• Title/Summary/Keyword: Image Privacy

Search Result 102, Processing Time 0.025 seconds

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

A Study on A Biometric Bits Extraction Method Using Subpattern-based PCA and A Helper Data (영역기반 주성분 분석 방법과 보조정보를 이용한 얼굴정보의 비트열 변환 방법)

  • Lee, Hyung-Gu;Jung, Ho-Gi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.183-191
    • /
    • 2010
  • Unique and invariant biometric characteristics have been used for secure user authentication. Storing original biometric data is not acceptable due to privacy and security concerns of biometric technology. In order to enhance the security of the biometric data, the cancelable biometrics was introduced. Using revocable and non-invertible transformation, the cancelable biometrics can provide a way of more secure biometric authentication. In this paper, we present a new cancelable bits extraction method for the facial data. For the feature extraction, the Subpattern-based Principle Component Analysis (PCA) is adopted. The Subpattern-based PCA divides a whole image into a set of partitioned subpatterns and extracts principle components from each subpattern area. The feature extracted by using Subpattern-based PCA is discretized with a helper data based method. The elements of the obtained bits are evaluated and ordered according to a measure based on the fisher criterion. Finally, the most discriminative bits are chosen as the biometric bits string and used for authentication of each identity. Even if the generated bits string is compromised, new bits string can be generated simply by changing the helper data. Because, the helper data utilizes partial information of the feature, the proposed method does not reveal privacy sensitive biometric information of the user. For a security evaluation of the proposed method, a scenario in which the helper is compromised by an adversary is also considered.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

Design of Invisible Watermarking for Biometric Image of Electronic ID Card (전자신분증용 바이오 영상을 위한 비인지 워터마킹 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Kim, Won-Gyum
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1555-1565
    • /
    • 2008
  • Biometric information such as face and fingerprint information is highlighted in many security areas, including authentication, due to its uniqueness and convenience factors. However, if exploited maliciously, it can cause more serious damage than traditional security measures, like passwords. This paper reviews the watermarking method that is able to verify the integrity of this biometric information. The watermark to be inserted is the date of the biometric information acquisition. It is combined with 16-bit Cyclic Redundancy Checks prior to insertion. In particular, face and fingerprint images are saved in a specific compressed format. The proposed watermarking algorithm will be designed in such a way as to remain resilient against compression. The watermark inserted at the acquisition stage will be extracted at each storage and deployment stage, so that the integrity of the biometric information can be verified.

  • PDF

The Planning of Schematic Design for Student Housing Using Shipping Containers - Focused on the Student Housing of Keetwonen - (해상컨테이너를 이용한 대학생기숙사 거주 활용 계획 연구 - 암스테르담 대학생기숙사 키트보넨 사례를 중심으로 -)

  • Lee, Jong-Chan;Kang, Youn-Do;Kim, Byung-Sean
    • KIEAE Journal
    • /
    • v.14 no.6
    • /
    • pp.59-64
    • /
    • 2014
  • The purpose of this study was suggested to establish of student housing by using shipping container. The research method are a study of shipping container and characteristics of student housing by using shipping container, compared typically student housing with student housing by using shipping container. Also there are planning though a case study of various planes and survey based on the student housing city in Amsterdam, Netherland, is called Keetwonen. It is a planning for housing unit to actual build at the part of land to devise master plan The 40FT(High Cube) Shipping Container housing unit are double occupancy room with toilet and balcony. The common areas are the kitchen, laundry facilities, conference room and lounge are available on the first floor with a lightweight steel frame construction method applied for obtain substantive utilization of the space. Considering into the type and scale of site shall be planning in the form of side corridor and central corridor, which is preferable to separate the interior space into two areas by a central corridor to secure personal privacy. Also, planning such as a separate exterior panel, color and landscape design to improve the external image of the container and block the solar radiation heat influx with a pitched roof. Allow 24 college students shall live at the site of Seongnae-dong, Gangdong-gu in Seoul, Korea (site area $330.9m^2$), including common facilities and a lounge with a building that has three stories above ground were established to build plans to target the actual land.

Design and Implementation of Automated Detection System of Personal Identification Information for Surgical Video De-Identification (수술 동영상의 비식별화를 위한 개인식별정보 자동 검출 시스템 설계 및 구현)

  • Cho, Youngtak;Ahn, Kiok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.75-84
    • /
    • 2019
  • Recently, the value of video as an important data of medical information technology is increasing due to the feature of rich clinical information. On the other hand, video is also required to be de-identified as a medical image, but the existing methods are mainly specialized in the stereotyped data and still images, which makes it difficult to apply the existing methods to the video data. In this paper, we propose an automated system to index candidate elements of personal identification information on a frame basis to solve this problem. The proposed system performs indexing process using text and person detection after preprocessing by scene segmentation and color knowledge based method. The generated index information is provided as metadata according to the purpose of use. In order to verify the effectiveness of the proposed system, the indexing speed was measured using prototype implementation and real surgical video. As a result, the work speed was more than twice as fast as the playing time of the input video, and it was confirmed that the decision making was possible through the case of the production of surgical education contents.

Evolving Internet Information & Technology as Enablers for Creating Shared Values

  • Song, In Kuk;Chun, Junchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.309-317
    • /
    • 2015
  • Recently many companies began to realize their visions for the sustainable growth with the advent of CSV(Creating Shared Values). Michael E. Porter, a Harvard Professor, claims that placing social value creation at the core of business strategy has the potential to uncover big opportunities for individual companies and that shared value can play a significant role in increasing competitive advantages while fostering social prosperity. In consequence, the various researches have illustrated how to get the opportunity for competitive advantages from building a social value proposition into corporate strategy, and considerable studies have been promoted heavily from the managerial perspective. However, due to the lack of capability converging information technology with business strategy, any research effort to identify technological or Internet-related issues and to link the issues to CSV does not exist. With Korean being a Internet leading country, the demands of researches analyzing core technology, information, and service utilizing Internet are rapidly growing. The study aims to find out Internet-related enablers for CSV. This paper describes the concepts and features of CSV, identifies emerging Internet-related issues toward the opportunity for competitive advantage, and then depicts the rigorous research endeavors in the areas of Internet information, technology, and services. As a result, 11 papers presented and selected as the outstanding papers at APIC-IST 2014 handle the issues to be brought together, which include: Wireless and Sensor Network, Image Processing and HCI, Big Data and Business Intelligence, Security & Privacy in Internet, SNS & Communication, Smart-Learning and e-Learning, and Internet Business Strategy. The study finally recommends indispensible terms for substantially vitalizing CSV.

Long Distance Vehicle License Plate Region Detection Using Low Resolution Feature of License Plate Region in Road View Images (로드뷰 영상에서 번호판 영역의 저해상도 특징을 이용한 원거리 자동차 번호판 영역 검출)

  • Oh, Myoung-Kwan;Park, Jong-Cheon
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.239-245
    • /
    • 2017
  • For privacy protection, we propose a vehicle license plate region detection method in road view image served from portal site. Because vehicle license plate regions in road view images have different feature depending on distance, long distance vehicle license plate regions are not detected by feature of low resolution. Therefore, we suggest a method to detect short distance vehicle license plate regions by edge feature and long distance vehicle license plate regions using MSER feature. And then, we select candidate region of vehicle license plate region from detected region of each method, because the number of the vehicle license plate has a structural feature, we used it to detect the final vehicle license plate region. As the experiment result, we got a recall rate of 93%, precision rate of 75%, and F-Score rate of 80% in various road view images.

Generation of Changeable Face Template by Combining Independent Component Analysis Coefficients (독립성분 분석 계수의 합성에 의한 가변 얼굴 생체정보 생성 방법)

  • Jeong, Min-Yi;Lee, Chel-Han;Choi, Jeung-Yoon;Kim, Jai--Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.16-23
    • /
    • 2007
  • Changeable biometrics has been developed as a solution to problem of enhancing security and privacy. The idea is to transform a biometric signal or feature into a new one for the purposes of enrollment and matching. In this paper, we propose a changeable biometric system that can be applied to appearance based face recognition system. In the first step when using feature extraction, ICA(Independent Component Analysis) coefficient vectors extracted from an input face image are replaced randomly using their mean and variation. The transformed vectors by replacement are scrambled randomly and a new transformed face coefficient vector (transformed template) is generated by combination of the two transformed vectors. When this transformed template is compromised, it is replaced with new random numbers and a new scrambling rule. Because e transformed template is generated by e addition of two vectors, e original ICA coefficients could not be easily recovered from the transformed coefficients.

Robust Blind Watermarking in Medical Images Using by Polar Transformation (의료영상에서 Polar 변환을 적용한 강인한 블라인드 워터마킹 기법)

  • 김태호;남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.241-246
    • /
    • 2004
  • Medical images are being managed more by PACS in general medical institutions. It is important to protect patients from being invaded their privacy related to the images. It is also necessary to confirm the ownership, the right of properity of the medical images and notice whether the data are modified. In this paper, we propose a robust watermarking against RST attacks in medical images on the PACS. The proposed scheme modifies and improves Log-Polar Mapping and Fourier Mellin Transform in order to realize and recover serious image degradation and watermark data loss caused by the conversion between cartesian coordinate and log-polar coordinate. We used the radius and theta Look Up Table to solve the realization of the Fourier Mellin Transform, and inserted a watermark into 2D-DFT magnitudes using Spread Spectrum. Experimental results shows that this method are robust to several attack.

  • PDF