• Title/Summary/Keyword: Hidden Area Detection

Search Result 22, Processing Time 0.024 seconds

A Study on Hidden Node Margin to Protect DTV Service in Korea (국내 DTV 서비스 보호를 위한 은닉 노드 마진 연구)

  • Kang, Kyu-Min;Cho, Sang-In;Jeong, Byung-Jang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.12
    • /
    • pp.1165-1171
    • /
    • 2011
  • In this paper, we investigate hidden node problem to effectively utilize TV band devices(TVBDs) in the TV white space(TVWS), and also to protect digital television(DTV) service in Korea. Firstly, we classify the radio propagation environment into an urban area, a basin area, and a coastal area based on geographical characteristics. Thereafter, we measure and analyze local shape based hidden node attenuation at eight segmented positions in each geographic area. Because commercial buildings as well as residential and commercial buildings in Korea are located in closer proximity to each other than in other countries, hidden node margin should be more than 38 dB in order to safely protect DTV service in Korea.

A Study on Look alike Offender Detection Using Hidden Face Information (얼굴가림 정보를 이용한 유사 범인 검출에 관한 연구)

  • Kim, Soo-In
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.4
    • /
    • pp.70-79
    • /
    • 2014
  • In this paper, I propose a method for detection of look-alike offenders by using hidden face information. For extraction of moving objects, PRA matching is used to extract moving components, and brightness changes can be dealt with by an adaptive threshold adjusting in the proposed method. Moving objects extracted in the territory of the face region is extracted using the complexion, facial area, eyes, nose, mouth. The extracted information detected by the presence of these characteristics were likely to help judge a person. Results of the extracted face makes the recognition rate of possible murderers 90% so the usefulness of the proposed method was confirmed.

An effective detection method for hiding data in compound-document files (복합문서 파일에 은닉된 데이터 탐지 기법에 대한 연구)

  • Kim, EunKwang;Jeon, SangJun;Han, JaeHyeok;Lee, MinWook;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1485-1494
    • /
    • 2015
  • Traditionally, data hiding has been done mainly in such a way that insert the data into the large-capacity multimedia files. However, the document files of the previous versions of Microsoft Office 2003 have been used as cover files as their structure are so similar to a File System that it is easy to hide data in them. If you open a compound-document file which has a secret message hidden in it with MS Office application, it is hard for users who don't know whether a secret message is hidden in the compound-document file to detect the secret message. This paper presents an analysis of Compound-File Binary Format features exploited in order to hide data and algorithms to detect the data hidden with these exploits. Studying methods used to hide data in unused area, unallocated area, reserved area and inserted streams led us to develop an algorithm to aid in the detection and examination of hidden data.

Cognitive Radio MAC Protocol for Hidden Incumbent System Detection (무선 인지 기술 기반의 WRAN 시스템에서 숨겨진 인컴번트 시스템 검출 MAC 프로토콜)

  • Kim, Hyun-Ju;Jo, Kyoung-Jin;Hyon, Tae-In;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1058-1067
    • /
    • 2006
  • In this paper, we propose a inband/outband broadcast method for hidden incumbent system detection of medium access control layer for wireless regional area network systems using cognitive radio technology. Through some extra channels that are not currently used, a short message is broadcasted. The message allows CPE detecting an appearance of incumbent system to send sensing report to CR BS. For the hidden incumbent system report message, the BS needs a process or method for allocation of upstream resource to CPEs. And transmitting multiple out-band signals has a possibility to collide with out-band signals of other co-located WRAN BSs. To avoid out-band signal collision, BSs randomly select it out-band signal broadcasting time within the pre-defined explicit out-band signaling, period. And fractional Bandwidth Usage allows WRAN BSs to efficiently use bandwidth.

Efficient Lane Detection for Preceding Vehicle Extraction by Limiting Search Area of Sequential Images (전방의 차량포착을 위한 연속영상의 대상영역을 제한한 효율적인 차선 검출)

  • Han, Sang-Hoon;Cho, Hyung-Je
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.705-717
    • /
    • 2001
  • In this paper, we propose a rapid lane detection method to extract a preceding vehicle from sequential images captured by a single monocular CCD camera. We detect positions of lanes for an individual image within the limited area that would not be hidden and thereby compute the slopes of the detected lanes. Then we find a search area where vehicles would exist and extract the position of the preceding vehicle within the area with edge component by applying a structured method. To verify the effects of the proposed method, we capture the road images with a notebook PC and a CCD camera for PC and present the results such as processing time for lane detection, accuracy and vehicles detection against the images.

  • PDF

A Study on Analysis of Hidden Areas of Removable Storage Device from a Digital Forensics Point of View (디지털 포렌식 관점에서 이동식 저장매체의 은닉영역 분석 연구)

  • Hong, Pyo-gil;Lee, Dae-sung;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.111-113
    • /
    • 2021
  • USB storage devices, which are represented by removable storage media, are widely used even nowadays when cloud services are common. However, since they are cases where hidden areas are created and exploited in USB storage devices. This research is needed to detect and analyze them from an Anti-forensic point of view. In this paper, we analyze a program that can be exploited as Anti-forensic because it can create a hidden partition and store files there, and the file system created by it from a digital forensic point of view.

  • PDF

Banner Control Automation System Using YOLO and OpenCV (YOLO와 OpenCV기술을 활용한 현수막 단속 자동화 시스템 방안)

  • Dukwoen Kim;Jihoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.48-52
    • /
    • 2023
  • From the past to the present, banners are consistently used as effective advertising means. In the case of Korea, there are frequent situations in which hidden advertisements are installed. As a result, such hidden advertisement materials may damage urban aesthetics and moreover, incur unnecessary manpower consumption and waste of money. The proposed method classifies the detected banners into good banner and bad banner. The classification results are based on whether the relevant banners are installed in compliance with legal guidelines. In the process, YOLO and Open Computer Vision library are used to determine from various perspectives whether banners in CCTV images comply with the guidelines. YOLO is used to detect the banner area in CCTV images, and OpenCV is used to detect the color values in the area for color comparison. If a banner is detected in the video, the proposed method calculates the location of the banner and the distance from the designated bulletin to determine whether it was installed within the designated location, and then compares whether the color used in the banner is complied with local government guidelines.

  • PDF

An Application of Deep Clustering for Abnormal Vessel Trajectory Detection (딥 클러스터링을 이용한 비정상 선박 궤적 식별)

  • Park, Heon-Jei;Lee, Jun Woo;Kyung, Ji Hoon;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.169-176
    • /
    • 2021
  • Maritime monitoring requirements have been beyond human operators capabilities due to the broadness of the coverage area and the variety of monitoring activities, e.g. illegal migration, or security threats by foreign warships. Abnormal vessel movement can be defined as an unreasonable movement deviation from the usual trajectory, speed, or other traffic parameters. Detection of the abnormal vessel movement requires the operators not only to pay short-term attention but also to have long-term trajectory trace ability. Recent advances in deep learning have shown the potential of deep learning techniques to discover hidden and more complex relations that often lie in low dimensional latent spaces. In this paper, we propose a deep autoencoder-based clustering model for automatic detection of vessel movement anomaly to assist monitoring operators to take actions on the vessel for more investigation. We first generate gridded trajectory images by mapping the raw vessel trajectories into two dimensional matrix. Based on the gridded image input, we test the proposed model along with the other deep autoencoder-based models for the abnormal trajectory data generated through rotation and speed variation from normal trajectories. We show that the proposed model improves detection accuracy for the generated abnormal trajectories compared to the other models.

A Study on Eigenspace Face Recognition using Wavelet Transform and HMM (웨이블렛 변환과 HMM을 이용한 고유공간 기반 얼굴인식에 관한 연구)

  • Lee, Jung-Jae;Kim, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2121-2128
    • /
    • 2012
  • This paper proposed the real time face area detection using Wavelet transform and the strong detection algorithm that satisfies the efficiency of computation and detection performance at the same time was proposed. The detected face image recognizes the face by configuring the low-dimensional face symbol through the principal component analysis. The proposed method is well suited for real-time system construction because it doesn't require a lot of computation compared to the existing geometric feature-based method or appearance-based method and it can maintain high recognition rate using the minimum amount of information. In addition, in order to reduce the wrong recognition or recognition error occurred during face recognition, the input symbol of Hidden Markov Model is used by configuring the feature values projected to the unique space as a certain symbol through clustering algorithm. By doing so, any input face will be recognized as a face model that has the highest probability. As a result of experiment, when comparing the existing method Euclidean and Mahananobis, the proposed method showed superior recognition performance in incorrect matching or matching error.

A Study on the Detection of the Abnormal Tool State for Neural Network in Drilling (드릴가공시 신경망에 의한 공구 이상상태 검출에 관한 연구)

  • 신형곤;김민호;김태영;김대성
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.1021-1024
    • /
    • 2001
  • Out of all metal-cutting processes, the hole-making process is the most widely used. It is estimated to be more than 30% of the total metal-cutting process. It is therefore desirable to monitor and detect drill wear during the hole-drilling process. In this paper, the vision system of the sensing methods of drill flank wear on the basis of image processing is used to detect the wear pattern by non-contact and direct method and get the reliable wear information about drill. In image processing of acquired image, median filter is applied for noise removal. The vision flank wear area of the drill was measured. Backpropagation neural networks (BPns) were used for no-line detection of drill wear. The neural network consisted of three layers: input, hidden and output. The input vectors comprised of spindle rotational speed, feed rates, vision flank wear, thrust and torque signals. The output was the drill wear state which was either usable or failure. Drilling experiments with various spindle rotational speed and feed rates were carried out. The learning process was peformed effectively by utilizing backpropagation. The detection of the abnormal states using BPNs achieved 96.4% reliability even when the spindle rotational speed and feedrate were changed.

  • PDF