DOI QR코드

DOI QR Code

Auto Detection System of Personal Information based on Images and Document Analysis

이미지와 문서 분석을 통한 개인 정보 자동 검색 시스템

  • 조정현 (영남이공대학교 컴퓨터정보과) ;
  • 안철웅 (계명문화대학교 스마트웹콘텐츠과)
  • Received : 2015.08.01
  • Accepted : 2015.10.09
  • Published : 2015.10.31

Abstract

This paper proposes Personal Information Auto Detection(PIAD) System to prevent leakage of Personal informations in document and image files that can be used by mobile service provider. The proposed system is to automatically detect the images and documents that contain personal informations and shows the result to the user. The PIAD is divided into the selection step for fast and accurate retrieval images and analysis which is composed of SURF, erosion and dilation, FindContours algorithm. The result of proposed PIAD system showed more than 98% accuracy by selection and analysis steps, 267 images detection of 272 images.

본 논문에서는 통신 판매사에서 사용하는 문서와 이미지 파일에서 개인 정보의 유출을 방지할 수 있는 개인 정보 자동 검색(PIAD, Personal Information Auto Detection) 시스템을 제안한다. 제안하는 시스템은 개인 정보를 포함하는 신분증과 계약서 이미지를 자동으로 검색하고 그 결과를 사용자에게 전달하고, 문서상의 개인 정보 또한 검출할 수 있다. 본 시스템은 빠르고 정확한 검색을 위하여 선별 과정과 분석 과정으로 나뉘고, 분석 과정은 SURF, 침식과 팽창, FindContours 알고리즘들을 사용한다. 제안하는 PIAD 시스템은 272장의 입력 이미지들 중 267장을 선별 및 검출함으로써 98% 이상의 정확도를 보였다.

Keywords

References

  1. The Statics Portal, "Number of smart phones sold to end users worldwide from 2007 to 2013 (in million units)", http://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/.
  2. Korea Internet Security Agency, "Study on Usage Patterns of Age and Gender for Smartphone Users", Internet & Security Focus, pp. 35-51, 2013.
  3. "Personal Information Loss of Mobile Service Provider", http://www.zdnet.co.kr/news/news_view.asp?artice_id=20140311154043.
  4. Korea Internet Security Agency, "Counselling Count of Personal Information Protection", http://isis.kisa.or.kr/.
  5. Ministry of Security and Public Administration, "The Personal Information Protection Act".
  6. H. Y. Hwang and N. Y. Kim, "Personal Information Protection System for Web Service", The Journal of The Institute of Internet, Broadcasting and Communication, VOL. 11, No. 6, pp. 261-266, December 2011.
  7. W. J. Kang, "An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement", The Journal of The Institute of Internet, Broadcasting and Communication, VOL. 13, No. 6, pp. 173-186, December 2013. https://doi.org/10.7236/JIIBC.2013.13.6.173
  8. J. K. Baek and J. P. Park, "A Study on Personal Information Control and Security in Printed Matter", Journal of Korea Academia-Industrial cooperation Society, Vol. 14, No. 5, pp. 2415-2421, 2013, https://doi.org/10.5762/KAIS.2013.14.5.2415
  9. B. Kim, J. I. Lim, Y. H. Jo, "Privacy Situation and Countermeasures of Financial Apps based on the Android operating System", The Journal of The Institute of Internet, Broadcasting and Communication, VOL. 14, No. 6, pp. 267-272, December 2014. https://doi.org/10.7236/JIIBC.2014.14.6.267
  10. M. S. Seo, and D. W. Park, "The Solution for Personal Information Protection Act of PC", Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 8, pp. 21-25, 2012.
  11. J. H. Cho, C. W. Ahn, and J. H. Jun, "A Feature Point Tracking Method By Using Template Matching and Buffer", The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL. 14, NO. 4, pp.173-179, 2014. https://doi.org/10.7236/JIIBC.2014.14.4.173
  12. H. J. Lee, "Character Recognition for Machine Reader Zone of Electronic Identity Card", Master's Thesis, Ajou University, 2014.
  13. S. D. Park, Y. U. Woo and G. B. Kim, "Recognition of Resident Registration Cards Using ART-1 and PCA Algorithm", Journal of Korea Institute of Information and Communication Engineering, Vol. 11, No. 9, pp. 1786-1792, 2007.
  14. R. Sankar and G. Ivkovic, "An Adaptive Image Quality Assessment Algorithm", International Journal of Advanced Smart Convergence(IJASC), Vol. 1, No. 1, pp. 6-13, 2012. https://doi.org/10.7236/JASC2012.1.1.2
  15. L. Neumann and J. Matas, "Real-Time Scene Text Localization and Recognition," the 25th IEEE Conference on Computer Vision and Pattern Recognition, pp. 3538-3545, 2012.
  16. H. Bay, T. Tuytelaars, and L. V. Gool, "Surf: Speeded up robust features," European Conference on Computer Vision, Vol. 3951, pp. 404-417, 2006.
  17. D. Lowe, "Distinctive Image Features from Scale-Invariant Keypoints," Int'l J. Computer Vision, Vol. 60, No. 2, pp. 91-110, 2004. https://doi.org/10.1023/B:VISI.0000029664.99615.94
  18. S. Suzuki and K. Abe, "Topological structural analysis of digital binary images by border following," Computer Vision, Graphics and Image Processing, Vol. 30, pp. 32-46, 1985. https://doi.org/10.1016/0734-189X(85)90016-7
  19. J. S. Kim, " A Study on V.M.D(Visual Merchandising Design) Environment of Mobile Telecommunication Company Store", Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 14, No. 4, pp. 1589-1594, 2013. https://doi.org/10.5762/KAIS.2013.14.4.1589