Optical Character Recognition based Security Document Image File Management System

광학문자인식 기반 보안문서 이미지 파일 관리 시스템

  • Jeong, Pil-Seong (Dept. of Information Technology Communication, Myongji College) ;
  • Cho, Yang-Hyun (Division of Computer & Mechatronics Engineering, Sahmyook University)
  • 정필성 (명지전문대학 정보통신공학과) ;
  • 조양현 (삼육대학교 컴퓨터.메카트로닉스공학부)
  • Received : 2018.12.28
  • Accepted : 2019.03.20
  • Published : 2019.03.28


With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

OHHGBW_2019_v10n3_7_f0001.png 이미지

Fig. 1. Proposed network model

OHHGBW_2019_v10n3_7_f0002.png 이미지

Fig. 2. Image upload and save keyword

OHHGBW_2019_v10n3_7_f0003.png 이미지

Fig. 3. Search and find image that has keyword

OHHGBW_2019_v10n3_7_f0004.png 이미지

Fig. 4. Image upload screen

OHHGBW_2019_v10n3_7_f0005.png 이미지

Fig. 5. Image list screen

OHHGBW_2019_v10n3_7_f0006.png 이미지

Fig. 6. Smart device application screen

Table 1. Google Cloud Vision API Feature

OHHGBW_2019_v10n3_7_t0001.png 이미지

Table 2. Apache Cordova Plugin API Services

OHHGBW_2019_v10n3_7_t0002.png 이미지

Table 3. USER table scheme

OHHGBW_2019_v10n3_7_t0003.png 이미지

Table 4. IMAGE table scheme

OHHGBW_2019_v10n3_7_t0004.png 이미지

Table 5. KEYWORD table scheme

OHHGBW_2019_v10n3_7_t0005.png 이미지

Table 6. Image file processing time

OHHGBW_2019_v10n3_7_t0006.png 이미지


Supported by : Research Foundation of Korea (NRF)


  1. S. U. Kang & Y. S. Choi. (2014). Design of Open Collaboration Solution's Server for Smart Work. Journal of the Institute of Electronics and Information Engineers, 51(7). 133-141.
  2. J. S. Kim & K. S. Han. (2016). The key technology factors of Smart work and the situations in Korea and overseas. The Korea Contents Association Review 14(1), 14-20.
  3. S. E. Yoo & S. Y. Lee. (2013). An Analysis on Types of Smart Workplace and its Planning Strategies. Journal of Korea Design Knowledge, 25, 279-288.
  4. S. H. Lee, H. J. Jun & T. S. Kim. (2018). A Study on Cyber Security Risk Management for Diffusion of Korean Smart Factories. The Journal of Korean Institute of Communications and Information Sciences, 43(10). 1741-1750.
  5. S. H. Paik, S. K. Kim & H. B. Park. (2010). Design and Implementation of Network Access Control for Security of Company Network, The Institute of Electronics Engineers of Korea - Telecommunications, 47(12), 90-96.
  6. W. R. Jeon, J. Y. Kim, Y. S. Lee & D. H. Won. (2011). Analysis of Threats and Countermeasures on Mobile Smartphone, Journal of the Korea Society of Computer and Information, 16(2), 153-163.
  7. B. I. Kang & S. J. Kim. (2014). Study on Security Grade Classification of Financial Company Documents, Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1319-1328.
  8. Y. J. Lee, Y. H. Jang & S. C. Park (2016). Design and Implementation of App Control System for Improving the Security of the Mobile Application, Journal of The Korea Contents Association, 16(2), 243-250.
  9. J. H. Lee, D. H. Lee & H. K. Kim. (2012). Decision Support System to Detect Unauthorized Access in Smart Work Environment. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 797-808.
  10. C. Kwan. (2015). Rethinking of Situational Context and Characteristic of Industrial Secrets Leakage: Some National Security and Psychological Perspectives. The Korean Journal of Forensic Psychology, 6(1), 1-11.
  11. J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure, Journal of Korean Institute of Information Technology, 10(6), 133-143.
  12. K. S. Sung, D. Y. Oh, J. J. Kim, W. S. Na & H. S. Oh. (2008). Study on the Efficiency System Design for Minimize the Information Leak of the E-Document Store Service, The Journal of The Korean Institute of Communication Sciences, 33(10), 350-358.
  13. B. H. Kang. (2018). 5 Topics for Education and Research in Business Ethics. Journal of Digital Convergence, 16(8), 137-150.
  14. Google. (2018). Firebase Documentation. Firebase(Online).
  15. Apache Cordova. (2018). Apache Cordova Documentation. Apache Cordova Documentation(Online).