• Title/Summary/Keyword: Media Security

Search Result 734, Processing Time 0.027 seconds

Pedestrian Counting System based on Average Filter Tracking for Measuring Advertisement Effectiveness of Digital Signage (디지털 사이니지의 광고효과 측정을 위한 평균 필터 추적 기반 유동인구 수 측정 시스템)

  • Kim, Kiyong;Yoon, Kyoungro
    • Journal of Broadcast Engineering
    • /
    • v.21 no.4
    • /
    • pp.493-505
    • /
    • 2016
  • Among modern computer vision and video surveillance systems, the pedestrian counting system is a one of important systems in terms of security, scheduling and advertising. In the field of, pedestrian counting remains a variety of challenges such as changes in illumination, partial occlusion, overlap and people detection. During pedestrian counting process, the biggest problem is occlusion effect in crowded environment. Occlusion and overlap must be resolved for accurate people counting. In this paper, we propose a novel pedestrian counting system which improves existing pedestrian tracking method. Unlike existing pedestrian tracking method, proposed method shows that average filter tracking method can improve tracking performance. Also proposed method improves tracking performance through frame compensation and outlier removal. At the same time, we keep various information of tracking objects. The proposed method improves counting accuracy and reduces error rate about S6 dataset and S7 dataset. Also our system provides real time detection at the rate of 80 fps.

Measuring Quality of Experience of Internet Protocol Television (IPTV 체감 품질의 측정)

  • Byun, Dae-Ho;Jeon, Hong-Dae
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.63-83
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an innovation technology to lead the new media age. Internet protocol television (IPTV) is a next generation television converged with the Internet which are delivered portal services such as information search, games, movies, home shopping and banking. Generally, service quality affects to adopt or use these technologies. Quality of experience (QoE) is more issue to be considered than service quality because of the technological restriction and limitation that IPTV is accessed by the Internet. The QoE is defined as the cognitive and experienced quality measured with users through an experiment and is conceptually related to service quality. The objective of this paper is to suggest a methodology to measure the QoE of IPTV using a user testing. We find significant factors affecting QoE of IPTV through an exploratory study and measure QoE scores. We found the nine factors of graphics, picture, accuracy, access method, quality of contents, usability, security, and performance important for QoE. The QoE scores of picture, graphics, and quality of contents gained over the average score, but the overall score for IPTV service providers was not high and the QoE needs to be improved.

A Study on the User Authentication Scheme with Forward Secrecy (순방향 비밀성을 제공하는 사용자 인증 스킴에 관한 연구)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.183-191
    • /
    • 2011
  • Recently Wang-Li proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we described the Wang-Li and Yoon et al.'s authentication scheme simply, and we prove that the Wang-Li's scheme is vulnerable to a password guessing attack and impersonation attack in case that the attacker steals the user's smart card and extracts the information in the smart card. Accordingly, we propose the improved user authentication scheme based on the hash function and generalized ElGamal signature scheme that can withstand many possible attacks including a password guessing attack, impersonation attack and replay attack, and that can offer the function of forward secrecy. The result of comparative analysis, the our proposed scheme is much more secure and efficient than the Wang-Li and Yoon et al.'s scheme.

Secure Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks (비대칭 무선랜 환경을 위한 안전한 패스워드 인증 키 교환 프로토콜)

  • Yang, Hyung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.173-181
    • /
    • 2011
  • User authentication and key exchange protocols are the most important cryptographic applications. For user authentication, most protocols are based on the users' secret passwords. However, protocols based on the users' secret passwords are vulnerable to the password guessing attack. In 1992, Bellovin and Merritt proposed an EKE(Encrypted Key Exchange) protocol for user authentication and key exchage that is secure against password guessing attack. After that, many enhanced and secure EKE protocols are proposed so far. In 2006, Lo pointed out that Yeh et al.'s password-based authenticated key exchange protocol has a security weakness and proposed an improved protocol. However, Cao and Lin showed that his protocol is also vulnerable to off-line password guessing attack. In this paper, we show his protocol is vulnerable to on-line password guessing attack using new attack method, and propose an improvement of password authenticated key exchange protocol for imbalanced wireless networks secure against password guessing attack.

Perceived Usefulness and Risks and Behavioral Intentions of Mobile Fashion Apps -Focus Group Interviews with Chinese Students Studying in Korea- (모바일 패션 앱의 지각된 유용성과 위험 및 행동의도 -중국인 유학생 초점집단 면접 조사-)

  • Hong, Heesook;Sun, Yu;Lee, Seung-Eun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.2
    • /
    • pp.255-272
    • /
    • 2020
  • This exploratory study investigated Chinese consumers' perceived usefulness and risks of fashion apps and identified reasons for continuance and discontinuance intentions. This study conducted focus group interviews with a convenience sample of 13 Chinese students majoring in fashion in Korea. Based on interviewee responses, this study identified five attributes leading the perceived usefulness of mobile fashion apps (ubiquity and convenience, multi-media information, personalization, interactivity between consumers, and immediateness) and sub elements related to the five attributes. Five types of perceived risk (privacy risk, security risk, product risk, loss of future opportunity, and time risk) were identified in relation to Chinese consumers' use of fashion apps. The important role of live streaming services was uniquely identified by Chinese fashion app users. Usefulness of location-based information provided by mobile fashion apps were differently perceived according to respondents' use purpose, and augmented reality services provided by the apps were related to entertainment rather than usefulness. This study provides meaningful insights into Chinese consumers' perceptions of fashion apps and important app attributes that influence their continuance and discontinuance intentions. The findings from this study lend preliminary implications for future researchers and fashion businesses interested in the Chinese app market.

Secure Configuration Scheme for Internet of Things using NFC as OOB Channel (NFC를 OOB 채널로 활용한 사물인터넷 보안 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.

A Study on the Public Safety Long Term Evolution Disaster Communication Network (PS-LTE 재난안전통신망에 관한 정책 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.43-51
    • /
    • 2015
  • South Korea decided to use the public safety long term evolution (PS-LTE) method to build a wireless communications network for national disaster. The move will allow all disaster management agencies, including police, firefighters and the military to use multimedia information, including videos, in addition to voice to carry out rescue operations from 2017. The Ministry of Science, ICT and Future Planning said Thursday that it adopted PS-LTE as the technology method for national disaster management system following a national policy coordination meeting last month. PS-LTE is a method integrating group communication, direction communication between terminals and independent base station function with existing LTE technology. Until now, disaster management agencies used technology that only allowed voice communication. However, transmission of multimedia information is possible using PS-LTE.

The Analysis on Users' Centrality in the Social Network and their Sentiment : Applying to Medical Web Forum on Alzheimer's Disease (사회연결망상의 우위와 감성 표현과의 관계 분석: 알츠하이머 웹포럼의 적용)

  • Lee, Min-Jung;Woo, Ji-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.127-140
    • /
    • 2015
  • In this study, we aim to analyze the relationship between the centrality in the social network and the sentiment of medial web forum users. In recent, many people use online resources to obtain health and wellness information especially social media resources. In the medial web forum, people give and receive informational supports and emotional supports and this interaction forms the social network. We analyze the social network, derive node characteristics in terms of centrality and compare the centrality index and the sentiment score derived from users' messages. We found that as more people express their emotion, they possess higher central position in the network. Further, people who express positive emotion in their messages have higher central position in the network than people who have negative emotion. This study will help to identify influentials of emotional supports to others and finally to control the depression of Alzheimer's disease patients and their related ones.

A Study on the Continuity Essential Function of Critical Infrastructure Protection System for Public Safety (공공안전을 위한 국가기반체계 보호제도의 핵심기능연속성에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.795-802
    • /
    • 2017
  • If the function of the national infrastructure is suspended due to natural disasters and social disasters, the damage of the national infrastructure can be a serious threat to the national security as well as the life, body and property damage of the people. In this paper, we examine the domestic and overseas trends of the national system protection system and examine the domestic and overseas trends of the national system protection system. The detailed function of the essential function continuity, essential function, succession order, authority delegation, continuity facility, continuity communication, We examined the specific issues related to testing, education and training, transferring control and directing authority, analyzing the system related to the national infrastructure protection plan, and examined the specific problems and suggested an effective improvement plan for the critical infrastructure protection system.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF