• Title/Summary/Keyword: image security system

Search Result 498, Processing Time 0.027 seconds

A Study on the Multiple Texture Rendering System for 3D Image Signal Recognition (3차원 영상인식을 위한 다중영상매핑 시스템에 대한 연구)

  • Kim, Sangjune;Park, Chunseok
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.47-53
    • /
    • 2016
  • Techniques to be developed in this study is intended to apply to an existing integrated control system to "A Study on the multiple Texture Rendering system for three-dimensional Image Signal Recognition" technology or become a center of the building control system in real time video. so, If the study plan multi-image mapping system developed, CCTV camera technology and network technology alone that is, will be a number of security do not have to build a linked system personnel provide services that control while the actual patrol, the other if necessary systems and linked to will develop a system that can reflect the intention Ranger.

A Novel Whale Optimized TGV-FCMS Segmentation with Modified LSTM Classification for Endometrium Cancer Prediction

  • T. Satya Kiranmai;P.V.Lakshmi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.53-64
    • /
    • 2023
  • Early detection of endometrial carcinoma in uterus is essential for effective treatment. Endometrial carcinoma is the worst kind of endometrium cancer among the others since it is considerably more likely to affect the additional parts of the body if not detected and treated early. Non-invasive medical computer vision, also known as medical image processing, is becoming increasingly essential in the clinical diagnosis of various diseases. Such techniques provide a tool for automatic image processing, allowing for an accurate and timely assessment of the lesion. One of the most difficult aspects of developing an effective automatic categorization system is the absence of huge datasets. Using image processing and deep learning, this article presented an artificial endometrium cancer diagnosis system. The processes in this study include gathering a dermoscopy images from the database, preprocessing, segmentation using hybrid Fuzzy C-Means (FCM) and optimizing the weights using the Whale Optimization Algorithm (WOA). The characteristics of the damaged endometrium cells are retrieved using the feature extraction approach after the Magnetic Resonance pictures have been segmented. The collected characteristics are classified using a deep learning-based methodology called Long Short-Term Memory (LSTM) and Bi-directional LSTM classifiers. After using the publicly accessible data set, suggested classifiers obtain an accuracy of 97% and segmentation accuracy of 93%.

A Study on Design of the Image Retrieval System Using Embedded System (임베디드 시스템을 이용한 이미지 검색 시스템 설계에 관한 연구)

  • Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.49-53
    • /
    • 2010
  • Recently multimedia has been formed, provided, and shared enough not to compare with the past, due to the proliferation of Internet and the development of hardware relating to multimedia. Accordingly to internationally give a proper expression to metadata of multimedia, the standard of MPEG-7 has been established, and researches for image search among various data of multimedia using MPEG-7 are going on. Thus there are meaning-based search. In the former there is a merit that search speed is fast, but technology and accuracy by technical knowledge on the image. In the latter the accuracy of search is decreasing because of not understanding the meaning about image and the internet of users. In this study to solve these problems a search system has been designed by combining the two methods. Also the search and manage image data by handheld devices such as portable PDA or smart phone, a system. Once this is used, multimedia data can be efficiently searched and utilized by handheld devices.

Performance Comparison According to Image Generation Method in NIDS (Network Intrusion Detection System) using CNN

  • Sang Hyun, Kim
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.67-75
    • /
    • 2023
  • Recently, many studies have been conducted on ways to utilize AI technology in NIDS (Network Intrusion Detection System). In particular, CNN-based NIDS generally shows excellent performance. CNN is basically a method of using correlation between pixels existing in an image. Therefore, the method of generating an image is very important in CNN. In this paper, the performance comparison of CNN-based NIDS according to the image generation method was performed. The image generation methods used in the experiment are a direct conversion method and a one-hot encoding based method. As a result of the experiment, the performance of NIDS was different depending on the image generation method. In particular, it was confirmed that the method combining the direct conversion method and the one-hot encoding based method proposed in this paper showed the best performance.

An Ontology-based Context Aware Model for the Implementation of Integrated Security Control System (통합보안관제 시스템 구축을 위한 온톨로지 기반의 상황인식 모델)

  • Han, Kwang-Rok;Kim, Jeong-Bin;Sohn, Surg-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2246-2255
    • /
    • 2010
  • In this paper, we describe an ontology-based context aware model that collects context information from USN sensor and CCTV image and reasons about context in order to development an integrated security control system in the industrial environments. The context model represents autonomous and heterogeneous data as ontologies and recognizes the context through DL(description logic) inference in the smart computing environment. We expect that the integrated security control system can automatically detects the risk in the industrial field and reduces the safety and security incidents by applying this context model to the system.

A Study Medium-based safe File Management Security System on the cloud Environment (클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구)

  • Kim, Hee-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.142-150
    • /
    • 2019
  • This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.

A Driving Information Centric Information Processing Technology Development Based on Image Processing (영상처리 기반의 운전자 중심 정보처리 기술 개발)

  • Yang, Seung-Hoon;Hong, Gwang-Soo;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.31-37
    • /
    • 2012
  • Today, the core technology of an automobile is becoming to IT-based convergence system technology. To cope with many kinds of situations and provide the convenience for drivers, various IT technologies are being integrated into automobile system. In this paper, we propose an convergence system, which is called Augmented Driving System (ADS), to provide high safety and convenience of drivers based on image information processing. From imaging sensor, the image data is acquisited and processed to give distance from the front car, lane, and traffic sign panel by the proposed methods. Also, a converged interface technology with camera for gesture recognition and microphone for speech recognition is provided. Based on this kind of system technology, car accident will be decreased although drivers could not recognize the dangerous situations, since the system can recognize situation or user context to give attention to the front view. Through the experiments, the proposed methods achieved over 90% of recognition in terms of traffic sign detection, lane detection, and distance measure from the front car.

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.

The Possibilities of Cultural Diplomacy for Sustainable Development at Different Levels of Social Interactions

  • Pletsan, Khrystyna;Konovalova, Marta;Varenia, Nataliia;Khodanovych, Vitalii;Rozvadovskyi, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.283-293
    • /
    • 2022
  • One of the important areas of state policy in the socio-economic and cultural development of the country is cultural diplomacy. It contributes to the information dissemination about the country, strengthens interstate relations, and forms a positive image. Through cultural diplomacy, we achieve a positive perception of the world community of the country, determined by its place in the modern system of international relations. The aim of the study is a comparative analysis of cultural diplomacy opportunities for sustainable development at different levels of public relations, as well as the impact of cultural diplomacy opportunities on the indicators of the Global Sustainable Competitiveness Index and the Global Sustainable Development Index. Regarding the results of the research on the impact of cultural diplomacy opportunities on the indicators of the Global Index of Sustainable Competitiveness and the Global Index of Sustainable Development, four groups are identified among the countries of the European Union: countries with a very high level of sustainable competitiveness and sustainable development; countries with a high level of sustainable competitiveness and sustainable development; countries with low levels of sustainable competitiveness and sustainable development.

A study on development of multimedia SCADA system for electric facility (영상정보 통합형 전기설비 감시시스템 개발 연구)

  • Lee, W.T.;Lee, J.J.;Jeong, Y.K.;Kim, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2445-2447
    • /
    • 1998
  • For increasing the quality of SCADA system, the application of image information is demanded from typical SCADA system based on data information. Until now, the remote control and monitoring systems combine data information but now gradually have trends to combine voice, data and image information. So multimedia technology is applied to realize new SCADA system. Depends on these requires, we apply new concepts of communication network and multimedia technology to the SCADA system for electric facility. In this paper, we aim at developing multi media supervisory control and data acquisition system based on data and image information, which used electric power system and security system.

  • PDF