• Title/Summary/Keyword: Security Camera

Search Result 296, Processing Time 0.026 seconds

Smart CCTV Security Service in IoT(Internet of Things) Environment (사물인터넷 환경에서 스마트 CCTV 방범 서비스)

  • Cho, Jeong-Rae;Kim, Hye-Suk;Chae, Doo-Keol;Lim, Suk-Ja
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1135-1142
    • /
    • 2017
  • In this paper, we propose IoT based smart CCTV security service to prevent crime in blind spot and prevent unexpected fire or danger. In the proposed method, a RC (Radio Control) car is made using Raspberry pie, and a camera and various modules are installed in an RC car. It was then implemented using Raspbian O / S, Apache Web Server, Shell script, Python, PHP, HTML, CSS, Javascript. The RC car provides a security service that informs the manager of the situation by judging the risk of the scene with modules such as video, voice and temperature. Experimental results show that the transmission time of video and audio information is less than 0.1 second. In addition, real-time status transmission was possible in AVG, emergency, and manual mode. It is expected that the proposed method will be applied to the development of smart city by applying it to unmanned vehicles, drones and the like.

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

Home Security System Based on IoT (IoT 기반 홈 보안 시스템)

  • Kim, Kang-Chul;Wang, Ding-Hua;Han, Seok-Bung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.147-154
    • /
    • 2017
  • This paper aims to build a home security system based on IoT to monitor a home on a mobile phone. The system consists of data gathering sensors, camera, gateway and Xively platform. The Raspberry Pi collects data from the three sensors and sends the data to Xively, and sends the video stream of home to a client in a smart phone through a internet. The servers are composed of Xively, socket server in Raspberry Pi and E-mail server in Google. The proposed system transmits e-mail, text message, and video stream when there are motion, fire, and gas leakage, and can control the gas valve through Raspberry Pi. The experimental results show that a user gets 'emergency E-mail' and text message and watches the video stream of the home through WIFI or LTE on a smart phone.

Design and Implementation of the Security System for the Moving Object Detection (이동물체 검출을 위한 보안 시스템의 설계 및 구현)

  • 안용학;안일영
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.77-86
    • /
    • 2002
  • In this paper, we propose a segmentation algorithm that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. Image segmentation is one of the most difficult process in image processing and an adoption in the change of environment must be considered for the increase in the accuracy of the image. The proposed algorithm consists of four process : generation of the difference image between the input image and the reference image, removes the background noise using the background nois modeling to a difference image histogram, then selects the candidate initial region using local maxima to the difference image, and gradually expanding the connected regions, region by region, using the shape information. The test results show that the proposed algorithm can detect moving objects like intruders very effectively in the noisy environment.

  • PDF

Design and Implementation of Internal Network and VPN-based NVR System (내부망 및 VPN 기반 NVR 시스템 설계 및 구현)

  • Byeong-Seon Park;Hee-Kwon Lee;Dong-Hwan Hwang;Yong-Kab Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.1-6
    • /
    • 2024
  • In this paper, we designed and implemented the security network NVR system that can flexibly use the internal network and VPN network. In general, the NVR systems that only use internal networks cannot be access from the outside, which has the disadvantage of unnecessary inspections and inability to access from the outside. External access has made possible using the VPN security network, and a NVR system software was designed and implemented so that the existing internal network could be used. We compared with the NVR system usage environment in the internal network through the client and the NVR system. It also has implemented usage environment with the VPN network through the mobile APP, and confirmed that the same NVR was operating normally with the same functions. We also studied on IP based NVR for flexible access with closed loop network based on VPN system.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

A Implementation of Iris recognition system using scale-space filtering (Scale-space filtering을 이용한 홍채인식 보안시스템 구현)

  • Joo, Sang-Hyun;Kang, Tae-Gil;Yang, Woo-Suk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.175-181
    • /
    • 2009
  • In this paper, we introduce the implementation of the security system using iris recognition. This system acquires images with infrared camera and extracts the 2D code from a infrared image which uses scale-space filtering and concavity. We examine the system by (i) extract 2D code and (ii) compare the code that stored on the server (iii) mearsure FAR and FRR using pattern matching. Experiment results show that the proposed method is very suitable.

  • PDF

Implementation of Sound Recognition for Security Camera (보안카메라에서 소리인식 구현)

  • Yun, Tae-In;Ku, Ha-Neul;Kim, Do-Eun;Jang, Won-Serk;Kwon, Soon-Kak;Kwon, Oh-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.491-493
    • /
    • 2012
  • 소리인식이란 우리 귀에 들리는 모든 소리를 받아 들여 소리의 값과 저장되어 있는 데이터의 값을 비교하여 인식 결과를 도출해내는 과정을 의미한다. 보안 카메라는 현재 다양한 장소에서 설치되어 있어도 여전히 보안의 사각지대는 존재하며, 이를 보완하기 위해서는 여러 방향을 촬영하기 위한 아주 많은 보완 카메라가 설치될 수 밖에 없다. 그렇게 되면 설치비용이 더욱 증가되고, 무수한 카메라는 사람들에게 심적 부담감을 줄 것이다. 본 논문은 보안 카메라에 마이크를 설치하고, 입력되는 소리를 인식하여 발생되는 상황을 판단하는 시스템을 설계하고 구현하기 위한 것이다. 이를 바탕으로 보안 카메라의 사각지대를 소리인식으로 해결할 수 있어서 보완 카메라의 설치 비용을 줄일 수 있다.

  • PDF

Development of the Human Body Recognition System Using Image Processing (영상처리를 이용한 생체인식 시스템 개발)

  • Ayurzana, Odgerel;Ha, Kwan-Yong;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.187-189
    • /
    • 2004
  • This paper presents the system widely used for extraction of human body recognition system in the field of bio-metric identification. The Human body recognition system is used in many fields. This biological is appled to the human recognition in banking and the access control with security. The important algorithm of the identification software usese hand lines and hand shape geometry. We used the simple algorithm and recognizing the person by their hand image from the input camera. The geometrical characteristics in hand shape such as length of finger to whole hand length thickness of finger to length, etc are used.

  • PDF

3-D Laser Measurement using Mode Image Segmentation Method

  • Moon Hak-Yong;Park Jong-Chan;Han Wun-Dong;Cho Heung-Gi;Jeon Hee-Jong
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.104-108
    • /
    • 2001
  • In this paper, the 3-D measurement method of moving object with a laser and one camera system for image processing method is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. In this paper, to improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.

  • PDF