• Title/Summary/Keyword: image security system

Search Result 496, Processing Time 0.027 seconds

Enabling Energy Efficient Image Encryption using Approximate Memoization

  • Hong, Seongmin;Im, Jaehyung;Islam, SM Mazharul;You, Jaehee;Park, Yongjun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.3
    • /
    • pp.465-472
    • /
    • 2017
  • Security has become one of the most important requirements for various devices for multi-sensor based embedded systems. The AES (Advanced Encryption Standard) algorithm is widely used for security, however, it requires high computing power. In order to reduce the CPU power for the data encryption of images, we propose a new image encryption module using hardware memoization, which can reuse previously generated data. However, as image pixel data are slightly different each other, the reuse rate of the simple memoization system is low. Therefore, we further apply an approximate concept to the memoization system to have a higher reuse rate by sacrificing quality. With the novel technique, the throughput can be highly improved by 23.98% with 14.88% energy savings with image quality loss minimization.

Image-based Subway Security System by Histogram Projection Technology

  • Bai, Zhiguo;Jung, Sung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.287-297
    • /
    • 2015
  • A railway security detection system is very important. There are many safety factors that directly affect the safe operation of trains. Security detection technology can be divided into passive and active approaches. In this paper, we will first survey the railway security systems and compare them. We will also propose a subway security detection system with computer vision technology, which can detect three kinds of problems: the spark problem, the obstacle problem, and the lost screw problem. The spark and obstacle detection methods are unique in our system. In our experiment using about 900 input test images, we obtained about a 99.8% performance in F- measure for the spark detection problem, and about 94.7% for the obstacle detection problem.

New Cellular Neural Networks Template for Image Halftoning based on Bayesian Rough Sets

  • Elsayed Radwan;Basem Y. Alkazemi;Ahmed I. Sharaf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.85-94
    • /
    • 2023
  • Image halftoning is a technique for varying grayscale images into two-tone binary images. Unfortunately, the static representation of an image-half toning, wherever each pixel intensity is combined by its local neighbors only, causes missing subjective problem. Also, the existing noise causes an instability criterion. In this paper an image half-toning is represented as a dynamical system for recognizing the global representation. Also, noise is reduced based on a probabilistic model. Since image half-toning is considered as 2-D matrix with a full connected pass, this structure is recognized by the dynamical system of Cellular Neural Networks (CNNs) which is defined by its template. Bayesian Rough Sets is used in exploiting the ideal CNNs construction that synthesis its dynamic. Also, Bayesian rough sets contribute to enhance the quality of the halftone image by removing noise and discovering the effective parameters in the CNNs template. The novelty of this method lies in finding a probabilistic based technique to discover the term of CNNs template and define new learning rules for CNNs internal work. A numerical experiment is conducted on image half-toning corrupted by Gaussian noise.

Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment (클라우드 네이티브 환경을 위한 오픈소스 기반 모니터링 서비스 간편 배포 및 이미지 서명 검사기 구현)

  • Gwak, Songi;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.637-645
    • /
    • 2022
  • Cloud computing has been gaining popularity over decades, and container, a technology that is primarily used in cloud native applications, is also drawing attention. Although container technologies are lighter and more capable than conventional VMs, there are several security threats, such as sharing kernels with host systems or uploading/downloading images from the image registry. one of which can refer to the integrity of container images. In addition, runtime security while the container application is running is very important, and monitoring the behavior of the container application at runtime can help detect abnormal behavior occurring in the container. Therefore, in this paper, first, we implement a signing checker that automatically checks the signature of an image based on the existing Docker Content Trust (DCT) technology to ensure the integrity of the container image. Next, based on falco, an open source project of Cloud Native Computing Foundation(CNCF), we introduce newly created image for the convenience of existing falco image, and propose implementation of docker-compose and package configuration that easily builds a monitoring system.

Design of Multimedia data Retrieval System based on MPEG-7 (MPEG-7 기반의 멀티미디어 데이터 검색 시스템 설계)

  • Kim, Kyungl-Soo
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.91-96
    • /
    • 2008
  • An increasing in quantity of multimedia data brought a new problem that expected data should be retrieved fast and exactly. The adequate representation is a key element for the efficient retrieval. For this reason, MPEG-7 standard was established for description of multimedia data in 2001. In this paper, we designed a Audio/Image Retrieval System based on MPEG-7 that can retrieve multimedia data like audio, image efficiently. And we integrated high-level and low-level schemas to retrieve datas for users.

  • PDF

A Study on the Improvement of Aquaculture Security System to Insure the Lawful Evidence of Theft (도적행위의 법적증거확보를 위한 양식장 보안 시스템 개선에 관한 연구)

  • Yim, Jeong-Bin;Nam, Taek-Keun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.4
    • /
    • pp.55-63
    • /
    • 2007
  • The Group Digital Surveillance System for Fishery Safety and Security (GDSS-F2S) is to provide the target tracking information and the target identification information in order to secure an huge aquaculture farm-field from a thief. The two information, however, is not enough to indict the thief due to the lack of lawful evidences for the crime actions. To overcome this problem, we consider the target image information as one of solutions after discussion with the effective countermeasure tools for the crime actions with scenario-based analysis according to the geological feature of aquaculture farm-field. To capture the real-time image for the trespassing targets in the aquaculture farm-field area, we developed the image capture system which is consists of ultra sensitive CCD(Charge-Coupled Device) camera with 0.0001 Lux and supplementary devices. As results from the field tests for GDSS-F2S with image capture system, the high definite images of the vehicle number plate and shape, person's actions and features are obtainable not only day time but also very dark night without moon light. Thus it is cleary known that the improved GDSS-F2S with image capture system can provide much enough lawful evidences for the crime actions of targets.

  • PDF

A Study on Authentication using Image Synthesis (이미지 합성을 이용한 인증에 대한 연구)

  • Kim, Suhee;Park, Bongjoo
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.19-25
    • /
    • 2004
  • This research develops an algorithm using image synthesis for a server to authenticate users and implements it. The server creates cards with random dots for users and distribute them to users. The server also manages information of the cards distributed to users. When there is an authentication request from a user, the server creates a server card based on information of the user' s card in real time and send it to the user. Different server card is generated for each authentication. Thus, the server card plays a role of one-time password challenge. The user overlaps his/her card with the server card and read an image(eg. a number with four digits) made up from them and inputs the image to the system. This is the authentication process. Keeping security level high, this paper proposes a technique to generate the image clearly and implements it.

  • PDF

Design and Implementation of Optimal Smart Home Security Monitoring System (최적의 스마트 홈 시큐리티 모니터링 시스템 설계 및 구현)

  • Lee, Hyoung-Ro;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.197-202
    • /
    • 2016
  • In this paper, we propose optimal smart home security monitoring system. Proposeed optimal smart home security system using the three types of ultrasonic sensors were tested to obtain reliable data. and Using Raspberry Pi3, the smart home security system was implemented. In addition, It was verified through experiments optimal efficiency with a small amount compared to the conventional sensor of the home security system by the two ultrasonic sensors located in the optimal position. It was able to use two ultrasonic sensors to determine whether the intruder's highly efficient and reliable intrusion, and connect the servo motor at the bottom of the camera so you can shoot adjusted to the attacker's location to shoot the intruder's image. In addition, by using a Web server and stored the recorded image and two ultrasonic sensor data and provide a Web page for a user to monitor at all remote locations.

An Implementation of Image Security System Based oil Web (웹기반 화상 감시 시스템의 구현)

  • 조평기;박영석
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.49-52
    • /
    • 2000
  • In this paper we have developed an image security system based on Internet Web in order to overcome the problem of existing systems that use the dedicated network. The developed system resolves the safety problem of the centralized control model by adapting the distributed control model based on Web, and has the functions of remote control and automatic monitoring for grouped multiple sites on Web browser. And the system can operate various computers or operating system because it's operating software was designed by the concepts of Java Virtual Machine and Virtual Instrument. Also, our system has not need of additional cost for network construction by using Internet and can greatly improve the managemental efficiency of system because the maintenance and publishing of software updates can be performed through Web Server.

  • PDF

Optical security system for protection of personal identification information (개인신원정보 보호를 위한 광 보호 시스템)

  • 윤종수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.383-391
    • /
    • 2003
  • A new optical security system for the protection of personal identification information is proposed. Personal identification information consisting of a pure face image and an identification number is used for verification and authentication. Image encryption is performed by a fully phase image encryption technique with two random phase masks located in the input and the Fourier plane of 4-f correlator. The personal information, however, can be leaked out in the decryption process. To cope with this possibility, the encrypted image itself is used in the identification process. An encrypted personal identification number is discriminated and recognized by using the proposed MMACE_p (multiplexed MACE_p) filter, and then authenticity of the personal information is verified by correlation of the face image using the optical wavelet matched filter (OWMF). MMACE_p filter is a synthetic filter with four MACE_p (minimum average correlation energy_phase encrypted) filters multiplexed in one filter plane to recognize 10 different encrypted-numbers at a time. OWMF can improve discrimination capability and SNR (signal to noise ratio). Computer simulations confirmed that the proposed security technique can be applied to the protection of personal identification information.