• Title/Summary/Keyword: Intelligent image security

Search Result 79, Processing Time 0.03 seconds

Emergency Detection Method using Motion History Image for a Video-based Intelligent Security System

  • Lee, Jun;Lee, Se-Jong;Park, Jeong-Sik;Seo, Yong-Ho
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.39-42
    • /
    • 2012
  • This paper proposed a method that detects emergency situations in a video stream using MHI (Motion History Image) and template matching for a video-based intelligent security system. The proposed method creates a MHI of each human object through image processing technique such as background removing based on GMM (Gaussian Mixture Model), labeling and accumulating the foreground images, then the obtained MHI is compared with the existing MHI templates for detecting an emergency situation. To evaluate the proposed emergency detection method, a set of experiments on the dataset of video clips captured from a security camera has been conducted. And we successfully detected emergency situations using the proposed method. In addition, the implemented system also provides MMS (Multimedia Message Service) so that a security manager can deal with the emergency situation appropriately.

Exploring Image Processing and Image Restoration Techniques

  • Omarov, Batyrkhan Sultanovich;Altayeva, Aigerim Bakatkaliyevna;Cho, Young Im
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.172-179
    • /
    • 2015
  • Because of the development of computers and high-technology applications, all devices that we use have become more intelligent. In recent years, security and surveillance systems have become more complicated as well. Before new technologies included video surveillance systems, security cameras were used only for recording events as they occurred, and a human had to analyze the recorded data. Nowadays, computers are used for video analytics, and video surveillance systems have become more autonomous and automated. The types of security cameras have also changed, and the market offers different kinds of cameras with integrated software. Even though there is a variety of hardware, their capabilities leave a lot to be desired. Therefore, this drawback is trying to compensate by dint of computer program solutions. Image processing is a very important part of video surveillance and security systems. Capturing an image exactly as it appears in the real world is difficult if not impossible. There is always noise to deal with. This is caused by the graininess of the emulsion, low resolution of the camera sensors, motion blur caused by movements and drag, focus problems, depth-of-field issues, or the imperfect nature of the camera lens. This paper reviews image processing, pattern recognition, and image digitization techniques, which will be useful in security services, to analyze bio-images, for image restoration, and for object classification.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission

  • Kumar, N. Rajesh;Krishnan, R. Bala;Manikandan, G.;Raajan, N.R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2862-2878
    • /
    • 2020
  • Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* - 1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.

Soundsource Localization and Tracking System of Intruder for Intelligent Surveillance System (지능형 감시 시스템 구축을 위한 침입자의 음원 위치 파악 및 추적 시스템)

  • Park, Jung-Hyun;Yeom, Hong-Gi;Jung, Bong-Gyu;Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.6
    • /
    • pp.786-791
    • /
    • 2007
  • In the place that its security is crucial, the necessity of system which can tract and recognize random person is getting more important. In this paper, we'd like to develop the invader tracking system which consists of the sound source tracking-sensor and the pan-tilt camera for wide-area guard. After detecting the direction of any sound with the sound source tracking-sensor at first, our system make move the pan-tilt camera to that direction and extract reference image from that camera. This reference image is compared and updated by the next captured image after some interval time. By keeping on it over again, we can realize the guard system which can tract an invader using the difference image and the result of another image processing. By linking home network security system, the suggested system can provide some interfacing functions for the security service of the public facilities as well as that of home.

Image-based Intelligent Surveillance System Using Unmanned Aircraft (무인비행체를 이용한 영상 기반 지능형 순찰 시스템)

  • Kim, Do Hyun;Kim, Jung Eun;Song, Ji Hag;Shin, Yong Jun;Hwang, Sung Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.437-445
    • /
    • 2017
  • Necessity of security reinforcement has been increased these days. As a result, surveillance systems using CCTV and the patrol system by person have been applied to security zone. However, CCTV has a blind spot and CCTV itself cannot handle emergency situation. Patrol system by person is economically expensive. To overcome these disadvantages, this paper presents an image-based surveillance system using unmanned aircraft. As a default, unmanned aircraft traces lines installed on ground which represents path for patrolling. If the aircraft detects objects, then it keeps a constant distance between object without missing the object in the image. Simulation results show that the proposed system can be operated even with unmanned aircraft with low specification.

MalDC: Malicious Software Detection and Classification using Machine Learning

  • Moon, Jaewoong;Kim, Subin;Park, Jangyong;Lee, Jieun;Kim, Kyungshin;Song, Jaeseung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1466-1488
    • /
    • 2022
  • Recently, the importance and necessity of artificial intelligence (AI), especially machine learning, has been emphasized. In fact, studies are actively underway to solve complex and challenging problems through the use of AI systems, such as intelligent CCTVs, intelligent AI security systems, and AI surgical robots. Information security that involves analysis and response to security vulnerabilities of software is no exception to this and is recognized as one of the fields wherein significant results are expected when AI is applied. This is because the frequency of malware incidents is gradually increasing, and the available security technologies are limited with regard to the use of software security experts or source code analysis tools. We conducted a study on MalDC, a technique that converts malware into images using machine learning, MalDC showed good performance and was able to analyze and classify different types of malware. MalDC applies a preprocessing step to minimize the noise generated in the image conversion process and employs an image augmentation technique to reinforce the insufficient dataset, thus improving the accuracy of the malware classification. To verify the feasibility of our method, we tested the malware classification technique used by MalDC on a dataset provided by Microsoft and malware data collected by the Korea Internet & Security Agency (KISA). Consequently, an accuracy of 97% was achieved.

An Intelligent Video Image Segmentation System using Watershed Algorithm (워터쉐드 알고리즘을 이용한 지능형 비디오 영상 분할 시스템)

  • Yang, Hwang-Kyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.3
    • /
    • pp.309-314
    • /
    • 2010
  • In this paper, an intelligent security camera over internet is proposed. Among ISC methods, watersheds based methods produce a good performance in segmentation accuracy. But traditional watershed transform has been suffered from over-segmentation due to small local minima included in gradient image that is input to the watershed transform. And a zone face candidates of detection using skin-color model. last step, face to check at face of candidate location using SVM method. It is extract of wavelet transform coefficient to the zone face candidated. Therefore, it is likely that it is applicable to read world problem, such as object tracking, surveillance, and human computer interface application etc.

Performance Analysis of Face Recognition by Distance according to Image Normalization and Face Recognition Algorithm (영상 정규화 및 얼굴인식 알고리즘에 따른 거리별 얼굴인식 성능 분석)

  • Moon, Hae-Min;Pan, Sung Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.737-742
    • /
    • 2013
  • The surveillance system has been developed to be intelligent which can judge and cope by itself using human recognition technique. The existing face recognition is excellent at a short distance but recognition rate is reduced at a long distance. In this paper, we analyze the performance of face recognition according to interpolation and face recognition algorithm in face recognition using the multiple distance face images to training. we use the nearest neighbor, bilinear, bicubic, Lanczos3 interpolations to interpolate face image and PCA and LDA to face recognition. The experimental results show that LDA-based face recognition with bilinear interpolation provides performance in face recognition.

A Design of Intelligent Surveillance System Based on Mobile Robot and Network Camera (모바일 로봇 및 네트워크 카메라 기반 지능형 감시 시스템 설계)

  • Park, Jung-Hyun;Lee, Min-Young;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.476-481
    • /
    • 2008
  • The necessity of intelligent surveillance system is gradually considered seriously from the space where the security is important. From this paper will load Network Camera in Mobile Robot based on embedded Linux and Goal is in the system embodiment will be able to track the intruder. From Network Camera uses Wireless Lan transmits an image with server, grasps direction of the intruder used Block Matching algorithms from server, transmits direction information and tracks an intruder. The robot tracks the intruder according to gets the effective image of an intruder. In compliance with this paper the system which is embodied is linked with a different surveillance system and as intelligent surveillance system there is a possibility of becoming worse a reliability.