• Title/Summary/Keyword: image security system

Search Result 496, Processing Time 0.042 seconds

A Study of 4G Network for Security System

  • Kim, Suk-jin;Lee, Hyangran;Lee, Malrey
    • International Journal of Advanced Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.77-86
    • /
    • 2015
  • In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a result of the nature of 4G networks there are still more security holes and open issues for expert to notice. Our survey shows that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. Other than that, it tells about the security issues and vulnerabilities present in the above 4G standards are discussed. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention and future work by the research and advanced technology industry.

Improving Imaging Quality Assessment of Cabinet X-Ray Security Systems (캐비닛 엑스선 검색장비 이미지품질평가 고도화 방안 연구)

  • Yoon, Yeon Ah;Jung, Jin Hyeong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.1
    • /
    • pp.47-60
    • /
    • 2021
  • Purpose: This study proposes methods and procedures for evaluating imaging security systems quality of cabinet x-ray screening system to enhance performance certification technology. Also, conducted a comparative analysis of the literature of test-kit for imaging security quality evaluation. Methods: Comparative analysis of the test-kits and related documents for image quality assessment of cabinet x-ray screening equipment. This allows assessment items were selected and the methods for each assessment item were proposed. In addition, the configuration method of the assessment team was established by applying the technology readiness assessment(TRA). Results: Four of the assessment items were selected when estimate image quality by a comparative analysis of literature. For each assessment item, the evaluation method and minimum level of availability were determined. Finally, this paper proposes an imaging quality assessment of cabinet X-ray imaging security systems. Conclusion: Development of imaging security systems evaluation procedures for cabinet X-ray screening systems can be help improve performance certification of aviation security equipment.

Target Object Image Extraction from 3D Space using Stereo Cameras

  • Yoo, Chae-Gon;Jung, Chang-Sung;Hwang, Chi-Jung
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1678-1680
    • /
    • 2002
  • Stereo matching technique is used in many practical fields like satellite image analysis and computer vision. In this paper, we suggest a method to extract a target object image from a complicated background. For example, human face image can be extracted from random background. This method can be applied to computer vision such as security system, dressing simulation by use of extracted human face, 3D modeling, and security system. Many researches about stereo matching have been performed. Conventional approaches can be categorized into area-based and feature-based method. In this paper, we start from area-based method and apply area tracking using scanning window. Coarse depth information is used for area merging process using area searching data. Finally, we produce a target object image.

  • PDF

Implementation of Illegal Entry Detection System using Sensor Node and Image Processing (센서 노드와 영상처리 기법을 이용한 불법 침입 감지 시스템 구현)

  • Kim, Kyung-Jong;Jung, Se-Hoon;Sim, Chun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.741-744
    • /
    • 2009
  • In this paper, we design and implement an illegal entry detection system which efficiently can detect illegal intruders applying image processing technique on the perceived value of the infrared sensor and acquired image from two-way wireless camera(DRC) for prevention of damage caused by theft and the ratio of security in the security of the square such as livestock, agricultural products, and logistics warehouse. At first, the proposed system acquires the image from wireless camera when infrared sensor detect the location of illegal intruders. and then, the system process to determine movement by applying image process technique with acquired image. Finally, we send the detected and analyzed the results and the final image to security company and mobile device of owner.

  • PDF

Holographic optical security system using a reflection photopolymer (반사형 포토폴리머를 이용한 홀로그래픽 광 보안 시스템)

  • Sin, Chang-Won;Kim, Nam;Kim, Min-Su;Jeon, Seok-Hui;Kim, Eun-Gyeong
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2008.02a
    • /
    • pp.199-200
    • /
    • 2008
  • In this paper, we researched optical characteristics of a holographic optical security system using a reflection recording material and optical random phase mask. The system have the property of optical security key with the phase mask. Also, a reflection recording geometry can reduced a size of the reconstruction system because a input beam to reconstruct a holographic image and a diffraction beam are the same side on the material.

  • PDF

Development of Thermal Image System Based Multi-Core Image Processor (멀티코어 이미지 프로세서 기반 열화상 이미지 시스템 개발)

  • Cha, Jeong Woo;Han, Joon Hwan;Park, Chan;Kim, Young Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.2
    • /
    • pp.25-30
    • /
    • 2020
  • The thermal image system was widely used in the defence-related industry because of detect infrared light from the object without light. but, as the demand in the security system and automobile market increases, the civilian industry are expanding to the private sector. There are difficult to apply various requirement because of previous systems are based by FPGA, so it need new system that apply to various requirement. The proposed paper is thermal image processing system using common image processor. It has various requirement and scalable to support image input/output interface and device driver. If it is used to proposed system, it reduce development cost and period than previous system based FPGA. Because there has very high accessibility. In addition, it expect to have satisfaction of customer requirements, development cost, development period, release date of product.

Real-time Surveillance System for Security of Important Area (중요지역 보안을 위한 실시간 감시 시스템)

  • Ahn, Sung-Jin;Lee, Kwan-Hee;Kim, Nam-Hyung;Kwon, Goo-Rak;Ko, Sung-Jea
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.297-298
    • /
    • 2006
  • In this paper, we propose a real-time surveillance system for security of important area such as military bases, prisons, and strategic infra structures. The proposed system recognizes the movement of objects in dark environments. First, the Multi-scale retinex (MSR) is processed to enhance the contrast of image captured in dark environments. Then, the enhanced input image is subtracted with the background image. Finally, each bounding box enclosing each objects are tracked. The center point of each bounding box obtained by the proposed algorithm provides more accurate tracking information. Experimental results show that the proposed system provides good performance even though an object moves very fast and the background is quite dark.

  • PDF

Design and Implementation of Hierarchical Image Classification System for Efficient Image Classification of Objects (효율적인 사물 이미지 분류를 위한 계층적 이미지 분류 체계의 설계 및 구현)

  • You, Taewoo;Kim, Yunuk;Jeong, Hamin;Yoo, Hyunsoo;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.53-59
    • /
    • 2018
  • In this paper, we propose a hierarchical image classification scheme for efficient object image classification. In the non-hierarchical image classification, which classifies the existing whole images at one time, it showed that objects with relatively similar shapes are not recognized efficiently. Therefore, in this paper, we introduce the image classification method in the hierarchical structure which attempts to classify object images hierarchically. Also, we introduce to the efficient class structure and algorithms considering the scalability that can occur when a deep learning image classification is applied to an actual system. Such a scheme makes it possible to classify images with a higher degree of confidence in object images having relatively similar shapes.

  • PDF

Image Features Based Secure Access Control for Data Content Protection (데이터 내용 보호를 위한 이미지 특징 기반의 보안 접근 제어)

  • Ha, Sunju;Park, Daechul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.171-180
    • /
    • 2013
  • Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.

IoT based Authentication System Implementation on Raspberry Pi (라즈베리파이에서 사물인터넷 기반의 인증 시스템 구현)

  • Kim, Jeong Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.31-38
    • /
    • 2017
  • With the Development of Information Technology, Security is becoming very Important. Existing Security Systems are Mostly Expensive and Not Easy to Implement, and are Also very Complex when using Biometric Information. In this paper, We try to solve this Problem by Implementing a Low cost Internet based Security Terminal Using Fingerprint and Face Image. To Implement a Low-cost Security System, a Fingerprint Scanner and a Camera are installed in Raspberry pi, and the Scanned Image is encrypted with the AES-256 Algorithm and Transmitted to Cloud. Through This Study, We confirmed the Possibility of the Proposed System in view of Authentication, Cost Reduction, Security and Scalability.