• Title/Summary/Keyword: image security system

Search Result 498, Processing Time 0.025 seconds

3D Image Qube Password Interface Design and Implementation for Entrance/Exit of Sailors (선박승무원 출입관리를 위한 3차원 영상 큐브 암호 인터페이스 설계 및 구현)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.25-32
    • /
    • 2010
  • Recently a passenger ship and liner has been spread throughout men of diversity, the space and informations is not open to general passenger. Therefore security systems are necessary for special sailors to admit them. Although security systems has a variety usage methods which are organism recognition(finger printer, iritis and vein etc) a few years ago, these usages has a defect reusing other objects because of leaving a trace. Therefore this paper designs and implements using 3D Qube image password interface which hand gestures are recognized after acquiring from 2D input image for protective marker of finger printer.

Smart Vehicle Parking Management System using Image Processing

  • Waqas, Maria;Iftikhar, Umar;Safwan, Muhammad;Abidin, Zain Ul;Saud, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.161-166
    • /
    • 2021
  • The term parking management system usually refers to the custom built hardware intensive systems installed in building and malls. However, there are many places where such expensive solutions cannot be installed due to various reasons, like cost and urgent/temporary setup requirements. This project focuses on developing a parking management system based on image processing to detect vacant parking slot in an area where automated systems are not installed. Camera images of the parking area are subjected to image processing algorithm which marks virtual slots in the area and extracts occupancy information to guide the incoming drivers about availability and position of vacant spaces. The application consists of two interfaces: one for the guidance of the incoming drivers and the other one for the administrator. The later interface also informs the administrator if a car is not parked properly in the virtual slot. This parking system would reduce the stress and time wastage associated with car parking and would make the management of such areas less costly.

Invader Detection System Using the Morphological Filtering and Difference Images Based on the Max-Valued Edge Detection Algorithm

  • Lee, Jae-Hyun;Kim, Sung-Shin;Kim, Jung-Min
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.5
    • /
    • pp.645-661
    • /
    • 2012
  • Recently, pirates are infesting on the sea and they have been hijacking the several vessels for example Samho Dream and Samho Jewelry of Korea. One of the items to reduce the risk is to adopt the invader detection system. If the pirates break in to the ship, the detection system can monitor the pirates and then call the security alarm. The crew can gain time to hide to the safe room and the report can be automatically sent to the control room to cope with the situation. For the invader detection, an unmanned observation system was proposed using the image detection algorithm that extracts the invader image from the recording image. To detect the motion area, the difference value was calculated between the current image and the prior image of the invader, and the 'AND' operator was used in calculated image and edge line. The image noise was reduced based on the morphology operation and then the image was transformed into morphological information. Finally, a neural network model was applied to recognize the invader. In the experimental results, it was confirmed that the proposed approach can improve the performance of the recognition in the invader monitoring system.

Building Cooperation Policing Systems and Roles of Private Security (협력치안체제구축과 민간경비의 역할)

  • Seok, Cheong-Ho
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.67-90
    • /
    • 2010
  • Today, the police alone can not prevent a crime. And the police is limited to meet for people's the increased needs on public safety. So the police and the community needs the cooperation of a variety of resources. Police in cooperation with community resources to respond to the crime's most professional and the private sector is a private security. However, the role of private security for cooperation policing is insufficient in South Korea. So for this study to build a cooperative policing in South Korea as private security for the following four kinds of directions are presented. First, as a private security of the United States and Japan, specializes in diversified business sectors. Simple human-oriented private security of the building security get out. Instead, take the high-tech crime prevention or industry complex security should be changed to a professional organization. Second, the interaction between police and private security should be increased. Police and private security through regular meetings between the need for mutual interests and build consensus is needed. The role of private security companies to be represented on the Security Association of South Korea's active role in the matter. Third, efforts to improve the image of private security activities and the publiciy activity of private security is needed. Some of the private security in an effort to escape a negative image to the people and actively promote a positive image is necessary. Finally, for South Korea to the level the cooperation between the police and private security are required to develop system models. Front-line policing priority in the field and the mutual understanding between the police and private security in an effort to have a positive perception is needed. Equal partners, especially the police and private security to private security companies to have recognized experts in their own recruitment and training should be improved by strengthening the expertise.

  • PDF

Motion Detection using Adaptive Background Image and Pixel Space (적응적 배경영상과 픽셀 간격을 이용한 움직임 검출)

  • 지정규;이창수;오해석
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2003
  • Security system with web camera remarkably has been developed at an Internet era. Using transmitted images from remote camera, the system can recognize current situation and take a proper action through web. Existing motion detection methods use simply difference image, background image techniques or block matching algorithm which establish initial block by set search area and find similar block. But these methods are difficult to detect exact motion because of useless noise. In this paper, the proposed method is updating changed background image as much as $N{\times}M$pixel mask as time goes on after get a difference between imput image and first background image. And checking image pixel can efficiently detect motion by computing fixed distance pixel instead of operate all pixel.

  • PDF

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

Design of a Contactless Access Security System using Palm Creases and Palm Vein Pattern Matching (손금과 정맥혈관 패턴매칭을 이용한 비접촉 출입 보안시스템 설계)

  • Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.327-334
    • /
    • 2024
  • In this paper, we developed a system with a near-infrared LED light source with a wavelength of 950nm to acquire palm vein images and a white LED light source to acquire palm creases based on Raspberry Pi. In addition, we implemented a unique pattern-extractable image processing technology that can prevent counterfeiting and enhance security of mixed creases and palmprints through image pre-processing (Gray scaling, Histogram Equalization, Blurring, Thresholding, Thinning) for the acquired vein and palm images, and secured a source technology that can be used in a security-enhanced system.

A Study on the Improvement Plan for the Establishing an Advanced Aviation Security System in Korea (첨단 항공보안체계 국내 도입을 위한 개선방안 연구)

  • Yosik Kim;Donghwan Yoon;YongHun Choi;Insu Jung;Keumjin Lee
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2024
  • The International Civil Aviation Organization (ICAO) has set up the Global Aviation Security Plan (GASeP), which urges member states to transition to more advanced security systems. This paper examines advanced aviation security policies and technologies at both domestic and international levels, and also investigates the underlying reasons for the challenges faced in establishing an advanced security system in the Republic of Korea. Based on this analysis, we propose effective strategies for deploying advanced security equipment at domestic airports, taking into consideration their respective classifications. Additionally, we identify the need for establishing new technological standards to introduce an advanced aviation security system, and provide evaluation criteria for the maintenance and management of technology to ensure the smooth operation of advanced security equipment.

Image Encryption by C-MLCA and 3-dimensional Chaotic Cat Map using Laplace Expansions (C-MLCA와 Laplace 전개를 이용한 3차원 카오스 캣맵에 의한 영상 암호)

  • Cho, Sung-Jin;Kim, Han-Doo;Choi, Un-Sook;Kang, Sung-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1187-1196
    • /
    • 2019
  • Information security has become a major challenge with the advent of cloud and social networking sites. Conventional encryption algorithms might not be suitable for image encryption because of the large data size and high redundancy among the raw pixels of a digital image. In this paper, we generalize the encryption method for of color image proposed by Jeong et al. to color image encryption using parametric 3-dimensional chaotic cat map using Laplace expansion and C-MLCA. Through rigorous experiments, we demonstrate that the proposed new image encryption system provides high security and reliability.