• Title/Summary/Keyword: security component

Search Result 407, Processing Time 0.026 seconds

Face Detection Based on Distribution Map (분포맵에 기반한 얼굴 영역 검출)

  • Cho Han-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.1
    • /
    • pp.11-22
    • /
    • 2006
  • Recently face detection has actively been researched due to its wide range of applications, such as personal identification and security systems. In this paper, a new face detection method based on the distribution map is proposed. Face-like regions are first extracted by applying the skin color map with the frequency to a color image and then, possible eye regions are determined by using the pupil color distribution map within the face-like regions. This enables the reduction of space for finding facial features. Eye candidates are detected by means of a template matching method using weighted window, which utilizes the correlation values of the luminance component and chrominance components as feature vectors. Finally, a cost function for mouth detection and location information between the facial features are applied to each pair of the eye candidates for face detection. Experimental results show that the proposed method can achieve a high performance.

  • PDF

Design and Implementation of PKI based Cryptography Communication Component (PKI 기반의 암호화 통신 컴포넌트 설계 및 구현)

  • Mo Soo-jong;Cho Won-hi;Yu Sun-young;Yim Jae-hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1316-1322
    • /
    • 2005
  • Specially, though electronic commerce and electron signature technology through internet rose, PKI (Public Key Ifrastructure) is one of technologies. PKI brought several kind of new standards in encryption base technology. In spite of several kind of standardizations consist lively, shortcoming of solutions that apply PKI is expensive and slow. If main interest of encryption technology including PKI is the fast speed and security that improve, this is very serious problem. The various kinds alternatives about these problem are presented. But, we must consider about replace expense and stability etc. still. So, I propose that use suitable encryption policy by method to solve such problem. I improved some problems of existent PKI structure. Subject of this treatise designs and embody communication component could use easily and simply short message communication or simplicity way encryption communication.

Face Recognition using 2D-PCA and Image Partition (2D - PCA와 영상분할을 이용한 얼굴인식)

  • Lee, Hyeon Gu;Kim, Dong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.31-40
    • /
    • 2012
  • Face recognition refers to the process of identifying individuals based on their facial features. It has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous consumer applications, such as access control, surveillance, security, credit-card verification, and criminal identification. However, illumination variation on face generally cause performance degradation of face recognition systems under practical environments. Thus, this paper proposes an novel face recognition system using a fusion approach based on local binary pattern and two-dimensional principal component analysis. To minimize illumination effects, the face image undergoes the local binary pattern operation, and the resultant image are divided into two sub-images. Then, two-dimensional principal component analysis algorithm is separately applied to each sub-images. The individual scores obtained from two sub-images are integrated using a weighted-summation rule, and the fused-score is utilized to classify the unknown user. The performance evaluation of the proposed system was performed using the Yale B database and CMU-PIE database, and the proposed method shows the better recognition results in comparison with existing face recognition techniques.

An Improved RF Detection Algorithm Using EMD-based WT

  • Lv, Xue;Wang, Zekun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.3862-3879
    • /
    • 2019
  • More and more problems for public security have occurred due to the limited solutions for drone detection especially for micro-drone in long range conditions. This paper aims at dealing with drones detection using a radar system. The radio frequency (RF) signals emitted by a controller can be acquired using the radar, which are usually too weak to extract. To detect the drone successfully, the static clutters and linear trend terms are suppressed based on the background estimation algorithm and linear trend suppression. The principal component analysis technique is used to classify the noises and effective RF signals. The automatic gain control technique is used to enhance the signal to noise ratios (SNR) of RF signals. Meanwhile, the empirical mode decomposition (EMD) based wavelet transform (WT) is developed to decrease the influences of the Gaussian white noises. Then, both the azimuth information between the drone and radar and the bandwidth of the RF signals are acquired based on the statistical analysis algorithm developed in this paper. Meanwhile, the proposed accumulation algorithm can also provide the bandwidth estimation, which can be used to make a decision accurately whether there are drones or not in the detection environments based on the probability theory. The detection performance is validated with several experiments conducted outdoors with strong interferences.

A Systematic Design Automation Method for RDA-based .NET Component with MDA

  • Kum, Deuk Kyu
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.69-76
    • /
    • 2019
  • Recent Enterprise System has component driven real-time distributed architecture (RDA) and this kind of architecture should performed with satisfying strict constraints on life cycle of object and response time such as synchronization, transaction and so on. Microsoft's .NET platform supports RDA and is able to implement services including before mentioned time restriction and security service by only specifying attribute code and maximizing advantages of OMG's Model Driven Architecture (MDA). In this study, a method to automatically generate an extended model of essential elements in an enterprise-system-based RDA as well as the platform specific model (PSM) for Microsoft's .NET platform are proposed. To realize these ideas, the functionalities that should be considered in enterprise system development are specified and defined in a meta-model and an extended UML profile. In addition, after defining the UML profile for .NET specification, these are developed and applied as plug-ins of the open source MDA tool, and extended models are automatically generated using this tool. Accordingly, by using the proposed specification technology, the profile and tools can easily and quickly generate a reusable extended model even without detailed coding-level information about the functionalities considered in the .NET platform and RDA.

The Operation of Administration Tool for Relatinships Management in the RBAC Security System (RBAC 보안시스템에서 관계관리를 위한 관리도구 동작)

  • 오석균;김성열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.373-377
    • /
    • 1999
  • Role Based Access Control(RBAC) reduces the cost of administering access control policies as well as making the process less error-prone. The administration tool is most important component in the concept of RBAC. The administration tool for the RBAC security system is required the consistency of a relationships between user and role in the RBAC Database. In this paper, we propose formal specification in order to manage user-role and role-role relationships. The proposed formal specification leads to the consistency requirements for the RBAC database which are defined as a set of relationship. This paper can easily derive the implementation of the RBAC administration tool by formal specification of operations.

  • PDF

Performance Analysis of Face Recognition by Distance according to Image Normalization and Face Recognition Algorithm (영상 정규화 및 얼굴인식 알고리즘에 따른 거리별 얼굴인식 성능 분석)

  • Moon, Hae-Min;Pan, Sung Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.737-742
    • /
    • 2013
  • The surveillance system has been developed to be intelligent which can judge and cope by itself using human recognition technique. The existing face recognition is excellent at a short distance but recognition rate is reduced at a long distance. In this paper, we analyze the performance of face recognition according to interpolation and face recognition algorithm in face recognition using the multiple distance face images to training. we use the nearest neighbor, bilinear, bicubic, Lanczos3 interpolations to interpolate face image and PCA and LDA to face recognition. The experimental results show that LDA-based face recognition with bilinear interpolation provides performance in face recognition.

Implementation of Methodology & Tool for Communication Safety Guarantee in Railway System (철도시스템 통신 안전성 확보를 위한 방법 제시 및 도구 구현)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Kim, Yong-Kyu
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.1
    • /
    • pp.10-17
    • /
    • 2010
  • Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in train control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. In this paper, we proposed the safety strategies employed in the railway communications and a security mechanism for Korean railway communication system. Also, we presented the developed means for validation and determination of communication safety based on the proposed security mechanism in the railway system.

A Novel Trust Establishment Method for Wireless Sensor Networks

  • Ishmanov, Farruh;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1529-1547
    • /
    • 2015
  • Establishment of trust is important in wireless sensor networks for security enhancement and successful collaboration. Basically, a node establishes trust with other nodes by estimating a trust value based on monitored behavior of the other nodes. Since a malicious/misbehaving node might launch different attack strategies and might demonstrate random misbehavior, a trust estimation method should be robust against such attacks and misbehavior. Otherwise, the operation of trust establishment will be meaningless, and performance of an application that runs on top of trust establishment will degrade. In this paper, we propose a robust and novel trust estimation method. Unlike traditional trust estimation methods, we consider not only the weight of misbehavior but also the frequency of misbehavior. The frequency-of-misbehavior component explicitly demonstrates how frequently a node misbehaves during a certain observed time period, and it tracks the behavior of nodes more efficiently, which is a main factor in deriving an accurate trust value. In addition, the weight of misbehavior is comprehensively measured to mitigate the effect of an on-off attack. Frequency and weight of misbehavior are comprehensively combined to obtain the trust value. Evaluation results show that the proposed method outperforms other trust estimation methods under different attacks and types of misbehavior.

Preventing Service Injection Attack on OSGi Platform (OSGi 플랫폼에서 서비스 인젝션 공격 및 대응책)

  • Kim, In-Tae;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.111-118
    • /
    • 2010
  • The OSGi platform is a Java-based component platform that is being widely used from environments for the application development to enterprise software. The OSGi platform provides dynamic and transparent installation for open environments. However, it open new attacks so that many researches try to solve OSGi vulnerability. Security flaws in OSGi platform are categorized two parts: the JVM and the OSGi platform itself. We focus on vulnerability by OSGi platform itself, particularly service injection. We identify the service injection attack and suggest secure mechanisms to prevent the attack. Those mechanisms are implemented, providing a few modification to the Knopflerfish OSGi implementation and are evaluated through comparing with existing mechanisms.