• Title/Summary/Keyword: 개인정보침해

Search Result 609, Processing Time 0.028 seconds

Intelligent Face Mosaicing Method in Video for Personal Information Protection (개인정보 보호를 위한 비디오에서의 지능형 얼굴 모자이킹 방법)

  • Lim, Hyuk;Choi, Minseok;Choi, Seungbi;Choi, Haechul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.338-339
    • /
    • 2020
  • 개인 방송의 보편화로 인해 인터넷 혹은 방송으로 유포되는 영상에서 일반인의 얼굴이 빈번히 노출되고 있으며, 동의 받지 않은 얼굴의 방송 노출은 개인 초상권 침해와 같은 사회적 문제를 일으킬 수 있다. 이러한 개인 초상권 침해 문제를 해결하고자 본 논문은 비디오에서 일반인의 얼굴을 검출하고 이에 마스킹을 가하는 방법을 제안한다. 제안 방법은 우선 딥러닝 기반의 Faster R-CNN을 이용하여 모자이킹을 하지 않을 특정인과 모자이킹을 가할 비특정인을 포함한 다수의 얼굴 영상을 학습한다. 학습된 네트워크를 이용하여 입력 비디오에 대해 사람의 얼굴을 검출하고 검출된 결과 중 특정인을 선별해 낸다. 최종적으로 입력 비디오에서 특정인을 제외한 나머지 검출된 얼굴에 대해 모자이킹 처리를 수행함으로써 비디오에서 지능적으로 비특정인의 얼굴을 가린다. 실험결과, 특정인과 비특정인을 포함한 얼굴 검출의 경우 99%의 정확도를 보였으며, 얼굴 검출 결과 중 특정인을 정확히 맞춘 경우는 86%의 정확도를 보였다. 제안 방법은 인터넷 동영상 서비스 및 방송 분야에서 개인 정보 보호를 위해 효과적으로 활용될 수 있을 것으로 기대된다.

  • PDF

A Study on Personal Information Protection Management Assessment Method by DEA (DEA 모형을 이용한 개인정보보호 관리수준 평가방법에 대한 연구)

  • Jeong, Myeong-soo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.691-701
    • /
    • 2015
  • Recently, with the growing number of services using personal information, government offices' tasks have become more dependent to personal information. Various policies and systems have been made and managed for the safe use of personal information in the circumstances that inevitably require the use of personal information, but the personal information privacy incidents and their scale are on a constant increase. Thus, Korea has been implementing personal information protection management system since 2008 to examine whether public organizations observe the personal information protection act and to how well they manage the personal information, and to improve what is insufficient in the process. However, despite high scores of the outcomes of the system, questions about the effectiveness of the outcomes and about the actual manage level are being raised. Thus, this study seeks to analyze public organizations' activities to protect personal information and the effectiveness of their foundation efforts for them by using the DEA model, and to propose a new model to enhance the effectiveness of the outcomes of personal information protection management system by reflecting them into the outcomes of system, using the derived effectiveness.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

초연결사회로의 변화와 개인정보 보호

  • Seon, Won-Jin;Kim, Du-Hyeon
    • Information and Communications Magazine
    • /
    • v.31 no.4
    • /
    • pp.53-58
    • /
    • 2014
  • 초연결사회의 구현을 위해서는 다양한 객체를 연결하는 사물인터넷, 연결 사이를 흐르는 데이터 속의 가치를 찾아내는 빅데이터, 그리고 빅데이터의 관련 기술인 클라우드 컴퓨팅 등 핵심기술이 유기적으로 활용되고 있는데, 이 과정에서 발생하는 개인정보 침해의 위험성을 파악하고, 이에 대한 대응 방안을 모색하고자 한다.

국내 정보보호관련 법규 분석

  • 이대기;조영섭;진승헌;정교일
    • Review of KIISC
    • /
    • v.12 no.4
    • /
    • pp.74-87
    • /
    • 2002
  • 본 논문에서는 최근 급격하게 증가하고 있는 해킹, 컴퓨터바이러스 유포 등 각종 전자적침해행위, 개인정보의 광범위한 수집과 오·남용, 음란·폭력정보의 범람, 익명성·비대면성을 악용한 인권 침해행위 및 신종 사이버범죄 등의 정보화 역기능에 대처하기 위한 정보보호관련 법규들이 제·개정되어 효과적으로 대응할 수 있게 되었으나 관련 법규들간의 상호 조정이나 정비 및 제정이 지속적으로 이루어져야 하므로 이를 위해 정보보호 문제와 관련된 법체계를 분석하고 법·제도의 개선방향을 제시한다.