System using Multiple Signal Processing (다중신호처리를 이용한 인터렉티브 시스템)

  • Kim, Sung-Ill;Yang, Hyo-Sik;Shin, Wee-Jae;Park, Nam-Chun;Oh, Se-Jin
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.282-285
    • /
    • 2005
  • This paper discusses the interactive system for smart home environments. In order to realize this, the main emphasis of the paper lies on the description of the multiple signal processing on the basis of the technologies such as fingerprint recognition, video signal processing, speech recognition and synthesis. For essential modules of the interactive system, we adopted the motion detector based on the changes of brightness in pixels as well as the fingerprint identification for adapting home environments to the inhabitants. In addition, the real-time speech recognizer based on the HM-Net(Hidden Markov Network) and the speech synthesis were incorporated into the overall system for interaction between user and system. In experimental evaluation, the results showed that the proposed system was easy to use because the system was able to give special services for specific users in smart home environments, even though the performance of the speech recognizer was not better than the simulation results owing to the noisy environments.

  • PDF

Human Iris Recognition using Wavelet Transform and Neural Network

  • Cho, Seong-Won;Kim, Jae-Min;Won, Jung-Woo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.178-186
    • /
    • 2003
  • Recently, many researchers have been interested in biometric systems such as fingerprint, handwriting, key-stroke patterns and human iris. From the viewpoint of reliability and robustness, iris recognition is the most attractive biometric system. Moreover, the iris recognition system is a comfortable biometric system, since the video image of an eye can be taken at a distance. In this paper, we discuss human iris recognition, which is based on accurate iris localization, robust feature extraction, and Neural Network classification. The iris region is accurately localized in the eye image using a multiresolution active snake model. For the feature representation, the localized iris image is decomposed using wavelet transform based on dyadic Haar wavelet. Experimental results show the usefulness of wavelet transform in comparison to conventional Gabor transform. In addition, we present a new method for setting initial weight vectors in competitive learning. The proposed initialization method yields better accuracy than the conventional method.

Enterprise Human Resource Management using Hybrid Recognition Technique (하이브리드 인식 기술을 이용한 전사적 인적자원관리)

  • Han, Jung-Soo;Lee, Jeong-Heon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.333-338
    • /
    • 2012
  • Human resource management is bringing the various changes with the IT technology. In particular, if HRM is non-scientific method such as group management, physical plant, working hours constraints, personal contacts, etc, the current enterprise human resources management(e-HRM) appeared in the individual dimension management, virtual workspace (for example: smart work center, home work, etc.), working time flexibility and elasticity, computer-based statistical data and the scientific method of analysis and management has been a big difference in the sense. Therefore, depending on changes in the environment, companies have introduced a variety of techniques as RFID card, fingerprint time & attendance systems in order to build more efficient and strategic human resource management system. In this paper, time and attendance, access control management system was developed using multi camera for 2D and 3D face recognition technology-based for efficient enterprise human resource management. We had an issue with existing 2D-style face-recognition technology for lighting and the attitude, and got more than 90% recognition rate against the poor readability. In addition, 3D face recognition has computational complexities, so we could improve hybrid video recognition and the speed using 3D and 2D in parallel.

Security Measures for Casino Facilities (카지노 시설경비 안전대책 방안)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.243-272
    • /
    • 2005
  • All measures related to the safety of the casino facilities guarantee safety of facilities that are targets of security guards, protect lives and properties, minimize risks of artificial and natural disaster and crimes. In summary, plan for responding to safety and accidents should be developed not only for the casino facilities but also for the facilities of annexed buildings, and lives and properties of customers and employees. Determine areas in the casino facilities that are prone to accidents and set around-the-clock guard in the areas or maintain surveillance with CCTV and prevent accidents through continuous patrol. These are the most basic and the most important requirements in safety. In addition, casinos which prompt gambling are causing economic and psychological treats to families. To resolve these social issues, casinos have adopted limited entrance system. To support this system, new forms of machine security systems such as video automatic recognition system of fingerprint pattern recognition system should be adopted too. In addition, security guards in casino facilities need to instill themselves with a sense of ownership as well as a strong sense of mission to do the best for customer security and to protect the company assets and employees and manage accidents that could occur without notice. Security guards should do their best to enable manage accidents that could occur without notice. Security guards should do their best to enable tourists who are on the rise due to increase in advanced country-style tourism and leisurely activities to get the utmost satisfaction from the casinos, and as a leader of private security company, establish the foundation for security based on the characteristics of security in Korea.

  • PDF