• Title/Summary/Keyword: specific crime

Search Result 103, Processing Time 0.026 seconds

CNN-Based Fake Image Identification with Improved Generalization (일반화 능력이 향상된 CNN 기반 위조 영상 식별)

  • Lee, Jeonghan;Park, Hanhoon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1624-1631
    • /
    • 2021
  • With the continued development of image processing technology, we live in a time when it is difficult to visually discriminate processed (or tampered) images from real images. However, as the risk of fake images being misused for crime increases, the importance of image forensic science for identifying fake images is emerging. Currently, various deep learning-based identifiers have been studied, but there are still many problems to be used in real situations. Due to the inherent characteristics of deep learning that strongly relies on given training data, it is very vulnerable to evaluating data that has never been viewed. Therefore, we try to find a way to improve generalization ability of deep learning-based fake image identifiers. First, images with various contents were added to the training dataset to resolve the over-fitting problem that the identifier can only classify real and fake images with specific contents but fails for those with other contents. Next, color spaces other than RGB were exploited. That is, fake image identification was attempted on color spaces not considered when creating fake images, such as HSV and YCbCr. Finally, dropout, which is commonly used for generalization of neural networks, was used. Through experimental results, it has been confirmed that the color space conversion to HSV is the best solution and its combination with the approach of increasing the training dataset significantly can greatly improve the accuracy and generalization ability of deep learning-based identifiers in identifying fake images that have never been seen before.

The Production and Contents of Illustrations Used in the 'House Search Report' During the Japanese Colonial Period (일제강점기 '가택수색조서'에 사용된 도판의 생산과 내용에 관한 연구)

  • Kim, Jeong-Hee;Han, Dong-Soo
    • Journal of architectural history
    • /
    • v.32 no.6
    • /
    • pp.33-47
    • /
    • 2023
  • The study confirmed the "house search report(家宅搜索調書)" containing criminal records during the Japanese colonial period, as well as the production process and the way of expressing the illustrations contained in them. It also explored architectural values through analysis of the location and use of the building. This records the discovery of evidence by searching the residences of those involved in the crime from 1919 to 1922. The illustrations contained in this record were not standardized, so the contents of the article differed depending on the author's background and cultural experience. Nevertheless, this painting reflects the regional characteristics of traditional houses located throughout the Korean Peninsula. It is also evidence that the house was used for cultural, commercial, and industrial purposes, beyond the general assumption that it was used only for residential purposes. The "House Search Report(家宅搜索調書)" provides information on ordinary buildings that existed as the background of everyday life, rather than buildings with a specific purpose or exceptional design. It is evaluated as an important resource for understanding the diverse life and spatial structures of buildings during that time.

Factors Affecting Information Security Practice of Elementary School Students (초등학생들의 정보보호실천에 영향을 미치는 요인)

  • Choi, Seung-Jae;Kim, Hyeong-Yeol;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.449-461
    • /
    • 2016
  • If students are not aware of the information security, they easily let others know their information or they use others' information with no sense of guilt. The information security education is necessary to protect and prevent students from cyber crime. However, South Korea's information curriculum has no specific information security education course and it has led a school or teacher to teach contents of information ethics superficially. The purpose of this paper is to find the factors affecting the information security practice of the elementary school students. For an empirical analysis, questionnaire survey was conducted and the Partial Least Square(PLS) was used to analyze the research model. The analysis results show that the information ethics awareness and the information security awareness have a positive impact on the information security practice. The results of this study are expected to help choose the specific information security curriculum required for the information security practice of elementary school students.

Object classification and the number of pixels compared with children protection (화소 수 비교를 통한 성인과 유아 구분 방법)

  • Kang, ji-hun;Kim, chang-dae;Ryu, sung-pil;Kim, dong-woo;Ahn, jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.725-728
    • /
    • 2014
  • Continue to have an increasingly violent crimes against children every year, and as you know all seriousness is classified as a felony. However, efforts to reduce the underlying crime is low. Therefore, it is necessary to solve this problem, the security system. Is to protect the children and adults that exist that can pose a threat to children to identify and monitor tracking method in this paper. Was based on a Korean standard body size of a person, such as keys, arm length, leg length, head vertical length, head width proposed method. Also, separate the adults and children through the comparison of the reference value, the ratio and the ratio of the number of pixels of the detected object, the proposed method. Processing speed is fast because it detects only a specific object region in the entire image in the handling method in the proposed method the five nine minutes. The advantage is to enable comparison of the specific object, through which there is.

  • PDF

Online Video Synopsis via Multiple Object Detection

  • Lee, JaeWon;Kim, DoHyeon;Kim, Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.19-28
    • /
    • 2019
  • In this paper, an online video summarization algorithm based on multiple object detection is proposed. As crime has been on the rise due to the recent rapid urbanization, the people's appetite for safety has been growing and the installation of surveillance cameras such as a closed-circuit television(CCTV) has been increasing in many cities. However, it takes a lot of time and labor to retrieve and analyze a huge amount of video data from numerous CCTVs. As a result, there is an increasing demand for intelligent video recognition systems that can automatically detect and summarize various events occurring on CCTVs. Video summarization is a method of generating synopsis video of a long time original video so that users can watch it in a short time. The proposed video summarization method can be divided into two stages. The object extraction step detects a specific object in the video and extracts a specific object desired by the user. The video summary step creates a final synopsis video based on the objects extracted in the previous object extraction step. While the existed methods do not consider the interaction between objects from the original video when generating the synopsis video, in the proposed method, new object clustering algorithm can effectively maintain interaction between objects in original video in synopsis video. This paper also proposed an online optimization method that can efficiently summarize the large number of objects appearing in long-time videos. Finally, Experimental results show that the performance of the proposed method is superior to that of the existing video synopsis algorithm.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Development of Real-time Video Search System Using the Intelligent Object Recognition Technology (지능형 객체 인식 기술을 이용한 실시간 동영상 검색시스템)

  • Chang, Jae-Young;Kang, Chan-Hyeok;Yoon, Jae-Min;Cho, Jae-Won;Jung, Ji-Sung;Chun, Jonghoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.85-91
    • /
    • 2020
  • Recently, video-taping equipment such as CCTV have been seeing more use for crime prevention and general safety concerns. Since these video-taping equipment operates all throughout the day, the need for security personnel is lessened, and naturally costs incurred from managing such manpower should also decrease. However, technology currently used predominantly lacks self-sufficiency when given the task of searching for a specific object in the recorded video such as a person, and has to be done manually; current security-based video equipment is insufficient in an environment where real-time information retrieval is required. In this paper, we propose a technology that uses the latest deep-learning technology and OpenCV library to quickly search for a specific person in a video; the search is based on the clothing information that is inputted by the user and transmits the result in real time. We implemented our system to automatically recognize specific human objects in real time by using the YOLO library, whilst deep learning technology is used to classify human clothes into top/bottom clothes. Colors are also detected through the OpenCV library which are then all combined to identify the requested object. The system presented in this paper not only accurately and quickly recognizes a person object with a specific clothing, but also has a potential extensibility that can be used for other types of object recognition in a video surveillance system for various purposes.

A Study on Improving Measures against Terrorism in Metropolitan Subways (지하철내 테러대응 개선방안의 연구)

  • Park, Woong-Shin
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.91-115
    • /
    • 2017
  • Recently the characteristics of those who committed serious terrorist crimes are not directly related to the direct command system of a specific terrorist organization (ex. IS) but are influenced by the political propaganda of terrorist organizations online, Terrorist crime under the loose form of the terrorist organization. Therefore, this study suggests ways to improve countermeasures against terrorism in metropolitan subways. Although it is important for the prevention of terrorism in the subway, it is important for the police officers of the subway police and the special police officers of the railway to have a physical limit to take charge of them, and after confirming that improvement measures are necessary, And pointed out the possibility of establishing independent security departments where judicial and administrative control is not feasible to grant police rights. In addition, I pointed out how to improve the safety of subways in the metropolitan area through the recruitment of core job candidates and the identity survey during the subway operation. Furthermore, it was confirmed that a special council on terrorism, which can take into consideration the characteristics of subway terrorism, such as airports and ports, is required to be established in charge of terrorism prevention under the current Anti-Terrorism Act. Finally, it is once again emphasized that the strengthening of the powers of the counterparts to terrorism must inevitably limit the basic rights of the people, so the principle of proportionality must be observed in their activities.

  • PDF

A Study on the Comparison and Semantic Analysis between SNS Big Data, Search Portal Trends and Drug Case Statistics (SNS 빅데이터 및 검색포털 트렌드와 마약류 사건 통계간의 비교 및 의미분석 연구)

  • Choi, Eunjung;Lee, SuRyeon;Kwon, Hyemin;Kim, Myuhngjoo;Lee, Insoo;Lee, Seunghoon
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.231-238
    • /
    • 2021
  • SNS data can catch the user's thoughts and actions. And the trend of the search portal is a representative service that can observe the interests of users and their changes. In this paper, the relationship was analyzed by comparing statistics on narcotics incidents and the degree of exposure to narcotics related words in tweets of SNS and in the trends of search portal. It was confirmed that the trend of SNS and search portal trends was the same in the statistics of the prosecution office with a certain time difference.In addition, cluster analysis was performed to understand the meaning of tweets in which narcotics related words were mentioned. In the 50,000 tweets collected in January 2020, it was possible to find meaning related to the sale of actual drugs. Therefore, through SNS monitoring alone it is possible to monitor narcotics-related incidents and to find specific sales or purchase-related information, and this can be used in the investigation process. In the future, it is expected that crime monitoring and prediction systems can be proposed as related crime analysis may be possible not only with text but also images.

A Study on the Judgment Criteria for the Trademark Dilution of Famous Marks

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.225-232
    • /
    • 2019
  • The trademark dilution of famous marks as a kind of unfair competition practice is defined and regulated in Article 2 (1) (c) of the Unfair Competition Prevention and Trade Secret Protection Act (hereinafter referred to as the Unfair Competition Prevention Act), which was newly established according to the amendment of the Act on February 3, 2001. Famous trademarks are universally protected in all around the world, which are likewise protected in the Republic of Korea by the Unfair Competition Prevention Actin line with such international trends. In order to establish the trademark dilution of famous marks, it is necessary to have the following characteristics: (1) high reputation of the original mark, (2) use of identical or similar markscompared to the original mark, (3) occurrence of blurring of discrimination or tarnishment of reputation; in particular, with respect to the degree of proof of 'blurring of discrimination or tarnishment of reputation', which is a constituent requirement of the trademark dilution of famous marks, it is reasonable to interpret the trademark dilution as concrete endangerment offense, neither harm-based offense nor abstract endangerment offense, and thus it should be considered that the crime is established if a specific realistic risk of blurring of discrimination or tarnishment of reputation occurs. Furthermore, in relation to the specific criteria of 'blurring of discrimination or tarnishment of reputation', it is necessary to comprehensively judge the degree of individual behavior in specific matters as a normative factor as well as the psychosocial viewpoint of the general public.