• Title/Summary/Keyword: image security system

Search Result 508, Processing Time 0.029 seconds

Security Improvement Methods for Computer-based Test Systems (컴퓨터 기반 평가 시스템의 보안성 강화 방안)

  • Kim, Sang Hyun;Cho, Sang-Young
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • ICT technology has been applied to various educational fields, but applying to educational test field is limited. Computer-based test (CBT) can overcome temporal and spatial constraints of conventional paper-based test, but is vulnerable to fraud by test parties. In this paper, we propose real-time monitoring and process management methods to enhance the security of CBT. In the proposed methods, the test screens of students are periodically captured and transferred to the professor screen to enable real-time monitoring, and the possible processes used for cheating can be blocked before testing. In order to monitor the screen of many students in real time, effective compression of the captured original image is important. We applied three-step compression methods: initial image compression, resolution reduction, and re-compression. Through this, the original image of about 6MB was converted into the storage image of about 3.8KB. We use the process extraction and management functions of Windows API to block the processes that may be used for cheating. The CBT system of this paper with the new security enhancement methods shows the superiority through comparison of the security related functions with the existing CBT systems.

  • PDF

Optical Security System Using Phase Mask and Interferometer (위상 카드와 간섭계를 이용한 광학적 보안 시스템)

  • Kim, Jong-Yun;Kim, Gi-Jeong;Park, Se-Jun;Kim, Cheol-Su;Bae, Jang-Geun;Kim, Jeong-U;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.1
    • /
    • pp.37-43
    • /
    • 2001
  • In this paper, we propose a new optical security technique using two phase masks based on interferometer. A binary random phase image is used as a reference image and the encrypted image is generated according to the phase difference between the reference image and the original image. If there is no phase difference of a same pixel position in two phase masks, interference intensity of the pixel has minimum value and if phase difference of a same pixel position in two phase masks is $\pi$, its interference intensity has maximum value. We can decrypt the original image by putting two phase masks on each of the two optical paths of the Mach-Zehnder interferometer. Computer simulation and the optical experiments show a good performance of the proposed optical security system.

  • PDF

A Study on the model of CCTV Image Information Integration portal (CCTV 영상자료 통합포털 구축 모델에 관한 연구)

  • Kang, Poo-Reum;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.43-51
    • /
    • 2012
  • CCTV would be the effective way in the prevention of abuse, as well as recorded image information evidence of the crime as a significant legal effect. But recorded image information As evidence by utilizing the Complaint/complaint handling, and administrative business processes that are currently operating offline procedural complexity and unnecessary time appear costly, privacy remains an issue to be solved, etc. Runoff. In this paper, incidence rate of offline business processing phase to solve the problems proposed to build unified portal for CCTV image information and the existing studies on the effectiveness of electronic civil service system, previous studies by analyzing e-government in accordance with laws and privacy laws, CCTV image information portal deployment model is applied to data integration occurs are trying to solve the problem effectively.

Design on Smart Security Disk System with Wireless Interface of High Definition Image (고해상도 영상의 무선 인터페이스를 갖는 스마트 보안 디스크 시스템의 설계)

  • Kim, Won
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.195-200
    • /
    • 2013
  • In visual surveillance system abandoned objects in public places are the deliberately left things, which should be automatically detected by intelligent systems in the environment where the number of cameras is increasing. This research deals with the design scheme of a smart security disk system which can detect these abandoned objects automatically and save the relevant image information with the wireless interface of high definition images. By implementing the proposed system in this research it is confirmed that the transmission performance shows 60 frames per second without compression of high definition images and the capability of the disk system shows the relevant images can be saved in a RAID configuration. Also, the proposed visual surveillance software shows a good detection rate of 80% in PAT performance.

The Evaluation of Spatial Resolution of Stationary-gantry Sparse-view CT Security-screening System (고정형(Stationary-gantry) 희소뷰(Sparse-view) CT 보안검색시스템의 공간분해능 평가)

  • YoungJo Kim;KwangYoon Choi;Chunhe Zheng;HyeongKyu Park
    • Journal of Radiation Industry
    • /
    • v.17 no.4
    • /
    • pp.377-384
    • /
    • 2023
  • In this study, the image quality assessment, especially spatial resolution evaluation, for Sparse-view CT reconstructed images was performed. The main goal of the experiment is to evaluate Modulation Transfer Function by using American Standard Method for Measurement of Computed Tomography System Performance(ASTM E1695-95) which uses the edge test object. To compare with the ASTM method, a different method, the radial-type edge profile, to measure MTF using the edge method also performed. Both approaches were tested on the same image acquired by the stationary-gantry sparse-view CT security-screening system using cylindrical test phantom manufactured in accordance with ANSI 42.45. Both of the spatial resolutions at 10% modulation are 0.195, 0.203lp pixel-1, respectively. The method implemented by ASTM E1695-95 showed higher reliability and had a relatively more accurate spatial resolution result than the radial-type edge profile method.

Encryption and decryption using phase mapping of gray scale image based on a phase-shifting interferometry principle (위상천이 간섭계 원리에 기반한 계조도 영상의 위상 매핑을 이용한 암호화 및 복호화)

  • Seok-Hee Jeon;Sang-Keun Gil
    • Journal of IKEEE
    • /
    • v.28 no.3
    • /
    • pp.271-278
    • /
    • 2024
  • An encryption and decryption method using phase mapping of a gray scale image based on a phase-shifting interferometry principle is proposed in which an encrypted image is formed into complex digital hologram function by symmetric security key in the proposed encryption system.. The gray scale image to be encrypted is converted to phase mapped function that is mixed with a randomly generated binary security encryption key and is used as an input. Decryption of phase information is performed by complex digital hologram and security encryption key, which reconstructs the original gray scale image by phase unmapping. The proposed method confirms that correlation coefficient of the decrypted image is 0.995 when quantization level of CCD is 8-bits(28=256 levels).

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.

An Improved Pseudorandom Sequence Generator and its Application to Image Encryption

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1307-1329
    • /
    • 2022
  • This paper proposes an improved Pseudorandom Sequence Generator (PRSG) based on the concept of modular arithmetic systems with non-integral numbers. The generated random sequence use in various cryptographic applications due to its unpredictability. Here the mathematical model is designed to solve the problem of the non-uniform distribution of the sequences. In addition, PRSG has passed the standard statistical and empirical tests, which shows that the proposed generator has good statistical characteristics. Finally, image encryption has been performed based on the sort-index method and diffusion processing to obtain the encrypted image. After a thorough evaluation of encryption performance, there has been no direct association between the original and encrypted images. The results show that the proposed PRSG has good statistical characteristics and security performance in cryptographic applications.

COLORNET: Importance of Color Spaces in Content based Image Retrieval

  • Judy Gateri;Richard Rimiru;Micheal Kimwele
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.33-40
    • /
    • 2023
  • The mainstay of current image recovery frameworks is Content-Based Image Retrieval (CBIR). The most distinctive retrieval method involves the submission of an image query, after which the system extracts visual characteristics such as shape, color, and texture from the images. Most of the techniques use RGB color space to extract and classify images as it is the default color space of the images when those techniques fail to change the color space of the images. To determine the most effective color space for retrieving images, this research discusses the transformation of RGB to different color spaces, feature extraction, and usage of Convolutional Neural Networks for retrieval.

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.