• Title/Summary/Keyword: Paper-smartphone devices

Search Result 249, Processing Time 0.032 seconds

Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering (Wiener 필터링에 기반하는 센서 패턴 노이즈를 활용한 영상 장치 식별 기술 연구)

  • Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2153-2158
    • /
    • 2016
  • Multimedia such as image, audio, and video is easy to create and distribute with the advance of IT. Since novice uses them for illegal purposes, multimedia forensics are required to protect contents and block illegal usage. This paper presents a multimedia forensic algorithm for video to identify the device used for acquiring unknown video files. First, the way to calculate a sensor pattern noise using Wiener filter (W-SPN) is presented, which comes from the imperfection of photon detectors against light. Then, the way to identify the device is explained after estimating W-SPNs from the reference device and the unknown video. For the experiment, 30 devices including DSLR, compact camera, smartphone, and camcorder are tested and analyzed quantitatively. Based on the results, the presented algorithm can achieve the 96.0% identification accuracy.

One-Click Marketing Solution for Mobile Videos

  • Lee, Jae Seung;Lee, Seung Heon;Jang, Jin Woo;Kim, Hyun Bin;Nam, Ga Young;Lee, Suk Ho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.71-76
    • /
    • 2019
  • In this paper, we propose a simple one-click marketing solution for mobile devices which can advertise a product which is embedded in a mobile video while watching the video on a smartphone. If a specific product of interest appears in the video to the user, one can simply click on the product in the video and a pop-up window with information about the product is proposed. The implementation of the system is expected to enable users to gain real-time information about the product while watching the video without having to search for the product again after watching the movie, and thereby facilitating more mobile commerce. We use a two-fold system to prevent the failure of tracking which often occurs on a single online tracking system, so that the user cannot always get the commercial product information.

Design and Implementation of Walking Status Analysis System based on Multi-Sensors

  • Seo, Kwi-Bin;Lee, Seung-Hyun;Hong, Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.159-166
    • /
    • 2019
  • Recently, the advanced development of smart devices has increased the interest in health-care, and many people are paying more attentions to disease prevention than disease treatment. Among these prevention methods, the bare body movement has received much attention, and especially walking exercise is attracting much attention because it is enjoyable without any restrictions on place and time. Walking exercise is generally divided into two types: walking on the ground and climbing the stairs. Walking up the stairs consumes much more calories compared to walking on the ground. These walking exercises have the advantage that they can be easily performed by male and female without special equipments or economic considerations. However, there is a lack of applications and systems that accurately determine such walking and stair walking and measure momentum according to stair walking. In this paper, we designed and implemented a real-time walking status analysis system using smartwatch's, pedometer, smartphone's barometer and beacons.

Device-Centered Personalized Product Recommendation Method using Purchase and Share Behavior in E-Commerce Environment (이커머스 환경에서 구매와 공유 행동을 이용한 기기 중심 개인화 상품 정보 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.85-96
    • /
    • 2022
  • Personalized recommendation technology is one of the most important technologies in electronic commerce environment. It helps users overcome information overload by suggesting information that match user's interests. In e-commerce environment, both mobile device users and smart device users have risen dramatically. It creates new challenges. Our method suggests product information that match user's device interests beyond only user's interests. We propose a device-centered personalized recommendation method. Our method uses both purchase and share behavior for user's devices interests. Moreover, it considers data type preference for each device. This paper presents a new recommendation method and algorithm. Then, an e-commerce scenario with a computer, a smartphone and an AI-speaker are described. The scenario shows our work is better than previous researches.

Design of Small Space Convergence Locking device Using IoT (IOT를 이용한 소규모 공간의 융합 잠금 장치 제안)

  • Park, Hyun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

Design and Implementation of Cost-effecive Public Bicycle Sharing System based on IoT and Access Code Distribution (사물 인터넷과 액세스 코드 배포 기반의 경제적인 공공 자전거 공유 시스템의 설계 및 구현)

  • Bajracharya, Larsson;Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1123-1132
    • /
    • 2018
  • In this paper, we design and implement a public bicycle sharing system based on smart phone application capable of distributing access codes via internet connection. When smartphone user uses the application to request a bicycle unlock code, server receives the request and sends an encrypted code, which is used to unlock the bicycle at the station and the same code is used to return the bicycle. The station's hardware prototypes were built on top of Internet devices such as raspberry pi, arduino, keypad, and motor driver, and smartphone application basically includes shared bike rental and return functionality. It also includes an additional feature of reservation for a certain time period. We tested the implemented system, and found that it is efficient because it shows the average of 3-4 seconds delay. The system can be implemented to manage multiple bikes with a single control box, and as the user can use a smartphone application, this makes the system more cost effective.

User Motion Recognition Healthcare System Using Smart-Band (스마트밴드를 이용한 사용자 모션인식 헬스 케어 시스템 구현)

  • Park, Jin-Tae;Hwang, Hyun-Seo;Yun, Jun-Soo;Park, Gyung-Soo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.619-624
    • /
    • 2014
  • Nowadays there are various smart devices and development with the development of smart phones and that can be attached to the human body wearable computing device has been in the spotlight. In this paper, we proceeded developing wearable devices in watch type which can detect user's movement and developing a system which connects the wearable devices to smart TVs, or smart phones so that users can save and manage their physical information in those devices. Health care wearable devices already existing save information by connecting their systems to smart phones. And, smart TV health applications usually include motion detecting systems using cameras. However, there is a limit when connecting smart phone systems to different devices from various companies. Also, in case of smart TV, because some devices may not have cameras, there can be a limit for users who wants to connect their devices to smart TVs. Wearable device and user information collected by using the smart phone and when it is possible to exercise and manage anywhere. This information can also be confirmed by the smart TV applications. By using this system will be able to take advantage of the study of the behavior of the future work of the user more accurately be measured in recognition technology and other devices.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Design for Distributed Simulator using Wired and Wireless Devices (유무선 단말기를 이용한 분산 시뮬레이터 설계)

  • Jo, Soo-Hyun;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.41-48
    • /
    • 2011
  • Wireless communication technology developed, portable wireless devices based on wireless network including the smartphone rapidly developed, and products with functions similar to highly efficient computer are being launched. Therefore, active studies to enable performance of works, which were previously held in computers, on portable wireless terminal are being held. Until now, simulation was undertaken using computers which satisfy high performance computing resource. Such contains a problem that it cannot break away the limit of space. Portable wireless terminal has the merit that it can break away from the limit of space by using wireless network in comparison to wired environment. In this paper, it suggests a simulator based on wireless devices for distributed simulation. For such purpose, the performance time of simulation will be compared in regards to the case of performing nodes control simulation in a single highly efficient computer and the case of performing distributed simulation in many wired and wireless network environments. Through the comparison, the possibility for utility of portable wireless terminal as the object of distributed simulation will be verified, and it will be presented that simulation can be performed in a shorter time by performing distributed simulation under various wired and wireless network environments away from the limit of space.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.