• Title/Summary/Keyword: image security system

Search Result 498, Processing Time 0.245 seconds

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.

Design and Implementation of Automated Detection System of Personal Identification Information for Surgical Video De-Identification (수술 동영상의 비식별화를 위한 개인식별정보 자동 검출 시스템 설계 및 구현)

  • Cho, Youngtak;Ahn, Kiok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.75-84
    • /
    • 2019
  • Recently, the value of video as an important data of medical information technology is increasing due to the feature of rich clinical information. On the other hand, video is also required to be de-identified as a medical image, but the existing methods are mainly specialized in the stereotyped data and still images, which makes it difficult to apply the existing methods to the video data. In this paper, we propose an automated system to index candidate elements of personal identification information on a frame basis to solve this problem. The proposed system performs indexing process using text and person detection after preprocessing by scene segmentation and color knowledge based method. The generated index information is provided as metadata according to the purpose of use. In order to verify the effectiveness of the proposed system, the indexing speed was measured using prototype implementation and real surgical video. As a result, the work speed was more than twice as fast as the playing time of the input video, and it was confirmed that the decision making was possible through the case of the production of surgical education contents.

PC-based Hand-Geometry Verification System

  • Kim Young-Tak;Kim Soo-Jong;Lee Chang-Gyu;Kim Gwan-Hyung;Kang Sung-In;Lee Jae-Hyun;Tack Han-Ho;Lee Sang-Bae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.3
    • /
    • pp.247-254
    • /
    • 2006
  • Biometrics are getting more and more attention in recent years for security and other concerns. So far, only fingerprint recognition has seen limited success for on-line security check, since other biometrics verification and identification systems require more complicated and expensive acquisition interfaces and recognition processes. Hand-Geometry can be used for biometric verification and identification because of its acquisition convenience and good performance for verification and identification performance. It could also be a good candidate for online checks. Therefore, this paper proposes a Hand-Geometry recognition system based on geometrical features of hand. From anatomical point of view, human hand can be characterized by its length, width, thickness, geometrical composition, shapes of the palm, and shape and geometry of the fingers. This paper proposes thirty relevant features for a Hand-Geometry recognition system. This system presents verification results based on hand measurements of 20 individuals. The verification process has been tested on a size of $320{\times}240$ image, and result of the verification process have hit rate of 95% and FAR of 0.020.

Gesture Control Gaming for Motoric Post-Stroke Rehabilitation

  • Andi Bese Firdausiah Mansur
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.37-43
    • /
    • 2023
  • The hospital situation, timing, and patient restrictions have become obstacles to an optimum therapy session. The crowdedness of the hospital might lead to a tight schedule and a shorter period of therapy. This condition might strike a post-stroke patient in a dilemma where they need regular treatment to recover their nervous system. In this work, we propose an in-house and uncomplex serious game system that can be used for physical therapy. The Kinect camera is used to capture the depth image stream of a human skeleton. Afterwards, the user might use their hand gesture to control the game. Voice recognition is deployed to ease them with play. Users must complete the given challenge to obtain a more significant outcome from this therapy system. Subjects will use their upper limb and hands to capture the 3D objects with different speeds and positions. The more substantial challenge, speed, and location will be increased and random. Each delegated entity will raise the scores. Afterwards, the scores will be further evaluated to correlate with therapy progress. Users are delighted with the system and eager to use it as their daily exercise. The experimental studies show a comparison between score and difficulty that represent characteristics of user and game. Users tend to quickly adapt to easy and medium levels, while high level requires better focus and proper synchronization between hand and eye to capture the 3D objects. The statistical analysis with a confidence rate(α:0.05) of the usability test shows that the proposed gaming is accessible, even without specialized training. It is not only for therapy but also for fitness because it can be used for body exercise. The result of the experiment is very satisfying. Most users enjoy and familiarize themselves quickly. The evaluation study demonstrates user satisfaction and perception during testing. Future work of the proposed serious game might involve haptic devices to stimulate their physical sensation.

A Failover Method in CCTV Network Video Recording Environment (CCTV 네트워크 영상 녹화 환경에서 장애 조치 기법)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.1-6
    • /
    • 2019
  • CCTV video recording system is recognized as evidence value of video data, and is widely used in real life for the purpose of security of facilities or security control, and it is developing in order to process high-resolution and high-capacity data in real time through network. However, there is no description of redundancy to prevent the loss of image data due to defects of unexpected equipment or external attack, and even if the redundancy is implemented, a high-capacity video stream is transmitted through the network, network overload can not avoided. In this paper, we propose and verify a failover method based on rules that can operate the redundancy scheme without inducing network overload in CCTV network video recording environment.

A Study on LED Control System for Object Detecting based on Zigbee Network in BEMS (BEMS용 Zigbee 네트워크 기반 객체감지형 LED 조명 제어 시스템에 관한연구)

  • Ko, Kwangseok;Lee, JungHoon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.17-21
    • /
    • 2013
  • A building energy-saving have been increased worldwide interest. There is continuing research on IT technology for efficient management of BEMS. Recently, It is able to control of LED and to maximize energy savings to the development of LED lighting technology. We propose the security image processing system to improve efficiency and we implement the real-time status monitoring system to surveil the object in the building energy management system. In this paper, we proposed the system of LED control using Zigbee network for connect the server. User is able to control LED light and monitering by the desktop. We implemented LED light control software on the based of Real-time monitering and LED control. Also detect human body movement.

Design and characterization of a Muon tomography system for spent nuclear fuel monitoring

  • Park, Chanwoo;Baek, Min Kyu;Kang, In-soo;Lee, Seongyeon;Chung, Heejun;Chung, Yong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.601-607
    • /
    • 2022
  • In recent years, monitoring of spent nuclear fuel inside dry cask storage has become an important area of national security. Muon tomography is a useful method for monitoring spent nuclear fuel because it uses high energy muons that penetrate deep into the target material and provides a 3-D structure of the inner materials. We designed a muon tomography system consisting of four 2-D position sensitive detector and characterized and optimized the system parameters. Each detector, measuring 200 × 200 cm2, consists of a plastic scintillator, wavelength shifting (WLS) fibers and, SiPMs. The reconstructed image is obtained by extracting the intersection of the incoming and outgoing muon tracks using a Point-of-Closest-Approach (PoCA) algorithm. The Geant4 simulation was used to evaluate the performance of the muon tomography system and to optimize the design parameters including the pixel size of the muon detector, the field of view (FOV), and the distance between detectors. Based on the optimized design parameters, the spent fuel assemblies were modeled and the line profile was analyzed to conduct a feasibility study. Line profile analysis confirmed that muon tomography system can monitor nuclear spent fuel in dry storage container.

A Study on Making Map of Flood Using Digital Elevation Model (DEM) (수치표고모형 (DEM)을 이용한 침수재해 지도작성에 관한 연구)

  • Lim, Hyun Taek;Kim, Jae Hwi;Lee, Hak Beom;Park, Sung Yong;Kim, Yong Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.81-90
    • /
    • 2017
  • Recent floodplain data are important for river master plan, storm and flood damage reduction comprehensive plan and pre-disaster impact assessment. Hazard map, base of floodplain data, is being emphasized as important method of non-structural flood prevention and consist of inundation trace map, inundation expected map and hazard information map. Inundation trace map describes distribution of area that damaged from typhoons, heavy rain and tsunamis and includes identified flood level, flood depth and flood time from flooding area. However due to lack of these data by local government, which are foundational and supposed to be well prepared nationwide, having hard time for making inundation trace map or hazard information map. To overcome this problem, time consumption and budget reduction is required through various research. From this study, DEM (Digital Elevation Model) from image material from UAVS (Unmanned Aerial Vehicle System) and numeric geographic map from National Geographic Information Institute are used for calculating flooding damaged area and compared with inundation trace map. As results, inundation trace map DEM based on image material from UAVS had better accuracy than that used DEM based on numeric geographic map. And making hazard map could be easier and more accurate by utilizing image material from UAVS than before.

Real time Monitoring System using Web Camera (웹 카메라를 통한 실시간 모니터링 시스템)

  • Ryu, Kwang-Hee;Choi, Jong-Kun;Im, Young-Tae;Park, Yeon-Sik;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.667-670
    • /
    • 2005
  • As security and surveillance have become the center of interest, remote controlled CCTV(Closed-Circuit Television) market has been formed while rapid development of digital image compression technology and Internet triggered the advent of web cameras. The characteristic of web camera is that it can provide users with higher quality image than CCTV at any place where Internet access is available. However, As for the system administrator, the existing web camera have disadvantage in that they allows users only. who are connected to the server of the web camera, to see the image from it. In this paper, in order to make up for this defect, designed multi-vision interface showing multi images on single screen and, for the purpose of the improvement in efficiency, the functions of saving images and of scheduling the time to save the images.

  • PDF

Steganography on Android Smart Devices (안드로이드 스마트기기에서의 스테가노그래피 연구)

  • Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose a new data hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the embedding capacity of the secret data on the Alpha area with a less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.